WPMU DEV in your language
Translations
Translation of Defender: Chinese (China)
| Prio | Original string | Translation | — |
|---|---|---|---|
| Suspicious function found | 发现可疑功能 | Details | |
| Monthly | 每月 | Details | |
| Weekly | 每周 | Details | |
| Daily | 每天 | Details | |
| A scan is already in progress | 扫秒已在进行中 | Details | |
| Issues | 问题 | Details | |
| Summary | 摘要 | Details | |
| Update WordPress | 更新WordPress | Details | |
| Update WordPress to latest version | 将WordPress更新到最新版本 | Details | |
|
Update WordPress to latest version 将WordPress更新到最新版本
Login to your account for contributing to translations.
|
|||
| Update old security keys | 更新旧的安全密钥 | Details | |
| Prevent Information Disclosure | 防止信息泄露 | Details | |
| 2. Add the code below inside the server section in the file, right before the php location block. Looks something like: | 添加以上代码到文件中的<strong>server</strong>部分里,在php位置区之前,看起来像这样: | Details | |
|
2. Add the code below inside the server section in the file, right before the php location block. Looks something like: 添加以上代码到文件中的<strong>server</strong>部分里,在php位置区之前,看起来像这样:
Login to your account for contributing to translations.
|
|||
| 1. Copy the generated code into your site specific .conf file usually located in a subdirectory under /etc/nginx/... or /usr/local/nginx/conf/... | 将生成的代码复制到你网站特定的.conf文件中,通常位于/etc/nginx/... 或 /usr/local/nginx/conf/...下面的子目录中 | Details | |
|
1. Copy the generated code into your site specific .conf file usually located in a subdirectory under /etc/nginx/... or /usr/local/nginx/conf/... 将生成的代码复制到你网站特定的.conf文件中,通常位于/etc/nginx/... 或 /usr/local/nginx/conf/...下面的子目录中
Login to your account for contributing to translations.
|
|||
| By default, a plugin/theme vulnerability could allow a PHP file to get uploaded into your site's directories and in turn execute harmful scripts that can wreak havoc on your website. Prevent this altogether by disabling direct PHP execution in directories that don't require it. | 默认情况下,插件/主题漏洞可能随着PHP文件上传到你网站的目录中,执行这些有害脚本可能会在你的网站上造成严重的破坏,在不需要的目录中停用PHP执行权限可以完全防止这种情况。 | Details | |
|
By default, a plugin/theme vulnerability could allow a PHP file to get uploaded into your site's directories and in turn execute harmful scripts that can wreak havoc on your website. Prevent this altogether by disabling direct PHP execution in directories that don't require it. 默认情况下,插件/主题漏洞可能随着PHP文件上传到你网站的目录中,执行这些有害脚本可能会在你的网站上造成严重的破坏,在不需要的目录中停用PHP执行权限可以完全防止这种情况。
Login to your account for contributing to translations.
|
|||
| Prevent PHP Execution | 保护PHP执行 | Details | |
Legend:
Current
Waiting
Rejected
Fuzzy
Old
changesrequested
With warnings
Export as •
Translators
- Andy: 12%