Translations by Nick Ellery

Nick Ellery has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

150 of 69 results
~
To restore a backup made with <application>HUBackup</application>, press <menuchoice><guimenu>System</guimenu><guisubmenu>Administration</guisubmenu><guimenuitem>Home User Restore</guimenuitem></menuchoice> and follow the instructions on-screen.
2008-05-20
To restore a backup made with <application>HUBackup</application>, press <menuchoice><guimenu>System</guimenu><guisubmenu>Administration</guisubmenu><guimenuitem>Home User Restore</guimenuitem></menuchoice> and follow the instructions on-screen.
~
Alternatively, you can use a dedicated back-up application, such as <application>HUBackup</application>:
2008-05-20
Alternatively, you can use a dedicated back-up application, such as <application>HUBackup</application>:
~
To make a backup, press <menuchoice><guimenu>System</guimenu><guisubmenu>Administration</guisubmenu><guimenuitem>Home User Backup</guimenuitem></menuchoice>.
2008-05-20
To make a backup, press <menuchoice><guimenu>System</guimenu><guisubmenu>Administration</guisubmenu><guimenuitem>Home User Backup</guimenuitem></menuchoice>.
~
Select the files which you would like to make a backup copy of and choose the location which you would like to save the backup to. If you have a CD or DVD writer, it should be present in this list.
2008-05-20
Select the files which you would like to make a backup copy of and choose the location which you would like to save the backup to. If you have a CD or DVD writer, it should be present in this list.
~
Press <guibutton>Backup</guibutton> and follow the instructions given on-screen.
2008-05-20
Press <guibutton>Backup</guibutton> and follow the instructions given on-screen.
~
If a website asks for your financial details, ensure that it is secure. In the <application>Firefox Web browser</application>, secure websites have a <emphasis>yellow</emphasis> address bar with a padlock icon to the right of the address. Click on the padlock to read more information about the security of the website.
2008-05-20
If a website asks for your financial details, ensure that it is secure. In the <application>Firefox Web browser</application>, secure websites have a <emphasis>yellow</emphasis> address bar with a padlock icon to the right of the address. Click on the padlock to read more information about the security of the website.
~
For help and advice on the advanced configuration of <application>Firestarter</application>, see the <ulink url="http://www.fs-security.com/docs.php">Firestarter Online Manual</ulink>.
2008-05-20
For help and advice on the advanced configuration of <application>Firestarter</application>, see the <ulink url="http://www.fs-security.com/docs.php">Firestarter Online Manual</ulink>.
~
Follow the steps in the <application>Firewall Wizard</application>. After completing all of the steps, the firewall should be configured and running.
2008-05-20
Follow the steps in the <application>Firewall Wizard</application>. After completing all of the steps, the firewall should be configured and running.
~
The <application>Firewall Wizard</application> should run. If it does not, press <menuchoice><guimenu>Firewall</guimenu><guimenuitem>Run Wizard</guimenuitem></menuchoice>.
2008-05-20
The <application>Firewall Wizard</application> should run. If it does not, press <menuchoice><guimenu>Firewall</guimenu><guimenuitem>Run Wizard</guimenuitem></menuchoice>.
~
More advanced users may wish to use the UFW firewall, which is installed by default. See the <ulink type="help" url="man:ufw">UFW manual</ulink> for more information.
2008-05-20
More advanced users may wish to use the UFW firewall, which is installed by default. See the <ulink type="help" url="man:ufw">UFW manual</ulink> for more information.
~
To check that your firewall is working correctly, make use of an online firewall testing service such as <ulink url="http://www.grc.com/">ShieldsUP</ulink>.
2008-05-20
To check that your firewall is working correctly, make use of an online firewall testing service such as <ulink url="http://www.grc.com/">ShieldsUP</ulink>.
~
You can optionally install a firewall to protect your computer against unauthorized access by people on the Internet or your network. Firewalls block connections to your computer from unknown sources, which helps to prevent security breaches.
2008-05-20
You can optionally install a firewall to protect your computer against unauthorized access by people on the Internet or your network. Firewalls block connections to your computer from unknown sources, which helps to prevent security breaches.
~
To start <application>Firestarter</application>, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Firestarter</guimenuitem></menuchoice>, and enter your administrator password when prompted.
2008-05-20
To start <application>Firestarter</application>, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Firestarter</guimenuitem></menuchoice>, and enter your administrator password when prompted.
~
Click the update icon, and enter your password when asked.
2008-05-20
Click the update icon, and enter your password when asked.
~
In the Update Manager window, click <guibutton>Install Updates</guibutton>.
2008-05-20
In the Update Manager window, click <guibutton>Install Updates</guibutton>.
~
When updates are available, the update icon (an orange star) appears in the panel, usually near the top right of the screen. To install updates you must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> and the computer must be connected to the Internet.
2008-05-20
When updates are available, the update icon (an orange star) appears in the panel, usually near the top right of the screen. To install updates you must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> and the computer must be connected to the Internet.
1.
ubuntu-doc@lists.ubuntu.com (Ubuntu Documentation Project)
2008-05-20
ubuntu-doc@lists.ubuntu.com (Ubuntu Documentation Project)
2.
Keeping Your Computer Safe
2008-05-20
Keeping Your Computer Safe
3.
2006-09-07
2008-05-20
2006-09-07
4.
Placeholder.
2008-05-20
Placeholder.
5.
Credits and License
2008-05-20
Credits and License
7.
This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA).
2008-05-20
This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA).
8.
You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license.
2008-05-20
You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license.
9.
This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER.
2008-05-20
This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER.
12.
Ubuntu Documentation Project
2008-05-20
Ubuntu Documentation Project
13.
Canonical Ltd. and members of the <placeholder-1/>
2008-05-20
Canonical Ltd. and members of the <placeholder-1/>
14.
The Ubuntu Documentation Project
2008-05-20
The Ubuntu Documentation Project
15.
This section describes how to keep your computer safe from security threats.
2008-05-20
This section describes how to keep your computer safe from security threats.
27.
Give a separate user account to each person
2008-05-20
Give a separate user account to each person
28.
When Ubuntu is installed, it is set up for a single person to use. If more than one person will use the computer, it is best for each person to have their own user account. This way they can have separate settings, documents, and other files. If necessary, files can also be protected from being viewed or changed by non-administrators.
2008-05-20
When Ubuntu is installed, it is set up for a single person to use. If more than one person will use the computer, it is best for each person to have their own user account. This way they can have separate settings, documents, and other files. If necessary, files can also be protected from being viewed or changed by non-administrators.
29.
To set up user accounts, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Users and Groups</guimenuitem></menuchoice>. You must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> to do this.
2008-05-20
To set up user accounts, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Users and Groups</guimenuitem></menuchoice>. You must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> to do this.
30.
See the <ulink type="help" url="ghelp:users-admin">Users Administration Tool manual</ulink> for more information on setting up user accounts.
2008-05-20
See the <ulink type="help" url="ghelp:users-admin">Users Administration Tool manual</ulink> for more information on setting up user accounts.
31.
Keep your software up to date
2008-05-20
Keep your software up to date
32.
Ubuntu developers often issue updates to the Ubuntu software. These updates may improve security or fix other problems.
2008-05-20
Ubuntu developers often issue updates to the Ubuntu software. These updates may improve security or fix other problems.
34.
The update process may take a while if many updates need to be installed.
2008-05-20
The update process may take a while if many updates need to be installed.
35.
If a pair of blue arrows appears in the panel when the updates have finished, you need to restart the computer to complete the installation.
2008-05-20
If a pair of blue arrows appears in the panel when the updates have finished, you need to restart the computer to complete the installation.
36.
To check for updates yourself, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Update Manager</guimenuitem></menuchoice> and press <guibutton>Check</guibutton>.
2008-05-20
To check for updates yourself, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Update Manager</guimenuitem></menuchoice> and press <guibutton>Check</guibutton>.
38.
Lock your screen while away
2008-05-20
Lock your screen while away
39.
Locking your screen prevents other people from accessing your computer while you are away from it. All of your applications and work remain open while the screen is locked, and the screensaver is displayed.
2008-05-20
Locking your screen prevents other people from accessing your computer while you are away from it. All of your applications and work remain open while the screen is locked, and the screensaver is displayed.
40.
You can lock your screen in one of the following ways:
2008-05-20
You can lock your screen in one of the following ways:
42.
Press <keycombo><keycap>Control</keycap><keycap>Alt</keycap><keycap>L</keycap></keycombo> to lock the screen. This keyboard shortcut can be changed in <menuchoice><guimenu>System</guimenu><guimenuitem>Preferences</guimenuitem><guimenuitem>Keyboard Shortcuts</guimenuitem></menuchoice>.
2008-05-20
Press <keycombo><keycap>Control</keycap><keycap>Alt</keycap><keycap>L</keycap></keycombo> to lock the screen. This keyboard shortcut can be changed in <menuchoice><guimenu>System</guimenu><guimenuitem>Preferences</guimenuitem><guimenuitem>Keyboard Shortcuts</guimenuitem></menuchoice>.
43.
You can add a <guibutton>Lock Screen</guibutton> button to a panel for easy access. Right-click a panel (for example, the panel at the top of the screen), select <guibutton>Add to Panel...</guibutton> and drag the <guibutton>Lock Screen</guibutton> item to the desired location.
2008-05-20
You can add a <guibutton>Lock Screen</guibutton> button to a panel for easy access. Right-click a panel (for example, the panel at the top of the screen), select <guibutton>Add to Panel...</guibutton> and drag the <guibutton>Lock Screen</guibutton> item to the desired location.
45.
If more than one person has a user account on your computer and the screen is locked, other users can press the <guibutton>Switch user...</guibutton> button to use the computer, even while the screen is locked. They will be unable to access your currently-open work, and you will be able to switch back to your locked session when they have finished using the computer.
2008-05-20
If more than one person has a user account on your computer and the screen is locked, other users can press the <guibutton>Switch user...</guibutton> button to use the computer, even while the screen is locked. They will be unable to access your currently-open work, and you will be able to switch back to your locked session when they have finished using the computer.
46.
Set up a firewall
2008-05-20
Set up a firewall
73.
Avoid Internet nuisances and crime
2008-05-20
Avoid Internet nuisances and crime
74.
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
2008-05-20
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
75.
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
2008-05-20
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
76.
Unwanted (unsolicited) mail tends to fall in to one of several categories:
2008-05-20
Unwanted (unsolicited) mail tends to fall in to one of several categories:
77.
Spam (junk) email, where people offer unwanted services and products
2008-05-20
Spam (junk) email, where people offer unwanted services and products
78.
Scam emails, where people pretend to ask for help in exchange for large sums of money
2008-05-20
Scam emails, where people pretend to ask for help in exchange for large sums of money