r623 - community/f13/es-ES

transif at fedoraproject.org transif at fedoraproject.org
Wed Jul 14 17:15:13 UTC 2010


Author: transif
Date: 2010-07-14 17:15:13 +0000 (Wed, 14 Jul 2010)
New Revision: 623

Modified:
   community/f13/es-ES/Nmap.po
Log:
l10n: Updates to Spanish (Castilian) (es) translation

Transmitted-via: Transifex (translate.fedoraproject.org)

Modified: community/f13/es-ES/Nmap.po
===================================================================
--- community/f13/es-ES/Nmap.po	2010-07-14 17:13:50 UTC (rev 622)
+++ community/f13/es-ES/Nmap.po	2010-07-14 17:15:13 UTC (rev 623)
@@ -66,6 +66,24 @@
 "\t      [me at myhost ~]$\n"
 "\t      "
 msgstr ""
+"\n"
+"\t     [me at myhost ~]$ nmap 10.0.0.1\n"
+"\t     \n"
+"\t      Starting Nmap 4.68 ( http://nmap.org ) at 2009-01-05 14:52 EST\n"
+"\t      Interesting ports on 10.0.0.1:\n"
+"\t      Not shown: 1710 filtered ports\n"
+"\t      \n"
+"\t      PORT    STATE  SERVICE\n"
+"\t      22/tcp  open   ssh\n"
+"\t      53/tcp  open   domain\n"
+"\t      70/tcp  closed gopher\n"
+"\t      80/tcp  open   http\n"
+"\t      113/tcp closed auth\n"
+"\n"
+"\t      Nmap done: 1 IP address (1 host up) scanned in 18.555 seconds\n"
+"\t      \n"
+"\t      [me at myhost ~]$\n"
+"\t      "
 
 #. Tag: para
 #, no-c-format
@@ -104,6 +122,34 @@
 "\t      [root at myhost ~]#\n"
 "\t      "
 msgstr ""
+"\n"
+"\t      [root at myhost ~]# nmap -sV -p 22 10.0.0.1 -v\n"
+"\n"
+"\t      Starting Nmap 4.68 ( http://nmap.org ) at 2009-01-07 09:31 EST\n"
+"\t      Initiating Parallel DNS resolution of 1 host. at 09:31\n"
+"\t      Completed Parallel DNS resolution of 1 host. at 09:31, 0.38s elapsed\n"
+"\t      Initiating SYN Stealth Scan at 09:31\n"
+"\t      Scanning 10.0.0.1 [1 port]\n"
+"\t      Discovered open port 22/tcp on 10.0.0.1\n"
+"\t      Completed SYN Stealth Scan at 09:31, 0.00s elapsed (1 total ports)\n"
+"\t      Initiating Service scan at 09:31\n"
+"\t      Scanning 1 service on 10.0.0.1\n"
+"\t      Completed Service scan at 09:31, 0.01s elapsed (1 service on 1 host)\n"
+"\t      SCRIPT ENGINE: Initiating script scanning.\n"
+"\t      Host 10.0.0.1 appears to be up ... good.\n"
+"\t      Interesting ports on 10.0.0.1:\n"
+"\t      \n"
+"\t      PORT   STATE SERVICE VERSION\n"
+"\t      22/tcp open  ssh     OpenSSH 5.1 (protocol 2.0)\n"
+"\n"
+"\t      Read data files from: /usr/share/nmap\n"
+"\t      Service detection performed. \n"
+"\t      Please report any incorrect results at http://nmap.org/submit/ \n"
+"\t      Nmap done: 1 IP address (1 host up) scanned in 0.454 seconds\n"
+"\t      Raw packets sent: 1 (44B) | Rcvd: 2 (88B)\n"
+"\t      \n"
+"\t      [root at myhost ~]#\n"
+"\t      "
 
 #. Tag: para
 #, no-c-format
@@ -137,6 +183,24 @@
 "\t     (....... and so on .......)\n"
 "\t  "
 msgstr ""
+"\n"
+"\t     me at myhost ~]$ nmap -sP 10.0.0.0/8 -v\n"
+"\n"
+"\t     Starting Nmap 4.68 ( http://nmap.org ) at 2009-01-06 13:59 EST\n"
+"\t     Initiating Ping Scan at 13:59\n"
+"\t     Scanning 256 hosts [1 port/host]\n"
+"\t     Completed Ping Scan at 13:59, 1.54s elapsed (256 total hosts)\n"
+"\t     Initiating Parallel DNS resolution of 256 hosts. at 13:59\n"
+"\t     Completed Parallel DNS resolution of 256 hosts. at 13:59, 0.02s elapsed\n"
+"\t     Host 10.0.0.0 appears to be down.\n"
+"\t     Host 10.0.0.1 appears to be up.\n"
+"\t     Host 10.0.0.2 appears to be up.\n"
+"\t     Host 10.0.0.3 appears to be down.\n"
+"\t     Host 10.0.0.4 appears to be up.\n"
+"\t     Host 10.0.0.5 appears to be down.\n"
+"\t     Host 10.0.0.6 appears to be down.\n"
+"\t     (....... and so on .......)\n"
+"\t  "
 
 #. Tag: para
 #, no-c-format
@@ -191,19 +255,58 @@
 "\t    [root at myhost ~]#\n"
 "\t    "
 msgstr ""
+"\n"
+"\t   [root at myhost ~]# nmap -O 10.0.0.1 -v\n"
+"\n"
+"\t    Starting Nmap 4.68 ( http://nmap.org ) at 2009-01-06 15:47 EST\n"
+"\t    Initiating Parallel DNS resolution of 1 host. at 15:47\n"
+"\t    Completed Parallel DNS resolution of 1 host. at 15:47, 0.36s elapsed\n"
+"\t    Initiating SYN Stealth Scan at 15:47\n"
+"\t    Scanning dhcp-1-16.bne.redhat.com (10.0.0.1) [1715 ports]\n"
+"\t    Discovered open port 22/tcp on 10.0.0.1\n"
+"\t    Discovered open port 111/tcp on 10.0.0.1\n"
+"\t    Discovered open port 6000/tcp on 10.0.0.1\n"
+"\t    Completed SYN Stealth Scan at 15:47, 0.07s elapsed (1715 total ports)\n"
+"\t    Initiating OS detection (try #1) against 10.0.0.1\n"
+"\t    Host 10.0.0.1 appears to be up ... good.\n"
+"\t    Interesting ports on 10.0.0.1:\n"
+"\t    Not shown: 1712 closed ports\n"
+"\t    \n"
+"\t    PORT     STATE SERVICE\n"
+"\t    22/tcp   open  ssh\n"
+"\t    111/tcp  open  rpcbind\n"
+"\t    6000/tcp open  X11\n"
+"\t    \n"
+"\t    Device type: general purpose\n"
+"\t    Running: Linux 2.6.X\n"
+"\t    OS details: Linux 2.6.17 - 2.6.24\n"
+"\t    \n"
+"\t    Uptime: 27.138 days (since Wed Dec 10 12:29:08 2008)\n"
+"\t    Network Distance: 0 hops\n"
+"\t    TCP Sequence Prediction: Difficulty=206 (Good luck!)\n"
+"\t    IP ID Sequence Generation: All zeros\n"
+"\t    Read data files from: /usr/share/nmap\n"
+"\t    OS detection performed. \n"
+"\t    \n"
+"\t    Please report any incorrect results at http://nmap.org/submit/ .\n"
+"\t    Nmap done: 1 IP address (1 host up) scanned in 1.772 seconds\n"
+"\t    Raw packets sent: 1734 (77.058KB) | Rcvd: 3474 (147.092KB)\n"
+"\t    \n"
+"\t    [root at myhost ~]#\n"
+"\t    "
 
 #. Tag: para
-#, fuzzy, no-c-format
+#, no-c-format
 msgid "The output shows that Nmap has performed an OS detection scan and has determined that the target host is running the Linux kernel, version 2.6, which in this case is correct. Other details are also shown, such as the target's uptime and the amount of hops between the scanning host and the target."
 msgstr "Los datos de salida muestran que Nmap ha realizado un escaneo para localizar sistemas operativos, y ha determinado que el equipo escaneado está utilizando un kernel Linux, versión 2.6, lo que en este caso es correcto. También se observan otros detalles, como ser por ejemplo el tiempo que hace que el equipo escaneado está funcionando, y la cantidad de hops existentes entre el equipo que realiza el escaneo, y el equipo escaneado. "
 
 #. Tag: para
-#, fuzzy, no-c-format
+#, no-c-format
 msgid "Specific details of the detection techniques that Nmap uses to come to a conclusion about a remote host&#39;s operating system can be found here: <ulink url=\"http://nmap.org/book/osdetect.html\">http://nmap.org/book/osdetect.html</ulink>"
 msgstr "Los detalles particulares acerca de las técnicas de detección que utiliza Nmap para llegar a una conclusión sobre el sistema operativo de un equipo remoto, pueden encontrarse en: <ulink url=\"http://nmap.org/book/osdetect.html\">http://nmap.org/book/osdetect.html</ulink>"
 
 #. Tag: para
-#, fuzzy, no-c-format
+#, no-c-format
 msgid "Be aware that this section is only indicative of a very small amount of Nmap&#39;s options and capabilities. Nmap is very powerful and is extremely helpful to administrators as a security tool."
 msgstr "Tenga en cuenta que en la siguiente sección se detalla sólo una pequeña cantidad de opciones y capacidades de Nmap. Nmap es una herramienta de seguridad muy útil para los administradores. "
 
@@ -216,3 +319,4 @@
 #, no-c-format
 msgid "<ulink url=\"http://linux.die.net/man/1/nmap\">Nmap manual page</ulink>"
 msgstr "<ulink url=\"http://linux.die.net/man/1/nmap\">Página del manual de Nmap</ulink>"
+



More information about the docs-commits mailing list