http-headers.pot
17.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
# Copyright (C) 2017 HTTP Headers
# This file is distributed under the same license as the HTTP Headers package.
msgid ""
msgstr ""
"Project-Id-Version: HTTP Headers\n"
"POT-Creation-Date: 2017-17-12 19:26:00+02:00\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"MIME-Version: 1.0\n"
"Report-Msgid-Bugs-To: https://wordpress.org/support/plugin/http-headers\n"
"PO-Revision-Date: 2017-17-12 19:26:00+02:00\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
#: views/includes/config.inc.php:2
msgid "Off"
msgstr ""
#: views/includes/config.inc.php:2
msgid "On"
msgstr ""
#: views/includes/config.inc.php:5
msgid "Security"
msgstr ""
#: views/includes/config.inc.php:6
msgid "Access control"
msgstr ""
#: views/includes/config.inc.php:7
msgid "Authentication"
msgstr ""
#: views/includes/config.inc.php:8
msgid "Compression"
msgstr ""
#: views/includes/config.inc.php:9
msgid "Caching"
msgstr ""
#: views/includes/config.inc.php:10
msgid "Miscellaneous"
msgstr ""
#: views/includes/breadcrumbs.inc.php:2
msgid "Dashboard"
msgstr ""
#: views/includes/breadcrumbs.inc.php:11
msgid "Advanced settings"
msgstr ""
#: views/includes/breadcrumbs.inc.php:13
msgid "Inspect headers"
msgstr ""
#: views/index.php:13
msgid "Error!"
msgstr ""
#: views/index.php:16
msgid "The following file was not found. Please make sure the file exists and has write permissions:"
msgstr ""
#: views/index.php:18
msgid "Please make sure the following file has write permissions:"
msgstr ""
#: views/index.php:28
msgid "Warning!"
msgstr ""
#: views/index.php:40
msgid "Quick links"
msgstr ""
#: views/index.php:41
msgid "Getting started"
msgstr ""
#: views/index.php:43
msgid "Manual setup"
msgstr ""
#: views/dashboard.php:47
msgid "Donate"
msgstr ""
#: views/dashboard.php:34
msgid "Rate us"
msgstr ""
#: views/dashboard.php:35
msgid "Tell us what you think about this plugin"
msgstr ""
#: views/dashboard.php:35
msgid "writing a review"
msgstr ""
#: views/dashboard.php:36
msgid "Contribution"
msgstr ""
#: views/dashboard.php:37
msgid "Help us to continue developing this plugin with a small donation."
msgstr ""
#: views/category.php:8
msgid "Header"
msgstr ""
#: views/category.php:9
msgid "Value"
msgstr ""
#: views/category.php:10
msgid "Status"
msgstr ""
#: views/category.php:230
msgid "Edit"
msgstr ""
#: views/category.php:223
msgid "On"
msgstr ""
#: views/category.php:223
msgid "Off"
msgstr ""
#: views/advanced.php:10
msgid "Default mode"
msgstr ""
#: views/advanced.php:11
msgid "Choose a method for sending of headers. Usually, the PHP method works perfectly. However, some third-party plugins like WP Super Cache may require switching to Apache method."
msgstr ""
#: views/advanced.php:20
msgid "Use PHP to send headers (deprecated)"
msgstr ""
#: views/advanced.php:21
msgid "Use Apache (mod_headers) to send headers"
msgstr ""
#: views/advanced.php:40
msgid "Export"
msgstr ""
#: views/advanced.php:41
msgid "Export the plugin current state of settings for later use if recovery needs."
msgstr ""
#: views/advanced.php:46
msgid "Export settings"
msgstr ""
#: views/advanced.php:51
msgid "Import"
msgstr ""
#: views/advanced.php:52
msgid "Import a previously saved state of settings."
msgstr ""
#: views/advanced.php:58
msgid "Import settings"
msgstr ""
#: views/advanced.php:58
msgid "Choose file..."
msgstr ""
#: views/access-control-allow-credentials.php:3
msgid "The Access-Control-Allow-Credentials header indicates whether the response to request can be exposed when the credentials flag is true."
msgstr ""
#: views/access-control-allow-credentials.php:10
msgid "Read more at"
msgstr ""
#: views/access-control-allow-credentials.php:11
msgid "MDN Web Docs"
msgstr ""
#: views/access-control-allow-headers.php:3
msgid "The Access-Control-Allow-Headers header is returned by the server in a response to a preflight request and informs the browser about the HTTP headers that can be used in the actual request."
msgstr ""
#: views/access-control-allow-methods.php:3
msgid "The Access-Control-Allow-Methods header is returned by the server in a response to a preflight request and informs the browser about the HTTP methods that can be used in the actual request."
msgstr ""
#: views/access-control-allow-origin.php:3
msgid "The Access-Control-Allow-Origin header indicates whether a resource can be shared."
msgstr ""
#: views/access-control-allow-origin.php:65
msgid "Add origin"
msgstr ""
#: views/access-control-expose-headers.php:3
msgid "The Access-Control-Expose-Headers response header brings information about headers that browsers could allow accessing."
msgstr ""
#: views/access-control-max-age.php:3
msgid "The Access-Control-Max-Age header indicates how much time, the result of a preflight request, can be cached."
msgstr ""
#: views/age.php:3
msgid "The Age header contains the time in seconds the object has been in a proxy cache."
msgstr ""
#: views/age.php:21
msgid "seconds"
msgstr ""
#: views/cache-control.php:3
msgid "The Cache-Control general-header field is used to specify directives for caching mechanisms in both, requests and responses. Caching directives are unidirectional, meaning that a given directive in a request is not implying that the same directive is to be given in the response."
msgstr ""
#: views/connection.php:3
msgid "The Connection general header controls whether or not the network connection stays open after the current transaction finishes. If the value sent is keep-alive, the connection is persistent and not closed, allowing for subsequent requests to the same server to be done."
msgstr ""
#: views/content-encoding.php:3
msgid "Compression is an important way to increase the performance of a Web site. For some documents, size reduction of up to 70% lowers the bandwidth capacity needs."
msgstr ""
#: views/content-encoding.php:28
msgid "Module"
msgstr ""
#: views/content-encoding.php:53
msgid "By content type"
msgstr ""
#: views/content-encoding.php:98
msgid "By extension"
msgstr ""
#: views/content-security-policy.php:6
msgid "Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware."
msgstr ""
#: views/content-security-policy.php:32
msgid "Directive"
msgstr ""
#: views/content-security-policy.php:12
msgid "for reporting-only purposes"
msgstr ""
#: views/content-type.php:8
msgid "The Content-Type entity header is used to indicate the media type of the resource. In responses, a Content-Type header tells the client what the content type of the returned content actually is. Browsers will do MIME sniffing in some cases and will not necessarily follow the value of this header; to prevent this behavior, the header X-Content-Type-Options can be set to nosniff."
msgstr ""
#: views/cookie-security.php:8
msgid "A secure cookie is only sent to the server with a encrypted request over the HTTPS protocol."
msgstr ""
#: views/cookie-security.php:9
msgid "To prevent cross-site scripting (XSS) attacks, HttpOnly cookies are inaccessible to JavaScript's Document.cookie API; they are only sent to the server."
msgstr ""
#: views/cookie-security.php:10
msgid "SameSite prevents the browser from sending this cookie along with cross-site requests. The main goal is mitigate the risk of cross-origin information leakage. It also provides some protection against cross-site request forgery attacks."
msgstr ""
#: views/cookie-security.php:45
msgid "(PHP 7.3+ only)"
msgstr ""
#: views/cross-origin-resource-policy.php:8
msgid "The HTTP Cross-Origin-Resource-Policy response header conveys a desire that the browser blocks no-cors cross-origin/cross-site requests to the given resource."
msgstr ""
#: views/cross-origin-embedder-policy.php:8
msgid "The HTTP Cross-Origin-Embedder-Policy (COEP) response header prevents a document from loading any cross-origin resources that don't explicitly grant the document permission (using CORP or CORS)."
msgstr ""
#: views/cross-origin-opener-policy.php:8
msgid "The HTTP Cross-Origin-Opener-Policy (COOP) response header allows you to ensure a top-level document does not share a browsing context group with cross-origin documents."
msgstr ""
#: views/cross-origin-opener-policy.php:9
msgid "COOP will process-isolate your document and potential attackers can't access to your global object if they were opening it in a popup, preventing a set of cross-origin attacks dubbed XS-Leaks."
msgstr ""
#: views/cross-origin-opener-policy.php:10
msgid "If a cross-origin document with COOP is opened in a new window, the opening document will not have a reference to it, and the window.opener property of the new window will be null. This allows you to have more control over references to a window than rel=noopener, which only affects outgoing navigations."
msgstr ""
#: views/custom-headers.php:3
msgid "Common non-standard response fields:"
msgstr ""
#: views/custom-headers.php:73
msgid "Add header"
msgstr ""
#: views/custom-headers.php:66
msgid "Delete"
msgstr ""
#: views/expect-ct.php:3
msgid "Expect-CT is an HTTP header that allows sites to opt in to reporting and/or enforcement of Certificate Transparency requirements, which prevents the use of misissued certificates for that site from going unnoticed. When a site enables the Expect-CT header, they are requesting that Chrome check that any certificate for that site appears in public CT logs."
msgstr ""
#: views/expires.php:3
msgid "The Expires header contains the date/time after which the response is considered stale."
msgstr ""
#: views/expires.php:4
msgid "Invalid dates, like the value 0, represent a date in the past and mean that the resource is already expired."
msgstr ""
#: views/expires.php:5
msgid "If there is a Cache-Control header with the 'max-age' or 's-max-age' directive in the response, the Expires header is ignored."
msgstr ""
#: views/expires.php:6
msgid "* Works only in Apache mode"
msgstr ""
#: views/feature-policy.php:8
msgid "With Feature Policy, you opt-in to a set of policies for the browser to enforce on specific features used throughout your site. These policies restrict what APIs the site can access or modify the browser's default behavior for certain features."
msgstr ""
#: views/p3p.php:3
msgid "The Platform for Privacy Preferences Project (P3P) is a protocol allowing websites to declare their intended use of information they collect about web browser users."
msgstr ""
#: views/pragma.php:3
msgid "The Pragma HTTP/1.0 general header is an implementation-specific header that may have various effects along the request-response chain. It is used for backwards compatibility with HTTP/1.0 caches where the Cache-Control HTTP/1.1 header is not yet present."
msgstr ""
#: views/referrer-policy.php:3
msgid "The Referrer-Policy HTTP header governs which referrer information, sent in the Referer header, should be included with requests made."
msgstr ""
#: views/nel.php:8
msgid "Network Error Logging is a mechanism that can be configured via the NEL HTTP response header. This experimental header allows web sites and applications to opt-in to receive reports about failed (and, if desired, successful) network fetches from supporting browsers."
msgstr ""
#: views/report-to.php:3
msgid "The Report-To HTTP response header field instructs the user agent to store reporting endpoints for an origin."
msgstr ""
#: views/report-to.php:110
msgid "Add endpoint"
msgstr ""
#: views/report-to.php:114
msgid "Remove endpoint"
msgstr ""
#: views/report-to.php:126
msgid "Remove group"
msgstr ""
#: views/report-to.php:171
msgid "Add endpoint group"
msgstr ""
#: views/strict-transport-security.php:3
msgid "HTTP Strict-Transport-Security (HSTS) enforces secure (HTTP over SSL/TLS) connections to the server. This reduces impact of bugs in web applications leaking session data through cookies and external links and defends against Man-in-the-middle attacks. HSTS also disables the ability for user's to ignore SSL negotiation warnings."
msgstr ""
#: views/timing-allow-origin.php:3
msgid "The Timing-Allow-Origin header indicates whether a resource provides the complete timing information. SEO tools use the Resource Timing API to analyze the speed and weight of your web page resources."
msgstr ""
#: views/vary.php:3
msgid "The Vary HTTP response header determines how to match future request headers to decide whether a cached response can be used rather than requesting a fresh one from the origin server. It is used by the server to indicate which headers it used when selecting a representation of a resource in a content negotiation algorithm."
msgstr ""
#: views/www-authenticate.php:3
msgid "HTTP supports the use of several authentication mechanisms to control access to pages and other resources. These mechanisms are all based around the use of the 401 status code and the WWW-Authenticate response header."
msgstr ""
#: views/www-authenticate.php:79
msgid "Add user"
msgstr ""
#: views/www-authenticate.php:43
msgid "Username"
msgstr ""
#: views/www-authenticate.php:44
msgid "Password"
msgstr ""
#: views/x-content-type-options.php:3
msgid "Prevents Internet Explorer and Google Chrome from MIME-sniffing a response away from the declared content-type. This also applies to Google Chrome, when downloading extensions. This reduces exposure to drive-by download attacks and sites serving user uploaded content that, by clever naming, could be treated by MSIE as executable or dynamic HTML files."
msgstr ""
#: views/x-dns-prefetch-control.php:3
msgid "The X-DNS-Prefetch-Control HTTP response header controls DNS prefetching, a feature by which browsers proactively perform domain name resolution on both links that the user may choose to follow as well as URLs for items referenced by the document, including images, CSS, JavaScript, and so forth."
msgstr ""
#: views/x-dns-prefetch-control.php:4
msgid "This prefetching is performed in the background, so that the DNS is likely to have been resolved by the time the referenced items are needed. This reduces latency when the user clicks a link."
msgstr ""
#: views/x-download-options.php:3
msgid "For web applications that need to serve untrusted HTML files, Microsoft IE introduced a mechanism to help prevent the untrusted content from compromising your site’s security. When the X-Download-Options header is present with the value noopen, the user is prevented from opening a file download directly; instead, they must first save the file locally. When the locally saved file is later opened, it no longer executes in the security context of your site, helping to prevent script injection."
msgstr ""
#: views/x-frame-options.php:3
msgid "This header can be used to indicate whether or not a browser should be allowed to render a page in a <frame>, <iframe> or <object>. Use this to avoid clickjacking attacks."
msgstr ""
#: views/x-permitted-cross-domain-policies.php:3
msgid "A cross-domain policy file is an XML document that grants a web client, such as Adobe Flash Player or Adobe Acrobat (though not necessarily limited to these), permission to handle data across domains."
msgstr ""
#: views/x-powered-by.php:3
msgid "Specifies the technology (e.g. ASP.NET, PHP, JBoss, Express) supporting the web application, i.e. the scripting language. It is recommended to remove it or provide misleading information to throw off hackers that might target a particular technology/version."
msgstr ""
#: views/x-robots-tag.php:8
msgid 'The X-Robots-Tag HTTP header is used to indicate how a web page is to be indexed within public search engine results. The header is effectively equivalent to <code><meta name="robots" content="..."></code>.'
msgstr ""
#: views/x-robots-tag.php:11
msgid "Google Search Central"
msgstr ""
#: views/x-ua-compatible.php:3
msgid "In some cases, it might be necessary to restrict a webpage to a document mode supported by an older version of Windows Internet Explorer. Here we look at the x-ua-compatible header, which allows a webpage to be displayed as if it were viewed by an earlier version of the browser."
msgstr ""
#: views/x-xss-protection.php:3
msgid "This header enables the Cross-site scripting (XSS) filter built into most recent web browsers. It's usually enabled by default anyway, so the role of this header is to re-enable the filter for this particular website if it was disabled by the user."
msgstr ""
#: views/inspect.php:19
msgid "Use this tool to inspect the HTTP headers of your website or your competitor's website."
msgstr ""
#: views/inspect.php:35
msgid "Auth Type"
msgstr ""
#: views/inspect.php:52
msgid "Inspect"
msgstr ""
#: views/ajax.php:123
msgid "Category"
msgstr ""
#: views/inspect.php:52
msgid "Inspect"
msgstr ""
#: views/ajax.php:118
msgid "Missing headers"
msgstr ""
#: views/ajax.php:72
msgid "Response headers"
msgstr ""
#: views/ajax.php:45
msgid "HTTP Status"
msgstr ""
#: views/ajax.php:17
msgid "URL malformed"
msgstr ""
#: http-headers.php:1110
msgid "Settings"
msgstr ""