Filipino Translation of "OWASP ZAP- Vulnerabilities"- Translated 1,105 Words
Project Details
The OWASP (ZAP) Zed Attack Proxy is a great tool for security testing as it can help you find the vulnerabilities in the security of web applications. It can be used while testing and/or developing applications.
Links related to the translation
- Github Repository: https://github.com/zaproxy/zaproxy
- Project's link in Crowdin: https://crowdin.com/project/owasp-zap
- Project's link for Filipino Translation: https://crowdin.com/project/owasp-zap/fil#
- My Crowdin account link: https://crowdin.com/profile/zararina/activity
Source Language
English
Translated Language
I translated in: Filipino
The Videos: vulnerabilities.xml file that I am translating has a total of 19,563 words and 19,563 words (100 percent) have been translated on the said file.
Number Of Words
I translated some words in the OWASP ZAP project, Part 22. I translated 1,105 words.
Proofread Words
4,490 words have been proofread in vulnerabilities.xml file.
Previous translation on the same project
Part 1, Part 2, Part 3, Part 4, Part 5, Part 6, Part 7, Part 8, Part 9, Part 10, Part 11, Part 12, Part 13, Part 14, Part 15, Part 16, Part 17, Part 18, Part 19, Part 20
, Part 21
Number of words translated on the project before this report (if any):
18,458 words for Videos: vulnerabilities.xml file of the OWASP ZAP project.
Before
Below is a screenshot showing that it was 18,458 words translated for vulnerabilities.xml file.

After
Below is a screenshot showing that it is now 19,563 words translated for vulnerabilities.xml file.

Screenshot of my Crowdin Profile Page.

Screenshot of my Crowdin Activity Page with some of my recent translations for this project.

Some of my translations in texts form.
Translation File Language Time
Magtalaga ng isang bagong pansamantalang password sa halip na ibunyag ang orihinal na password. vulnerabilities.xml Filipino 04:26 AM
Huwag kailanmang pahintulutan ang gumagamit na kontrolin kung saang e-mail address ipapadala ang bagong password sa mekanismo sa pagbawi ng password. vulnerabilities.xml Filipino 04:25 AM
Kinakailangan na masagot ng maayos ng gumagamit ang tanong sa seguridad bago ang pag-reset ng kanilang password at pagpapadala ng bagong password sa email address na nakatala. vulnerabilities.xml Filipino 04:23 AM
Huwag paganahin ang pag-andar ng pagbawi ng password pagkatapos ng ilang (maliit) na bilang ng hindi tamang mga hula. vulnerabilities.xml Filipino 04:19 AM
Siguraduhin na mayroong pagpigil sa bilang ng hindi tamang mga sagot sa isang tanong sa seguridad. vulnerabilities.xml Filipino 04:16 AM
Siguraduhin na ang lahat ng input na ibinigay ng gumagamit sa mekanismo ng pagbawi ng password ay ganap na nasala at napatunayan Huwag gumamit ng karaniwang mahina na mga tanong sa seguridad at gumamit ng iba't-ibang mga katanungan sa seguridad. vulnerabilities.xml Filipino 04:12 AM
Ang mga sistema ng pagbawi ng password ay maaaring makompromiso sa pamamagitan ng paggamit ng malupit na pwersa na mga pag-atake, likas na mga kahinaan ng sistema, o madaling mahulaan ang lihim na mga tanong. vulnerabilities.xml Filipino 04:07 AM
Ito ay nangyayari kapag ang kinakailangang impormasyon upang mapatunayan ang pagkakakilanlan ng gumagamit para sa pagbawi ay alinman sa madaling hulaan o maaaring dayain. vulnerabilities.xml Filipino 04:03 AM
Posted on Utopian.io - Rewarding Open Source Contributors
I very much want to learn Filipino
perfect campers rarely have anyone else understood this extraordinary is really a very remarkable project good luck always
Thank you for the contribution. It has been approved.
You can contact us on Discord.
[utopian-moderator]
Thanks. :)
You have collected your daily Power Up! This post received an upvote worth of 0.42$.

Learn how to Power Up Smart here!
Hey @zararina I am @utopian-io. I have just upvoted you!
Achievements
Suggestions
Get Noticed!
Community-Driven Witness!
I am the first and only Steem Community-Driven Witness. Participate on Discord. Lets GROW TOGETHER!
Up-vote this comment to grow my power and help Open Source contributions like this one. Want to chat? Join me on Discord https://discord.gg/Pc8HG9x