Str20a_JavaScriptOrApplet=JavaScript or a Java applet from '<b>
Str20b_AdditionalPrivileges=</b>' is requesting additional privileges.
Str21a_JavaScriptOrAppletFrom=JavaScript or a Java applet from <b>
Str21b_AdditionalPrivilegesUnsigned=</b> is requesting additional privileges. It is <b>not digitally signed</b>.
Str22_GrantAccess=Do you wish to grant this access?
Str23a_YesGrant=Yes, grant this access to all applets or scripts from <b>
Str23b_thisSession=</b> for this session
Str25_NoDeny=No, deny this access (This may mean the applet or script cannot work properly)
Str26_RememberThisDecisionForAll=Remember this decision for all applets or scripts from <b>{0}</b>
Str27_RememberThisDecision=Remember this decision
Str28_IdentityVerified=<10> Identity verified by
Str29_Grant=Grant
Str30_Deny=Deny
Str31_ok=OK
Str32_Help=Help
Str33_Close=Close
Str34_CertificateFor=Certificate for {0}
Str35_WasSignedWithCertificate=The JavaScript or Java applet was digitally signed with the following certificate. The certificate proves who the applet or script is from.
Str59_ManipulatingApplets=Manipulating other applets (threads) running on your computer
Str60_ManipulatingGroups=Manipulating groups of applets (threads) running on your computer"
Str61_StartingPrograms=Starting programs stored on your computer
Str62_StartingProgramsDesc=Starting programs that are separate from Communicator and stored on hard disks or other storage media connected to your computer. For example, starting a word-processing or spreadsheet application.
Str63_ExitingCommunicator=Exiting the Communicator program
Str64_ExitingCommunicatorDesc=Exiting all parts of the Communicator program that are currently running and releasing the memory they occupy.
Str65_UsingNativeCode=Using native code stored in dynamically linked libraries
Str66_UsingNativeCodeDesc=Using code written specifically for the operating system of your computer. Such code must be stored in dynamically linked libraries on hard disks or other storage media connected to your computer.
Str67_ModifyingInformation=Modifying sensitive information stored in your computer
Str68_ModifyingInformationDesc=Modifying sensitive information stored in your computer that is normally kept private, such as certain security policy controls.
Str69_ReadingInformation=Reading information stored in your computer, such as your user name
Str70_ReadingInformationDesc=Reading information stored in your computer that is normally kept private, such as your user name and the current directory.
Str71_ReadingFiles=Reading files stored in your computer
Str72_ReadingFilesDesc=Reading any files stored on hard disks or other storage media connected to your computer.
Str73_ModifyingFiles=Modifying files stored in your computer
Str74_ModifyingFilesDesc=Modifying any files stored on hard disks or other storage media connected to you computer.
Str75_DeletingFiles=Deleting files stored in your computer
Str76_DeletingFilesDesc=Deletion of any files stored on hard disks or other storage media connected to your computer.
Str77_ReadingNetworkConnection=Reading data from a network connection
Str78_ReadingNetworkConnectionDesc=Reading data from a network connection via file descriptor
Str79_WritingNetworkConnection=Writing data from a network connection
Str80_WritingNetworkConnectionDesc=Writing data from a network connection via file descriptor
Str81_AcceptNetworkConnection=Accepting connections from other computers on a network
Str82_AcceptNetworkConnectionDesc=Contacting and connecting with other computers over a network.
Str83_AllowRemoteRedirection=Allow remote computer to redirect connection requests to another computer
Str84_AuthenticateSSL=Remotely authenticate as you with SSL
Str85_AuthenticateSSLDesc=Connecting to remote computers using SSL and authenticating with a key in your private database. If the applet additionally has UniversalConnect privileges, it could potentially authenticate with your key to any site on the Internet, which would be more dangerous.
Str86_ContactNetwork=Contacting and connecting with other computers over a network
Str87_ContactNetworkDesc=Contacting and connecting with other computers, where the remote computer can redirect connection requests to another computer.
Str89_BroadcastingNetwork=Broadcasting information to multiple computers over a network.
Str90_DisplayUnsigned=Displaying windows that don't have the unsigned applet label
Str100_DisplayModal=Displaying a dialog box that may temporarily disable the browser
Str101_DisplayModalDesc=Displaying modal dialog boxes: that is, dialog boxes that require you to type or respond in some way before you can do anything else. Modal dialog boxes temporarily disable the browser and can cause problems if not correctly implemented
/* XXX: Some of the descriptions of JDK1.1 targets is terse. */
Str102_RestrictedJava=Using restricted Java system code
Str103_LoadingRestrictedJava=Loading restricted Java system code
Str104_DefiningProtocolHandlers=Defining protocol handlers for network connections
Str105_ExamineJavaCode=Examining the Java code for any applet running on your computer
Str106_PrintingWithin=Printing from within Communicator
Str107_ClipboardAccess=Reading and writing to the system clipboard for your computer
Str108_MonitoringMouse=Monitoring or intercepting typing or mouse movements
Str109_AccessToSecurity=Access to security
Str110_CreatePolices=Creating security policies for your computer
Str111_ImpersonateApplication=Access to impersonate as another application
Str112_AccessBrowserData=Access to browser data
Str113_AccessBrowserDataDesc=Access to browser data that may be considered private, such as a list of web sites visited or the contents of web page forms you may have filled in.
Str114_ModifyBrowser=Modifying the browser
Str115_ModifyBrowserDesc=Modifying the browser in a potentially dangerous way, such as creating windows that may look like they belong to another program or positioning windows anywhere on the screen.
Str116_ReadWriteBrowserData=Reading or modifying browser data
Str117_ReadWriteBrowserDataDesc=Reading or modifying browser data that may be considered private, such as a list of web sites visited or the contents of web forms you may have filled in. Modifications may also include creating windows that look like they belong to another program or positioning windowsanywhere on the screen.";
Str121_ModifyPreferencesDesc=Modifying the current settings of your preferences.
Str122_SendMail=Sending email messages on your behalf
Str123_VendorRegistry=Access to the vendor's portion of your computer's registry of installed software
Str124_VendorRegistryDesc=Most computers store information about installed software, such as version numbers, in a registry file. When you install new software, the installation program sometimes needs to read or change entries in the portion of the registry that describes the software vendor's products. You should grant this form of access only if you are installing new software from a reliable vendor. The entity that signs the software can access only that entity's portion of the registry.
Str125_SharedRegistry=Access to shared information in the computer's registry of installed software
Str126_SharedRegistryDesc=Most computers store information about installed software, such as version numbers, in a registry file. This file also includes information shared by all programs installed on your computer, including information about the user or the system. Programs that have access to shared registry information can obtain information about other programs that have the same access. This allows programs that work closely together to get information about each other. You should grant this form of access only if you know that the program requesting it is designed to work with other programs on your hard disk.
Str127_AnyPartRegistry=Access to any part of your computer's registry of installed software
Str128_AnyPartRegistryDesc=Most computers store information about installed software, such as version numbers, in a registry file. System administrators sometimes need to change entries in the registry for software from a variety of vendors. You should grant this form of access only if you are running software provided by your system administrator.
Str129_Uninstall=Uninstall software
Str130_UninstallDesc=Access required for automatic removal of previously installed software.
Str131_Installing=Installing and running software on your computer
Str132_InstallingDesc=Installing software on your computer's main hard disk, potentially deleting other files on the hard disk. Each time a program that has this form of access attempts to install software, it must display a dialog box that lets you choose whether to go ahead with the installation. If you go ahead, the installation program can execute any software on your computer. This potentially dangerous form of access is typically requested by an installation program after you have downloaded new software or a new version of software that you have previously installed. You should not grant this form of access unless you are installing or updating software from a reliable source.
Str133_InstallRun=Installing and running software without warning you
Str134_InstallRunDesc=Installing software on your computer's main hard disk without giving you any warning, potentially deleting other files on the hard disk. Any software on the hard disk may be executed in the process. This is an extremely dangerous form of access. It should be granted by system administrators only.
Str135_SuperPrivilages=Access to all Super User privileges
Str136_PluginAccess=Access required by Navigator plug-ins and similar programs
Str137_PluginAccessDesc=Access required by plug-ins and other programs containing native code. This form of access is allowed automatically in Navigator 3.0 for code that is downloaded to your hard disk.
Str138_SiteArchiveAccess=Access to the site archive file
Str139_SiteArchiveAccessDesc=Access required to add, modify, or delete site archive files and make arbitrary network connections in the process. This form of access is required only by netcasting applications such as Netscape Netcaster, which request it in combination with several other kinds of access. Applications should not normally request this access by itself, and you should not normally grant it.
Str140_NetcastingAccess=Access required by netcasting programs
Str141_NetcastingAccessDesc=Access required by programs, such as Netscape Netcaster, that allow users to receive information over Internet channels and work with network resources offline.
Str142_MarimbaAccess=Ability to run Marimba Castanet channels in their own applet sandbox with the extension that these channels may write to a part of the disk reserved for them and may find out the full path to the user profile directory.
Str143_MarimbaAccessDesc=Granting this target will allow the Marimba Castanet code to run. As part of running channels the Castanet code needs access to the hard-disk and the ability to connect to arbitrary network locations. It also needs to manipulate threads. Castanet channels run in a sandbox similar to untrusted applets except they can read/write to a part of the disk reserved for them separate from the rest of the disk.
Str145_IIOPDesc=Internet Inter-ORB Protocol (IIOP) is an open industry standard for distributing objects. It is commonly used for programs, such as banking applications, that involve transferring information among different kinds of computer systems over a network. Granting this access permits Java code to implement IIOP on your computer and to access remote objects over a network. You should grant this access only if you are running a program, from a reliable IIOP vendor, that needs to connect with remote objects over a network.
Str146_CodebaseProperties=Ability to read and modify properties associated an applet's code base.
Str147_CodebasePropertiesDesc=Allows local code to store and retrieve objects from a table that is associated with the current applet's host of origin.
Str148_DebuggerAccess=Access to the debugger
Str149_DebuggerAccessDesc=You should grant this access only if you are a professional programmer using debugging software from a reliable vendor.
Str150_ScreenAccess=Displaying text or graphics anywhere on the screen
Str151_ScreenAccessDesc=Displaying HTML text or graphics on any part of the screen, without window borders, toolbars, or menus. Typically granted to invoke canvas mode, screen savers, and so on.
Str152_FullLocalAccess=Reading, modification, or deletion of any of your files
Str153_FullLocalAccessDesc=This form of access is typically required by a program such as a word processor or a debugger that needs to create, read, modify, or delete files on hard disks or other storage media connected to your computer.
Str154_LimitedLocalAccess=Limited file access typically required by games
Str155_LimitedLocalAccessDesc=Reading and modification of a limited area on disk as required by games to save scores
Str156_CookieAccess=Cookie access typically required by cookie viewers
Str157_CookieAccessDesc=Reading and modification of cookies stored on disk as required by cookie viewers
Str158_SignOnAccess=Signon access typically required by signon viewers
Str159_SignOnAccessDesc=Reading and modification of signons stored on disk as required by signon viewers
Str160_LimitedRegistryAccess=Limited registry access typically required by games
Str161_LimitedRegistryAccessDesc=Reading and modification of a limited registry area as required by games to save scores
Str162_WordProcessAccess=File access typically required by word-processing programs
Str163_WordProcessAccessDesc=Reading, modification, or deletion of any of your files, as required by word-processing programs.
Str164_SpreadSheetAccess=File access typically required by spreadsheet programs
Str165_SpreadSheetAccessDesc=Reading, modification, or deletion of any of your files, as required by spreadsheet programs.
Str166_PresentationAccess=File access typically required by presentation programs
Str167_PresentationAccessDesc=Reading, modification, or deletion of any of your files, as required by presentation programs.
Str168_DatabaseAccess=File access typically required by database programs
Str169_DatabaseAccessDesc=Reading, modification, or deletion of any of your files, as required by database programs.
Str170_TerminalAccess=Access required by terminal emulators and other communications programs
Str171_TerminalAccessDesc=Reading and writing files and establishing network connections. This form of access is required by terminal emulators such as the 3270 or VT100 emulator.
Str172_JarAccess=Access needed to create, sign, and manipulate JAR files
Str173_JarAccessDesc=Access required to read and create files, in order to to sign and manipulate JAR container files
Str174_ConfigureBrowserAccess=Access required to setup and configure your browser
Str175_ConfigureBrowserAccessDesc=Access to, and modification of, browser data, preferences, files, networking and modem configuration. This access is commonly granted to the main setup program for your browser.
Str176_SpecificReadAccess=Reading a specific file on your hard disk
Str177_SpecificModifyAccess=Modifying a specific file on your hard disk