Please sign in to see the alerts.
Project website debian-handbook.info
Mailing list for translators debian-handbook-translators@lists.alioth.debian.org
Instructions for translators

https://debian-handbook.info/contribute/

Translation process
  • Translations can be made directly.
  • Translation suggestions can be made.
  • Any authenticated user can contribute.
  • The translation uses bilingual files.
Translation license GNU General Public License v2.0 or later
Repository https://salsa.debian.org/hertzog/debian-handbook.git
Repository branch buster/master
Last remote commit Translated using Weblate (Norwegian Bokmål) ba97bce0
User avatar pere authored 5 days ago
Repository containing Weblate translations https://hosted.weblate.org/git/debian-handbook/12_advanced-administration/
Filemask*/14_security.po
Number of strings 11,804
Number of words 393,198
Number of characters 3,032,068
Number of languages 26
Number of source strings 454
Number of source words 15,123
Number of source characters 116,618
User avatar None

New alert

Debian Handbook / 14_security

Repository has changes. yesterday
User avatar _caba

Translation changed

Debian Handbook / 14_securityGerman

AppArmor support is built into the standard kernels provided by Debian. Enabling AppArmor is thus just a matter of installing some packages by executing <command>apt install apparmor apparmor-profiles apparmor-utils</command> with root privileges.
AppArmor-Unterstützung ist in den von Debian bereitgestellten Standard-Kernel eingebaut. Das Aktivieren von AppArmor ist daher nur eine Frage der Installation einiger Pakete durch Ausführen von <command>apt install apparmor apparmor apparmor-profiles apparmor-utils</command> mit Root-Rechten.
4 days ago
User avatar _caba

Translation changed

Debian Handbook / 14_securityGerman

An information system can have a varying level of importance depending on the environment. In some cases, it is vital to a company's survival. It must therefore be protected from various kinds of risks. The process of evaluating these risks, defining and implementing the protection is collectively known as the “security process”.
Ein Informationssystem kann je nach der Umgebung, in der es eingesetzt wird, unterschiedlich wichtig sein. Manchmal ist es für ein Unternehmen lebensnotwendig. Deshalb muss es vor verschiedenen Gefahren geschützt sein. Das Verfahren, bei dem diese Gefahren identifiziert werden und der passende Schutz festgelegt und eingerichtet wirdist, wird insgesamt als „Sicherheitsprozess“ bezeichnet.
4 days ago
User avatar ssantos

Translation changed

Debian Handbook / 14_securityGerman

<primary>Bruce Schneier</primary>
<primary>EmpfangspuffBruce Schneier</primary>
4 days ago
User avatar ssantos

Translation changed

Debian Handbook / 14_securityGerman

<primary>Schneier, Bruce</primary>
<primary>FilterregelSchneier, Bruce</primary>
4 days ago
User avatar pere

Component unlocked

Debian Handbook / 14_security

Component unlocked 4 days ago
User avatar pere

Component locked

Debian Handbook / 14_security

Component locked 4 days ago
User avatar pere

Component unlocked

Debian Handbook / 14_security

Component unlocked 9 days ago
User avatar pere

Component locked

Debian Handbook / 14_security

Component locked 9 days ago
User avatar pere

Component unlocked

Debian Handbook / 14_security

Component unlocked 9 days ago
Browse all component changes

Daily activity

Daily activity

Weekly activity

Weekly activity