BETA

Transvision

Displaying 8 results for the string L’ in en-US:

Entity en-US en-US
Entity # all locales chat • irc.ftl
command-topic
en-US
{ $commandName } [<new topic>]: Set this channel’s topic.
en-US
{ $commandName } [<new topic>]: Set this channel’s topic.
Entity # all locales mail • messenger • openpgp • keyWizard.ftl
openpgp-generate-key-info
en-US
<b>Key generation may take up to several minutes to complete.</b> Do not exit the application while key generation is in progress. Actively browsing or performing disk-intensive operations during key generation will replenish the ‘randomness pool’ and speed-up the process. You will be alerted when key generation is completed.
en-US
<b>Key generation may take up to several minutes to complete.</b> Do not exit the application while key generation is in progress. Actively browsing or performing disk-intensive operations during key generation will replenish the ‘randomness pool’ and speed-up the process. You will be alerted when key generation is completed.
Entity # all locales dom • chrome • security • csp.properties
ignoringUnsafeEval
en-US
Ignoring ‘unsafe-eval’ or ‘wasm-unsafe-eval’ inside “%1$S”.
en-US
Ignoring ‘unsafe-eval’ or ‘wasm-unsafe-eval’ inside “%1$S”.
Entity # all locales dom • chrome • security • security.properties
ReferrerPolicyDisallowRelaxingWarning
en-US
Referrer Policy: Less restricted policies, including ‘no-referrer-when-downgrade’, ‘origin-when-cross-origin’ and ‘unsafe-url’, will be ignored soon for the cross-site request: %S
en-US
Referrer Policy: Less restricted policies, including ‘no-referrer-when-downgrade’, ‘origin-when-cross-origin’ and ‘unsafe-url’, will be ignored soon for the cross-site request: %S
Entity # all locales mozilla_org • en • mozorg • about • governance • policies • participation.ftl
participation-is-not-acceptable
en-US
is not acceptable. This includes deliberately referring to someone by a gender that they do not identify with, and/or questioning the legitimacy of an individual’s gender identity. If you’re unsure if a word is derogatory, don’t use it. This also includes repeated subtle and/or indirect discrimination; when asked to stop, stop the behavior in question.
en-US
is not acceptable. This includes deliberately referring to someone by a gender that they do not identify with, and/or questioning the legitimacy of an individual’s gender identity. If you’re unsure if a word is derogatory, don’t use it. This also includes repeated subtle and/or indirect discrimination; when asked to stop, stop the behavior in question.
Entity # all locales mozilla_org • en • privacy • faq.ftl
privacy-faq-the-second-is-what-we-call-interaction
en-US
The second is what we call “interaction data.” This is data about an individual’s engagement with { -brand-name-firefox }, such as the number of tabs that were open, the status of user preferences, or number of times certain browser features were used, such as screenshots or containers. For example, we collect this data in terms of the back button, that arrow in the upper left corner of your browser that lets you navigate back to a previous webpage in a way that shows us someone used the back button, but doesn’t tell what specific webpages are accessed.
en-US
The second is what we call “interaction data.” This is data about an individual’s engagement with { -brand-name-firefox }, such as the number of tabs that were open, the status of user preferences, or number of times certain browser features were used, such as screenshots or containers. For example, we collect this data in terms of the back button, that arrow in the upper left corner of your browser that lets you navigate back to a previous webpage in a way that shows us someone used the back button, but doesn’t tell what specific webpages are accessed.
Entity # all locales mozilla_org • en • privacy • faq.ftl
privacy-faq-the-second-is-what-we-call-interaction-v2
en-US
The second is what we call “interaction data.” This is data about an individual’s engagement with { -brand-name-firefox }, such as the number of tabs that were open, the status of user preferences, or number of times certain browser features were used, such as screenshots or containers. For example, we collect this data through the back button (that arrow in the upper left corner of your browser that lets you navigate back to a previous webpage) in a way that shows us someone used the back button, but doesn’t tell what specific webpages are accessed.
en-US
The second is what we call “interaction data.” This is data about an individual’s engagement with { -brand-name-firefox }, such as the number of tabs that were open, the status of user preferences, or number of times certain browser features were used, such as screenshots or containers. For example, we collect this data through the back button (that arrow in the upper left corner of your browser that lets you navigate back to a previous webpage) in a way that shows us someone used the back button, but doesn’t tell what specific webpages are accessed.
Entity # all locales mozilla_org • en • products • vpn • more • when-to-use-a-vpn.ftl
vpn-when-to-use-if-you-are
en-US
If you are renting a temporary place for remote work or planning a future Airbnb getaway, chances are it will come with free WiFi. Even if the WiFi is protected behind a password, that doesn’t make it automatically safe and private. For starters, the host could be accessing the network to track what you do online. Also, if they haven’t changed the password between guests, any prior guest could reconnect alongside you. Plus, an earlier guest could have accessed the rental’s router and installed software that allows them to snoop on it remotely. Much to consider! Short of skipping the WiFi entirely, the best course of action is to use a trusted VPN whenever you’re connecting your computer, phone or tablet to a rental’s internet. This goes for hotels and hostels, too.
en-US
If you are renting a temporary place for remote work or planning a future Airbnb getaway, chances are it will come with free WiFi. Even if the WiFi is protected behind a password, that doesn’t make it automatically safe and private. For starters, the host could be accessing the network to track what you do online. Also, if they haven’t changed the password between guests, any prior guest could reconnect alongside you. Plus, an earlier guest could have accessed the rental’s router and installed software that allows them to snoop on it remotely. Much to consider! Short of skipping the WiFi entirely, the best course of action is to use a trusted VPN whenever you’re connecting your computer, phone or tablet to a rental’s internet. This goes for hotels and hostels, too.
Please enable JavaScript. Some features won't be available without it.