Changeset 499


Ignore:
Timestamp:
11/10/2008 1:40:18 PM (6 years ago)
Author:
lowjoel
Message:

Updated the String resources.

Location:
branches/eraser6/Eraser
Files:
3 edited

Legend:

Unmodified
Added
Removed
  • branches/eraser6/Eraser/Strings.NL.resx

    r482 r499  
    118118    <value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> 
    119119  </resheader> 
    120   <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant:     Mentor/Researcher\n\u2022 Joel Low:     Developer Lead\n\u2022 Dennis van Lith:     Designer\n\u2022 Kasra Nasiri:      Developer\n" xml:space="preserve"> 
     120  <data name="Eraser is an advanced security tool for Windows, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.  Eraser is Free software and its source code is released under GNU General Public License.\r\n\r\nErasure Method Credits:\r\nGutmann (35 Pass):      Copyright Peter Gutmann &amp; Colin Plumb\r\nGutmann Lite (10 pass):        Copyright Peter Gutmann &amp; Colin Plumb\r\nUS DoD (7 pass):           Copyright United States Department of\r\n               Defense\r\nUS DoD (3 pass):         Copyright United States Department of\r\n               Defense\r\nUS Air Force 5020 (3 pass):      Copyright United States Department of\r\n               Defense\r\nUS Army AR380-19 (3 pass):   Copyright United States Department of\r\n               Defense\r\nRCMP TSSIT OPS-II (7 pass):  Copyright Government of Canada,\r\n             Royal Canadian Mounted Police\r\nSchneier�s Method (7 pass):    Copyright Bruce Schneier\r\nGerman VSITR (7 pass):      Copyright Germany BSI Verschlusssachen\r\n              -IT-Richtlinien\r\nBritish HMG IS5 (3 pass):        Copyright British Government\r\nBritish HMG IS5 (1 pass):       Copyright British Government\r\nRussian GOST P50739-95 (2 pass):    Copyright Government of the Soviet\r\n              Union \r\nPseudorandom data (1 pass):   Public Domain\r\nFirst/Last 16Kb:           Copyright The Eraser Project\r\n\r\nEraser Copyright \u00A9 The Eraser Project\r\n\r\nEraser Project Members:\r\n\u2022 Sami Tolvanen:      Initiator/Developer\r\n\u2022 Garrett Trant:        Mentor/Researcher\r\n\u2022 Joel Low:       Lead Developer\r\n\u2022 Dennis van Lith:       Designer\r\n\u2022 Kasra Nasiri:        Security Researcher" xml:space="preserve"> 
    121121    <value>(Untranslated)</value> 
    122122  </data> 
     
    157157    <value>{0} van {1}</value> 
    158158  </data> 
    159   <data name="{0:hh:mm:ss} left" xml:space="preserve"> 
     159  <data name="About {0:hh:mm:ss} left" xml:space="preserve"> 
     160    <value>(Untranslated)</value> 
     161  </data> 
     162  <data name="Unknown" xml:space="preserve"> 
    160163    <value>(Untranslated)</value> 
    161164  </data> 
     
    220223    <value>(Untranslated)</value> 
    221224  </data> 
     225  <data name="The new UI language will take only effect when Eraser is restarted." xml:space="preserve"> 
     226    <value>(Untranslated)</value> 
     227  </data> 
    222228  <data name="The new randomness data source will only be used when the next task is run.\nCurrently running tasks will use the old source." xml:space="preserve"> 
    223229    <value>(Untranslated)</value> 
     
    232238    <value>Foutieve folder</value> 
    233239  </data> 
     240  <data name="(default)" xml:space="preserve"> 
     241    <value>(Untranslated)</value> 
     242  </data> 
    234243  <data name="The task has no data to erase." xml:space="preserve"> 
    235244    <value>De taak heeft geen data om te wissen.</value> 
  • branches/eraser6/Eraser/Strings.en.resx

    r482 r499  
    118118    <value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> 
    119119  </resheader> 
    120   <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant:     Mentor/Researcher\n\u2022 Joel Low:     Developer Lead\n\u2022 Dennis van Lith:     Designer\n\u2022 Kasra Nasiri:      Developer\n" xml:space="preserve"> 
    121     <value>(Untranslated)</value> 
     120  <data name="Eraser is an advanced security tool for Windows, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.  Eraser is Free software and its source code is released under GNU General Public License.\r\n\r\nErasure Method Credits:\r\nGutmann (35 Pass):      Copyright Peter Gutmann &amp; Colin Plumb\r\nGutmann Lite (10 pass):        Copyright Peter Gutmann &amp; Colin Plumb\r\nUS DoD (7 pass):           Copyright United States Department of\r\n               Defense\r\nUS DoD (3 pass):         Copyright United States Department of\r\n               Defense\r\nUS Air Force 5020 (3 pass):      Copyright United States Department of\r\n               Defense\r\nUS Army AR380-19 (3 pass):   Copyright United States Department of\r\n               Defense\r\nRCMP TSSIT OPS-II (7 pass):  Copyright Government of Canada,\r\n             Royal Canadian Mounted Police\r\nSchneier�s Method (7 pass):    Copyright Bruce Schneier\r\nGerman VSITR (7 pass):      Copyright Germany BSI Verschlusssachen\r\n              -IT-Richtlinien\r\nBritish HMG IS5 (3 pass):        Copyright British Government\r\nBritish HMG IS5 (1 pass):       Copyright British Government\r\nRussian GOST P50739-95 (2 pass):    Copyright Government of the Soviet\r\n              Union \r\nPseudorandom data (1 pass):   Public Domain\r\nFirst/Last 16Kb:           Copyright The Eraser Project\r\n\r\nEraser Copyright \u00A9 The Eraser Project\r\n\r\nEraser Project Members:\r\n\u2022 Sami Tolvanen:      Initiator/Developer\r\n\u2022 Garrett Trant:        Mentor/Researcher\r\n\u2022 Joel Low:       Lead Developer\r\n\u2022 Dennis van Lith:       Designer\r\n\u2022 Kasra Nasiri:        Security Researcher" xml:space="preserve"> 
     121    <value>Eraser is an advanced security tool for Windows, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.  Eraser is Free software and its source code is released under GNU General Public License.\r\n\r\nErasure Method Credits:\r\nGutmann (35 Pass):     Copyright Peter Gutmann &amp; Colin Plumb\r\nGutmann Lite (10 pass):        Copyright Peter Gutmann &amp; Colin Plumb\r\nUS DoD (7 pass):           Copyright United States Department of\r\n               Defense\r\nUS DoD (3 pass):         Copyright United States Department of\r\n               Defense\r\nUS Air Force 5020 (3 pass):      Copyright United States Department of\r\n               Defense\r\nUS Army AR380-19 (3 pass):   Copyright United States Department of\r\n               Defense\r\nRCMP TSSIT OPS-II (7 pass):  Copyright Government of Canada,\r\n             Royal Canadian Mounted Police\r\nSchneier�s Method (7 pass):    Copyright Bruce Schneier\r\nGerman VSITR (7 pass):      Copyright Germany BSI Verschlusssachen\r\n              -IT-Richtlinien\r\nBritish HMG IS5 (3 pass):        Copyright British Government\r\nBritish HMG IS5 (1 pass):       Copyright British Government\r\nRussian GOST P50739-95 (2 pass):    Copyright Government of the Soviet\r\n              Union \r\nPseudorandom data (1 pass):   Public Domain\r\nFirst/Last 16Kb:           Copyright The Eraser Project\r\n\r\nEraser Copyright \u00A9 The Eraser Project\r\n\r\nEraser Project Members:\r\n\u2022 Sami Tolvanen:      Initiator/Developer\r\n\u2022 Garrett Trant:        Mentor/Researcher\r\n\u2022 Joel Low:       Lead Developer\r\n\u2022 Dennis van Lith:       Designer\r\n\u2022 Kasra Nasiri:        Security Researcher</value> 
    122122  </data> 
    123123  <data name="Eraser" xml:space="preserve"> 
     
    157157    <value>{0} out of {1}</value> 
    158158  </data> 
    159   <data name="{0:hh:mm:ss} left" xml:space="preserve"> 
    160     <value>{0:hh:mm:ss} left</value> 
     159  <data name="About {0:hh:mm:ss} left" xml:space="preserve"> 
     160    <value>About {0:hh:mm:ss} left</value> 
     161  </data> 
     162  <data name="Unknown" xml:space="preserve"> 
     163    <value>Unknown</value> 
    161164  </data> 
    162165  <data name="Total: {0,2:#0.00%}" xml:space="preserve"> 
     
    220223    <value>Erasures with plausible deniability was selected, but no files were selected to be used as decoys.</value> 
    221224  </data> 
     225  <data name="The new UI language will take only effect when Eraser is restarted." xml:space="preserve"> 
     226    <value>The new UI language will take only effect when Eraser is restarted.</value> 
     227  </data> 
    222228  <data name="The new randomness data source will only be used when the next task is run.\nCurrently running tasks will use the old source." xml:space="preserve"> 
    223229    <value>The new randomness data source will only be used when the next task is run.\nCurrently running tasks will use the old source.</value> 
     
    232238    <value>Invalid folder path</value> 
    233239  </data> 
     240  <data name="(default)" xml:space="preserve"> 
     241    <value>(default)</value> 
     242  </data> 
    234243  <data name="The task has no data to erase." xml:space="preserve"> 
    235244    <value>The task has no data to erase.</value> 
  • branches/eraser6/Eraser/Strings.resx

    r482 r499  
    118118    <value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> 
    119119  </resheader> 
    120   <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant:     Mentor/Researcher\n\u2022 Joel Low:     Developer Lead\n\u2022 Dennis van Lith:     Designer\n\u2022 Kasra Nasiri:      Developer\n" xml:space="preserve"> 
    121     <value>The Gutmann method used for overwriting is based on Peter Gutmann's paper \"Secure Deletion of Data from Magnetic and Solid-State Memory\".\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \"National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant:       Mentor/Researcher\n\u2022 Joel Low:     Developer Lead\n\u2022 Dennis van Lith:     Designer\n\u2022 Kasra Nasiri:      Developer\n</value> 
     120  <data name="Eraser is an advanced security tool for Windows, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.  Eraser is Free software and its source code is released under GNU General Public License.\r\n\r\nErasure Method Credits:\r\nGutmann (35 Pass):      Copyright Peter Gutmann &amp; Colin Plumb\r\nGutmann Lite (10 pass):        Copyright Peter Gutmann &amp; Colin Plumb\r\nUS DoD (7 pass):           Copyright United States Department of\r\n               Defense\r\nUS DoD (3 pass):         Copyright United States Department of\r\n               Defense\r\nUS Air Force 5020 (3 pass):      Copyright United States Department of\r\n               Defense\r\nUS Army AR380-19 (3 pass):   Copyright United States Department of\r\n               Defense\r\nRCMP TSSIT OPS-II (7 pass):  Copyright Government of Canada,\r\n             Royal Canadian Mounted Police\r\nSchneier�s Method (7 pass):    Copyright Bruce Schneier\r\nGerman VSITR (7 pass):      Copyright Germany BSI Verschlusssachen\r\n              -IT-Richtlinien\r\nBritish HMG IS5 (3 pass):        Copyright British Government\r\nBritish HMG IS5 (1 pass):       Copyright British Government\r\nRussian GOST P50739-95 (2 pass):    Copyright Government of the Soviet\r\n              Union \r\nPseudorandom data (1 pass):   Public Domain\r\nFirst/Last 16Kb:           Copyright The Eraser Project\r\n\r\nEraser Copyright \u00A9 The Eraser Project\r\n\r\nEraser Project Members:\r\n\u2022 Sami Tolvanen:      Initiator/Developer\r\n\u2022 Garrett Trant:        Mentor/Researcher\r\n\u2022 Joel Low:       Lead Developer\r\n\u2022 Dennis van Lith:       Designer\r\n\u2022 Kasra Nasiri:        Security Researcher" xml:space="preserve"> 
     121    <value>Eraser is an advanced security tool for Windows, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.  Eraser is Free software and its source code is released under GNU General Public License.\r\n\r\nErasure Method Credits:\r\nGutmann (35 Pass):     Copyright Peter Gutmann &amp; Colin Plumb\r\nGutmann Lite (10 pass):        Copyright Peter Gutmann &amp; Colin Plumb\r\nUS DoD (7 pass):           Copyright United States Department of\r\n               Defense\r\nUS DoD (3 pass):         Copyright United States Department of\r\n               Defense\r\nUS Air Force 5020 (3 pass):      Copyright United States Department of\r\n               Defense\r\nUS Army AR380-19 (3 pass):   Copyright United States Department of\r\n               Defense\r\nRCMP TSSIT OPS-II (7 pass):  Copyright Government of Canada,\r\n             Royal Canadian Mounted Police\r\nSchneier�s Method (7 pass):    Copyright Bruce Schneier\r\nGerman VSITR (7 pass):      Copyright Germany BSI Verschlusssachen\r\n              -IT-Richtlinien\r\nBritish HMG IS5 (3 pass):        Copyright British Government\r\nBritish HMG IS5 (1 pass):       Copyright British Government\r\nRussian GOST P50739-95 (2 pass):    Copyright Government of the Soviet\r\n              Union \r\nPseudorandom data (1 pass):   Public Domain\r\nFirst/Last 16Kb:           Copyright The Eraser Project\r\n\r\nEraser Copyright \u00A9 The Eraser Project\r\n\r\nEraser Project Members:\r\n\u2022 Sami Tolvanen:      Initiator/Developer\r\n\u2022 Garrett Trant:        Mentor/Researcher\r\n\u2022 Joel Low:       Lead Developer\r\n\u2022 Dennis van Lith:       Designer\r\n\u2022 Kasra Nasiri:        Security Researcher</value> 
    122122  </data> 
    123123  <data name="Eraser" xml:space="preserve"> 
     
    157157    <value>{0} out of {1}</value> 
    158158  </data> 
    159   <data name="{0:hh:mm:ss} left" xml:space="preserve"> 
    160     <value>{0:hh:mm:ss} left</value> 
     159  <data name="About {0:hh:mm:ss} left" xml:space="preserve"> 
     160    <value>About {0:hh:mm:ss} left</value> 
     161  </data> 
     162  <data name="Unknown" xml:space="preserve"> 
     163    <value>Unknown</value> 
    161164  </data> 
    162165  <data name="Total: {0,2:#0.00%}" xml:space="preserve"> 
     
    220223    <value>Erasures with plausible deniability was selected, but no files were selected to be used as decoys.</value> 
    221224  </data> 
     225  <data name="The new UI language will take only effect when Eraser is restarted." xml:space="preserve"> 
     226    <value>The new UI language will take only effect when Eraser is restarted.</value> 
     227  </data> 
    222228  <data name="The new randomness data source will only be used when the next task is run.\nCurrently running tasks will use the old source." xml:space="preserve"> 
    223229    <value>The new randomness data source will only be used when the next task is run.\nCurrently running tasks will use the old source.</value> 
     
    232238    <value>Invalid folder path</value> 
    233239  </data> 
     240  <data name="(default)" xml:space="preserve"> 
     241    <value>(default)</value> 
     242  </data> 
    234243  <data name="The task has no data to erase." xml:space="preserve"> 
    235244    <value>The task has no data to erase.</value> 
Note: See TracChangeset for help on using the changeset viewer.