Branch 'f13' - ru-RU/Security.po
Transifex System User
transif at fedoraproject.org
Mon Apr 5 01:11:18 UTC 2010
ru-RU/Security.po | 176 +++++++++++-------------------------------------------
1 file changed, 36 insertions(+), 140 deletions(-)
New commits:
commit 75f9e4d40e0fb4bd6129ab972fb371f294e2d5d3
Author: ypoyarko <ypoyarko at fedoraproject.org>
Date: Mon Apr 5 01:11:14 2010 +0000
l10n: Updates to Russian (ru) translation
Transmitted-via: Transifex (translate.fedoraproject.org)
diff --git a/ru-RU/Security.po b/ru-RU/Security.po
index 933c9eb..d94f69f 100644
--- a/ru-RU/Security.po
+++ b/ru-RU/Security.po
@@ -1,10 +1,12 @@
# translation of ru.po to
-# translation of ru-RL.po to
-# Copyright (C) 2006, 2008 Free Software Foundation, Inc.
+# translation of ru-RU.po to
+# Copyright (C) 2006, 2008, 2010 Free Software Foundation, Inc.
+#
+#
# Andrew Martynov <andrewm at inventa.ru>, 2006, 2008.
# Vasiliy Korchagin <rocker_mipt at mail.ru>, 2008.
# Gregory Sapunkov <sapunidze at ya.ru>, 2008.
-# Yulia Poyarkova <yulia.poyarkova at redhat.com>, 2008.
+# Yulia <ypoyarko at redhat.com>, 2008, 2010.
# Alexey Vasyukov <alexey.vasyukov at vdel.com>, 2008.
# Alexey Kostyuk <unitoff at gmail.com>, 2008.
# Dmitry Stropaloff <helions8 at gmail.com>, 2008.
@@ -13,20 +15,21 @@
# Vlad Goreletsky <vlad_goreletsky at lexpr.ru>, 2009, 2009.
# Sergey Nikolaevich Raspopov <qwerty3456 at mail.ru>, 2009.
# Anatoliy Guskov <anatoliy.guskov at gmail.com>, 2009.
-# Misha Shnurapet <zayzayats at yandex.ru>, 2009.Misha Shnurapet <zayzayats at yandex.ru>, 2009.
-#
-#
+# Misha Shnurapet <zayzayats at yandex.ru>, 2009.
+
msgid ""
msgstr ""
"Project-Id-Version: ru\n"
"Report-Msgid-Bugs-To: http://bugs.kde.org\n"
"POT-Creation-Date: 2010-03-19T02:19:38\n"
-"PO-Revision-Date: 2009-11-13 22:10+0300\n"
+"PO-Revision-Date: 2010-04-05 11:07\n"
"Last-Translator: <>\n"
-"Language-Team: <>\n"
+"Language-Team: Russian\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Generator: KBabel 1.11.4\n"
+"Plural-Forms: nplurals=3; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2);\n"
#. Tag: title
#, no-c-format
@@ -36,7 +39,7 @@ msgstr "ÐезопаÑноÑÑÑ"
#. Tag: title
#, no-c-format
msgid "Dogtag Certificate System"
-msgstr ""
+msgstr "СиÑÑема ÑеÑÑиÑикаÑов Dogtag"
#. Tag: para
#, no-c-format
@@ -51,6 +54,9 @@ msgid ""
"Processing System</firstterm> (TPS) and smartcard management, through "
"<firstterm>Enterprise Security Client</firstterm> (ESC)."
msgstr ""
+"<firstterm>СиÑÑема ÑеÑÑиÑикаÑии Dogtag</firstterm> (DGS) — ÑÑо оÑкÑÑÑÑй ÑенÑÑ ÑеÑÑиÑикаÑии (CA, <firstterm>Certificate Authority</firstterm>) пÑомÑÑленного ÑÑовнÑ, поддеÑживаÑÑий вÑе аÑпекÑÑ ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¶Ð¸Ð·Ð½ÐµÐ½Ð½Ñм Ñиклом ÑеÑÑиÑикаÑов и вклÑÑаÑÑий <firstterm>ÑенÑÑ ÑеÑÑиÑикаÑии</firstterm>, <firstterm>Ð¼ÐµÐ½ÐµÐ´Ð¶ÐµÑ DRM</firstterm> (Data Recovery "
+"Manager), Ð¼ÐµÐ½ÐµÐ´Ð¶ÐµÑ <firstterm>пÑоÑокола OCSP</firstterm>, <firstterm>ÑенÑÑ ÑегиÑÑÑаÑии</firstterm> (RA, Registration Authority), <firstterm>TKS</firstterm> (Token Key Service), <firstterm>TPS</firstterm> (Token "
+"Processing System) и ÑпÑавление ÑмаÑÑ-каÑÑами Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ <firstterm>ESC</firstterm> (Enterprise Security Client)."
#. Tag: para
#, no-c-format
@@ -59,11 +65,13 @@ msgid ""
"Fedora wiki for additional details â <ulink url=\"http://fedoraproject.org/w/"
"index.php?title=Features/DogtagCertificateSystem\" />."
msgstr ""
+"ÐодÑобнÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи в Ðики Fedora, на ÑÑÑаниÑе <ulink url=\"http://fedoraproject.org/w/"
+"index.php?title=Features/DogtagCertificateSystem\" />."
#. Tag: title
#, no-c-format
msgid "modprobe Whitelist"
-msgstr ""
+msgstr "ÐелÑй ÑпиÑок modprobe"
#. Tag: para
#, no-c-format
@@ -75,7 +83,7 @@ msgid ""
"to exploit vulnerabilities in modules that are not ordinarily used, for "
"example, by attaching hardware. The amount of potentially vulnerable code "
"that can run in the kernel is therefore limited."
-msgstr ""
+msgstr "ÐелÑй ÑпиÑок <application>modprobe</application> позволÑÐµÑ ÑиÑÑемнÑм админиÑÑÑаÑоÑам наложиÑÑ Ð¾Ð³ÑаниÑение на загÑÑжаемÑе Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ <application>modprobe</application> модÑли, еÑли необÑ
одим вÑÑокий ÑÑÐ¾Ð²ÐµÐ½Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи. ÐÑо огÑаниÑение не Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸Ñ Ð½ÐµÐ¿ÑивилегиÑованнÑм полÑзоваÑелÑм ÑкÑплÑаÑиÑоваÑÑ ÑÑзвимоÑÑи модÑлей, к пÑимеÑÑ, за ÑÑÐµÑ Ð¿Ð¾Ð´ÐºÐ»ÑÑÐµÐ½Ð¸Ñ Ð¾Ð±Ð¾ÑÑдованиÑ. Ðак ÑезÑлÑÑаÑ, огÑаниÑиваеÑÑÑ Ð¾Ð±Ñем вÑполнÑемого в ÑдÑе поÑенÑиалÑно ÑÑзвимого кода."
#. Tag: para
#, no-c-format
@@ -89,7 +97,7 @@ msgid ""
"specified file, including <application>modprobe</application> actions run in "
"the <application>dracut</application> <filename>initrd</filename>. A script "
"will be provided that compiles a proposed whitelist from the logged data."
-msgstr ""
+msgstr "ÐÑоме Ñого, <application>modprobe</application> Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполнÑÑÑ Ð·Ð°Ð´Ð°Ð½Ð½Ñе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð²Ð¼ÐµÑÑо загÑÑзки модÑÐ»Ñ (Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð´Ð¸ÑекÑÐ¸Ð²Ñ <command>install</command>). ÐÑа возможноÑÑÑ Ñакже опÑеделÑеÑÑÑ Ð±ÐµÐ»Ñм ÑпиÑком. <application>modprobe</application> вклÑÑÐ°ÐµÑ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑнÑÑ ÑÑнкÑионалÑноÑÑÑ Ð´Ð»Ñ Ð³ÐµÐ½ÐµÑаÑии белого ÑпиÑка: Ñак, можно запиÑÑваÑÑ Ð¿Ð¾Ð´ÑобнÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ (аналогиÑнÑÑ ÑезÑлÑÑаÑÑ <command>modprobe -v</command>) в заданнÑй Ñайл жÑÑнала, вклÑÑÐ°Ñ Ð´ÐµÐ¹ÑÑÐ²Ð¸Ñ <application>modprobe</application>, вÑполнÑемÑе в <application>dracut</application> <filename>initrd</filename>. ÐоÑÑÑпен ÑÑенаÑий Ð´Ð»Ñ ÐºÐ¾Ð¼Ð¿Ð¸Ð»ÑÑии пÑедложенного белого ÑпиÑка на оÑн
ове даннÑÑ
жÑÑнала."
#. Tag: para
#, no-c-format
@@ -101,6 +109,8 @@ msgid ""
"boot/vmlinuz*</filename>) is included, the sample desktop system runs 8.36 "
"MB of kernel-space code, out of 34.66 MB available (24%)."
msgstr ""
+"ÐÑполÑзÑйÑе белÑй ÑпиÑок Ð´Ð»Ñ ÑÑÑеÑÑвенного ÑÐ½Ð¸Ð¶ÐµÐ½Ð¸Ñ ÑиÑка аÑаки ÑдÑа и во избежание ÑÑзвимоÑÑей Ñедко иÑполÑзÑемого кода ÑдÑа. ÐапÑимеÑ, еÑли в ÑиÑÑеме Fedora загÑÑжено 79 модÑлей из 1964 доÑÑÑпнÑÑ
(4%), Ñо Ñ ÑÑеÑом ÑазмеÑа кода Ñ Ð²ÐºÐ»ÑÑением оÑновного Ñайла ÑдÑа <filename>/"
+"boot/vmlinuz*</filename> ÑÐ°ÐºÐ°Ñ ÑиÑÑема бÑÐ´ÐµÑ Ð¸ÑполнÑÑÑ 8.36 ÐРкода пÑоÑÑÑанÑÑва ÑдÑа из доÑÑÑпнÑÑ
34.66 ÐÐ (24%)."
#. Tag: para
#, no-c-format
@@ -109,11 +119,13 @@ msgid ""
"Fedora wiki for a more complete description of this feature: <ulink url="
"\"http://fedoraproject.org/w/index.php?title=Features/ModprobeWhitelist\" />"
msgstr ""
+"ÐодÑобнÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи в Ðики Fedora, на ÑÑÑаниÑе <ulink url="
+"\"http://fedoraproject.org/w/index.php?title=Features/ModprobeWhitelist\" />."
#. Tag: title
#, no-c-format
msgid "User Account Dialog"
-msgstr ""
+msgstr "Ðиалог ÑÑÑÑнÑÑ
запиÑей"
#. Tag: para
#, no-c-format
@@ -126,6 +138,10 @@ msgid ""
"<application>gdmsetup</application> and <application>polkit-gnome-"
"authorization</application>, and makes it available in one place."
msgstr ""
+"ÐовÑй диалог ÑÑÑÑнÑÑ
запиÑей полÑзоваÑелей пÑедÑÑавлÑÐµÑ Ð½Ð¾Ð²Ñй дизайн инÑеÑÑейÑа и позволÑÐµÑ ÑоздаваÑÑ Ð¿Ð¾Ð»ÑзоваÑелей и изменÑÑÑ Ð¸Ñ
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð² окÑÑжениÑÑ
Ñ Ð¾Ð´Ð½Ð¸Ð¼ полÑзоваÑелем или неболÑÑими гÑÑппами. ÐÑÐ¾Ñ Ð´Ð¸Ð°Ð»Ð¾Ð³ обÑединÑÐµÑ Ð² Ñебе ÑÑнкÑионалÑноÑÑÑ, коÑоÑÑÑ ÑанÑÑе обеÑпеÑивали оÑделÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ <application>system-config-user</"
+"application>, <application>gnome-about-me</application>, "
+"<application>gdmsetup</application>, <application>polkit-gnome-"
+"authorization</application>."
#. Tag: para
#, no-c-format
@@ -134,11 +150,13 @@ msgid ""
"includes more details: <ulink url=\"http://fedoraproject.org/w/index.php?"
"title=Features/UserAccountDialog\" />"
msgstr ""
+"ÐодÑобнÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи в Ðики Fedora, на ÑÑÑаниÑе <ulink url=\"http://fedoraproject.org/w/index.php?"
+"title=Features/UserAccountDialog\" />."
#. Tag: title
#, no-c-format
msgid "Policy Kit One"
-msgstr ""
+msgstr "Policy Kit One"
#. Tag: para
#, no-c-format
@@ -151,6 +169,8 @@ msgid ""
"utilize the native KDE authentication agent, <application>KAuth</"
"application> in Fedora 13."
msgstr ""
+"<application>PolicyKitOne</application> заменÑÐµÑ ÑÑÑаÑевÑÑÑ ÑиÑÑÐµÐ¼Ñ Ð°Ð²ÑоÑизаÑии <application>PolicyKit</application> и пÑедоÑÑавлÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑм KDE ÑиÑокие возможноÑÑи пÑи иÑполÑзовании пÑиложений и окÑÑÐ¶ÐµÐ½Ð¸Ñ ÑабоÑего ÑÑола. СбоÑка Fedora 12 KDE иÑполÑзовала <application>Ð°Ð³ÐµÐ½Ñ Ð°ÑÑенÑиÑикаÑии Gnome</application>. ТепеÑÑ Ð¶Ðµ <application>PolicyKitOne</application> иÑполÑзÑÐµÑ ÑобÑÑвеннÑй Ð°Ð³ÐµÐ½Ñ Ð°ÑÑенÑиÑикаÑии KDE — <application>KAuth</"
+"application>."
#. Tag: para
#, no-c-format
@@ -159,130 +179,6 @@ msgid ""
"PolicyKit One Qt</citetitle> page on the Fedora wiki: <ulink url=\"http://"
"fedoraproject.org/w/index.php?title=Features/KDE_PolicyKitOneQt\" />"
msgstr ""
+"ÐодÑобнÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи в Ðики Fedora, на ÑÑÑаниÑе <ulink url=\"http://"
+"fedoraproject.org/w/index.php?title=Features/KDE_PolicyKitOneQt\" />"
-#~ msgid ""
-#~ "This beat is located here: <ulink type=\"http\" url=\"https://"
-#~ "fedoraproject.org/wiki/Docs/Beats/Security\">https://fedoraproject.org/"
-#~ "wiki/Docs/Beats/Security</ulink>"
-#~ msgstr ""
-#~ "ÐоÑледнÑÑ Ð²ÐµÑÑÐ¸Ñ ÑÑого докÑменÑа здеÑÑ: <ulink type=\"http\" url="
-#~ "\"https://fedoraproject.org/wiki/Docs/Beats/Security\">https://"
-#~ "fedoraproject.org/wiki/Docs/Beats/Security</ulink>"
-
-#~ msgid "This section highlights various security items from Fedora."
-#~ msgstr "ÐаннÑй Ñаздел оÑвеÑÐ°ÐµÑ ÑазлиÑнÑе ÑÑедÑÑва безопаÑноÑÑи Fedora."
-
-#~ msgid "Lower process capabilities"
-#~ msgstr "Снижение полномоÑий пÑоÑеÑÑов"
-
-#~ msgid ""
-#~ "Daemons running as root have been reviewed and patched to run with lower "
-#~ "process capabilities. This reduces the desirability of using these "
-#~ "daemons for privilege escalation. Additionally, the shadow file "
-#~ "permissions have been changed to <literal>000</literal> and several "
-#~ "directories in <filename>$PATH</filename> have been set to <literal>555</"
-#~ "literal> in order to prevent daemons without <literal>DAC_OVERRIDE</"
-#~ "literal> from being able to access the shadow file or write to the "
-#~ "<filename>$PATH</filename> directories."
-#~ msgstr ""
-#~ "СлÑжбÑ, ÑабоÑаÑÑие Ñ Ð¿ÑивилегиÑми root, пеÑеÑмоÑÑÐµÐ½Ñ Ð¸ иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ñак, "
-#~ "ÑÑÐ¾Ð±Ñ Ð¾Ð½Ð¸ ÑабоÑали Ñ Ð¼ÐµÐ½ÑÑими возможноÑÑÑми пÑоÑеÑÑа. ÐÑо ÑменÑÑÐ°ÐµÑ "
-#~ "Ñоблазн иÑполÑзоваÑÑ ÑÑи ÑлÑÐ¶Ð±Ñ Ð´Ð»Ñ Ð¿Ð¾Ð²ÑÑÐµÐ½Ð¸Ñ Ð¿Ñивилегий. ÐÑоме Ñого, "
-#~ "пÑава доÑÑÑпа к ÑÐ°Ð¹Ð»Ñ shadow Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ñ Ð½Ð° <literal>000</literal>, а "
-#~ "некоÑоÑÑе каÑалоги в <filename>$PATH</filename> ÑÑÑÐ°Ð½Ð¾Ð²Ð»ÐµÐ½Ñ Ð² "
-#~ "<literal>555</literal>, ÑÑÐ¾Ð±Ñ Ð½Ðµ даÑÑ ÑлÑжбам без <literal>DAC_OVERRIDE</"
-#~ "literal> возможноÑÑÑ Ð¿Ð¾Ð»ÑÑиÑÑ Ð´Ð¾ÑÑÑп к ÑÐ°Ð¹Ð»Ñ shadow или запиÑÑваÑÑ Ð² "
-#~ "каÑалоги из <filename>$PATH</filename>."
-
-#~ msgid ""
-#~ "When someone attacks a system, they normally can not do much unless they "
-#~ "can escalate privileges. This feature reduces the number of attack "
-#~ "targets that can be used to escalate privileges. If root processes do not "
-#~ "have all capabilities, they will be harder to use to subvert the system."
-#~ msgstr ""
-#~ "Ðогда кÑо-нибÑÐ´Ñ Ð°ÑакÑÐµÑ ÑиÑÑемÑ, он обÑÑно не многое Ð¼Ð¾Ð¶ÐµÑ ÑделаÑÑ, еÑли "
-#~ "не ÑÐ¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´Ð½ÑÑÑ Ð¿Ñивилегии. ÐÑа Ð½Ð¾Ð²Ð°Ñ Ð¾ÑобенноÑÑÑ ÑÐ½Ð¸Ð¶Ð°ÐµÑ ÑиÑло Ñелей, "
-#~ "коÑоÑÑе могÑÑ Ð±ÑÑÑ Ð¸ÑполÑÐ·Ð¾Ð²Ð°Ð½Ñ Ð´Ð»Ñ ÑвелиÑÐµÐ½Ð¸Ñ Ð¿Ñивилегий. ÐÑли Ñ root-"
-#~ "пÑоÑеÑÑов не бÑÐ´ÐµÑ Ð²ÑеÑ
возможноÑÑей, иÑ
бÑÐ´ÐµÑ ÑÑÑднее иÑполÑзоваÑÑ Ð´Ð»Ñ "
-#~ "ÑазÑÑÑÐµÐ½Ð¸Ñ ÑиÑÑемÑ."
-
-#~ msgid ""
-#~ "Processes with the root uid can still damage a system, because they can "
-#~ "write to nearly any file and of course read the <filename>/etc/shadow "
-#~ "file</filename>. However, if the system is hardened so that root requires "
-#~ "the <literal>DAC_OVERRIDE</literal> capability, then only a limited "
-#~ "number of processes can damage the system. This will not affect any admin "
-#~ "abilities because they always get full privileges which includes "
-#~ "<literal>DAC_OVERRIDE</literal>. Therefore, even if someone does "
-#~ "successfully attack a root process, it is now harder for them to take "
-#~ "advantage of this attack."
-#~ msgstr ""
-#~ "ÐÑоÑеÑÑÑ Ñ root uid вÑе же могÑÑ Ð½Ð°Ð½ÐµÑÑи вÑед ÑиÑÑеме, поÑÐ¾Ð¼Ñ ÑÑо они "
-#~ "могÑÑ Ð¿Ð¸ÑаÑÑ Ð¿ÑакÑиÑеÑки в лÑбой Ñайл и, конеÑно, ÑиÑаÑÑ Ñайл <filename>/"
-#~ "etc/shadow</filename>. Ðднако, еÑли безопаÑноÑÑÑ ÑиÑÑÐµÐ¼Ñ ÑÑилена Ñаким "
-#~ "обÑазом, ÑÑо Ð´Ð»Ñ root ÑÑебÑеÑÑÑ Ð¿ÑÐ¸Ð²Ð¸Ð»ÐµÐ³Ð¸Ñ <literal>DAC_OVERRIDE</"
-#~ "literal>, Ñогда лиÑÑ Ð¾Ð³ÑаниÑенное ÑиÑло пÑоÑеÑÑов Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð²ÑедиÑÑ "
-#~ "ÑиÑÑемÑ. ÐÑо не повлиÑÐµÑ Ð½Ð° возможноÑÑи админиÑÑÑаÑоÑов, поÑÐ¾Ð¼Ñ ÑÑо они "
-#~ "вÑегда полÑÑаÑÑ Ð²Ñе пÑивилегии, вклÑÑÐ°Ñ <literal>DAC_OVERRIDE</literal>. "
-#~ "Таким обÑазом, даже еÑли кÑо-нибÑÐ´Ñ ÑÑпеÑно аÑакÑÐµÑ root-пÑоÑеÑÑ, ÑепеÑÑ "
-#~ "им бÑÐ´ÐµÑ ÑÑÑднее воÑполÑзоваÑÑÑÑ ÑезÑлÑÑаÑами ÑÑой аÑаки."
-
-#~ msgid ""
-#~ "A hardened system would have permissions like: <literal>555</literal> "
-#~ "<filename>/bin</filename>, <literal>555</literal> <filename>/lib</"
-#~ "filename>, <literal>000</literal> <filename>/etc/shadow</filename> and so "
-#~ "on. The current scope is to cover the directories in <filename>$PATH</"
-#~ "filename> variable, library dirs, <filename>/boot</filename>, and "
-#~ "<filename>/root</filename>. This scheme does not affect SELinux in any "
-#~ "way and complements it since capabilities are DAC controls and they have "
-#~ "first vote on allowing an access."
-#~ msgstr ""
-#~ "Ð ÑиÑÑеме Ñ ÑÑиленной безопаÑноÑÑÑÑ Ð¿Ñава доÑÑÑпа Ð´Ð¾Ð»Ð¶Ð½Ñ Ð±ÑÑÑ Ð¿ÑимеÑно "
-#~ "Ñакими: <literal>555</literal> <filename>/bin</filename>, <literal>555</"
-#~ "literal> <filename>/lib</filename>, <literal>000</literal> <filename>/etc/"
-#~ "shadow</filename> и Ñак далее. ТекÑÑÐ°Ñ Ð·Ð°Ð´Ð°Ñа - оÑ
ваÑиÑÑ ÐºÐ°Ñалоги в "
-#~ "пеÑеменной <filename>$PATH</filename>, библиоÑеÑнÑе каÑалоги, <filename>/"
-#~ "boot</filename> и <filename>/root</filename>. ÐÑа ÑÑ
ема никак не меÑÐ°ÐµÑ "
-#~ "SELinux, а дополнÑÐµÑ ÐµÐ³Ð¾, поÑколÑÐºÑ Ð¿Ñивилегии ÑвлÑÑÑÑÑ ÑÑедÑÑвами "
-#~ "диÑкÑеÑионного ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑÑпом и они пеÑвÑми ÑÑаÑÑвÑÑÑ Ð² ÑазÑеÑении "
-#~ "доÑÑÑпа."
-
-#~ msgid "SELinux Sandbox"
-#~ msgstr "ÐеÑоÑниÑа SELinux"
-
-#~ msgid ""
-#~ "The SELinux sandbox allows a command to be run in a highly constrained "
-#~ "fashion. Unfortunately, the nature of GUI applications is such that it is "
-#~ "very difficult to use this capability on those applications that need it "
-#~ "most."
-#~ msgstr ""
-#~ "ÐеÑоÑниÑа SELinux Ð´Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð·Ð°Ð¿ÑÑÑиÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² кÑайне "
-#~ "огÑаниÑенном Ñежиме. Ð ÑожалениÑ, пÑиÑода пÑиложений Ñ Ð³ÑаÑиÑеÑким "
-#~ "инÑеÑÑейÑом Ñакова, ÑÑо ÑÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¾ÑÐµÐ½Ñ ÑÑÑдно пÑимениÑÑ Ðº ÑÑим "
-#~ "пÑиложениÑм, Ð´Ð»Ñ ÐºÐ¾ÑоÑÑÑ
ÑÑо ÑÑебÑеÑÑÑ Ð±Ð¾Ð»ÑÑе вÑего."
-
-#~ msgid ""
-#~ "A new <command>sandbox -X</command> command allows many GUI applications "
-#~ "to be tightly constrained. By applying this within some web applications, "
-#~ "a user may specify, for example, that Open Office should run normally "
-#~ "when invoked by the user, but should be constrained when invoked from the "
-#~ "web."
-#~ msgstr ""
-#~ "ÐÐ¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð°Ð½Ð´Ð° <command>sandbox -X</command> Ð´Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ ÑилÑно "
-#~ "огÑаниÑиÑÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñ Ð³ÑаÑиÑеÑким инÑеÑÑейÑом. ÐÑполÑзÑÑ ÑÑо в "
-#~ "некоÑоÑÑÑ
web-пÑиложениÑÑ
, полÑзоваÑÐµÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°Ð´Ð°ÑÑ, напÑимеÑ, ÑÑо Open "
-#~ "Office должен ÑабоÑаÑÑ Ð½Ð¾ÑмалÑно, еÑли запÑÑен полÑзоваÑелем, но должен "
-#~ "бÑÑÑ Ð¾Ð³ÑаниÑен, еÑли запÑÑен из ÐнÑеÑнеÑа."
-
-#~ msgid ""
-#~ "When run from the SELinux sandbox, a GUI application may only access a "
-#~ "limited directory structure which is destroyed on exit, is denied access "
-#~ "to the network, and runs in an isolated X-server, which prevents it from "
-#~ "accessing other X applications."
-#~ msgstr ""
-#~ "ÐÑдÑÑи запÑÑеннÑм в пеÑоÑниÑе SELinux, пÑиложение Ñ Ð³ÑаÑиÑеÑким "
-#~ "инÑеÑÑейÑом Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð»ÑÑаÑÑ Ð´Ð¾ÑÑÑп лиÑÑ Ðº огÑаниÑенной ÑÑÑÑкÑÑÑе "
-#~ "каÑалогов, коÑоÑÐ°Ñ ÑниÑÑожаеÑÑÑ Ð¿Ñи вÑÑ
оде, ÑÑÐ¾Ð¼Ñ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð·Ð°Ð¿ÑеÑен "
-#~ "доÑÑÑп в ÑеÑÑ Ð¸ оно ÑабоÑÐ°ÐµÑ Ð½Ð° изолиÑованном X-ÑеÑвеÑе, ÑÑо "
-#~ "пÑедоÑвÑаÑÐ°ÐµÑ Ð´Ð¾ÑÑÑп ÑÑого пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ðº дÑÑгим пÑиложениÑм, ÑабоÑаÑÑим в "
-#~ "X."
More information about the docs-commits
mailing list