Translations by Luz Varela Armas

Luz Varela Armas has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

132 of 32 results
3.
Specify a scan result file in Nmap XML output format. Can be used more than once to specify several scan result files.
2013-07-10
Especifica un ficheiro de resultado da análise no formato de saída Nmap XML. Poderase usar máis dunha vez para especificar varios ficheiros de resultado da análise.
4.
Run %s with the specified args.
2013-07-10
Executar %s cos argumentos especificados.
5.
Begin with the specified profile selected. If combined with the -t (--target) option, automatically run the profile against the specified target.
2013-07-10
Comeza co perfil especificado seleccionado. De se combinar coa opción -t (--target), executa automaticamente o perfil contra o destino seleccionado.
6.
Specify a target to be used along with other options. If specified alone, open with the target field filled with the specified target
2013-07-10
Especifica un destino para se usar canda outras opcións. De se especificar só, ábrese co campo de destino cuberto co destino especificado
7.
Increase verbosity of the output. May be used more than once to get even more verbosity
2013-07-03
Aumenta a cantidade de información da saída. Pódese usar máis dunha vez para obter aínda máis información
8.
No module named dbapi2.pysqlite2 or sqlite3
2013-07-03
Non hai ningún módulo co nome dbapi2.pysqlite2 ou sqlite3
47.
Nmap Output Properties
2013-07-03
Propiedade de saída de Nmap
48.
details
2013-07-03
detalles
50.
open port
2013-07-03
porto aberto
51.
closed port
2013-07-03
porto pechado
52.
filtered port
2013-07-03
porto filtrado
53.
date
2013-07-03
data
54.
hostname
2013-07-03
nome de equipo
55.
ip
2013-07-03
ip
57.
Text
2013-07-03
Texto
58.
Highlight
2013-07-03
Resaltar
61.
About %s and %s
2013-07-03
Sobre %s e %s
62.
%s is a free and open source utility for network exploration and security auditing.
2013-07-03
%s é unha utilidade libre e de código aberto para a exploración de redes e para auditorías de seguridade.
64.
%s is an %s GUI created as part of the Nmap/Google Summer of Code program.
2013-07-03
%s é unha %s GUI creada como parte do programa Nmap/Google Summer of Code.
65.
%s credits
2013-07-03
%s créditos
67.
Design
2013-07-03
Deseño
68.
SoC 2007
2013-07-03
SoC 2007
69.
Contributors
2013-07-03
Contribuíntes
70.
Translation
2013-07-03
Tradución
71.
Maemo
2013-07-03
Maemo
113.
Scan
2013-07-03
Analizar
190.
Search:
2013-07-03
Buscar
191.
Expressions
2013-07-03
Expresións
192.
Date
2013-07-03
Data
193.
No search method selected!
2013-07-03
Non se seleccionou o método de busca!
194.
%s can search results on directories or inside it's own database. Please, select a method by choosing a directory or by checking the search data base option at the 'Search options' tab before start the search
2013-07-10
%s pode buscar resultados en directorios ou dentro da súa propia base de datos. Por favor, selecciona un método escollendo un directorio ou marcando a opción de busca na base de datos na lapela «Opcións de busca» antes de comezar a procura
195.
Entering the text into the search performs a <b>keyword search</b> - the search string is matched against the entire output of each scan. To refine the search, you can use <b>operators</b> to search only within a specific part of a scan. Operators can be added to the search interactively if you click on the <b>Expressions</b> button, or you can enter them manually into the search field. Most operators have a short form, listed. <b>profile: (pr:)</b> - Profile used. <b>target: (t:)</b> - User-supplied target, or a rDNS result. <b>option: (o:)</b> - Scan options. <b>date: (d:)</b> - The date when scan was performed. Fuzzy matching is possible using the "~" suffix. Each "~" broadens the search by one day on "each side" of the date. In addition, it is possible to use the "date:-n" notation which means "n days ago". <b>after: (a:)</b> - Matches scans made after the supplied date (<i>YYYY-MM-DD</i> or <i>-n</i>). <b>before (b:)</b> - Matches scans made before the supplied date(<i>YYYY-MM-DD</i> or <i>-n</i>). <b>os:</b> - All OS-related fields. <b>scanned: (sp:)</b> - Matches a port if it was among those scanned. <b>open: (op:)</b> - Open ports discovered in a scan. <b>closed: (cp:)</b> - Closed ports discovered in a scan. <b>filtered: (fp:)</b> - Filtered ports discovered in scan. <b>unfiltered: (ufp:)</b> - Unfiltered ports found in a scan (using, for example, an ACK scan). <b>open|filtered: (ofp:)</b> - Ports in the "open|filtered" state. <b>closed|filtered: (cfp:)</b> - Ports in the "closed|filtered" state. <b>service: (s:)</b> - All service-related fields. <b>inroute: (ir:)</b> - Matches a router in the scan's traceroute output.
2013-07-10
Entering the text into the search performs a <b>keyword search</b> - the search string is matched against the entire output of each scan. To refine the search, you can use <b>operators</b> to search only within a specific part of a scan. Operators can be added to the search interactively if you click on the <b>Expressions</b> button, or you can enter them manually into the search field. Most operators have a short form, listed. <b>profile: (pr:)</b> - Profile used. <b>target: (t:)</b> - User-supplied target, or a rDNS result. <b>option: (o:)</b> - Scan options. <b>date: (d:)</b> - The date when scan was performed. Fuzzy matching is possible using the "~" suffix. Each "~" broadens the search by one day on "each side" of the date. In addition, it is possible to use the "date:-n" notation which means "n days ago". <b>after: (a:)</b> - Matches scans made after the supplied date (<i>YYYY-MM-DD</i> or <i>-n</i>). <b>before (b:)</b> - Matches scans made before the supplied date(<i>YYYY-MM-DD</i> or <i>-n</i>). <b>os:</b> - All OS-related fields. <b>scanned: (sp:)</b> - Matches a port if it was among those scanned. <b>open: (op:)</b> - Open ports discovered in a scan. <b>closed: (cp:)</b> - Closed ports discovered in a scan. <b>filtered: (fp:)</b> - Filtered ports discovered in scan. <b>unfiltered: (ufp:)</b> - Unfiltered ports found in a scan (using, for example, an ACK scan). <b>open|filtered: (ofp:)</b> - Ports in the "open|filtered" state. <b>closed|filtered: (cfp:)</b> - Ports in the "closed|filtered" state. <b>service: (s:)</b> - All service-related fields. <b>inroute: (ir:)</b> - Matches a router in the scan's traceroute output.