Translations by Nick Ellery

Nick Ellery has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

150 of 51 results
1.
ubuntu-doc@lists.ubuntu.com (Ubuntu Documentation Project)
2008-05-20
ubuntu-doc@lists.ubuntu.com (Ubuntu Documentation Project)
2.
Keeping Your Computer Safe
2008-05-20
Keeping Your Computer Safe
3.
2006-09-07
2008-05-20
2006-09-07
4.
Placeholder.
2008-05-20
Placeholder.
5.
Credits and License
2008-05-20
Credits and License
7.
This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA).
2008-05-20
This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA).
8.
You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license.
2008-05-20
You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license.
9.
This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER.
2008-05-20
This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER.
12.
Ubuntu Documentation Project
2008-05-20
Ubuntu Documentation Project
13.
Canonical Ltd. and members of the <placeholder-1/>
2008-05-20
Canonical Ltd. and members of the <placeholder-1/>
14.
The Ubuntu Documentation Project
2008-05-20
The Ubuntu Documentation Project
15.
This section describes how to keep your computer safe from security threats.
2008-05-20
This section describes how to keep your computer safe from security threats.
26.
Give a separate user account to each person
2008-05-20
Give a separate user account to each person
27.
When Ubuntu is installed, it is set up for a single person to use. If more than one person will use the computer, it is best for each person to have their own user account. This way they can have separate settings, documents, and other files. If necessary, files can also be protected from being viewed or changed by non-administrators.
2008-05-20
When Ubuntu is installed, it is set up for a single person to use. If more than one person will use the computer, it is best for each person to have their own user account. This way they can have separate settings, documents, and other files. If necessary, files can also be protected from being viewed or changed by non-administrators.
28.
To set up user accounts, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Users and Groups</guimenuitem></menuchoice>. You must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> to do this.
2008-05-20
To set up user accounts, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Users and Groups</guimenuitem></menuchoice>. You must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> to do this.
29.
See the <ulink type="help" url="ghelp:users-admin">Users Administration Tool manual</ulink> for more information on setting up user accounts.
2008-05-20
See the <ulink type="help" url="ghelp:users-admin">Users Administration Tool manual</ulink> for more information on setting up user accounts.
30.
Keep your software up to date
2008-05-20
Keep your software up to date
31.
Ubuntu developers often issue updates to the Ubuntu software. These updates may improve security or fix other problems.
2008-05-20
Ubuntu developers often issue updates to the Ubuntu software. These updates may improve security or fix other problems.
33.
The update process may take a while if many updates need to be installed.
2008-05-20
The update process may take a while if many updates need to be installed.
34.
If a pair of blue arrows appears in the panel when the updates have finished, you need to restart the computer to complete the installation.
2008-05-20
If a pair of blue arrows appears in the panel when the updates have finished, you need to restart the computer to complete the installation.
35.
To check for updates yourself, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Update Manager</guimenuitem></menuchoice> and press <guibutton>Check</guibutton>.
2008-05-20
To check for updates yourself, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Update Manager</guimenuitem></menuchoice> and press <guibutton>Check</guibutton>.
37.
Lock your screen while away
2008-05-20
Lock your screen while away
38.
Locking your screen prevents other people from accessing your computer while you are away from it. All of your applications and work remain open while the screen is locked, and the screensaver is displayed.
2008-05-20
Locking your screen prevents other people from accessing your computer while you are away from it. All of your applications and work remain open while the screen is locked, and the screensaver is displayed.
39.
You can lock your screen in one of the following ways:
2008-05-20
You can lock your screen in one of the following ways:
41.
Press <keycombo><keycap>Control</keycap><keycap>Alt</keycap><keycap>L</keycap></keycombo> to lock the screen. This keyboard shortcut can be changed in <menuchoice><guimenu>System</guimenu><guimenuitem>Preferences</guimenuitem><guimenuitem>Keyboard Shortcuts</guimenuitem></menuchoice>.
2008-05-20
Press <keycombo><keycap>Control</keycap><keycap>Alt</keycap><keycap>L</keycap></keycombo> to lock the screen. This keyboard shortcut can be changed in <menuchoice><guimenu>System</guimenu><guimenuitem>Preferences</guimenuitem><guimenuitem>Keyboard Shortcuts</guimenuitem></menuchoice>.
42.
You can add a <guibutton>Lock Screen</guibutton> button to a panel for easy access. Right-click a panel (for example, the panel at the top of the screen), select <guibutton>Add to Panel...</guibutton> and drag the <guibutton>Lock Screen</guibutton> item to the desired location.
2008-05-20
You can add a <guibutton>Lock Screen</guibutton> button to a panel for easy access. Right-click a panel (for example, the panel at the top of the screen), select <guibutton>Add to Panel...</guibutton> and drag the <guibutton>Lock Screen</guibutton> item to the desired location.
44.
If more than one person has a user account on your computer and the screen is locked, other users can press the <guibutton>Switch user...</guibutton> button to use the computer, even while the screen is locked. They will be unable to access your currently-open work, and you will be able to switch back to your locked session when they have finished using the computer.
2008-05-20
If more than one person has a user account on your computer and the screen is locked, other users can press the <guibutton>Switch user...</guibutton> button to use the computer, even while the screen is locked. They will be unable to access your currently-open work, and you will be able to switch back to your locked session when they have finished using the computer.
45.
Set up a firewall
2008-05-20
Set up a firewall
72.
Avoid Internet nuisances and crime
2008-05-20
Avoid Internet nuisances and crime
73.
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
2008-05-20
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
74.
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
2008-05-20
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
75.
Unwanted (unsolicited) mail tends to fall in to one of several categories:
2008-05-20
Unwanted (unsolicited) mail tends to fall in to one of several categories:
76.
Spam (junk) email, where people offer unwanted services and products
2008-05-20
Spam (junk) email, where people offer unwanted services and products
77.
Scam emails, where people pretend to ask for help in exchange for large sums of money
2008-05-20
Scam emails, where people pretend to ask for help in exchange for large sums of money
78.
Phishing email, where the message appears to be from a bank or other online service, asking you to enter your personal and financial details, or passwords.
2008-05-20
Phishing email, where the message appears to be from a bank or other online service, asking you to enter your personal and financial details, or passwords.
79.
Below are some tips for keeping safe online:
2008-05-20
Below are some tips for keeping safe online:
80.
You should never reply to unsolicited mail, or even click on the links in the mail. Doing so usually results in more junk mail being sent to you.
2008-05-20
You should never reply to unsolicited mail, or even click on the links in the mail. Doing so usually results in more junk mail being sent to you.
81.
Never click on links in emails which lead to websites asking for your password or similar. It is possible for the text of the link to give one address, when really it opens up another (possibly dangerous) address. Instead, type the link into your web browser yourself and proceed from there.
2008-05-20
Never click on links in emails which lead to websites asking for your password or similar. It is possible for the text of the link to give one address, when really it opens up another (possibly dangerous) address. Instead, type the link into your web browser yourself and proceed from there.
83.
Only download and run software from sources that you trust. By default, you can only download software directly from Ubuntu.
2008-05-20
Only download and run software from sources that you trust. By default, you can only download software directly from Ubuntu.
84.
Make backup copies of your files
2008-05-20
Make backup copies of your files
85.
A problem which you may occasionally encounter is the unexpected loss of some of your work and settings for one reason or another. The causes of such <emphasis>data loss</emphasis> are many and varied; it could be anything from a power cut to accidentally deleting a file. It is highly recommended that you make regular back-up copies of your important files so that, if you do encounter a problem, you will not have lost those files.
2008-05-20
A problem which you may occasionally encounter is the unexpected loss of some of your work and settings for one reason or another. The causes of such <emphasis>data loss</emphasis> are many and varied; it could be anything from a power cut to accidentally deleting a file. It is highly recommended that you make regular back-up copies of your important files so that, if you do encounter a problem, you will not have lost those files.
86.
It is wise to store back-up copies of files separately from your computer; that is, you should make use of some form of file storage which is not permanently attached to your computer. Options include:
2008-05-20
It is wise to store back-up copies of files separately from your computer; that is, you should make use of some form of file storage which is not permanently attached to your computer. Options include:
87.
Writable CDs and DVDs
2008-05-20
Writable CDs and DVDs
88.
External hard disks and flash memory devices
2008-05-20
External hard disks and flash memory devices
89.
Another computer on the network
2008-05-20
Another computer on the network
90.
A simple way of backing-up your files is to manually copy them to a safe location (see above) by using the <application>File Browser</application>.
2008-05-20
A simple way of backing-up your files is to manually copy them to a safe location (see above) by using the <application>File Browser</application>.
102.
Some general advice on how to keep good back-ups is given below:
2008-05-20
Some general advice on how to keep good back-ups is given below:
103.
Back-up on a regular basis
2008-05-20
Back-up on a regular basis
104.
Always test your back-ups after you make them, to ensure that they have been made correctly
2008-05-20
Always test your back-ups after you make them, to ensure that they have been made correctly
105.
Label your back-ups clearly, and keep them in a safe place
2008-05-20
Label your back-ups clearly, and keep them in a safe place