You are on page 1of 12

TRANSLATION & EDITING TASK #1

Test 1 - Localization/IT
601 words (417+184)

Part 1: UA

<h1>Intrusion Prevention</h1>

<p>The Intrusion Prevention enables to detect and block malicious codes over the
network, such as worms and Trojan horses. An infected computer has a potential to
infect other computers on the same network. Especially, a computer connecting the
Internet is always exposed to the danger of malicious codes. The Intrusion Prevention
will safeguard your computer from malicious intrusions. </p>
<p> </p>
<h4>Intrusion Prevention window</h4>

<p>The Intrusion Prevention window shows brief information about intrusions detected
and rules applied to the firewall to block malicious codes. You can check the following
information:</p>

<p><img src="Images/defense.jpg" x-maintain-ratio=TRUE


style="border: none; float: none;
width: 378px; height:
338px; border-style: none;
border-style: none;" width=378 height=338
border=0></p>

<ul>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Name:


Indicates rules used to block malicious codes. </p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Status:


Shows the status whether the network intrusion prevention rules are applied. Right click
on an item to change its status.</p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Rule


Type: Shows types of malicious codes. </p></li>

<li class=kadov-p-CListbullet4><p class=Listbullet4>Scanning:


A technique used by a hacker to detect open ports and IP address on a network, and to
send malicious packets to a vulnerable system, which can result in network overload.
</p></li>
<li class=kadov-p-CListbullet4><p class=Listbullet4>Worm: A
malicious code that has a capability to self-clone. Different from a virus, it replicates and
spreads itself from one computer to another over a network.</p></li>

<li class=kadov-p-CListbullet4><p class=Listbullet4>Trojan


horse: A malicious code that appears to be useful or harmless, but cause a serious
damage on the computer. Different from a virus or worm, it does not replicate itself, but
allows attackers to remote control the affected computer.</p></li>

<li class=kadov-p-CListbullet3><p
class=Listbullet3>Description: Displays the brief information about the rules used
to block malicious codes. </p></li>
</ul>

<p class=CautionSubject><img src="Images/warning.bmp"


x-maintain-ratio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Caution</p>

<p class=Caution>If the status of the Intrusion Prevention is set to <span


class=Message>Disabled</span>, your computer will become vulnerable to the attacks
from malicious codes.</p>

<h1>Setting Security Level</h1>

<p>You can set the security level (High, Medium or Low) depending on your necessity.
To adjust the security level:</p>

<ol>

<li class=kadov-p-CListNumber><p class=ListNumber>Right-click


the icon <img src="Images/002_tray_icon.gif" x-maintain-
ratio=TRUE style="border: none;
width: 17px; height: 18px;
float: none; border-style: none;
border-style: none;" width=17
height=18 border=0> on the taskbar. </p></li>

<li class=kadov-p-CListNumber><p class=ListNumber>Select


<span class=Message>Firewall</span> on the tray. </p></li>
<li class=kadov-p-CListNumber><p class=ListNumber>Go to <span
class=Message>Security Level</span>.</p></li>

<p class=ListNumber><img src="Images/security_level.jpg"


x-maintain-ratio=TRUE
style="border: none;
float: none;
margin-left: 36px;
width: 353px;
height: 315px;
border-style:
none; border-
style: none;" width=353
height=315
border=0></p>

<li class=kadov-p-CListNumber><p class=ListNumber>Move the


slider bar to set the security level. </p></li>
</ol>

<p> </p>

<h4>Security Level - Medium (Recommended)</h4>

<p>Set the level to <b style="font-weight: normal;">Medium</b> to apply all


security rules set in AOS, except the sharing rules. When the level is set to Medium, the
following functions will be available: </p>

<ul>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Detect


hacking tool: Detects a hacking tool approaching your computer.</p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Apply


program rule: Applies the specified program rules.</p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Apply


network rules: Applies the specified network rules. </p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Leave


logs: Records the logs about <!--kadov_tag{{<spaces>}}--> <!--
kadov_tag{{</spaces>}}-->AOS firewall functions. <!--
kadov_tag{{<spaces>}}--> <!--kadov_tag{{</spaces>}}--></p></li>
</ul>

<p class=NoteSubject><img src="Images/notice.bmp"


x-maintain-ratio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Note</p>

<p class=Note>When the security level is set to Medium, the Sharing Rules tab is
inactive.</p>

<p class=Listbullet3> </p>

<p class=CautionSubject><img src="Images/warning.bmp"


x-maintain-ratio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Caution</p>

<p class=Caution>If you set the security level to Medium, the sharing rules will not
be applied any more, and the Sharing Rules tab also will be inactivated.
</p>
Part 2: SW

;;;;; Screen No 00_01: UPDA_ERRO01 ;;;;;


UPDA_ERRO01_TTL01=XX Online Security
UPDA_ERRO01_DES01=The installation file may be corrupted.
UPDA_ERRO01_DES02=Do you want to scan for viruses or spyware?
UPDA_ERRO01_BTN01=Yes
UPDA_ERRO01_BTN02=No

;;;;; Screen No 01: SHEL_TRAY ;;;;;


SHEL_TRAY_TIP01=XX Online Security is running.
SHEL_TRAY_MNU01=About XX Online Security
SHEL_TRAY_MNU02=Anti-Keylogger
SHEL_TRAY_MNU03=Firewall
SHEL_TRAY_MNU04=Anti-Virus/Spyware
SHEL_TRAY_MNU05=Help

;;;;; Screen No 013: HACK_PEND01 ;;;;;


HACK_PEND01_TTL01=XX Online Security
HACK_PEND01_DES01=A hacking tool has been detected. Do you want to delete it?
HACK_PEND01_CTR01=Detection Name:
HACK_PEND01_CTR02=File Location:
HACK_PEND01_BTN01=Yes
HACK_PEND01_BTN02=No

;;;;; Screen No 013_01: HACK_PEND01_MESS ;;;;;


HACK_PEND01_MESS_TTL01=XX Online Security
HACK_PEND01_MESS_DES01=The hacking tool has been successfully deleted.
HACK_PEND01_MESS_DES02=Additional scan is recommended for the safety of your
computer. Do you want to start the scan now?
HACK_PEND01_MESS_DES03=Failed to delete the hacking tool.
HACK_PEND01_MESS_BTN01=Yes
HACK_PEND01_MESS_BTN02=No

;;;;; Screen No 014: HACK_PEND02 ;;;;;


HACK_PEND02_TTL01=XX Online Security
HACK_PEND02_DES01=The following file has been changed.\nDo you want to update
the program rule?
HACK_PEND02_CTR01=File Name:
HACK_PEND02_CTR02=Previous file version:
HACK_PEND02_CTR03=Previous file size:
HACK_PEND02_CTR04=Current file version:
HACK_PEND02_CTR05=Current file size:
HACK_PEND02_BTN01=Update
HACK_PEND02_BTN02=Block

// Scan/Repair status
MYSAFETY_MSG_IDLE=Preparing to scan.
MYSAFETY_MSG_SYSTEM_MEMORY_SCAN=Preparing to scan system memory.
MYSAFETY_MSG_PROCESS_MEMORY_SCAN=Scanning process memory.
MYSAFETY_MSG_BOOT_SCAN=Scanning boot sector.
MYSAFETY_MSG_PROCESS_IMAGE_SCAN=Scanning process images.
MYSAFETY_MSG_STARTUP_SCAN=Scanning startup programs.
MYSAFETY_MSG_SCAN_START=Starting the scan.
MYSAFETY_MSG_SCAN=Scanning for viruses or spyware.
MYSAFETY_MSG_SCAN_WAIT=Scanning for viruses or spyware that are running on
your computer.
MYSAFETY_MSG_SCAN_END=Scan completed.
MYSAFETY_MSG_CLEAN_START=Preparing to repair infected files.
MYSAFETY_MSG_CLEAN=Repairing viruses and spyware.
MYSAFETY_MSG_CLEAN_WAIT=Repairing viruses or spyware that are running on
your computer.
MYSAFETY_MSG_CLEAN_END=Repair completed.
Questions
Sources: indicate the main sources you used as reference for this test.

Comments on your test.


Perjemahan & Tugas Penyuntingan #1

Tes 1 - Pelokalan/IT
601 kata (417+184)

Bagian 1: UA

<h1>Pencegahan Penyusupan</h1>

<p>Pencegahan Penyusupan dapat mendeteksi dan memblokir virus berbahaya melalui


jaringan, seperti cacing dan kuda Trojan. Sebuah komputer yang terinfeksi dapat
menginfeksi komputer yang lainnya pada jaringan yang sama. Khususnya, komputer
yang terhubung internet selalu terkena bahaya dari virus berbahya. Pencegahan
Penyusupan akan menjaga komputer Anda dari gangguan berbahaya</p>
<p> </p>
<h4>Pencegahan Penyususpan layar<h4>

<p>Pencegahan Penyusupan layar menunjukkan informasi singkat tentang gangguan


yang terdeteksi dan aturan yang diterapkan pada firewall untuk memblokir virus
berbahaya. Anda bisa memeriksanya pada informasi berikut: </p>

<p><img src="Images/defense.jpg" x-perawatan-


rasio=TRUE style="border: none;
float: none; width: 378px;
height: 338px; border-style: none;
border-style: none;" width=378
height=338 border=0></p>

<ul>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Nama:


Mengindikasikan aturan yang digunakan untum memblokir virus berbahaya. </p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Status:


Menunjukan status bagaimana cara pencegahan jaringan diterapkan. Klik kanan pada
item untuk mengubah statusnya.</p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Rule


Type: Shows types of malicious codes. </p></li>

<li class=kadov-p-CListbullet4><p class=Listbullet4>Memindai:


Sebuah teknik yang digunakan oleh peretas untuk mendeteksi porta terbuka dan alamat
IP pada jaringan, dan untuk mengirimkan virus ke dalam jaringan sistem yang
mengakibatkan beban pada jaringan. </p></li>
<li class=kadov-p-CListbullet4><p class=Listbullet4>Worm:
sebuah virus berbahaya yang memiliki kemampuan untuk mengkloning diri sendiri.
Berbeda dari virus, itu meniru dan menyebar sendiri dari satu komputer ke komputer
yang laun melalui jaringan.</p></li>

<li class=kadov-p-CListbullet4><p class=Listbullet4> kuda


Trojan: Sebuah virus berbahaya yang berguna atau tidak berbahaya, tetapi bisa
menyebabkan kerusakan serius pada komputer. Berbeda dari virus atau worm, itu tidak
meniru dirinya sendiri, tetapi bisa menyerang pengendali remote</p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Deskripsi:


Tampilkan informasi singkat tentang aturan yang digunakan untuk meblokir
virus.</p></li>
</ul>

<p class=CautionSubject><img src="Images/warning.bmp"


x-perawatan-rasio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Caution</p>

<p class=Caution>Status pencegahan ganggua diatur pada <span


class=Message>Disabled</span>, komputer Anda akan menjadi rentan terhadap
serangan virus.</p>

<h1>Setting Security Level</h1>

<p>Anda dapat mengatur tingkat keamanan (High, Medium or Low) tergantung


kebutuhan Anda. Untuk menyesuaikan tingkat keamanan:</p>

<ol>

<li class=kadov-p-CListNumber><p class=ListNumber>Klik kanan


gambar <img src="Images/002_tray_icon.gif" x-perawatan-
rasio=TRUE style="border: none;
width: 17px; height: 18px;
float: none; border-style: none;
border-style: none;" width=17
height=18 border=0> on the taskbar. </p></li>

<li class=kadov-p-CListNumber><p class=ListNumber>Select


<span class=Message>Firewall</span> on the tray. </p></li>
<li class=kadov-p-CListNumber><p class=ListNumber>Go to <span
class=Message>Security Level</span>.</p></li>

<p class=ListNumber><img src="Images/security_level.jpg"


x-perawatan-rasio=TRUE
style="border: none;
float: none;
margin-left: 36px;
width: 353px;
height: 315px;
border-style:
none; border-
style: none;" width=353
height=315
border=0></p>

<li class=kadov-p-CListNumber><p class=ListNumber>Move the


slider bar to set the security level. </p></li>
</ol>

<p> </p>

<h4>Security Level - Medium (Recommended)</h4>

<p>Set the level to <b style="font-weight: normal;">Medium</b> to apply all


security rules set in AOS, except the sharing rules. Ketika diatur ketingkat medium,
fungsi berikut akan tersedia </p>

<ul>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Alat


deteksi peretasan: mendeteksi alat peretasan yang mendekati komputer
Anda.</p></li>

<li class=kadov-p-CListbullet3><p
class=Listbullet3>Menerapkan pengaturan program: menerapkan aturan program
yang diterapkan.</p></li>

<li class=kadov-p-CListbullet3><p
class=Listbullet3>Menerapkan aturan jaringan: menerapkan aturan jaringan yang
ditentukan. </p></li>

<li class=kadov-p-CListbullet3><p class=Listbullet3>Leave


logs: Records the logs about <!--kadov_tag{{<spaces>}}--> <!--
kadov_tag{{</spaces>}}-->AOS firewall functions. <!--
kadov_tag{{<spaces>}}--> <!--kadov_tag{{</spaces>}}--></p></li>
</ul>

<p class=NoteSubject><img src="Images/notice.bmp"


x-perawatan-rasio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Note</p>

<p class=Note>Ketika tingkat keamanan diatur ketingkat medium, tab Sharing Rules
tidak aktif.</p>

<p class=Listbullet3> </p>

<p class=CautionSubject><img src="Images/warning.bmp"


x-perawatan-rasio=TRUE
style="border: none;
width: 14px;
height: 14px;
float: none;
border-style: none;
border-style: none;"
width=14
height=14
border=0> Caution</p>

<p class=Caution>Jika Anda mengatur tingkat keamana ke Medium, aturan berbagi


tidak akan diterapkan, dan tombol Sharing Rules akan otomatis mati.
</p>
Part 2: SW

;;;;; Screen No 00_01: UPDA_ERRO01 ;;;;;


UPDA_ERRO01_TTL01=XX Online Security
UPDA_ERRO01_DES01=The installation file may be corrupted.
UPDA_ERRO01_DES02=Do you want to scan for viruses or spyware?
UPDA_ERRO01_BTN01=Yes
UPDA_ERRO01_BTN02=No

;;;;; Screen No 01: SHEL_TRAY ;;;;;


SHEL_TRAY_TIP01=XX Online Security is running.
SHEL_TRAY_MNU01=About XX Online Security
SHEL_TRAY_MNU02=Anti-Keylogger
SHEL_TRAY_MNU03=Firewall
SHEL_TRAY_MNU04=Anti-Virus/Spyware
SHEL_TRAY_MNU05=Help

;;;;; Screen No 013: HACK_PEND01 ;;;;;


HACK_PEND01_TTL01=XX Online Security
HACK_PEND01_DES01=alat peretas telah terdeteksi. Anda ingin menghapusnya?
HACK_PEND01_CTR01=Detection Name:
HACK_PEND01_CTR02=File Location:
HACK_PEND01_BTN01=Yes
HACK_PEND01_BTN02=No

;;;;; Screen No 013_01: HACK_PEND01_MESS ;;;;;


HACK_PEND01_MESS_TTL01=XX Online Security
HACK_PEND01_MESS_DES01=Alat peretas telah berhasil dihapus.
HACK_PEND01_MESS_DES02=Pemindaian tambahan direkomendasikan untuk
keamanan komputer Anda. Anda ingin memindai sekarang?
HACK_PEND01_MESS_DES03=Gagal menghapus alat peretas.
HACK_PEND01_MESS_BTN01=Yes
HACK_PEND01_MESS_BTN02=No

;;;;; Screen No 014: HACK_PEND02 ;;;;;


HACK_PEND02_TTL01=XX Online Security
HACK_PEND02_DES01=Berkas berikut telah berubah.\nAnda ingin memperbarui
aturan program?
HACK_PEND02_CTR01=File Name:
HACK_PEND02_CTR02=Previous file version:
HACK_PEND02_CTR03=Previous file size:
HACK_PEND02_CTR04=Berkas versi sekarang:
HACK_PEND02_CTR05=Current file size:
HACK_PEND02_BTN01=Update
HACK_PEND02_BTN02=Block

// Scan/Repair status
MYSAFETY_MSG_IDLE=Preparing to scan.
MYSAFETY_MSG_SYSTEM_MEMORY_SCAN=Persiapan memindai sistem
penyimpanan.
MYSAFETY_MSG_PROCESS_MEMORY_SCAN=Proses memindai memori.
MYSAFETY_MSG_BOOT_SCAN=Memindai boot sector.
MYSAFETY_MSG_PROCESS_IMAGE_SCAN=Proses memindai gambar.
MYSAFETY_MSG_STARTUP_SCAN=Memindai program startup.
MYSAFETY_MSG_SCAN_START=Mulai pemindaian.
MYSAFETY_MSG_SCAN=Memindai virus atau spyware.
MYSAFETY_MSG_SCAN_WAIT=Memindai virus atau spyware yang berjalan pada
komputer Anda.
MYSAFETY_MSG_SCAN_END=Pemindaian selesai.
MYSAFETY_MSG_CLEAN_START=Bersiap memperbaiki berkas yang terinfeksi.
MYSAFETY_MSG_CLEAN=Memperbaiki virus dan spyware.
MYSAFETY_MSG_CLEAN_WAIT=Memperbaiki virus atau spyware yang berjalan pada
komputer Anda.
MYSAFETY_MSG_CLEAN_END=Perbaikan selesai.

Questions
Sources: indicate the main sources you used as reference for this test.

Comments on your test.

You might also like