ok

Mini Shell

Direktori : /proc/thread-self/root/usr/share/locale/en_GB/LC_MESSAGES/
Upload File :
Current File : //proc/thread-self/root/usr/share/locale/en_GB/LC_MESSAGES/fwupd.mo

��GT�$�0,�01101A1Y1o1�1�1�1�1�1�1�1232
D2 R2s2	�2>�2�2�2�23H3Zg3�3�3
�3�3Y�3_I4�44�4�455!%5G5Z5k5|5'�5�5�5�5�56$6?6=V6#�6-�6�67(76@7w7�7"�7�7�7%�78.8F8#X8J|8D�8R99_9?�9D�9@:-_:G�:A�:H;`; t;�;�;�;�;�;�;/<6<I<P<f<�<	�<4�<"�<�<*�<!=*=;=L=d=v='�=�=�=�=�=�=,�=+>;>J>V>h>y>�>�>*�>�>	�>
�>!�>?3)?]?3n?�?/�?�?�?;@J@_@-~@0�@,�@(
A,3A3`A,�A�A�A�A�AB#,B2PB.�B �B�B#�B$CC<C7�C'�C?�C D&D#BD fD�D�D�D�D�D�D3�D.EAEUE]ExE�E�E.�F	�F
�F!�F
G'G @G'aG!�G�G�G"�G�G �G&HD:HH$�H�H�HA�H*,IWI^IuI�I!�I�I�IJJ)JCJ"XJ{J�J�J�J�J�J�JK\K{K�K�K�K�K�KL�$LE�LM3M/JM:zM�M0�M&�MNN=7N
uN'�N-�N2�N"	O,O!HO"jO!�O/�O�O%�O
$P#/PSPXPmPP �P�P�P/�P!�P* QKQpkQ�Q#�Q(R-:R/hR�R�R�R �R S7SNSlS9�S�S�S�STT<TMT_T
rT}T�T�T�T
�T�T	�T�T�TU!U9UAU
JUXUwU/U0�U�U�U
VV"V!BVdV
{V�V�V�V�V�V �V�V�V�V@	WJW,ZW%�W�W�W�W�WX2)X!\X~X!�X�X�X�X�X4�X.Y?Y=UY�Y*�Y�Y�Y	�Y
ZZZZ$2Z!WZyZ�Z�Z,�Z�Z�Z['[<[D[L[`[As[$�[�[�[#\"2\U\f\\�\�\�\!�\	�\�\"]%+],Q]~]
�]�]#�]�](�]
^)^E^
T^
b^	m^)w^
�^�^*�^�^_'_D_0Q_�_+�_1�_0�_@&`@g`�`�`�`�`�`	�`!a2*a5]a3�a
�a�a�a�ab+b
;b$Ib"nb*�b�b�b7�b*%cPc#gc �c �c�c&�c1d.Fd
ud�d&�d2�d	�deLeXe*_e�e,�e�e"�ef&f)Dfnf�f)�f�f(�f%g@@g&�g�g	�g�g�g�g�g(h;:h%vh�h�h"�h�h�h�h�hi#i70i)hj[�j5�j@$kKek,�k#�klI!lwkl>�l,"m�Om#n)=n<gnC�n��nf~o+�oIp[pmp~p�p-�p�p?�pq4(q]qoq�q�q�q1�q�qrr!r?r&Hror&�r3�r	�r	�r�r�rsEs^sjs>�s1�s0�sW%t}t�t�t�t�tu�tVu^u{u(�u�u�u�u�u�uvvv'v/v
8vCv$^v+�v
�v
�v{�vlDw'�w
�w�w�wx)xAx:Zx�x�x
�x+�x,�y z2zJz[zsz�z�z�z�z�z�z{{0{M{
^{ l{�{	�{>�{�{�{|"|H8|Z�|�|�|
�|�|Y	}_c}�}4�}	~~3~!?~a~f~w~�~'�~�~�~$0K=b#�-���(#�6L�����"��ـ�%��%�:�R�#d�J��DӁR�9k�?��D�@*�-k�G��A�H#�l� ��������ׄ���/�B�U�\�r���	��4��"ׅ��*�-�6�G�X�p���'����͆����,
�7�G�V�b�t�������*��އ	�
��!�%�35�i�3z���/Ĉ��;�V�k�-��0��,�(�,?�3l�,��͊֊�
��#8�2\�.�� ��ߋ#��$#�CH�7��'Č?�,�2�#N� r�������č��3�:�M�a�i�������.��	�
��!�
(�3� L�'m�!������"Ґ�� ��&�DF���$��ÑݑA��*8�c�j�����!��ݒ���&�5�O�"d�������̓�����\*�������Δߔ���0�E˕�3"�/V�:����0ǖ&���%�=C�
��'��-��2�"�8�!T�"v�!��/���%
�
0�#;�_�d�y��� ����ҙ/ڙ!
�*,�W�pw��#��(�-F�/t���Û� � "�C�Z�x�9��Ɯ֜�
�*�H�Y�k�
~���������
ĝϝ	ܝ���-�E�M�
V�d���/��0�����
��.�!N�p�
������������ ͟����@�V�,f�%����Ѡ��&�25�!h���!����šڡ�4�:�K�=a���*��ߢ��	�
���#�$>�!c�������,�����' �H�P�X�l�A�$����#�">�a�r�������ȥ!ԥ	���"�%7�,]���
����#��٦(��5�Q�
`�
n�	y�)��
����*ҧ���3�P�0]���+��1Ϩ0�@2�@s���Ωݩ��	
�!�26�5i�3��
Ӫ���
�'�7�
G�$U�"z�*��ȫ٫7��*1�\�#s� �� ��٬&��1 �.R�
����&��2խ	��L�d�*k���,���"��&)�)P�z���)���(��%&�@L�&����	��ư���(�;F�%������"ű����	��#�7<�)t�[��5��@0�Kq�,��#��I-�ww�>�,.��[�#%�)I�<s�C����f��+�I�g�y�����-��͹?�#�44�i�{�������1Ժ���!)�K�&T�{�&��3��	�	�����E$�j�v�>��1μ0�W1���������ٽu�b�j���(��ξ��������&�3�;�
D�O�$j�+��
��
ɿ{ԿlP�'��
����5�M�&f�����
��psQh�]������I��������I�7�B�j�0TL���%�8O��=+����������q���<���!#2�7��^/
l�Cb��g!=�"���:��1��(�}�$���%��i,/m0F�s9���F���^�X���U9�3u!	�4�r*�v��Z��p��6����4���x�)�EP�5��4KS�0�'<�>�R���&�?�i�����[/*Xw@'rk���(-��5�a�_b�B?8�{�g�U���J�,13QL'N��:�DA9
�SV�$���F���)nC62�GYma��u��.��
�|����2���AEH�f`��.:��w�����<7��",+�)}�
��k��;�Z�#����\{�& �l�D�G��R�_M�t��N>eY�|�.��oc�%�����VK�;�*�;�$q1@�c#@�y��
���Bv`+A=�TC�O�W�ht	��x�(j��6?-�o&
���W�d���G8	�EzJ e�����M�"�5�z��]�Dn��H�d�3���~ ������>�y\[������-~Pf��%.0f minute remaining%.0f minutes remaining%s Battery Update%s CPU Microcode Update%s Camera Update%s Configuration Update%s Consumer ME Update%s Controller Update%s Corporate ME Update%s Device Update%s Embedded Controller Update%s Keyboard Update%s ME Update%s Mouse Update%s Network Interface Update%s Storage Controller Update%s System Update%s TPM Update%s Thunderbolt Controller Update%s Touchpad Update%s Update%s and all connected devices may not be usable while updating.%s appeared: %s%s changed: %s → %s%s disappeared: %s%s manufacturing mode%s must remain connected for the duration of the update to avoid damage.%s must remain plugged into a power source for the duration of the update to avoid damage.%s override%s v%s%s version%u day%u days%u device has a firmware upgrade available.%u devices have a firmware upgrade available.%u device is not the best known configuration.%u devices are not the best known configuration.%u hour%u hours%u local device supported%u local devices supported%u minute%u minutes%u second%u seconds(obsoleted)A TPM PCR is now an invalid valueA single GUIDGUIDAction Required:Activate devicesActivate pending devicesActivate the new firmware on the deviceActivating firmware updateActivating firmware update forAgeAgree and enable the remote?Alias to %sAll TPM PCRs are now validAll TPM PCRs are validAll devices of the same type will be updated at the same timeAllow downgrading firmware versionsAllow reinstalling existing firmware versionsAllow switching firmware branchAlternate branchAn update requires a reboot to complete.An update requires the system to shutdown to complete.Answer yes to all questionsApply firmware updatesApply update even when not advisedApply update filesApplying update…Approved firmware:Approved firmware:Ask again next time?Attach to firmware modeAuthenticating…Authentication details are requiredAuthentication is required to downgrade the firmware on a removable deviceAuthentication is required to downgrade the firmware on this machineAuthentication is required to modify a configured remote used for firmware updatesAuthentication is required to modify daemon configurationAuthentication is required to set the list of approved firmwareAuthentication is required to sign data using the client certificateAuthentication is required to switch to the new firmware versionAuthentication is required to unlock a deviceAuthentication is required to update the firmware on a removable deviceAuthentication is required to update the firmware on this machineAuthentication is required to update the stored checksums for the deviceAutomatic ReportingAutomatically upload every time?BUILDER-XML FILENAME-DSTBYTESBind new kernel driverBlocked firmware files:Blocked versionBlocking firmware:Blocks a specific firmware from being installedBootloader VersionBranchBuild a firmware fileBuild firmware using a sandboxCancelCancelledCannot apply as dbx update has already been applied.Cannot apply updates on live mediaChangedChecks cryptographic hash matches firmwareChecksumChoose a branch:Choose a device:Choose a firmware type:Choose a release:Choose a volume:Clears the results from the last updateCommand not foundCommunity supportedConvert a firmware fileCreatedCriticalCryptographic hash verification is availableCurrent versionDEVICE-ID|GUIDDFU UtilityDebugging OptionsDecompressing…DescriptionDetach to bootloader modeDetailsDeviate from the best known configuration?Device FlagsDevice IDDevice added:Device can recover flash failuresDevice changed:Device firmware is required to have a version checkDevice is lockedDevice is required to install all provided releasesDevice is unreachableDevice is usable for the duration of the updateDevice removed:Device stages updatesDevice supports switching to a different branch of firmwareDevice update methodDevice update needs activationDevice will backup firmware before installingDevice will not re-appear after update completesDevices that have been updated successfully:Devices that were not updated correctly:Devices with no available firmware updates: Devices with the latest available firmware version:Did not find any devices with matching GUIDsDisabledDisabled fwupdate debuggingDisables a given remoteDisplay versionDo not check for old metadataDo not check for unreported historyDo not check if download remotes should be enabledDo not check or prompt for reboot after updateDo not include log domain prefixDo not include timestamp prefixDo not perform device safety checksDo not write to the history databaseDo you understand the consequences of changing the firmware branch?Do you want to disable this feature for future updates?Do you want to refresh this remote now?Do you want to upload reports automatically for future updates?Done!Downgrade %s from %s to %s?Downgrades the firmware on a deviceDowngrading %s from %s to %s... Downgrading %s…Download a fileDownloading…Dump SMBIOS data from a fileDurationESP specified was not validEnable firmware update support on supported systemsEnable new remote?Enable this remote?EnabledEnabled fwupdate debuggingEnabled if hardware matchesEnables a given remoteEnabling this functionality is done at your own risk, which means you have to contact your original equipment manufacturer regarding any problems caused by these updates. Only problems with the update process itself should be filed at $OS_RELEASE:BUG_REPORT_URL$.Enabling this remote is done at your own risk.EncryptedEncrypted RAMErase all firmware update historyErasing…Exit after a small delayExit after the engine has loadedExport a firmware file structure to XMLExtract a firmware blob to imagesFILEFILE [DEVICE-ID|GUID]FILE-IN FILE-OUT [SCRIPT] [OUTPUT]FILENAMEFILENAME CERTIFICATE PRIVATE-KEYFILENAME DEVICE-ALT-NAME|DEVICE-ALT-IDFILENAME DEVICE-ALT-NAME|DEVICE-ALT-ID [IMAGE-ALT-NAME|IMAGE-ALT-ID]FILENAME DEVICE-IDFILENAME OFFSET DATA [FIRMWARE-TYPE]FILENAME [DEVICE-ID|GUID]FILENAME [FIRMWARE-TYPE]FILENAME-SRC FILENAME-DST [FIRMWARE-TYPE-SRC] [FIRMWARE-TYPE-DST]FILENAME|CHECKSUM1[,CHECKSUM2][,CHECKSUM3]FailedFailed to apply updateFailed to connect to daemonFailed to get pending devicesFailed to install firmware updateFailed to load local dbxFailed to load quirksFailed to load system dbxFailed to lockFailed to parse argumentsFailed to parse fileFailed to parse flags for --filterFailed to parse local dbxFailed to rebootFailed to set splash modeFailed to validate ESP contentsFilenameFilename SignatureFilename SourceFilename requiredFilter with a set of device flags using a ~ prefix to exclude, e.g. 'internal,~needs-reboot'Firmware Base URIFirmware Update D-Bus ServiceFirmware Update DaemonFirmware UtilityFirmware attestationFirmware is already blockedFirmware is not already blockedFirmware metadata has not been updated for %u day and may not be up to date.Firmware metadata has not been updated for %u days and may not be up to date.Firmware metadata last refresh: %s ago. Use --force to refresh again.Firmware updatesFirmware updates are not supported on this machine.Firmware updates are supported on this machine.Firmware updates disabled; run 'fwupdmgr unlock' to enableFlagsForce the action by relaxing some runtime checksForce the action ignoring all warningsFoundFull Disk Encryption DetectedFull disk encryption secrets may be invalidated when updatingGUIDGUIDsGet all device flags supported by fwupdGet all devices that support firmware updatesGet all enabled plugins registered with the systemGets details about a firmware fileGets the configured remotesGets the host security attributesGets the list of approved firmwareGets the list of blocked firmwareGets the list of updates for connected hardwareGets the releases for a deviceGets the results from the last updateHWIDS-FILEHardware is waiting to be repluggedHighHost Security EventsHost Security ID:IOMMUIOMMU device protection disabledIOMMU device protection enabledIdle…Ignore SSL strict checks when downloading filesIgnore firmware checksum failuresIgnore firmware hardware mismatch failuresIgnore validation safety checksIgnoring SSL strict checks, to do this automatically in the future export DISABLE_SSL_STRICT in your environmentInstall DurationInstall a firmware blob on a deviceInstall a firmware file on this hardwareInstall old version of signed system firmwareInstall old version of unsigned system firmwareInstall signed device firmwareInstall signed system firmwareInstall to parent device firstInstall unsigned device firmwareInstall unsigned system firmwareInstalling Firmware…Installing firmware update…Installing on %s…Installing this update may also void any device warranty.Intel BootGuardIntel BootGuard ACM protectedIntel BootGuard OTP fuseIntel BootGuard error policyIntel BootGuard verified bootIntel CET ActiveIntel CET EnabledIntel DCI debuggerIntel SMAPInternal deviceInvalidIs downgradeIs in bootloader modeIs upgradeIssueIssuesKEY,VALUEKernel is no longer taintedKernel is taintedKernel lockdown disabledKernel lockdown enabledKeyringLOCATIONLast modifiedLess than one minute remainingLicenseLinux Vendor Firmware Service (stable firmware)Linux Vendor Firmware Service (testing firmware)Linux kernelLinux kernel lockdownLinux swapList entries in dbxList supported firmware updatesList the available firmware typesLists files on the ESPLoading…LockedLowMEI manufacturing modeMEI overrideMEI versionManually enable specific pluginsMediumMetadata SignatureMetadata URIMetadata can be obtained from the Linux Vendor Firmware Service.Minimum VersionMismatched daemon and client, use %s insteadModifies a daemon configuration valueModifies a given remoteModify a configured remoteModify daemon configurationMonitor the daemon for eventsMounts the ESPNOTE: This program may only work correctly as rootNeeds a reboot after installationNeeds rebootNeeds shutdown after installationNew versionNo action specified!No downgrades for %sNo firmware IDs foundNo hardware detected with firmware update capabilityNo plugins foundNo releases availableNo remotes are currently enabled so no metadata is available.No remotes availableNo updates available for remaining devicesNo updates were appliedNot approvedNot foundNot supportedOKOK!Only show single PCR valueOnly use IPFS when downloading filesOnly version upgrades are allowedOutput in JSON formatOverride the default ESP pathPATHParse and show details about a firmware fileParsing dbx update…Parsing system dbx…PasswordPatch a firmware blob at a known offsetPayloadPendingPercentage completePerform operation?Please ensure you have the volume recovery key before continuing.Please enter a number from 0 to %u: Plugin dependencies missingPre-boot DMA protectionPre-boot DMA protection is disabledPre-boot DMA protection is enabledPrevious versionPrint the version numberPrint verbose debug statementsPriorityProceed with upload?ProprietaryQuery for firmware update supportREMOTE-IDREMOTE-ID KEY VALUERead a firmware blob from a deviceRead firmware from device into a fileRead firmware from one partition into a fileReading from %s…Reading…Rebooting…Refresh metadata from remote serverReinstall %s to %s?Reinstall current firmware on the deviceReinstall firmware on a deviceReinstalling %s with %s... Release BranchRelease FlagsRelease IDRemote IDReplace data in an existing firmware fileReport URIReported to remote serverRequired efivarfs filesystem was not foundRequired hardware was not foundRequires a bootloaderRequires internet connectionRestart now?Restart the daemon to make the change effective?Restarting device…Return all the hardware IDs for the machineRun `fwupdmgr get-upgrades` for more information.Run `fwupdmgr sync-bkc` to complete this action.Run the plugin composite cleanup routine when using install-blobRun the plugin composite prepare routine when using install-blobRunning kernel is too oldRuntime SuffixSPI BIOS DescriptorSPI BIOS regionSPI lockSPI writeSUBSYSTEM DRIVER [DEVICE-ID|GUID]Save a file that allows generation of hardware IDsSave device state into a JSON file between executionsSchedule installation for next reboot when possibleScheduling…Secure Boot disabledSecure Boot enabledSee %s for more information.Selected deviceSelected volumeSerial NumberSet the debugging flag during updateSets the list of approved firmwareShare firmware history with the developersShow all resultsShow client and daemon versionsShow daemon verbose information for a particular domainShow debugging information for all domainsShow debugging optionsShow devices that are not updatableShow extra debugging informationShow history of firmware updatesShow plugin verbose informationShow the calculated version of the dbxShow the debug log from the last attempted updateShow the information of firmware update statusShutdown now?Sign a firmware with a new keySign data using the client certificateSign the uploaded data with the client certificateSignatureSizeSome of the platform secrets may be invalidated when updating this firmware.SourceSpecify Vendor/Product ID(s) of DFU deviceSpecify the dbx database fileSpecify the number of bytes per USB transferSuccessSuccessfully activated all devicesSuccessfully disabled remoteSuccessfully downloaded new metadata: Successfully enabled and refreshed remoteSuccessfully enabled remoteSuccessfully installed firmwareSuccessfully modified configuration valueSuccessfully modified remoteSuccessfully refreshed metadata manuallySuccessfully updated device checksumsSuccessfully uploaded %u reportSuccessfully uploaded %u reportsSuccessfully verified device checksumsSummarySupportedSupported on remote serverSuspend-to-idleSuspend-to-ramSwitch branch from %s to %s?Switch the firmware branch on the deviceSync firmware versions to the host best known configurationSystem requires external power sourceTEXTTPM PCR0 reconstructionTPM PCR0 reconstruction is invalidTPM empty PCRsTPM v2.0TagTagsTaintedTargetTest a device using a JSON manifestThe LVFS is a free service that operates as an independent legal entity and has no connection with $OS_RELEASE:NAME$. Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices. All firmware is provided only by the original equipment manufacturer.The TPM PCR0 differs from reconstruction.The daemon has loaded 3rd party code and is no longer supported by the upstream developers!The device version did not match: got %s, expected %sThe firmware from %s is not supplied by %s, the hardware vendor.The system clock has not been set correctly and downloading files may fail.The vendor did not supply any release notes.There are no blocked firmware filesThere is no approved firmware.This device will be reverted back to %s when the %s command is performed.This firmware is provided by LVFS community members and is not provided (or supported) by the original hardware vendor.This package has not been validated, it may not work properly.This program may only work correctly as rootThis remote contains firmware which is not embargoed, but is still being tested by the hardware vendor. You should ensure you have a way to manually downgrade the firmware if the firmware update fails.This system has HSI runtime issues.This system has a low HSI security level.This tool allows an administrator to apply UEFI dbx updates.This tool allows an administrator to debug UpdateCapsule operation.This tool allows an administrator to query and control the fwupd daemon, allowing them to perform actions such as installing or downgrading firmware.This tool allows an administrator to use the fwupd plugins without being installed on the host system.This tool can only be used by the root userThis tool will read and parse the TPM event log from the system firmware.Transient failureTrusted metadataTrusted payloadTypeUEFI ESP partition not detected or configuredUEFI Firmware UtilityUEFI capsule updates not available or enabled in firmware setupUEFI dbx UtilityUEFI firmware can not be updated in legacy BIOS modeUEFI platform keyUEFI secure bootUnable to connect to serviceUnbind current driverUnblocking firmware:Unblocks a specific firmware from being installedUnencryptedUnknownUnknown DeviceUnlock the device to allow accessUnlockedUnlocks the device for firmware accessUnmounts the ESPUnset the debugging flag during updateUnsupported daemon version %s, client version is %sUntaintedUpdatableUpdate ErrorUpdate MessageUpdate StateUpdate failure is a known issue, visit this URL for more information:Update now?Update requires a rebootUpdate the stored cryptographic hash with current ROM contentsUpdate the stored device verification informationUpdate the stored metadata with current contentsUpdates all specified devices to latest firmware version, or all devices if unspecifiedUpdatingUpdating %s from %s to %s... Updating %s…Upgrade %s from %s to %s?Upload report now?Uploading firmware reports helps hardware vendors to quickly identify failing and successful updates on real devices.UrgencyUse fwupdmgr --help for helpUse fwupdtool --help for helpUse quirk flags when installing firmwareUser has been notifiedUsernameVID:PIDValidValidating ESP contents…VariantVendorVerifying…VersionWARNING:Waiting…Watch for hardware changesWrite firmware from file into deviceWrite firmware from file into one partitionWriting file:Writing…Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices.Your hardware may be damaged using this firmware, and installing this release may void any warranty with %s.Your system is set up to the BKC of %s.[CHECKSUM][DEVICE-ID|GUID][DEVICE-ID|GUID] [BRANCH][FILE FILE_SIG REMOTE-ID][FILENAME1] [FILENAME2][SMBIOS-FILE|HWIDS-FILE]command-descriptionSign data using the client certificatedefaultfwupd TPM event log utilityfwupd pluginsProject-Id-Version: fwupd
Report-Msgid-Bugs-To: 
Language-Team: English (United Kingdom) (http://www.transifex.com/freedesktop/fwupd/language/en_GB/)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Language: en_GB
Plural-Forms: nplurals=2; plural=(n != 1);
%.0f minute remaining%.0f minutes remaining%s Battery Update%s CPU Microcode Update%s Camera Update%s Configuration Update%s Consumer ME Update%s Controller Update%s Corporate ME Update%s Device Update%s Embedded Controller Update%s Keyboard Update%s ME Update%s Mouse Update%s Network Interface Update%s Storage Controller Update%s System Update%s TPM Update%s Thunderbolt Controller Update%s Touchpad Update%s Update%s and all connected devices may not be usable while updating.%s appeared: %s%s changed: %s → %s%s disappeared: %s%s manufacturing mode%s must remain connected for the duration of the update to avoid damage.%s must remain plugged into a power source for the duration of the update to avoid damage.%s override%s v%s%s version%u day%u days%u device has a firmware upgrade available.%u devices have a firmware upgrade available.%u device is not the best known configuration.%u devices are not the best known configuration.%u hour%u hours%u local device supported%u local devices supported%u minute%u minutes%u second%u seconds(obsoleted)A TPM PCR is now an invalid valueGUIDAction Required:Activate devicesActivate pending devicesActivate the new firmware on the deviceActivating firmware updateActivating firmware update forAgeAgree and enable the remote?Alias to %sAll TPM PCRs are now validAll TPM PCRs are validAll devices of the same type will be updated at the same timeAllow downgrading firmware versionsAllow reinstalling existing firmware versionsAllow switching firmware branchAlternate branchAn update requires a reboot to complete.An update requires the system to shutdown to complete.Answer yes to all questionsApply firmware updatesApply update even when not advisedApply update filesApplying update…Approved firmware:Approved firmware:Ask again next time?Attach to firmware modeAuthenticating…Authentication details are requiredAuthentication is required to downgrade the firmware on a removable deviceAuthentication is required to downgrade the firmware on this machineAuthentication is required to modify a configured remote used for firmware updatesAuthentication is required to modify daemon configurationAuthentication is required to set the list of approved firmwareAuthentication is required to sign data using the client certificateAuthentication is required to switch to the new firmware versionAuthentication is required to unlock a deviceAuthentication is required to update the firmware on a removable deviceAuthentication is required to update the firmware on this machineAuthentication is required to update the stored checksums for the deviceAutomatic ReportingAutomatically upload every time?BUILDER-XML FILENAME-DSTBYTESBind new kernel driverBlocked firmware files:Blocked versionBlocking firmware:Blocks a specific firmware from being installedBootloader VersionBranchBuild a firmware fileBuild firmware using a sandboxCancelCancelledCannot apply as dbx update has already been applied.Cannot apply updates on live mediaChangedChecks cryptographic hash matches firmwareChecksumChoose a branch:Choose a device:Choose a firmware type:Choose a release:Choose a volume:Clears the results from the last updateCommand not foundCommunity supportedConvert a firmware fileCreatedCriticalCryptographic hash verification is availableCurrent versionDEVICE-ID|GUIDDFU UtilityDebugging OptionsDecompressing…DescriptionDetach to bootloader modeDetailsDeviate from the best known configuration?Device FlagsDevice IDDevice added:Device can recover flash failuresDevice changed:Device firmware is required to have a version checkDevice is lockedDevice is required to install all provided releasesDevice is unreachableDevice is usable for the duration of the updateDevice removed:Device stages updatesDevice supports switching to a different branch of firmwareDevice update methodDevice update needs activationDevice will backup firmware before installingDevice will not re-appear after update completesDevices that have been updated successfully:Devices that were not updated correctly:Devices with no available firmware updates: Devices with the latest available firmware version:Did not find any devices with matching GUIDsDisabledDisabled fwupdate debuggingDisables a given remoteDisplay versionDo not check for old metadataDo not check for unreported historyDo not check if download remotes should be enabledDo not check or prompt for reboot after updateDo not include log domain prefixDo not include timestamp prefixDo not perform device safety checksDo not write to the history databaseDo you understand the consequences of changing the firmware branch?Do you want to disable this feature for future updates?Do you want to refresh this remote now?Do you want to upload reports automatically for future updates?Done!Downgrade %s from %s to %s?Downgrades the firmware on a deviceDowngrading %s from %s to %s... Downgrading %s…Download a fileDownloading…Dump SMBIOS data from a fileDurationESP specified was not validEnable firmware update support on supported systemsEnable new remote?Enable this remote?EnabledEnabled fwupdate debuggingEnabled if hardware matchesEnables a given remoteEnabling this functionality is done at your own risk, which means you have to contact your original equipment manufacturer regarding any problems caused by these updates. Only problems with the update process itself should be filed at $OS_RELEASE:BUG_REPORT_URL$.Enabling this remote is done at your own risk.EncryptedEncrypted RAMErase all firmware update historyErasing…Exit after a small delayExit after the engine has loadedExport a firmware file structure to XMLExtract a firmware blob to imagesFILEFILE [DEVICE-ID|GUID]FILE-IN FILE-OUT [SCRIPT] [OUTPUT]FILENAMEFILENAME CERTIFICATE PRIVATE-KEYFILENAME DEVICE-ALT-NAME|DEVICE-ALT-IDFILENAME DEVICE-ALT-NAME|DEVICE-ALT-ID [IMAGE-ALT-NAME|IMAGE-ALT-ID]FILENAME DEVICE-IDFILENAME OFFSET DATA [FIRMWARE-TYPE]FILENAME [DEVICE-ID|GUID]FILENAME [FIRMWARE-TYPE]FILENAME-SRC FILENAME-DST [FIRMWARE-TYPE-SRC] [FIRMWARE-TYPE-DST]FILENAME|CHECKSUM1[,CHECKSUM2][,CHECKSUM3]FailedFailed to apply updateFailed to connect to daemonFailed to get pending devicesFailed to install firmware updateFailed to load local dbxFailed to load quirksFailed to load system dbxFailed to lockFailed to parse argumentsFailed to parse fileFailed to parse flags for --filterFailed to parse local dbxFailed to rebootFailed to set splash modeFailed to validate ESP contentsFilenameFilename SignatureFilename SourceFilename requiredFilter with a set of device flags using a ~ prefix to exclude, e.g. 'internal,~needs-reboot'Firmware Base URIFirmware Update D-Bus ServiceFirmware Update DaemonFirmware UtilityFirmware attestationFirmware is already blockedFirmware is not already blockedFirmware metadata has not been updated for %u day and may not be up to date.Firmware metadata has not been updated for %u days and may not be up to date.Firmware metadata last refresh: %s ago. Use --force to refresh again.Firmware updatesFirmware updates are not supported on this machine.Firmware updates are supported on this machine.Firmware updates disabled; run 'fwupdmgr unlock' to enableFlagsForce the action by relaxing some runtime checksForce the action ignoring all warningsFoundFull Disk Encryption DetectedFull disk encryption secrets may be invalidated when updatingGUIDGUIDsGet all device flags supported by fwupdGet all devices that support firmware updatesGet all enabled plugins registered with the systemGets details about a firmware fileGets the configured remotesGets the host security attributesGets the list of approved firmwareGets the list of blocked firmwareGets the list of updates for connected hardwareGets the releases for a deviceGets the results from the last updateHWIDS-FILEHardware is waiting to be repluggedHighHost Security EventsHost Security ID:IOMMUIOMMU device protection disabledIOMMU device protection enabledIdle…Ignore SSL strict checks when downloading filesIgnore firmware checksum failuresIgnore firmware hardware mismatch failuresIgnore validation safety checksIgnoring SSL strict checks, to do this automatically in the future export DISABLE_SSL_STRICT in your environmentInstall DurationInstall a firmware blob on a deviceInstall a firmware file on this hardwareInstall old version of signed system firmwareInstall old version of unsigned system firmwareInstall signed device firmwareInstall signed system firmwareInstall to parent device firstInstall unsigned device firmwareInstall unsigned system firmwareInstalling Firmware…Installing firmware update…Installing on %s…Installing this update may also void any device warranty.Intel BootGuardIntel BootGuard ACM protectedIntel BootGuard OTP fuseIntel BootGuard error policyIntel BootGuard verified bootIntel CET ActiveIntel CET EnabledIntel DCI debuggerIntel SMAPInternal deviceInvalidIs downgradeIs in bootloader modeIs upgradeIssueIssuesKEY,VALUEKernel is no longer taintedKernel is taintedKernel lockdown disabledKernel lockdown enabledKeyringLOCATIONLast modifiedLess than one minute remainingLicenceLinux Vendor Firmware Service (stable firmware)Linux Vendor Firmware Service (testing firmware)Linux kernelLinux kernel lockdownLinux swapList entries in dbxList supported firmware updatesList the available firmware typesLists files on the ESPLoading…LockedLowMEI manufacturing modeMEI overrideMEI versionManually enable specific pluginsMediumMetadata SignatureMetadata URIMetadata can be obtained from the Linux Vendor Firmware Service.Minimum VersionMismatched daemon and client, use %s insteadModifies a daemon configuration valueModifies a given remoteModify a configured remoteModify daemon configurationMonitor the daemon for eventsMounts the ESPNOTE: This program may only work correctly as rootNeeds a reboot after installationNeeds rebootNeeds shutdown after installationNew versionNo action specified!No downgrades for %sNo firmware IDs foundNo hardware detected with firmware update capabilityNo plugins foundNo releases availableNo remotes are currently enabled so no metadata is available.No remotes availableNo updates available for remaining devicesNo updates were appliedNot approvedNot foundNot supportedOKOK!Only show single PCR valueOnly use IPFS when downloading filesOnly version upgrades are allowedOutput in JSON formatOverride the default ESP pathPATHParse and show details about a firmware fileParsing dbx update…Parsing system dbx…PasswordPatch a firmware blob at a known offsetPayloadPendingPercentage completePerform operation?Please ensure you have the volume recovery key before continuing.Please enter a number from 0 to %u: Plugin dependencies missingPre-boot DMA protectionPre-boot DMA protection is disabledPre-boot DMA protection is enabledPrevious versionPrint the version numberPrint verbose debug statementsPriorityProceed with upload?ProprietaryQuery for firmware update supportREMOTE-IDREMOTE-ID KEY VALUERead a firmware blob from a deviceRead firmware from device into a fileRead firmware from one partition into a fileReading from %s…Reading…Rebooting…Refresh metadata from remote serverReinstall %s to %s?Reinstall current firmware on the deviceReinstall firmware on a deviceReinstalling %s with %s... Release BranchRelease FlagsRelease IDRemote IDReplace data in an existing firmware fileReport URIReported to remote serverRequired efivarfs filesystem was not foundRequired hardware was not foundRequires a bootloaderRequires internet connectionRestart now?Restart the daemon to make the change effective?Restarting device…Return all the hardware IDs for the machineRun `fwupdmgr get-upgrades` for more information.Run `fwupdmgr sync-bkc` to complete this action.Run the plugin composite cleanup routine when using install-blobRun the plugin composite prepare routine when using install-blobRunning kernel is too oldRuntime SuffixSPI BIOS DescriptorSPI BIOS regionSPI lockSPI writeSUBSYSTEM DRIVER [DEVICE-ID|GUID]Save a file that allows generation of hardware IDsSave device state into a JSON file between executionsSchedule installation for next reboot when possibleScheduling…Secure Boot disabledSecure Boot enabledSee %s for more information.Selected deviceSelected volumeSerial NumberSet the debugging flag during updateSets the list of approved firmwareShare firmware history with the developersShow all resultsShow client and daemon versionsShow daemon verbose information for a particular domainShow debugging information for all domainsShow debugging optionsShow devices that are not updatableShow extra debugging informationShow history of firmware updatesShow plugin verbose informationShow the calculated version of the dbxShow the debug log from the last attempted updateShow the information of firmware update statusShutdown now?Sign a firmware with a new keySign data using the client certificateSign the uploaded data with the client certificateSignatureSizeSome of the platform secrets may be invalidated when updating this firmware.SourceSpecify Vendor/Product ID(s) of DFU deviceSpecify the dbx database fileSpecify the number of bytes per USB transferSuccessSuccessfully activated all devicesSuccessfully disabled remoteSuccessfully downloaded new metadata: Successfully enabled and refreshed remoteSuccessfully enabled remoteSuccessfully installed firmwareSuccessfully modified configuration valueSuccessfully modified remoteSuccessfully refreshed metadata manuallySuccessfully updated device checksumsSuccessfully uploaded %u reportSuccessfully uploaded %u reportsSuccessfully verified device checksumsSummarySupportedSupported on remote serverSuspend-to-idleSuspend-to-ramSwitch branch from %s to %s?Switch the firmware branch on the deviceSync firmware versions to the host best known configurationSystem requires external power sourceTEXTTPM PCR0 reconstructionTPM PCR0 reconstruction is invalidTPM empty PCRsTPM v2.0TagTagsTaintedTargetTest a device using a JSON manifestThe LVFS is a free service that operates as an independent legal entity and has no connection with $OS_RELEASE:NAME$. Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices. All firmware is provided only by the original equipment manufacturer.The TPM PCR0 differs from reconstruction.The daemon has loaded 3rd party code and is no longer supported by the upstream developers!The device version did not match: got %s, expected %sThe firmware from %s is not supplied by %s, the hardware vendor.The system clock has not been set correctly and downloading files may fail.The vendor did not supply any release notes.There are no blocked firmware filesThere is no approved firmware.This device will be reverted back to %s when the %s command is performed.This firmware is provided by LVFS community members and is not provided (or supported) by the original hardware vendor.This package has not been validated, it may not work properly.This program may only work correctly as rootThis remote contains firmware which is not embargoed, but is still being tested by the hardware vendor. You should ensure you have a way to manually downgrade the firmware if the firmware update fails.This system has HSI runtime issues.This system has a low HSI security level.This tool allows an administrator to apply UEFI dbx updates.This tool allows an administrator to debug UpdateCapsule operation.This tool allows an administrator to query and control the fwupd daemon, allowing them to perform actions such as installing or downgrading firmware.This tool allows an administrator to use the fwupd plugins without being installed on the host system.This tool can only be used by the root userThis tool will read and parse the TPM event log from the system firmware.Transient failureTrusted metadataTrusted payloadTypeUEFI ESP partition not detected or configuredUEFI Firmware UtilityUEFI capsule updates not available or enabled in firmware setupUEFI dbx UtilityUEFI firmware can not be updated in legacy BIOS modeUEFI platform keyUEFI secure bootUnable to connect to serviceUnbind current driverUnblocking firmware:Unblocks a specific firmware from being installedUnencryptedUnknownUnknown DeviceUnlock the device to allow accessUnlockedUnlocks the device for firmware accessUnmounts the ESPUnset the debugging flag during updateUnsupported daemon version %s, client version is %sUntaintedUpdatableUpdate ErrorUpdate MessageUpdate StateUpdate failure is a known issue, visit this URL for more information:Update now?Update requires a rebootUpdate the stored cryptographic hash with current ROM contentsUpdate the stored device verification informationUpdate the stored metadata with current contentsUpdates all specified devices to latest firmware version, or all devices if unspecifiedUpdatingUpdating %s from %s to %s... Updating %s…Upgrade %s from %s to %s?Upload report now?Uploading firmware reports helps hardware vendors to quickly identify failing and successful updates on real devices.UrgencyUse fwupdmgr --help for helpUse fwupdtool --help for helpUse quirk flags when installing firmwareUser has been notifiedUsernameVID:PIDValidValidating ESP contents…VariantVendorVerifying…VersionWARNING:Waiting…Watch for hardware changesWrite firmware from file into deviceWrite firmware from file into one partitionWriting file:Writing…Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices.Your hardware may be damaged using this firmware, and installing this release may void any warranty with %s.Your system is set up to the BKC of %s.[CHECKSUM][DEVICE-ID|GUID][DEVICE-ID|GUID] [BRANCH][FILE FILE_SIG REMOTE-ID][FILENAME1] [FILENAME2][SMBIOS-FILE|HWIDS-FILE]Sign data using the client certificatedefaultfwupd TPM event log utilityfwupd plugins

Zerion Mini Shell 1.0