New translations firefly.php (French)

This commit is contained in:
James Cole
2017-08-15 00:50:07 +02:00
parent 7bb5d243a0
commit 298e6d38a0

View File

@@ -397,7 +397,7 @@ return [
'pref_optional_tj_notes' => 'Notes',
'pref_optional_tj_attachments' => 'Pièces jointes',
'optional_field_meta_dates' => 'Dates',
'optional_field_meta_business' => 'Business',
'optional_field_meta_business' => 'Commerce',
'optional_field_attachments' => 'Pièces jointes',
'optional_field_meta_data' => 'Métadonnées facultatives',
@@ -418,9 +418,9 @@ return [
'password_changed' => 'Mot de passe modifié!',
'should_change' => 'Lidée est de changer votre mot de passe.',
'invalid_password' => 'Mot de passe incorrect!',
'what_is_pw_security' => 'What is "verify password security"?',
'secure_pw_title' => 'How to choose a secure password',
'secure_pw_history' => 'In August 2017 well known security researcher Troy Hunt released a list of 306 million stolen passwords. These passwords were stolen during breakins at companies like LinkedIn, Adobe and NeoPets (and many more).',
'what_is_pw_security' => 'Qu\'est-ce que "vérifier la sécurité du mot de passe" ?',
'secure_pw_title' => 'Comment choisir un mot de passe sécurisé',
'secure_pw_history' => 'En août 2017, le réputé chercheur en sécurité Troy Hunt a publié une liste de 306 millions de mots de passe volés. Ces mots de passe ont été volés lors de cambriolages à des entreprises comme LinkedIn, Adobe et NeoPets (et bien dautres).',
'secure_pw_check_box' => 'By checking the box, Firefly III will send the SHA1 hash of your password to <a href="https://www.troyhunt.com/introducing-306-million-freely-downloadable-pwned-passwords/">the website of Troy Hunt</a> to see if it is on the list. This will stop you from using unsafe passwords as is recommended in the latest <a href="https://pages.nist.gov/800-63-3/sp800-63b.html">NIST Special Publication</a> on this subject.',
'secure_pw_sha1' => 'But I thought SHA1 was broken?',
'secure_pw_hash_speed' => 'Yes, but not in this context. As you can read on <a href="https://shattered.io/">the website detailing how they broke SHA1</a>, it is now slightly easier to find a "collision": another string that results in the same SHA1-hash. It now only takes 10,000 years using a single-GPU machine.',