commit 4bd67bcbc86630c2a6f200df8adb658a11005c48
Author: Translation commit bot <translat...@torproject.org>
Date:   Thu Aug 8 03:45:19 2013 +0000

    Update translations for tsum
---
 ms_MY/short-user-manual_ms_MY_noimg.xhtml |   25 +++++++++++++------------
 1 file changed, 13 insertions(+), 12 deletions(-)

diff --git a/ms_MY/short-user-manual_ms_MY_noimg.xhtml 
b/ms_MY/short-user-manual_ms_MY_noimg.xhtml
index 649e71c..7a85ef2 100644
--- a/ms_MY/short-user-manual_ms_MY_noimg.xhtml
+++ b/ms_MY/short-user-manual_ms_MY_noimg.xhtml
@@ -4,15 +4,15 @@
     <title/>
   </head>
   <body>
-    <h1 id="the-short-user-manual">The Short User Manual</h1>
-    <p>This user manual contains information about how to download Tor, how to 
use it, and what to do if Tor is unable to connect to the network. If you can't 
find the answer to your question in this document, email 
h...@rt.torproject.org.</p>
-    <p>Please note that we are providing support on a voluntary basis, and we 
get a lot of emails every single day. There is no need to worry if we don't get 
back to you straight away.</p>
-    <h2 id="how-tor-works">How Tor works</h2>
-    <p>Tor is a network of virtual tunnels that allows you to improve your 
privacy and security on the Internet. Tor works by sending your traffic through 
three random servers (also known as <em>relays</em>) in the Tor network, before 
the traffic is sent out onto the public Internet.</p>
-    <p>The image above illustrates a user browsing to different websites over 
Tor. The green monitors represent relays in the Tor network, while the three 
keys represent the layers of encryption between the user and each relay.</p>
-    <p>Tor will anonymize the origin of your traffic, and it will encrypt 
everything between you and the Tor network. Tor will also encrypt your traffic 
inside the Tor network, but it cannot encrypt your traffic between the Tor 
network and its final destination.</p>
-    <p>If you are communicating sensitive information, for example when 
logging on to a website with a username and password, make sure that you are 
using HTTPS (e.g. <strong>https</strong>://torproject.org/, not 
<strong>http</strong>://torproject.org/).</p>
-    <h2 id="how-to-download-tor">How to download Tor</h2>
+    <h1 id="the-short-user-manual">Manual Pengguna</h1>
+    <p>Manual pengguna ini mengandungi maklumat mengenai bagaimana untuk 
memuat turun Tor, bagaimana untuk menggunakannya, dan apa yang perlu dilakukan 
jika Tor tidak dapat menyambung kepada rangkaian. Jika anda tidak boleh mencari 
jawapan kepada soalan anda di dalam dokumen ini, e-mel 
h...@rt.torproject.org.</p>
+    <p>Sila ambil perhatian bahawa kami menyediakan sokongan secara sukarela, 
dan kita juga mendapat email yang banyak setiap hari. Tidak perlu bimbang jika 
kita membalas email kamu dengan segera.</p>
+    <h2 id="how-tor-works">Bagaimana Tor berfungsi</h2>
+    <p>Tor adalah satu rangkaian terowong maya yang membolehkan anda untuk 
meningkatkan privasi dan keselamatan anda di Internet. Tor berfungsi dengan 
menghantar trafik anda melalui tiga pelayan rawak (juga dikenali sebagai 
<em>relays</em>) dalam rangkaian Tor, sebelum trafik itu sampai ke Internet 
awam.</p>
+    <p>Gambar di atas menggambarkan bagaimana pengguna melayari internet ke 
laman web yang berbeza dengan menggunakan Tor, monitor hijau mewakili relay 
dalam rangkaian Tor, manakala tiga kunci mewakili lapisan penyulitan antara 
pengguna dan setiap relay.</p>
+    <p>Tor akan menyembunyikan asal-usul trafik anda, dan ia akan menyulitkan 
segala-galanya di antara anda dan rangkaian Tor. Tor juga akan menyulitkan 
trafik anda di dalam rangkaian Tor, tetapi ia tidak boleh menyulitkan trafik 
anda antara rangkaian Tor dan destinasi akhir.</p>
+    <p>Jika anda berkomunikasi dengan maklumat sensitif, contohnya apabila 
melayari laman web dengan nama pengguna dan kata laluan, pastikan anda 
menggunakan HTTPS (contohnya <strong>https</strong>://torproject.org/, tidak 
<strong>http</strong>://torproject.org/).</p>
+    <h2 id="how-to-download-tor">Bagaimana hendak memuat turun Tor</h2>
     <p>The bundle we recommend to most users is the <a 
href="https://www.torproject.org/projects/torbrowser.html";>Tor Browser 
Bundle</a>. This bundle contains a browser preconfigured to safely browse the 
Internet through Tor, and requires no installation. You download the bundle, 
extract the archive, and start Tor.</p>
     <p>There are two different ways to get hold of the Tor software. You can 
either browse to the <a href="https://www.torproject.org/";>Tor Project 
website</a> and download it there, or you can use GetTor, the email 
autoresponder.</p>
     <h3 id="how-to-get-tor-via-email">How to get Tor via email</h3>
@@ -22,12 +22,12 @@
     <p><strong>Note</strong>: The Tor Browser Bundles for Linux and Mac OS X 
are rather large, and you will not be able to receive any of these bundles with 
a Gmail, Hotmail or Yahoo account. If you cannot receive the bundle you want, 
send an email to h...@rt.torproject.org and we will give you a list of website 
mirrors to use.</p>
     <h3 id="tor-for-smartphones">Tor for smartphones</h3>
     <p>You can get Tor on your Android device by installing the package named 
<em>Orbot</em>. For information about how to download and install Orbot, please 
see the <a href="https://www.torproject.org/docs/android.html.en";>Tor Project 
website</a>.</p>
-    <p>We also have experimental packages for <a 
href="https://www.torproject.org/docs/N900.html.en";>Nokia Maemo/N900</a> and <a 
href="http://sid77.slackware.it/ios/";>Apple iOS</a>.</p>
+    <p>We also have experimental packages for <a 
href="https://www.torproject.org/docs/N900.html.en";>Nokia Maemo/N900</a> and <a 
href="http://sid77.slackware.it/iphone/";>Apple iOS</a>.</p>
     <h3 id="how-to-verify-that-you-have-the-right-version">How to verify that 
you have the right version</h3>
     <p>Before running the Tor Browser Bundle, you should make sure that you 
have the right version.</p>
     <p>The software you receive is accompanied by a file with the same name as 
the bundle and the extension <strong>.asc</strong>. This .asc file is a GPG 
signature, and will allow you to verify the file you've downloaded is exactly 
the one that we intended you to get.</p>
     <p>Before you can verify the signature, you will have to download and 
install GnuPG:</p>
-    <p><strong>Windows</strong>: <a 
href="http://gpg4win.org/download.html";>http://gpg4win.org/download.html</a><br/><strong>Mac
 OS X</strong>: <a 
href="http://www.gpgtools.org/";>http://www.gpgtools.org/</a><br/><strong>Linux</strong>:
 Most Linux distributions come with GnuPG preinstalled.</p>
+    <p><strong>Windows</strong>: <a 
href="http://gpg4win.org/download.html";>http://gpg4win.org/download.html</a><br/><strong>Mac
 OS X</strong>: <a 
href="http://macgpg.sourceforge.net/";>http://macgpg.sourceforge.net/</a><br/><strong>Linux</strong>:
 Most Linux distributions come with GnuPG preinstalled.</p>
     <p>Please note that you may need to edit the paths and the commands used 
below to get it to work on your system.</p>
     <p>Erinn Clark signs the Tor Browser Bundles with key 0x63FEE659. To 
import Erinn's key, run:</p>
     <pre>
@@ -45,6 +45,7 @@
       Key fingerprint = 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
 uid                  Erinn Clark &lt;er...@torproject.org&gt;
 uid                  Erinn Clark &lt;er...@debian.org&gt;
+
 uid                  Erinn Clark &lt;er...@double-helix.org&gt;
 sub   2048R/EB399FD7 2003-10-16
 </code>
@@ -57,7 +58,7 @@ sub   2048R/EB399FD7 2003-10-16
     <p>The output should say <em>"Good signature"</em>. A bad signature means 
that the file may have been tampered with. If you see a bad signature, send 
details about where you downloaded the package from, how you verified the 
signature, and the output from GnuPG in an email to h...@rt.torproject.org.</p>
     <p>Once you have verified the signature and seen the <em>"Good 
signature"</em> output, go ahead and extract the package archive. You should 
then see a directory similar to <strong>tor-browser_en-US</strong>. Inside that 
directory is another directory called <strong>Docs</strong>, which contains a 
file called <strong>changelog</strong>. You want to make sure that the version 
number on the top line of the changelog file matches the version number in the 
filename.</p>
     <h3 id="how-to-use-the-tor-browser-bundle">How to use the Tor Browser 
Bundle</h3>
-    <p>After downloading the Tor Browser Bundle, extract the package onto your 
desktop or a USB stick. You should have a directory containing a few files. One 
of the files is an executable called "Start Tor Browser" (or 
"start-tor-browser", depending on your operating system).</p>
+    <p>After downloading the Tor Browser Bundle and extracting the package, 
you should have a directory with a few files in it. One of the files is an 
executable called "Start Tor Browser" (or "start-tor-browser", depending on 
your operating system).</p>
     <p>When you start the Tor Browser Bundle, you will first see Vidalia start 
up and connect you to the Tor network. After that, you will see a browser 
confirming that you are now using Tor. This is done by displaying <a 
href="https://check.torproject.org/";>https://check.torproject.org/</a>. You can 
now browse the Internet through Tor.</p>
     <p>
       <em>Please note that it is important that you use the browser that comes 
with the bundle, and not your own browser.</em>

_______________________________________________
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to