diff options
author | Chris Leick <c.leick@vollbio.de> | 2018-10-30 22:32:34 +0100 |
---|---|---|
committer | David Kalnischkies <david@kalnischkies.de> | 2018-10-30 22:43:35 +0100 |
commit | b6b159cc5eedca24d2ca0e27e230865ad2b4ad0f (patch) | |
tree | 5fc74d4464ead28047349f4cd385148179ab01f8 /doc/po/pl.po | |
parent | 16f7be06850aa6ff196cf9d70e493ccbfae99a1b (diff) |
Fix typos encountered while updating de translation
Diffstat (limited to 'doc/po/pl.po')
-rw-r--r-- | doc/po/pl.po | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/doc/po/pl.po b/doc/po/pl.po index 8361a2dbf..ff41c0259 100644 --- a/doc/po/pl.po +++ b/doc/po/pl.po @@ -728,7 +728,7 @@ msgid "" "packages currently installed on the system from the sources configured via " "&sources-list;. New packages will be installed if required to satisfy " "dependencies, but existing packages will never be removed. If an upgrade for " -"a package requires the remove of an installed package the upgrade for this " +"a package requires the removal of an installed package the upgrade for this " "package isn't performed." msgstr "" @@ -4984,7 +4984,7 @@ msgstr "" msgid "" "The <literal>Ignore-Files-Silently</literal> list can be used to specify " "which files APT should silently ignore while parsing the files in the " -"fragment directories. Per default a file which end with <literal>.disabled</" +"fragment directories. Per default a file which ends with <literal>.disabled</" "literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-" "z]+</literal> is silently ignored. As seen in the last default value these " "patterns can use regular expression syntax." @@ -7495,7 +7495,7 @@ msgid "" "similar in use and available options to the http scheme. The main difference " "is that the communication between apt and server (or proxy) is encrypted. " "Note that the encryption does not prevent an attacker from knowing which " -"server (or proxy) apt is communicating with and deeper analyses can " +"server (or proxy) apt is communicating with and deeper analysis can " "potentially still reveal which data was downloaded. If this is a concern the " "Tor-based schemes mentioned further below might be a suitable alternative." msgstr "" @@ -9262,7 +9262,7 @@ msgid "" "http;), which, as indicated by the appended S, is wrapped in an encrypted " "layer known as Transport Layer Security (TLS) to provide end-to-end " "encryption. A sufficiently capable attacker can still observe the " -"communication partners and deeper analyse of the encrypted communication " +"communication partners and deeper analysis of the encrypted communication " "might still reveal important details. An overview over available " "alternative transport methods is given in &sources-list;." msgstr "" |