PHP Classes

File: vault/lang/lang.zh-tw.yaml

Recommend this page to a friend!
  Classes of Caleb   PHP Mussel   vault/lang/lang.zh-tw.yaml   Download  
File: vault/lang/lang.zh-tw.yaml
Role: Auxiliary data
Content type: text/plain
Description: Auxiliary data
Class: PHP Mussel
PHP file virus scanner to detect malware
Author: By
Last change:
Date: 4 years ago
Size: 5,514 bytes
 

Contents

Class file image Download
##\ # This file is a part of the phpMussel package. # Homepage: https://phpmussel.github.io/ # # PHPMUSSEL COPYRIGHT 2013 AND BEYOND BY THE PHPMUSSEL TEAM. # # Authors: # @see PEOPLE.md # # License: GNU/GPLv2 # @see LICENSE.txt # # This file: Chinese (traditional) language data (last modified: 2019.02.26). ##/ # Language settings. Local Name: "??????" Text Direction: "ltr" IntegerRule: "int1" FractionRule: "int1" PrivacyPolicy: "????" SafeBrowseLookup_200: "?????URL??" SafeBrowseLookup_400: "API????" SafeBrowseLookup_401: "API????" SafeBrowseLookup_503: "API?????" SafeBrowseLookup_999: "??API??" _exclamation: "%s?" _exclamation_final: "%s?" _fullstop: "?" _fullstop_final: "?" bad_command: "?????????????" cli_algo_not_supported: "?????????" cli_failed_to_complete: "????????" cli_is_not_a: "%s?????????" cli_ln2: | ??????phpMussel????PHP????????????????????????????????????????????? ??ClamAV????????? ~ ~ ~ PHPMUSSEL??2013???GNU/GPLv.2??Caleb M ?Maikuolan?? ~ ~ ~ cli_ln3: | ????phpMussel?CLI?????????????????????????scan????????????????phpMussel ?????Enter?????c????Enter???CLI??????????q????Enter?????? cli_pe1: "?PE???" cli_pe2: "PE??:" cli_signature_placeholder: "????" cli_working: "???" corrupted: "????PE" data_not_available: "??????" denied: "??????" denied_reason: "?????????????:" detected: "??%s" detected_control_characters: "??????" encrypted_archive: "????????; ?????????" failed_to_access: "?????%s??" field_date: "??" field_header_hash_reconstruction: "??????" field_header_pe_reconstruction: "PE??????" field_header_scan_results_why_flagged: "???????????" field_ip_address: "IP??" file: "??" filesize_limit_exceeded: "????????" filetype_blacklisted: "?????????" finished: "??" generated_by: "?????" greylist_cleared: " ??????" greylist_updated: " ??????" image: "??" instance_already_active: "?????????????????" invalid_data: "?????" invalid_file: "?????" invalid_url: "??????" macros_not_permitted: "??????" ok: "?" only_allow_images: "???????????" plugins_directory_nonexistent: "?????????" quarantined_as: "????/vault/quarantine/%s.qfu??" recursive: "?????????" required_variables_not_defined: "???????????????" scan_chameleon: "%s???????" scan_checking: "??" scan_command_injection: "????????" scan_complete: "??" scan_extensions_missing: "????????????" scan_filename_manipulation_detected: "???????" scan_missing_filename: "??????" scan_no_problems_found: "?????????" scan_not_archive: "???????????" scan_reading: "??" scan_signature_file_missing: "???????" scan_tampering: "???????????" scan_unauthorised_upload: "??????????????" scan_unauthorised_upload_or_misconfig: "????????????????????" started: "??" too_many_files_in_archive: "????????" too_many_urls: "???URL" upload_error_1: "??????upload_max_filesize???" upload_error_2: "??????????????????????" upload_error_34: "??????????????????????" upload_error_6: "??????????????????????????" upload_error_7: "????????????????????????" upload_error_8: "PHP?????????????????????????" upload_limit_exceeded: "??????" x_does_not_exist: "%s???" cli_commands: | .. q - ??CLI??? - ???quit??exit? hash_file:% - ??????????[???hash_file:?? ???]? hash:% - ??????????[???hash:?? ??]? algo - ?????????? hex_encode - ??????????????[???hex_encode ??]? - ???x? hex_decode - ??????????????[???hex_decode ??]? base64_encode - ???????????64???[???base64_encode ??]? - ???b? base64_decode - ?????64?????????[???base64_decode ??]? pe_meta - ?PE?????????[???pe_meta ???]? url_sig - ??URL??????[???url_sig ??]? scan - ?????????[???scan ???]? - ???s? c - ????????