WPMU DEV in your language
Translations
Translation of Defender: Danish
| Prio | Original string | Translation | — |
|---|---|---|---|
| The feature is allowed for specific origins. Place URLs here <strong>%s</strong>, one per line. | Funktionen er tilladt for bestemte oprindelser. Placer URL'er her <strong>%s</strong>, én pr. linje. | Details | |
|
The feature is allowed for specific origins. Place URLs here <strong>%s</strong>, one per line. Funktionen er tilladt for bestemte oprindelser. Placer URL'er her <strong>%s</strong>, én pr. linje.
Login to your account for contributing to translations.
|
|||
| Origin URL | Oprindelses URL | Details | |
| The page can't be displayed in a frame, regardless of the site attempting to do so. | Siden kan ikke vises i en ramme, uanset hvilket websted der forsøger at gøre det. | Details | |
|
The page can't be displayed in a frame, regardless of the site attempting to do so. Siden kan ikke vises i en ramme, uanset hvilket websted der forsøger at gøre det.
Login to your account for contributing to translations.
|
|||
| The page can only be displayed in a frame on the same origin as the page itself. The spec leaves it up to browser vendors to decide whether this option applies to the top level, the parent, or the whole chain. | Siden kan kun vises i en ramme med samme oprindelse som selve siden. Specifikationen overlader det til browserudbydere at beslutte, om denne mulighed gælder for det øverste niveau, overordnet eller hele kæden. | Details | |
|
The page can only be displayed in a frame on the same origin as the page itself. The spec leaves it up to browser vendors to decide whether this option applies to the top level, the parent, or the whole chain. Siden kan kun vises i en ramme med samme oprindelse som selve siden. Specifikationen overlader det til browserudbydere at beslutte, om denne mulighed gælder for det øverste niveau, overordnet eller hele kæden.
Login to your account for contributing to translations.
|
|||
| None | Ingen | Details | |
| Specific Origins | Specifikke oprindelser | Details | |
| The Permissions-Policy response header provides control over what browser features can be used when web pages are embedded in iframes. | Svaroverskriften Tilladelser-politik giver kontrol over, hvilke browserfunktioner der kan bruges, når websider er integreret i iframes. | Details | |
|
The Permissions-Policy response header provides control over what browser features can be used when web pages are embedded in iframes. Svaroverskriften Tilladelser-politik giver kontrol over, hvilke browserfunktioner der kan bruges, når websider er integreret i iframes.
Login to your account for contributing to translations.
|
|||
| Enforce | Sæt i værk | Details | |
| We will place %s file into the uploads folder to lock down the files and folders inside. | Vi placerer %s fil i uploadmappen for at låse filerne og mapperne inde. | Details | |
|
We will place %s file into the uploads folder to lock down the files and folders inside. Vi placerer %s fil i uploadmappen for at låse filerne og mapperne inde.
Login to your account for contributing to translations.
|
|||
| This security recommendation locks down your website by preventing the redirect, making it much harder for bots to get your usernames. We highly advise actioning this recommendation. | Denne sikkerhedsanbefaling låser dit websted ved at forhindre omdirigering, hvilket gør det meget sværere for bots at få dine brugernavne. Vi anbefaler stærkt at handle på denne anbefaling. | Details | |
|
This security recommendation locks down your website by preventing the redirect, making it much harder for bots to get your usernames. We highly advise actioning this recommendation. Denne sikkerhedsanbefaling låser dit websted ved at forhindre omdirigering, hvilket gør det meget sværere for bots at få dine brugernavne. Vi anbefaler stærkt at handle på denne anbefaling.
Login to your account for contributing to translations.
|
|||
| There are two sides to this hacking method - the username and the password. The passwords are random guesses, but (unfortunately) the username is easy to get. Simply typing the query string ?author=1, ?author=2 and so on, will redirect the page to /author/username/ - bam, the bot now has your usernames to begin brute force attacks with. | Der er to sider af denne hackingmetode - brugernavnet og adgangskoden. Adgangskoderne er tilfældige gæt, men (desværre) er brugernavnet let at få. Ved blot at skrive forespørgselsstrengen ?author=1, ?author=2 og så videre, omdirigeres siden til /author/username/ - bam, botten har nu dine brugernavne til at begynde brute force-angreb med. | Details | |
|
There are two sides to this hacking method - the username and the password. The passwords are random guesses, but (unfortunately) the username is easy to get. Simply typing the query string ?author=1, ?author=2 and so on, will redirect the page to /author/username/ - bam, the bot now has your usernames to begin brute force attacks with. Der er to sider af denne hackingmetode - brugernavnet og adgangskoden. Adgangskoderne er tilfældige gæt, men (desværre) er brugernavnet let at få. Ved blot at skrive forespørgselsstrengen ?author=1, ?author=2 og så videre, omdirigeres siden til /author/username/ - bam, botten har nu dine brugernavne til at begynde brute force-angreb med.
Login to your account for contributing to translations.
|
|||
| One of the more common methods for bots and hackers to gain access to your website is to find out login usernames and brute force the login area with tons of dummy passwords. The hope is that one the username and password combos will match, and voilà - they have access (you'd be surprised how common weak passwords are!). | En af de mere almindelige metoder for bots og hackere til at få adgang til dit websted er at finde ud af login-brugernavne og brute force login-området med masser af dummy-adgangskoder. Håbet er, at en brugernavn og adgangskode kombinationer vil matche, og voilà - de har adgang (du vil blive overrasket over, hvor almindelige svage adgangskoder er!). | Details | |
|
One of the more common methods for bots and hackers to gain access to your website is to find out login usernames and brute force the login area with tons of dummy passwords. The hope is that one the username and password combos will match, and voilà - they have access (you'd be surprised how common weak passwords are!). En af de mere almindelige metoder for bots og hackere til at få adgang til dit websted er at finde ud af login-brugernavne og brute force login-området med masser af dummy-adgangskoder. Håbet er, at en brugernavn og adgangskode kombinationer vil matche, og voilà - de har adgang (du vil blive overrasket over, hvor almindelige svage adgangskoder er!).
Login to your account for contributing to translations.
|
|||
| For more information visit | For mere information besøg | Details | |
|
For more information visit For mere information besøg
Login to your account for contributing to translations.
|
|||
| Here's a list of potentially harmful files Defender thinks could be suspicious. In a lot of cases the scan will pick up harmless files, but in some cases you may wish to remove files that look suspicious. | Her er en liste over potentielt skadelige filer, som Defender mener kan være mistænkelige. I mange tilfælde vil scanningen opfange harmløse filer, men i nogle tilfælde ønsker du måske at fjerne filer, der ser mistænkelige ud. | Details | |
|
Here's a list of potentially harmful files Defender thinks could be suspicious. In a lot of cases the scan will pick up harmless files, but in some cases you may wish to remove files that look suspicious. Her er en liste over potentielt skadelige filer, som Defender mener kan være mistænkelige. I mange tilfælde vil scanningen opfange harmløse filer, men i nogle tilfælde ønsker du måske at fjerne filer, der ser mistænkelige ud.
Login to your account for contributing to translations.
|
|||
| Error | Fejl | Details | |
Export as •
Translators
- Calmar: 68.7%
- Leonardo: 8.8%
- Mikkel: 4.4%
- Michael: 2.5%
- Chrish Justif: 2.2%
- NurseGnu: 0.8%
- PowerQuest: 0.7%
- Inovium: 0.6%
- Ulrik: 0.3%
- Joacim: 0%