You are on page 1of 6

TRANSLATION & EDITING TASK #1

Test 1 - Localization/IT
601 words (417+184)

Part 1: UA

<h1>Intrusion Prevention</h1>

<p>The Intrusion Prevention enables to detect and block malicious codes over the
network, such as worms and Trojan horses. An infected computer has a potential to
infect other computers on the same network. Especially, a computer connecting the
Internet is always exposed to the danger of malicious codes. The Intrusion Prevention
will safeguard your computer from malicious intrusions. </p>
<p> </p>
<h4>Intrusion Prevention window</h4>

<p>The Intrusion Prevention window shows brief information about intrusions detected
and rules applied to the firewall to block malicious codes. You can check the following
information:</p>

<p><img src="Images/defense.jpg" x-maintain-ratio=TRUE


style="border: none; float: none;
width: 378px; height:
338px; border-style: none;
border-style: none;" width=378 height=338
border=0></p>

<ul>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Name:


Indicates rules used to block malicious codes. </p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Status:


Shows the status whether the network intrusion prevention rules are applied. Right click
on an item to change its status.</p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Rule


Type: Shows types of malicious codes. </p></li>

<li class=kadov-p-CListbullet4><p class=Listbullet4>Scanning:


A technique used by a hacker to detect open ports and IP address on a network, and to
send malicious packets to a vulnerable system, which can result in network overload.
</p></li>
<li class=kadov-p-CListbullet4><p class=Listbullet4>Worm: A
malicious code that has a capability to self-clone. Different from a virus, it replicates and
spreads itself from one computer to another over a network.</p></li>

<li class=kadov-p-CListbullet4><p class=Listbullet4>Trojan


horse: A malicious code that appears to be useful or harmless, but cause a serious
damage on the computer. Different from a virus or worm, it does not replicate itself, but
allows attackers to remote control the affected computer.</p></li>

<li class=kadov-p-CListbullet3><p
class=Listbullet3>Description: Displays the brief information about the rules used
to block malicious codes. </p></li>
</ul>

<p class=CautionSubject><img src="Images/warning.bmp"


x-maintain-ratio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Caution</p>

<p class=Caution>If the status of the Intrusion Prevention is set to <span


class=Message>Disabled</span>, your computer will become vulnerable to the attacks
from malicious codes.</p>

<h1>Setting Security Level</h1>

<p>You can set the security level (High, Medium or Low) depending on your necessity.
To adjust the security level:</p>

<ol>

<li class=kadov-p-CListNumber><p class=ListNumber>Right-click


the icon <img src="Images/002_tray_icon.gif" x-maintain-
ratio=TRUE style="border: none;
width: 17px; height: 18px;
float: none; border-style: none;
border-style: none;" width=17
height=18 border=0> on the taskbar. </p></li>

<li class=kadov-p-CListNumber><p class=ListNumber>Select


<span class=Message>Firewall</span> on the tray. </p></li>
<li class=kadov-p-CListNumber><p class=ListNumber>Go to <span
class=Message>Security Level</span>.</p></li>

<p class=ListNumber><img src="Images/security_level.jpg"


x-maintain-ratio=TRUE
style="border: none;
float: none;
margin-left: 36px;
width: 353px;
height: 315px;
border-style:
none; border-
style: none;" width=353
height=315
border=0></p>

<li class=kadov-p-CListNumber><p class=ListNumber>Move the


slider bar to set the security level. </p></li>
</ol>

<p> </p>

<h4>Security Level - Medium (Recommended)</h4>

<p>Set the level to <b style="font-weight: normal;">Medium</b> to apply all


security rules set in AOS, except the sharing rules. When the level is set to Medium, the
following functions will be available: </p>

<ul>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Detect


hacking tool: Detects a hacking tool approaching your computer.</p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Apply


program rule: Applies the specified program rules.</p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Apply


network rules: Applies the specified network rules. </p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Leave


logs: Records the logs about <!--kadov_tag{{<spaces>}}--> <!--
kadov_tag{{</spaces>}}-->AOS firewall functions. <!--
kadov_tag{{<spaces>}}--> <!--kadov_tag{{</spaces>}}--></p></li>
</ul>

<p class=NoteSubject><img src="Images/notice.bmp"


x-maintain-ratio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Note</p>

<p class=Note>When the security level is set to Medium, the Sharing Rules tab is
inactive.</p>

<p class=Listbullet3> </p>

<p class=CautionSubject><img src="Images/warning.bmp"


x-maintain-ratio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Caution</p>

<p class=Caution>If you set the security level to Medium, the sharing rules will not
be applied any more, and the Sharing Rules tab also will be inactivated.
</p>
Part 2: SW

;;;;; Screen No 00_01: UPDA_ERRO01 ;;;;;


UPDA_ERRO01_TTL01=XX Online Security
UPDA_ERRO01_DES01=The installation file may be corrupted.
UPDA_ERRO01_DES02=Do you want to scan for viruses or spyware?
UPDA_ERRO01_BTN01=Yes
UPDA_ERRO01_BTN02=No

;;;;; Screen No 01: SHEL_TRAY ;;;;;


SHEL_TRAY_TIP01=XX Online Security is running.
SHEL_TRAY_MNU01=About XX Online Security
SHEL_TRAY_MNU02=Anti-Keylogger
SHEL_TRAY_MNU03=Firewall
SHEL_TRAY_MNU04=Anti-Virus/Spyware
SHEL_TRAY_MNU05=Help

;;;;; Screen No 013: HACK_PEND01 ;;;;;


HACK_PEND01_TTL01=XX Online Security
HACK_PEND01_DES01=A hacking tool has been detected. Do you want to delete it?
HACK_PEND01_CTR01=Detection Name:
HACK_PEND01_CTR02=File Location:
HACK_PEND01_BTN01=Yes
HACK_PEND01_BTN02=No

;;;;; Screen No 013_01: HACK_PEND01_MESS ;;;;;


HACK_PEND01_MESS_TTL01=XX Online Security
HACK_PEND01_MESS_DES01=The hacking tool has been successfully deleted.
HACK_PEND01_MESS_DES02=Additional scan is recommended for the safety of your
computer. Do you want to start the scan now?
HACK_PEND01_MESS_DES03=Failed to delete the hacking tool.
HACK_PEND01_MESS_BTN01=Yes
HACK_PEND01_MESS_BTN02=No

;;;;; Screen No 014: HACK_PEND02 ;;;;;


HACK_PEND02_TTL01=XX Online Security
HACK_PEND02_DES01=The following file has been changed.\nDo you want to update
the program rule?
HACK_PEND02_CTR01=File Name:
HACK_PEND02_CTR02=Previous file version:
HACK_PEND02_CTR03=Previous file size:
HACK_PEND02_CTR04=Current file version:
HACK_PEND02_CTR05=Current file size:
HACK_PEND02_BTN01=Update
HACK_PEND02_BTN02=Block

// Scan/Repair status
MYSAFETY_MSG_IDLE=Preparing to scan.
MYSAFETY_MSG_SYSTEM_MEMORY_SCAN=Preparing to scan system memory.
MYSAFETY_MSG_PROCESS_MEMORY_SCAN=Scanning process memory.
MYSAFETY_MSG_BOOT_SCAN=Scanning boot sector.
MYSAFETY_MSG_PROCESS_IMAGE_SCAN=Scanning process images.
MYSAFETY_MSG_STARTUP_SCAN=Scanning startup programs.
MYSAFETY_MSG_SCAN_START=Starting the scan.
MYSAFETY_MSG_SCAN=Scanning for viruses or spyware.
MYSAFETY_MSG_SCAN_WAIT=Scanning for viruses or spyware that are running on
your computer.
MYSAFETY_MSG_SCAN_END=Scan completed.
MYSAFETY_MSG_CLEAN_START=Preparing to repair infected files.
MYSAFETY_MSG_CLEAN=Repairing viruses and spyware.
MYSAFETY_MSG_CLEAN_WAIT=Repairing viruses or spyware that are running on
your computer.
MYSAFETY_MSG_CLEAN_END=Repair completed.

Questions
Sources: indicate the main sources you used as reference for this test.

Comments on your test.

You might also like