WPMU DEV in your language
Translations
Translation of Defender: Chinese (Hong Kong)
Prio | Original string | Translation | — |
---|---|---|---|
Update old security keys | 更新舊的安全密鑰 | Details | |
Prevent Information Disclosure | 防止訊息洩露 | Details | |
2. Add the code below inside the server section in the file, right before the php location block. Looks something like: | 增加以上代碼到檔案中的<strong>server</strong>部分裡,在php位置區之前,看起來像這樣: | Details | |
2. Add the code below inside the server section in the file, right before the php location block. Looks something like: 增加以上代碼到檔案中的<strong>server</strong>部分裡,在php位置區之前,看起來像這樣:
Login to your account for contributing to translations.
|
|||
1. Copy the generated code into your site specific .conf file usually located in a subdirectory under /etc/nginx/... or /usr/local/nginx/conf/... | 將產生的代碼複製到你網站特定的.conf檔案中,通常位於/etc/nginx/... 或 /usr/local/nginx/conf/...下面的子目錄中 | Details | |
1. Copy the generated code into your site specific .conf file usually located in a subdirectory under /etc/nginx/... or /usr/local/nginx/conf/... 將產生的代碼複製到你網站特定的.conf檔案中,通常位於/etc/nginx/... 或 /usr/local/nginx/conf/...下面的子目錄中
Login to your account for contributing to translations.
|
|||
By default, a plugin/theme vulnerability could allow a PHP file to get uploaded into your site's directories and in turn execute harmful scripts that can wreak havoc on your website. Prevent this altogether by disabling direct PHP execution in directories that don't require it. | 預設情況下,插件/主題漏洞可能隨著PHP檔案上傳到你網站的目錄中,執行這些有害腳本可能會在網站上造成嚴重的破壞,在不需要的目錄中停用PHP執行權限可以完全防止這種情況。 | Details | |
By default, a plugin/theme vulnerability could allow a PHP file to get uploaded into your site's directories and in turn execute harmful scripts that can wreak havoc on your website. Prevent this altogether by disabling direct PHP execution in directories that don't require it. 預設情況下,插件/主題漏洞可能隨著PHP檔案上傳到你網站的目錄中,執行這些有害腳本可能會在網站上造成嚴重的破壞,在不需要的目錄中停用PHP執行權限可以完全防止這種情況。
Login to your account for contributing to translations.
|
|||
Prevent PHP Execution | 保護PHP執行 | Details | |
Disable file editor | 停用檔案編輯器 | Details | |
WordPress comes with a file editor built into the system. This means that anyone with access to your login information can further edit your plugin and theme files and inject malicious code. | WordPress內建檔案編輯器,這表示任何有權訪問你的登入訊息的人,都可以編輯你的插件和主題檔案,我們建議停用編輯器。 | Details | |
WordPress comes with a file editor built into the system. This means that anyone with access to your login information can further edit your plugin and theme files and inject malicious code. WordPress內建檔案編輯器,這表示任何有權訪問你的登入訊息的人,都可以編輯你的插件和主題檔案,我們建議停用編輯器。
Login to your account for contributing to translations.
|
|||
Disable the file editor | 停用檔案編輯器 | Details | |
Disable Pingbacks | 停用Pingback | Details | |
Revert | 還原 | Details | |
Pingbacks notify a website when it has been mentioned by another website, like a form of courtesy communication. However, these notifications can be sent to any website willing to receive them, opening you up to DDoS attacks, which can take your website down in seconds and fill your posts with spam comments. | 當文章被另一個網站提到,Pingbacks會通知網站,這像是一種禮貌的溝通形式。 但這些通知可以發送到任何願意接收它們的網站,形成DDoS攻擊,這可以讓你的網站在幾秒鐘內停止運作,並不斷填寫垃圾評論。 | Details | |
Pingbacks notify a website when it has been mentioned by another website, like a form of courtesy communication. However, these notifications can be sent to any website willing to receive them, opening you up to DDoS attacks, which can take your website down in seconds and fill your posts with spam comments. 當文章被另一個網站提到,Pingbacks會通知網站,這像是一種禮貌的溝通形式。 但這些通知可以發送到任何願意接收它們的網站,形成DDoS攻擊,這可以讓你的網站在幾秒鐘內停止運作,並不斷填寫垃圾評論。
Login to your account for contributing to translations.
|
|||
Disable trackbacks and pingbacks | 停用Trackback和Pingback | Details | |
Disable trackbacks and pingbacks 停用Trackback和Pingback
Login to your account for contributing to translations.
|
|||
Hide error reporting | 隱藏錯誤報表 | Details | |
Update | 更新 | Details | |
Export as •
Translators
- Andy: 12.5%