diff options
Diffstat (limited to 'Translations/Language.zh-tw.xml')
-rw-r--r-- | Translations/Language.zh-tw.xml | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/Translations/Language.zh-tw.xml b/Translations/Language.zh-tw.xml index 8b2adad2..fc3863ab 100644 --- a/Translations/Language.zh-tw.xml +++ b/Translations/Language.zh-tw.xml @@ -851,19 +851,19 @@ <string lang="zh-tw" key="AFTER_INSTALL_TUTORIAL">如果您以前從未沒有使用過 VeraCrypt,我們建議您先閱讀 VeraCrypt 使用者指南中的 Beginner's Tutorial 章節。您想要查看教學導覽嗎?</string> <string lang="zh-tw" key="SELECT_AN_ACTION">請從下面選擇要執行的操作:</string> <string lang="zh-tw" key="REPAIR_REINSTALL">修復/重新安裝</string> <string lang="en" key="UPGRADE">Upgrade</string> <string lang="zh-tw" key="UNINSTALL">移除</string> <string lang="en" key="SETUP_ADMIN">To successfully install/uninstall VeraCrypt, you must have administrator privileges. Do you want to continue?</string> <string lang="en" key="TC_INSTALLER_IS_RUNNING">VeraCrypt Installer is currently running on this system and performing or preparing installation or update of VeraCrypt. Before you proceed, please wait for it to finish or close it. If you cannot close it, please restart your computer before proceeding.</string> <string lang="zh-tw" key="INSTALL_FAILED">安裝失敗。</string> <string lang="zh-tw" key="UNINSTALL_FAILED">移除失敗。</string> - <string lang="zh-tw" key="DIST_PACKAGE_CORRUPTED">這發行包裝檔已經損壞。請試著再下載一次(最好從 VeraCrypt 官方網站 https://veracrypt.codeplex.com 下載)。</string> + <string lang="zh-tw" key="DIST_PACKAGE_CORRUPTED">這發行包裝檔已經損壞。請試著再下載一次(最好從 VeraCrypt 官方網站 https://www.veracrypt.fr 下載)。</string> <string lang="zh-tw" key="CANNOT_WRITE_FILE_X">不能寫入檔案 %s</string> <string lang="zh-tw" key="EXTRACTING_VERB">正在解壓縮</string> <string lang="zh-tw" key="CANNOT_READ_FROM_PACKAGE">不能從包裝檔中讀取資料</string> <string lang="zh-tw" key="CANT_VERIFY_PACKAGE_INTEGRITY">不能驗證發行包裝檔的完整性。</string> <string lang="zh-tw" key="EXTRACTION_FAILED">解壓縮失敗。</string> <string lang="zh-tw" key="ROLLBACK">安裝已經被返回。</string> <string lang="zh-tw" key="INSTALL_OK">VeraCrypt 已成功安裝。</string> <string lang="en" key="SETUP_UPDATE_OK">VeraCrypt has been successfully updated.</string> <string lang="en" key="UPGRADE_OK_REBOOT_REQUIRED">VeraCrypt has been successfully upgraded. However, before you can start using it, the computer must be restarted.\n\nDo you want to restart it now?</string> @@ -1226,19 +1226,19 @@ <string lang="en" key="DECOY_OS_INSTRUCTIONS_PORTION_14">If you want to start the hidden operating system, you will just need to enter the password for the hidden operating system in the VeraCrypt Boot Loader screen (which appears after you turn on or restart your computer).\n\nIf you want to start the decoy operating system, you will just need to enter the password for the decoy operating system in the VeraCrypt Boot Loader screen.\n\nThe password for the decoy system can be disclosed to anyone forcing you to reveal your pre-boot authentication password. The existence of the hidden volume (and of the hidden operating system) will remain secret.\n\n</string> <string lang="en" key="DECOY_OS_INSTRUCTIONS_PORTION_15">The third password (for the outer volume) can be disclosed to anyone forcing you to reveal the password for the first partition behind the system partition, where both the outer volume and the hidden volume (containing the hidden operating system) reside. The existence of the hidden volume (and of the hidden operating system) will remain secret.\n\n\n</string> <string lang="en" key="DECOY_OS_INSTRUCTIONS_PORTION_16">If you revealed the password for the decoy system to an adversary and he asked you why the free space of the (decoy) system partition contains random data, you could answer, for example: "The partition previously contained a system encrypted by VeraCrypt, but I forgot the pre-boot authentication password (or the system was damaged and stopped booting), so I had to reinstall Windows and encrypt the partition again."\n\n\n</string> <string lang="en" key="DECOY_OS_INSTRUCTIONS_PORTION_17">If all the instructions are followed and if the precautions and requirements listed in the section "Security Requirements and Precautions Pertaining to Hidden Volumes" in the VeraCrypt User's Guide are followed, it should be impossible to prove that the hidden volume and hidden operating system exist, even when the outer volume is mounted or when the decoy operating system is decrypted or started.\n\nIf you save a copy of this text or print it (strongly recommended, unless your printer stores copies of documents it prints on its internal drive), you should destroy any copies of it after you have created the decoy system and after you have understood all the information contained in the text (otherwise, if such a copy was found, it might indicate that there is a hidden operating system on this computer).\n\n</string> <string lang="en" key="DECOY_OS_INSTRUCTIONS_PORTION_18">WARNING: IF YOU DO NOT PROTECT THE HIDDEN VOLUME (for information on how to do so, refer to the section "Protection of Hidden Volumes Against Damage" in the VeraCrypt User's Guide), DO NOT WRITE TO THE OUTER VOLUME (note that the decoy operating system is NOT installed in the outer volume). OTHERWISE, YOU MAY OVERWRITE AND DAMAGE THE HIDDEN VOLUME (AND THE HIDDEN OPERATING SYSTEM WITHIN IT)!</string> <string lang="en" key="HIDDEN_OS_CREATION_PREINFO_TITLE">Operating System Cloning</string> <string lang="en" key="HIDDEN_OS_CREATION_PREINFO_HELP">In the next steps, VeraCrypt will create the hidden operating system by copying the content of the system partition to the hidden volume (data being copied will be encrypted on the fly with an encryption key different from the one that will be used for the decoy operating system).\n\nPlease note that the process will be performed in the pre-boot environment (before Windows starts) and it may take a long time to complete; several hours or even several days (depending on the size of the system partition and on the performance of your computer).\n\nYou will be able to interrupt the process, shut down your computer, start the operating system and then resume the process. However, if you interrupt it, the entire process of copying the system will have to start from the beginning (because the content of the system partition must not change during cloning).</string> <string lang="en" key="CONFIRM_CANCEL_HIDDEN_OS_CREATION">Do you want to cancel the entire process of creation of the hidden operating system?\n\nNote: You will NOT be able to resume the process if you cancel it now.</string> <string lang="zh-tw" key="CONFIRM_CANCEL_SYS_ENC_PRETEST">您要取消系統加密預先測試嗎?</string> - <string lang="en" key="BOOT_PRETEST_FAILED_RETRY">The VeraCrypt system encryption pretest failed. Do you want to try again?\n\nIf you select 'No', the pre-boot authentication component will be uninstalled.\n\nNotes:\n\n- If the VeraCrypt Boot Loader did not ask you to enter the password before Windows started, it is possible that your operating system does not boot from the drive on which it is installed. This is not supported.\n\n- If you used an encryption algorithm other than AES and the pretest failed (and you entered the password), it may have been caused by an inappropriately designed driver. Select 'No', and try encrypting the system partition/drive again, but use the AES encryption algorithm (which has the lowest memory requirements).\n\n- For more possible causes and solutions, see: https://veracrypt.codeplex.com/wikipage?title=Troubleshooting</string> + <string lang="en" key="BOOT_PRETEST_FAILED_RETRY">The VeraCrypt system encryption pretest failed. Do you want to try again?\n\nIf you select 'No', the pre-boot authentication component will be uninstalled.\n\nNotes:\n\n- If the VeraCrypt Boot Loader did not ask you to enter the password before Windows started, it is possible that your operating system does not boot from the drive on which it is installed. This is not supported.\n\n- If you used an encryption algorithm other than AES and the pretest failed (and you entered the password), it may have been caused by an inappropriately designed driver. Select 'No', and try encrypting the system partition/drive again, but use the AES encryption algorithm (which has the lowest memory requirements).\n\n- For more possible causes and solutions, see: https://www.veracrypt.fr/en/Troubleshooting.html</string> <string lang="zh-tw" key="SYS_DRIVE_NOT_ENCRYPTED">系統分割區/磁碟機看起來並未加密(即沒有部分也沒有完全加密)。</string> <string lang="zh-tw" key="SETUP_FAILED_BOOT_DRIVE_ENCRYPTED">您的系統分割區/磁碟機已加密(部分或完全加密)。\n\n請在繼續進行之前解密這個系統分割區/磁碟機。要這樣做,在 VeraCrypt 主視窗的選單中,選擇 "系統" > "永久解密系統分割區/磁碟機"。</string> <string lang="en" key="SETUP_FAILED_BOOT_DRIVE_ENCRYPTED_DOWNGRADE">When the system partition/drive is encrypted (partially or fully), you cannot downgrade VeraCrypt (but you can upgrade it or reinstall the same version).</string> <string lang="zh-tw" key="SYS_ENCRYPTION_OR_DECRYPTION_IN_PROGRESS">您的系統分割區/磁碟機正在被加密,解密,不然就是被修改。請在繼續操作前中斷這個加密/解密/修改的操作(或一直等到它完成)。</string> <string lang="zh-tw" key="SYSTEM_ENCRYPTION_IN_PROGRESS_ELSEWHERE">已經有 VeraCrypt 加密區建立精靈的執行實例在執行,而且正在執行對系統分割區/磁碟機的加密/解密操作。在您操作前,請等它完成或者將它關閉。如果您無法關閉它,請在繼續操作前重新啟動電腦。</string> <string lang="zh-tw" key="SYSTEM_ENCRYPTION_NOT_COMPLETED">加密或解密系統分割區/磁碟機的操作尚未完成。請等到它操作完成。</string> <string lang="zh-tw" key="ERR_ENCRYPTION_NOT_COMPLETED">錯誤:加密分割區/磁碟機的操作尚未完成。那必須要先完成。</string> <string lang="en" key="ERR_NONSYS_INPLACE_ENC_INCOMPLETE">Error: The process of encryption of the partition/volume has not been completed. It must be completed first.\n\nNote: To resume the process, select 'Volumes' > 'Resume Interrupted Process' from the menu bar of the main VeraCrypt window.</string> <string lang="en" key="ERR_SYS_HIDVOL_HEAD_REENC_MODE_WRONG">The password is correct, VeraCrypt has successfully decrypted the volume header and detected that this volume is a hidden system volume. However, you cannot modify the header of a hidden system volume this way.\n\nTo change the password for a hidden system volume, boot the operating system residing in the hidden volume, and then select 'System' > 'Change Password' from the menu bar of the main VeraCrypt window.\n\nTo set the header key derivation algorithm, boot the hidden operating system and then select 'System' > 'Set Header Key Derivation Algorithm'.</string> |