One-KVM/web/share/i18n/i18n_en.json
2024-09-10 23:36:22 +08:00

62 lines
3.9 KiB
JSON

{
"username": "Username: ",
"password": "Password: ",
"2fa_code": "2FA code: ",
"if_enabled": "if enabled",
"login": "Login",
"select_language": "Select language: ",
"chinese": "Simplified Chinese",
"english": "English",
"footer-left": "This site is actively using JavaScript.<br>It doesn't contain ads, but is blocked by some ad filters.<br>Please turn it off to continue and reload the page.",
"index": " One-KVM Index ",
"copyright": "Copyright &copy; 2018-2024 Maxim Devaev | Modified by SilentWind",
"index_text_1": "Please note that when you are working with a KVM session or another application that captures the keyboard,you can't use some keyboard shortcuts such as Ctrl+Alt+Del (which will be caught by your OS) or Ctrl+W (caught by your browser).",
"index_text_2": "To override this limitation you can use Google Chrome in application mode.",
"serve_name": "Server:",
"index_text_10":"PiKVM Project",
"index_text_11":"PiKVM Documentation",
"index_text_12":"One-KVM Project",
"index_text_13":"One-KVM Documentation",
"index_title":"The Open Source KVM over IP",
"vnc_text1": "This One-KVM device has running <b>kvmd-vnc</b> daemon and provides VNC access to the server.",
"vnc_text2": "<b>WARNING!</b> We strongly don't recommend you to use VNC in untrusted networks without enabled X.509 or TLS encryption. Otherwise your passwords are transmitted in a plain text over the network.",
"vnc_text3": "Your VNC client must support Tight JPEG compression and password authentication. <a href=\"https://tigervnc.org\">TigerVNC</a> is a good choice.On Linux, this client will most likely be available for installation from the repository. It can also be called vncviewer.",
"ipmi_text1":"This One-KVM device has running <b>kvmd-ipmi</b> daemon and provides IPMI 2.0 interface for some basic BMC operations like on/off/reset the server.",
"ipmi_text2":"<b>WARNING!</b> We strongly don't recommend you to use IPMI in untrusted networks because this protocol is completely unsafe by design. In short, the authentication process for IPMI mandates that the server send a salted SHA1 or MD5 hash of the requested user's password to the client, prior to the client authenticating.",
"ipmi_text3":"<b>NEVER</b> use the same passwords for KVMD and IPMI users. And even better not to use IPMI. Instead, you can directly use KVMD API via curl. Here some examples:",
"kvm_text1":"About",
"kvm_text2":"// These <a href=\"https://github.com/pikvm/pikvm?tab=readme-ov-file#special-thanks\">kind people</a> donated money to the PiKVM project<br>// and supported the work on it. We are very grateful<br>// for their help, and memorializing their names<br>// is the least we can do in gratitude.<br>// If you also want to support this project,<br>// you can donate on <a target=\"_blank\" href=\"https://www.patreon.com/pikvm\"> Patreon</a> or <a target=\"_blank\" href=\"https://paypal.me/pikvm\"> Paypal</a>.",
"kvm_text3":"System",
"kvm_text4":"Runtime settings &amp; tools",
"kvm_text5":"Term",
"kvm_text6":"About",
"kvm_text7":"Log",
"kvm_text8":"WoL",
"kvm_text9":"Resolution:",
"kvm_text10":"JPEG quality:",
"kvm_text11":"JPEG max fps:",
"kvm_text12":"H.264 kbps:",
"kvm_text13":"H.264 gop",
"kvm_text14":"Video mode",
"kvm_text15":"Virtual Keyboard",
"kvm_text16":"Terminal",
"kvm_text17":"Orientation:",
"kvm_text18":"Default",
"kvm_text19":"Audio volume:",
"kvm_text20":"&bull; Show stream",
"kvm_text21":"&bull; Screenshot",
"kvm_text22":"Reset stream",
"kvm_text23":"Keyboard mode:",
"kvm_text24":"Mouse mode:",
"kvm_text25":"Keyboard &amp; Mouse (HID) settings",
"kvm_text26":"Mouse polling:",
"kvm_text27":"Relative sensitivity:",
"kvm_text28":"Reverse scrolling:",
"kvm_text29":"Scroll rate:",
"kvm_text30":"&bull; Show keyboard",
"kvm_text31":"Reset HID"
}