KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /usr/share/locale/sl/LC_MESSAGES/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/locale/sl/LC_MESSAGES/system-config-securitylevel.mo
8O)!%|	}O)U
>M.-x\JN (o)Oy),)	'+"Be|09	&6=N
`k{Dj-s/QW!"`#6"%Y%mV&&k'/(M*)2x))$X*}*+*)**	+++%+	++
, ,	7,A,E,%`,,
,,,,-,;,4-8-S-c-j-y-
-
-...A./2)0/"+(41	5 %
!3
&-,6#.8$*'7
ERROR - You must be root to run lokkit.

Firewall Configuration

   A firewall sits between your computer and the network, 
   and determines which resources on your computer remote
   users on the network are able to access. A
   properly configured firewall can greatly increase
   the out-of-the-box security of your system.


Firewall Customization

   Choose which trusted devices and incoming services
   should be allowed for your network security
   settings.

     * FTP -- FTP is a protocol used for remote file
       transfer. If you plan on making your FTP
       server publicly available, enable this option.
       You need the vsftpd package installed for this
       option to be useful.
     * Mail (SMTP) -- This allows incoming SMTP mail
       delivery. If you need to allow remote hosts to
       connect directly to your machine to deliver
       mail, enable this option. You do not need to
       enable this if you collect your mail from your
       ISP's server by POP3 or IMAP, or if you use a
       tool such as fetchmail. Note that an
       improperly configured SMTP server can allow
       remote machines to use your server to send
       spam.
     * Other ports -- You can specify that other
       ports not listed here be allowed through the
       firewall. The format to use is
       'port:protocol'. For example, if you wanted to
       allow IMAP access through your firewall, you
       can specify 'imap:tcp'. You can also specify
       numeric ports explicitly; to allow UDP packets
       on port 1234 through, specify '1234:udp'. To
       specify multiple ports, separate them by
       commas.
     * SSH -- Secure Shell (SSH) is a protocol for
       logging into and executing commands on remote
       machines. It provides secure encrypted
       communications. If you plan on accessing your
       machine remotely via SSH over a firewalled
       interface, enable this option. You need the
       openssh-server package installed for this
       option to be useful.
     * Telnet -- Telnet is a protocol for logging
       into remote machines. It is unencrypted, and
       provides little security from network snooping
       attacks. Enabling telnet is not recommended.
       You need the telnet-server package installed
       for this option to be useful.
     * WWW (HTTP) -- HTTP is the protocol used 
       to serve Web pages. If you plan on
       making your Web server publicly available,
       enable this option. This option is not
       required for viewing pages locally or
       developing Web pages. You need the httpd
       package installed for this option to be
       useful.
   Choose the appropriate security level for your
   system.

   Disabled -- Disabling the  firewall allows complete
   access and does no security checking. It is recommended
   that this only be selected if you are running on a
   trusted network (not the Internet), or if you plan
   to do more detailed firewall configuration later.

   Enabled -- By choosing enabled, your system will
   not accept connections from the outside that are
   not explicitly defined by you.

   If you are connecting your system to the Internet,
   but do not plan to run a server, this is the
   safest choice. If additional services are needed,
   you can choose Customize to allow specific
   services through the firewall, or to implicitly
   trust traffic coming over certain interfaces.

   It is not recommended to enable this for devices
   that are connected to public networks, such as the
   Internet.

   Trusted Devices -- Checking these for any of your
   devices allows all traffic coming from that device
   to be allowed. For example, if you are running a
   local network, but are connecting to the Internet
   via a PPP dialup, you could check that eth0 is
   trusted to allow any traffic coming from your
   local network.

 <Tab>/<Alt-Tab> between elements   |   <Space> selects  |   <F12> next screen'enforcing', 'permissive', or 'disabled'A firewall protects against unauthorized network intrusions. Enabling a firewall blocks all incoming connections. Disabling a firewall allows all connections and is not recommended. Allow all traffic on the specified deviceAllow incoming:Allow specific ports through the firewallBackwards compatibilty, aliased to --enabledBackwards compatiblity, ignoredCancelClicking the 'Yes' button will set the security level of the system and override any existing firewall configuration.  Are you sure that you want to do this?Configure SELinuxConfigure firewall but do not activate itCustomizeDisable firewallDisabledEnable firewall (default)EnabledFTPFirewall ConfigurationFirewall Configuration - CustomizeFirewall CustomizationMail (SMTP)OKOkOther portsPlease choose the security level for the system.Run noninteractively; process only command-line argumentsSSHSecurity Level ConfigurationSecurity Level:TelnetTrusted Devices:Trusted services:WWW (HTTP)You can customize your firewall in two ways. First, you can select to allow all traffic from certain network interfaces. Second, you can allow certain protocols explicitly through the firewall. Specify additional ports in the form 'service:protocol', such as 'imap:tcp'. _Firewall Options_SELinuxdevice to trustignore settings stored in /etc/sysconfig/system-config-securitylevelport:protocol (e.g, ssh:tcp)Project-Id-Version: sl
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2006-11-28 10:51-0500
PO-Revision-Date: 2004-04-05 21:15+0200
Last-Translator: Rok Papez <rok.papez@lugos.si>
Language-Team: slovenščina <translation-team-sl@lists.sourceforge.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Generator: KBabel 1.0

NAPAKA - Za delo z lokkit morate biti root.

Nastavitev požarnega zidu

   Požarni zid se nahaja med računalnikom in omrežjem in določa
   do katerih storitev lahko dostopajo uporabniki z omrežja.
   Pravilno nastavljeni požarni zid lahko zelo poveča varnost 
   sveže postavljenega sistema.


Nastavitev požarnega zidu

   Določite varne naprave in katere vhodne storitve
   so dovoljene v vašem varnostnem omrežnem sistemu.

     * FTP -- FTP je protokol za oddaljeni prenos
       datotek. Če želite imeti javno dostopni
       strežnik FTP vklopite to nastavitev. Poleg
       tega boste morali namestiti še paket vsftpd.
     * E-Pošta (SMTP) -- Ta nastavitev dovoli vhodno
       dostavljanje pošte SMTP. Če morate dovoliti
       neposredni dostop za dostavljanje pošte omogočite
       to nastavitev. Te storitve ne rabite, če pobirate
       pošto od ponudnika internetnih storitev s protkolom
       POP3 ali IMAP, na primer z orodjem fetchmail.
       Pazite saj je lahko nepravilno nastavljeni strežnik
       SMTP zlorabljen za prepošiljanje nadležne e-pošte.
     * Ostala vrata -- Tu lahko nanizate še ostala
       vrata, ki jih želite odpreti skozi požarni
       zid. Oblika zapisa je 'vrata:protokol'. Na
       primer za dostop do storitev IMAP bi vnesli
       'imap:tcp'. Vrata se lahko vnesejo tudi
       numerično; za vstop UDP paketov na vratih
       1234 bi vnesli '1234:udp'. Več vrat lahko
       vneseto tako, da jih ločite z vejicami.
     * SSH -- Varna lupina (angl. Secure SHell) je
       protokol za delo na oddaljenih računalnikih.
       Omogoča varno šifrirano povezavo. Če želite
       dostopati do tega računalnika z oddaljenega
       skozi požarni zid, omogočite to nastavitev.
       Vendar si boste morali namestiti še paket
       openssh-server.
     * Telnet -- Telnet je protokol za oddaljeni
       dostop. Ni šifriran in ne zagotavlja nikakršne
       varnosti pred prisluškovanjem. Močno se
       odsvetuje vklop te storitve. Poleg vklopa te
       nastavitve boste morali še namestiti paket
       telnet-server.
     * WWW (HTTP) -- HTTP je protokol za streženje
       spletnih strani. Omogočite to nastavitev, če
       želite dovoliti javni dostop do spletnega
       strežnika. Te nastavitve ne rabite pri
       dopstopu do strani na tem računalniku ali
       za razvoj spletnih strani. Poleg tega morate
       za ta servis namestiti še paket httpd.
   Izberite ustrezno raven varnosti za vaš sistem. 

   Onemogočen -- S tem požarni zid dovoli polni dostop
   brez kakršnegakoli varnostnega preverjanja. Priporoča
   se le pri povezavi v zaupanja vredno omrežje (nikako
   ne Internet) ali če želite kasneje podrobneje nastaviti
   požarni zid.

   Omogočeno -- S to nastavitvijo bo sistem zavračal
   vse povezave od zunaj, ki niso izrecno dovoljene.

   Če se priklapljate v Internet, a ne želite delovati
   kot strežnik, je to najvarnejša nastavitev. Če želite
   lahko z Prikroji nastavite dostop do določenih
   storitev sistema ali pa izrecno zaupate vsemu prometu
   z določenega vmesnika.

   Ne priporoča se vklop na napravah, ki so
   povezana na javna omrežja, kot je na primer
   Internet.

   Varne naprave -- Z odkljukanjem katere izmed naprav
   boste dovolili ves promet z nje. Na primer pri
   krajevnem omrežju in povezavi PPP v Internet, bi
   lahko označili eth0 kot varno napravo in dovolili
   ves promet z krajevnega omrežja.

 <Tab>/<Alt-Tab> med elementi  |  <Preslednica> izbere  |  <F12> nasl. zaslon'uveljavitveno', 'dovoljujoče' ali 'onemogočeno'Požarni zid varuje pred nepovabljenih dostopom. Z vklopom požarnega zidu se onemogoči vse vhodne povezave. Onemogočeni požarni zid dovoli vse povezave in se odsvetuje.Dovoli ves promet z navedene napraveDovoli prihajajočo:Omogoči določena vrata skozi požarni zidZdružljivo nazaj, psevdonim za --enabledZdružljivo nazaj, zanemarjenoPrekličiČe kliknete gumb 'Da', boste nastavili raven varnosti sistema in povozili obstoječo nastavitev požarnega zidu.  Ste prepričani, da želite to zares storiti?Nastavi SELinuxNastavi požarni zid a ga ne omogočiPrilagodiOnemogoči požarni zidOnemogočenOmogoči požarni zid (privzeto)OmogočenFTPNastavitev požarnega ziduNastavitev požarnega zidu - PrikrojiNastavitev požarnega ziduPošta (STMP)NaprejNaprejOstala vrataProsim, izberite raven varnosti za ta sistem.Teci neinteraktivno; obdelaj le nastavitve v ukazni vrsticiSSHPrikrojitev ravni varnostiRaven varnosti:TelnetVarne naprave:Varne naprave:WWW (HTTP)Požarni zid lahko prikrojite na dva načina. Pri prvem lahko nastavite ves promet z določenega omrežnega vmesnika, pri drugem pa izrecno dovolite določene storitve skozi požarni zid. Dodatna vrata se da določiti v obliki 'storitev:protokol', na primer 'imap:tcp'.Nastavitve _požarnega zidu_SELinuxzaupaj napraviZanemari nastavitve iz /etc/sysconfig/system-config-securitylevelvrata:protokol (npr. ssh:tcp)

Anon7 - 2021