r623 - community/f13/es-ES
transif at fedoraproject.org
transif at fedoraproject.org
Wed Jul 14 17:15:13 UTC 2010
Author: transif
Date: 2010-07-14 17:15:13 +0000 (Wed, 14 Jul 2010)
New Revision: 623
Modified:
community/f13/es-ES/Nmap.po
Log:
l10n: Updates to Spanish (Castilian) (es) translation
Transmitted-via: Transifex (translate.fedoraproject.org)
Modified: community/f13/es-ES/Nmap.po
===================================================================
--- community/f13/es-ES/Nmap.po 2010-07-14 17:13:50 UTC (rev 622)
+++ community/f13/es-ES/Nmap.po 2010-07-14 17:15:13 UTC (rev 623)
@@ -66,6 +66,24 @@
"\t [me at myhost ~]$\n"
"\t "
msgstr ""
+"\n"
+"\t [me at myhost ~]$ nmap 10.0.0.1\n"
+"\t \n"
+"\t Starting Nmap 4.68 ( http://nmap.org ) at 2009-01-05 14:52 EST\n"
+"\t Interesting ports on 10.0.0.1:\n"
+"\t Not shown: 1710 filtered ports\n"
+"\t \n"
+"\t PORT STATE SERVICE\n"
+"\t 22/tcp open ssh\n"
+"\t 53/tcp open domain\n"
+"\t 70/tcp closed gopher\n"
+"\t 80/tcp open http\n"
+"\t 113/tcp closed auth\n"
+"\n"
+"\t Nmap done: 1 IP address (1 host up) scanned in 18.555 seconds\n"
+"\t \n"
+"\t [me at myhost ~]$\n"
+"\t "
#. Tag: para
#, no-c-format
@@ -104,6 +122,34 @@
"\t [root at myhost ~]#\n"
"\t "
msgstr ""
+"\n"
+"\t [root at myhost ~]# nmap -sV -p 22 10.0.0.1 -v\n"
+"\n"
+"\t Starting Nmap 4.68 ( http://nmap.org ) at 2009-01-07 09:31 EST\n"
+"\t Initiating Parallel DNS resolution of 1 host. at 09:31\n"
+"\t Completed Parallel DNS resolution of 1 host. at 09:31, 0.38s elapsed\n"
+"\t Initiating SYN Stealth Scan at 09:31\n"
+"\t Scanning 10.0.0.1 [1 port]\n"
+"\t Discovered open port 22/tcp on 10.0.0.1\n"
+"\t Completed SYN Stealth Scan at 09:31, 0.00s elapsed (1 total ports)\n"
+"\t Initiating Service scan at 09:31\n"
+"\t Scanning 1 service on 10.0.0.1\n"
+"\t Completed Service scan at 09:31, 0.01s elapsed (1 service on 1 host)\n"
+"\t SCRIPT ENGINE: Initiating script scanning.\n"
+"\t Host 10.0.0.1 appears to be up ... good.\n"
+"\t Interesting ports on 10.0.0.1:\n"
+"\t \n"
+"\t PORT STATE SERVICE VERSION\n"
+"\t 22/tcp open ssh OpenSSH 5.1 (protocol 2.0)\n"
+"\n"
+"\t Read data files from: /usr/share/nmap\n"
+"\t Service detection performed. \n"
+"\t Please report any incorrect results at http://nmap.org/submit/ \n"
+"\t Nmap done: 1 IP address (1 host up) scanned in 0.454 seconds\n"
+"\t Raw packets sent: 1 (44B) | Rcvd: 2 (88B)\n"
+"\t \n"
+"\t [root at myhost ~]#\n"
+"\t "
#. Tag: para
#, no-c-format
@@ -137,6 +183,24 @@
"\t (....... and so on .......)\n"
"\t "
msgstr ""
+"\n"
+"\t me at myhost ~]$ nmap -sP 10.0.0.0/8 -v\n"
+"\n"
+"\t Starting Nmap 4.68 ( http://nmap.org ) at 2009-01-06 13:59 EST\n"
+"\t Initiating Ping Scan at 13:59\n"
+"\t Scanning 256 hosts [1 port/host]\n"
+"\t Completed Ping Scan at 13:59, 1.54s elapsed (256 total hosts)\n"
+"\t Initiating Parallel DNS resolution of 256 hosts. at 13:59\n"
+"\t Completed Parallel DNS resolution of 256 hosts. at 13:59, 0.02s elapsed\n"
+"\t Host 10.0.0.0 appears to be down.\n"
+"\t Host 10.0.0.1 appears to be up.\n"
+"\t Host 10.0.0.2 appears to be up.\n"
+"\t Host 10.0.0.3 appears to be down.\n"
+"\t Host 10.0.0.4 appears to be up.\n"
+"\t Host 10.0.0.5 appears to be down.\n"
+"\t Host 10.0.0.6 appears to be down.\n"
+"\t (....... and so on .......)\n"
+"\t "
#. Tag: para
#, no-c-format
@@ -191,19 +255,58 @@
"\t [root at myhost ~]#\n"
"\t "
msgstr ""
+"\n"
+"\t [root at myhost ~]# nmap -O 10.0.0.1 -v\n"
+"\n"
+"\t Starting Nmap 4.68 ( http://nmap.org ) at 2009-01-06 15:47 EST\n"
+"\t Initiating Parallel DNS resolution of 1 host. at 15:47\n"
+"\t Completed Parallel DNS resolution of 1 host. at 15:47, 0.36s elapsed\n"
+"\t Initiating SYN Stealth Scan at 15:47\n"
+"\t Scanning dhcp-1-16.bne.redhat.com (10.0.0.1) [1715 ports]\n"
+"\t Discovered open port 22/tcp on 10.0.0.1\n"
+"\t Discovered open port 111/tcp on 10.0.0.1\n"
+"\t Discovered open port 6000/tcp on 10.0.0.1\n"
+"\t Completed SYN Stealth Scan at 15:47, 0.07s elapsed (1715 total ports)\n"
+"\t Initiating OS detection (try #1) against 10.0.0.1\n"
+"\t Host 10.0.0.1 appears to be up ... good.\n"
+"\t Interesting ports on 10.0.0.1:\n"
+"\t Not shown: 1712 closed ports\n"
+"\t \n"
+"\t PORT STATE SERVICE\n"
+"\t 22/tcp open ssh\n"
+"\t 111/tcp open rpcbind\n"
+"\t 6000/tcp open X11\n"
+"\t \n"
+"\t Device type: general purpose\n"
+"\t Running: Linux 2.6.X\n"
+"\t OS details: Linux 2.6.17 - 2.6.24\n"
+"\t \n"
+"\t Uptime: 27.138 days (since Wed Dec 10 12:29:08 2008)\n"
+"\t Network Distance: 0 hops\n"
+"\t TCP Sequence Prediction: Difficulty=206 (Good luck!)\n"
+"\t IP ID Sequence Generation: All zeros\n"
+"\t Read data files from: /usr/share/nmap\n"
+"\t OS detection performed. \n"
+"\t \n"
+"\t Please report any incorrect results at http://nmap.org/submit/ .\n"
+"\t Nmap done: 1 IP address (1 host up) scanned in 1.772 seconds\n"
+"\t Raw packets sent: 1734 (77.058KB) | Rcvd: 3474 (147.092KB)\n"
+"\t \n"
+"\t [root at myhost ~]#\n"
+"\t "
#. Tag: para
-#, fuzzy, no-c-format
+#, no-c-format
msgid "The output shows that Nmap has performed an OS detection scan and has determined that the target host is running the Linux kernel, version 2.6, which in this case is correct. Other details are also shown, such as the target's uptime and the amount of hops between the scanning host and the target."
msgstr "Los datos de salida muestran que Nmap ha realizado un escaneo para localizar sistemas operativos, y ha determinado que el equipo escaneado está utilizando un kernel Linux, versión 2.6, lo que en este caso es correcto. También se observan otros detalles, como ser por ejemplo el tiempo que hace que el equipo escaneado está funcionando, y la cantidad de hops existentes entre el equipo que realiza el escaneo, y el equipo escaneado. "
#. Tag: para
-#, fuzzy, no-c-format
+#, no-c-format
msgid "Specific details of the detection techniques that Nmap uses to come to a conclusion about a remote host's operating system can be found here: <ulink url=\"http://nmap.org/book/osdetect.html\">http://nmap.org/book/osdetect.html</ulink>"
msgstr "Los detalles particulares acerca de las técnicas de detección que utiliza Nmap para llegar a una conclusión sobre el sistema operativo de un equipo remoto, pueden encontrarse en: <ulink url=\"http://nmap.org/book/osdetect.html\">http://nmap.org/book/osdetect.html</ulink>"
#. Tag: para
-#, fuzzy, no-c-format
+#, no-c-format
msgid "Be aware that this section is only indicative of a very small amount of Nmap's options and capabilities. Nmap is very powerful and is extremely helpful to administrators as a security tool."
msgstr "Tenga en cuenta que en la siguiente sección se detalla sólo una pequeña cantidad de opciones y capacidades de Nmap. Nmap es una herramienta de seguridad muy útil para los administradores. "
@@ -216,3 +319,4 @@
#, no-c-format
msgid "<ulink url=\"http://linux.die.net/man/1/nmap\">Nmap manual page</ulink>"
msgstr "<ulink url=\"http://linux.die.net/man/1/nmap\">Página del manual de Nmap</ulink>"
+
More information about the docs-commits
mailing list