WPMU DEV in your language
Translations
Translation of Defender: Chinese (Hong Kong)
| Prio | Original string | Translation | — |
|---|---|---|---|
| Issues | 問題 | Details | |
| Summary | 摘要 | Details | |
| Update WordPress | 更新WordPress | Details | |
| Update WordPress to latest version | 將WordPress更新到最新版本 | Details | |
|
Update WordPress to latest version 將WordPress更新到最新版本
Login to your account for contributing to translations.
|
|||
| Update old security keys | 更新舊的安全密鑰 | Details | |
| Prevent Information Disclosure | 防止訊息洩露 | Details | |
| 2. Add the code below inside the server section in the file, right before the php location block. Looks something like: | 增加以上代碼到檔案中的<strong>server</strong>部分裡,在php位置區之前,看起來像這樣: | Details | |
|
2. Add the code below inside the server section in the file, right before the php location block. Looks something like: 增加以上代碼到檔案中的<strong>server</strong>部分裡,在php位置區之前,看起來像這樣:
Login to your account for contributing to translations.
|
|||
| 1. Copy the generated code into your site specific .conf file usually located in a subdirectory under /etc/nginx/... or /usr/local/nginx/conf/... | 將產生的代碼複製到你網站特定的.conf檔案中,通常位於/etc/nginx/... 或 /usr/local/nginx/conf/...下面的子目錄中 | Details | |
|
1. Copy the generated code into your site specific .conf file usually located in a subdirectory under /etc/nginx/... or /usr/local/nginx/conf/... 將產生的代碼複製到你網站特定的.conf檔案中,通常位於/etc/nginx/... 或 /usr/local/nginx/conf/...下面的子目錄中
Login to your account for contributing to translations.
|
|||
| By default, a plugin/theme vulnerability could allow a PHP file to get uploaded into your site's directories and in turn execute harmful scripts that can wreak havoc on your website. Prevent this altogether by disabling direct PHP execution in directories that don't require it. | 預設情況下,插件/主題漏洞可能隨著PHP檔案上傳到你網站的目錄中,執行這些有害腳本可能會在網站上造成嚴重的破壞,在不需要的目錄中停用PHP執行權限可以完全防止這種情況。 | Details | |
|
By default, a plugin/theme vulnerability could allow a PHP file to get uploaded into your site's directories and in turn execute harmful scripts that can wreak havoc on your website. Prevent this altogether by disabling direct PHP execution in directories that don't require it. 預設情況下,插件/主題漏洞可能隨著PHP檔案上傳到你網站的目錄中,執行這些有害腳本可能會在網站上造成嚴重的破壞,在不需要的目錄中停用PHP執行權限可以完全防止這種情況。
Login to your account for contributing to translations.
|
|||
| Prevent PHP Execution | 保護PHP執行 | Details | |
| Disable file editor | 停用檔案編輯器 | Details | |
| WordPress comes with a file editor built into the system. This means that anyone with access to your login information can further edit your plugin and theme files and inject malicious code. | WordPress內建檔案編輯器,這表示任何有權訪問你的登入訊息的人,都可以編輯你的插件和主題檔案,我們建議停用編輯器。 | Details | |
|
WordPress comes with a file editor built into the system. This means that anyone with access to your login information can further edit your plugin and theme files and inject malicious code. WordPress內建檔案編輯器,這表示任何有權訪問你的登入訊息的人,都可以編輯你的插件和主題檔案,我們建議停用編輯器。
Login to your account for contributing to translations.
|
|||
| Disable the file editor | 停用檔案編輯器 | Details | |
| Disable Pingbacks | 停用Pingback | Details | |
| Revert | 還原 | Details | |
Export as •
Translators
- Andy: 12.3%