/*
 * Translatable strings file generated by Glade.
 * Add this file to your project's POTFILES.in.
 * DO NOT compile it as part of your application.
 */

gchar *s = N_("SNARE - Event Logging for Linux");
gchar *s = N_("View Activity");
gchar *s = N_("View");
gchar *s = N_("View the full status of the audit daemon and kernel module");
gchar *s = N_("Audit Status");
gchar *s = N_("Setup");
gchar *s = N_("Configure the audit events to display");
gchar *s = N_("Audit Configuration...");
gchar *s = N_("Configure the network parameters, so as to pass audit event records over the network");
gchar *s = N_("Network Configuration...");
gchar *s = N_("Activity");
gchar *s = N_("Stop all audit activity immediately");
gchar *s = N_("Stop the Audit Daemon");
gchar *s = N_("Apply and Restart the Audit Daemon");
gchar *s = N_("Reload Log File");
gchar *s = N_("Clear all current events");
gchar *s = N_("Clear All Current Alerts");
gchar *s = N_("Documentation");
gchar *s = N_("%H:%M");
gchar *s = N_("Show the Audit Status");
gchar *s = N_("Set the Audit Configuration");
gchar *s = N_("Set the Network Parameters");
gchar *s = N_("Clear the display");
gchar *s = N_("Reload all alerts from the Log File");
gchar *s = N_("Apply and restart the audit daemon");
gchar *s = N_("Stop all current alerts");
gchar *s = N_("Select to view help and documentation files");
gchar *s = N_("Intersect Alliance Website");
gchar *s = N_("Real Time Event Display");
gchar *s = N_("Alert");
gchar *s = N_("Event Date/Time");
gchar *s = N_("Details");
gchar *s = N_("(c) 1999-2002 Intersect Alliance Pty Ltd.");
gchar *s = N_("SNARE: System iNtrusion and Audit Reporting Environment\n"
              "SNARE is the \"C2 style\" Linux audit and intrusion analysis subsystem\n"
              "incorporating kernel space, user space and graphical interface components.");
gchar *s = N_("Network Configuration");
gchar *s = N_("Remote Host Details");
gchar *s = N_("Enable tranmission of event records to a remote host");
gchar *s = N_("Remote Host Details");
gchar *s = N_("Enter remote host IP or DNS  name ");
gchar *s = N_("Enter remote host (UDP) port");
gchar *s = N_("Enter details as an IP address (eg; 10.0.0.1) or DNS (eg; host.foo.com)");
gchar *s = N_("10.0.0.1");
gchar *s = N_("Enter the port number of the remote host");
gchar *s = N_("514");
gchar *s = N_("Field Delimiter");
gchar *s = N_("Use Tab delimiters");
gchar *s = N_("Use Comma delimiters");
gchar *s = N_("Use Semicolon delimiters");
gchar *s = N_("Select the field delimiter");
gchar *s = N_("All event auditing has been stopped");
gchar *s = N_("Audit Stopped");
gchar *s = N_("Event auditing has been restarted");
gchar *s = N_("Audit Restarted");
gchar *s = N_("Audit Status");
gchar *s = N_("SNARE Audit Status");
gchar *s = N_("SNARE Version:");
gchar *s = N_("Auditing Daemon Active?");
gchar *s = N_("Audit Process ID:");
gchar *s = N_("Events lost this session:");
gchar *s = N_("Audit Configuration");
gchar *s = N_("Grade of Auditing");
gchar *s = N_("The grade of auditing determines the reliability of the audit reporting mechanism.");
gchar *s = N_("\"Normal\" event reporting. Will allow audit reporting with minimum impact on host resources, but events may be lost");
gchar *s = N_("\"C2 Style\". Will report all events, or suspend kernel operations if it cannot do so. USE WITH CAUTION!");
gchar *s = N_("Type of Event Auditing");
gchar *s = N_("Select the method of auditing, either by configuring \"objectives\", or by selecting \"raw\" kernel events.");
gchar *s = N_("This will allow only filtered events to be reported, thereby ensuring only those events of interest are reported and stored");
gchar *s = N_("Specify Auditing by filtered \"Objectives\" (see \"Objectives\" tab)");
gchar *s = N_("This will allow all selected system calls to be audited, with no filtering");
gchar *s = N_("Specify Auditing by raw \"Kernel Events\" (see \"Kernel\" tab)");
gchar *s = N_("Log File");
gchar *s = N_("Events must be logged to a file. The audit daemon writes directly to this file, and the SNARE GUI reads from it.");
gchar *s = N_("/var/audit/audit.log");
gchar *s = N_("Auditing Control");
gchar *s = N_("\n"
              "Current Objectives\n"
              "\n"
              "The following objectives (filters) have been specified. To select or delete an objective, click on the relevant row from the list below. \n"
              "To add a new objective, select the \"Add an Objective\" button below.\n"
              "");
gchar *s = N_("Alert");
gchar *s = N_("Success/Failure");
gchar *s = N_("User Match");
gchar *s = N_("Users");
gchar *s = N_("Filter Type");
gchar *s = N_("Filter");
gchar *s = N_("Objective");
gchar *s = N_("Add an Objective");
gchar *s = N_("Objectives");
gchar *s = N_("\n"
              "Kernel events\n"
              "\n"
              "Select the raw kernel system calls for auditing.\n"
              "(WARNING: ALL selected system calls will be audited)\n"
              "");
gchar *s = N_("Resource Access and Security");
gchar *s = N_("open");
gchar *s = N_("rename");
gchar *s = N_("chmod");
gchar *s = N_("setuid");
gchar *s = N_("setreuid");
gchar *s = N_("setresuid");
gchar *s = N_("setuid32");
gchar *s = N_("setreuid32");
gchar *s = N_("setresuid32");
gchar *s = N_("setgid");
gchar *s = N_("setregid");
gchar *s = N_("setresgid");
gchar *s = N_("setgid32");
gchar *s = N_("setregid32");
gchar *s = N_("setresgid32");
gchar *s = N_("chown");
gchar *s = N_("lchown");
gchar *s = N_("chown32");
gchar *s = N_("lchown32");
gchar *s = N_("truncate");
gchar *s = N_("truncate64");
gchar *s = N_("Command Execution");
gchar *s = N_("execve");
gchar *s = N_("chroot");
gchar *s = N_("exit");
gchar *s = N_("reboot");
gchar *s = N_("Resource Creation and Deletion");
gchar *s = N_("creat");
gchar *s = N_("mknod");
gchar *s = N_("link");
gchar *s = N_("mkdir");
gchar *s = N_("unlink");
gchar *s = N_("rmdir");
gchar *s = N_("symlink");
gchar *s = N_("Kernel");
gchar *s = N_("Save Configuration");
gchar *s = N_("Edit Audit Objective");
gchar *s = N_("This window allows tailored audit \"objectives\" to be defined. Events will \n"
              "only be reported if they match all the filters in items 1 to 4 below.");
gchar *s = N_("1. Identify the \"high level\" event to be audited");
gchar *s = N_("This will trap the \"open\" system call");
gchar *s = N_("Open a file or directory");
gchar *s = N_("This will trap the \"creat\", \"mkdir\", \"mknod\", \"link\" and \"symlink\" system calls");
gchar *s = N_("Create a file or directory");
gchar *s = N_("This will trap the \"rmdir\" and \"unlink\" system calls");
gchar *s = N_("Remove a file or directory");
gchar *s = N_("This will trap the \"chmod\", \"rename\", \"reboot\", \"*truncate\" and \"*chown*\" system calls");
gchar *s = N_("Modify system, file or directory attributes");
gchar *s = N_("This traps the \"execve\" and \"exit\" system calls");
gchar *s = N_("Start or stop a program execution");
gchar *s = N_("This traps the \"setg/uid*\" range of system calls");
gchar *s = N_("Change user or group identity");
gchar *s = N_("2. Filter events based on an expression");
gchar *s = N_("A filter expression can be used to  record only those events of interest. \n"
              "NOTE: Regular Expression should only be used by experienced users.");
gchar *s = N_("This will trap only those events that contain the expression below, in the primary argument of the event");
gchar *s = N_("Partial match");
gchar *s = N_("This will trap only those events that contain the exact expression below, in the primary argument of the event");
gchar *s = N_("Full match");
gchar *s = N_("This is similar to the Partial Match, except with the full power of regular expressions. Use with care!");
gchar *s = N_("Regular expression");
gchar *s = N_("Enter an expression, that will act as a filter  (example: /etc/shadow)");
gchar *s = N_("3. Filter events based on whether they were successes and/or failures");
gchar *s = N_("Record only those events that have been successfully processed by the kernel");
gchar *s = N_("Success");
gchar *s = N_("Record only those events that have failed to be processed by the kernel");
gchar *s = N_("Failures");
gchar *s = N_("Record the event, whether it was a success or failure");
gchar *s = N_("Success and Failure");
gchar *s = N_("4. Filter events based on the user(s)");
gchar *s = N_("Events by any user will be trapped");
gchar *s = N_("Audit all users");
gchar *s = N_("Only the events attributed to those users listed below will be trapped");
gchar *s = N_("Audit selected users");
gchar *s = N_("Audit users other than those selected");
gchar *s = N_("Enter the selected users\n"
              "(use comas to separate)");
gchar *s = N_("5. Select the alert level");
gchar *s = N_("Events will be reported as critical (red)");
gchar *s = N_("Critical");
gchar *s = N_("Events will be reported as warning (yellow)");
gchar *s = N_("Warning");
gchar *s = N_("Events are for information only (green)");
gchar *s = N_("Information");
gchar *s = N_("Event alert level not assigned (no color)");
gchar *s = N_("Clear");
gchar *s = N_("Events will be reported as priority (orange)");
gchar *s = N_("Priority");
gchar *s = N_("Save Objective");
gchar *s = N_("Edit this objective");
gchar *s = N_("Delete this objective");
gchar *s = N_("Event Details");
gchar *s = N_("Event Details");
gchar *s = N_("Event Header Details");
gchar *s = N_("Criticality");
gchar *s = N_("Date and Time of Event");
gchar *s = N_("Event Detail");
