# Translation of Plugins - Prevent XSS Vulnerability - Stable (latest release) in English (Canada)
# This file is distributed under the same license as the Plugins - Prevent XSS Vulnerability - Stable (latest release) package.
msgid ""
msgstr ""
"PO-Revision-Date: 2018-12-04 22:56:21+0000\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Plural-Forms: nplurals=2; plural=n != 1;\n"
"X-Generator: GlotPress/2.4.0-alpha\n"
"Language: en_CA\n"
"Project-Id-Version: Plugins - Prevent XSS Vulnerability - Stable (latest release)\n"

#: admin/class-prevent-xss-vulnerability-about.php:146
msgid "On uploading  any image,  let's say services.png, WordPress creates the <strong>attachment post</strong> with the permalink of <strong>/services/</strong> and doesn't allow you to use that permalink to point your page. In this case, we comes up with this great solution."
msgstr "On uploading  any image,  let's say services.png, WordPress creates the <strong>attachment post</strong> with the permalink of <strong>/services/</strong> and doesn't allow you to use that permalink to point your page. In this case, we comes up with this great solution."

#: admin/class-prevent-xss-vulnerability-about.php:145
msgid "Media Post Permalink"
msgstr "Media Post Permalink"

#: admin/class-prevent-xss-vulnerability-about.php:136
msgid "It removes some meta data from the wordpress header so, your header keeps clean of useless information like <strong>shortlink</strong>, <strong>rsd_link</strong>, <strong>wlwmanifest_link</strong>, <strong>emoji_scripts</strong>, <strong>wp_embed</strong>, <strong>wp_json</strong>, <strong>emoji_styles</strong>, <strong>generator</strong> and so on."
msgstr "It removes some meta data from the WordPress header so, your header keeps clean of useless information like <strong>shortlink</strong>, <strong>rsd_link</strong>, <strong>wlwmanifest_link</strong>, <strong>emoji_scripts</strong>, <strong>wp_embed</strong>, <strong>wp_json</strong>, <strong>emoji_styles</strong>, <strong>generator</strong> and so on."

#: admin/class-prevent-xss-vulnerability-about.php:135
msgid "Remove Links and Scripts"
msgstr "Remove Links and Scripts"

#: admin/class-prevent-xss-vulnerability-about.php:126
msgid "Simply the easiest solution to add valid schema.org as a JSON script in the head of posts and pages. It provides you multiple <strong>SCHEMA</strong> types like Article, News Article, Organization and Website Schema."
msgstr "Simply the easiest solution to add valid schema.org as a JSON script in the head of posts and pages. It provides you multiple <strong>SCHEMA</strong> types like Article, News Article, Organization and Website Schema."

#: admin/class-prevent-xss-vulnerability-about.php:125
msgid "JSON Structuring Markup"
msgstr "JSON Structuring Markup"

#: admin/class-prevent-xss-vulnerability-about.php:116
msgid "Simply the easiest solution to add valid schema.org as a JSON script in the head of blog posts or articles. You can choose the schema either to show with the type of Article or NewsArticle from the settings page."
msgstr "Simply the easiest solution to add valid schema.org as a JSON script in the head of blog posts or articles. You can choose the schema either to show with the type of Article or NewsArticle from the settings page."

#: admin/class-prevent-xss-vulnerability-about.php:115
msgid "SCHEMA for Article"
msgstr "SCHEMA for Article"

#: admin/class-prevent-xss-vulnerability-about.php:106
msgid "Custom Permalinks helps you to make your permalinks customized for <em>individual</em> posts, pages, tags or categories. It will <strong>NOT</strong> apply whole permalink structures, or automatically apply a category's custom permalink to the posts within that category."
msgstr "Custom Permalinks helps you to make your permalinks customized for <em>individual</em> posts, pages, tags or categories. It will <strong>NOT</strong> apply whole permalink structures, or automatically apply a category's custom permalink to the posts within that category."

#: admin/class-prevent-xss-vulnerability-about.php:105
msgid "Custom Permalinks"
msgstr "Custom Permalinks"

#: admin/class-prevent-xss-vulnerability-about.php:96
msgid "Allows you to either define different Permalink Structure or define same Permalink Structure for default and Custom PostTypes, Taxonomies. Plugin automatically creates the user-friendly URLs as per your defined structured that can be edited from the single post/page."
msgstr "Allows you to either define different Permalink Structure or define same Permalink Structure for default and Custom PostTypes, Taxonomies. Plugin automatically creates the user-friendly URLs as per your defined structured that can be edited from the single post/page."

#: admin/class-prevent-xss-vulnerability-about.php:95
msgid "Permalinks Customizer"
msgstr "Permalinks Customizer"

#: admin/class-prevent-xss-vulnerability-about.php:86
msgid "Convert the paths(URLs) to relative instead of absolute. You can make <strong>Post</strong>, <strong>Category</strong>, <strong>Archive</strong>, <strong>Image</strong> URLs and <strong>Script</strong> and <strong>Style</strong> src as per your requirement. You can choose which you want to be relative from the settings Page."
msgstr "Convert the paths (URLs) to relative instead of absolute. You can make <strong>Post</strong>, <strong>Category</strong>, <strong>Archive</strong>, <strong>Image</strong> URLs and <strong>Script</strong> and <strong>Style</strong> src as per your requirement. You can choose which you want to be relative from the settings Page."

#: admin/class-prevent-xss-vulnerability-about.php:85
msgid "Make Paths Relative"
msgstr "Make Paths Relative"

#: admin/class-prevent-xss-vulnerability-about.php:76
msgid "Allows you apply <strong>HTTP Auth</strong> on your site. You can apply HTTP Authentication all over the site or only the admin pages. It helps to stop cralwing on your site while on development or persist the <strong>Brute Attacks</strong> by locking the Admin Pages."
msgstr "Allows you apply <strong>HTTP Auth</strong> on your site. You can apply HTTP Authentication all over the site or only the admin pages. It helps to stop cralwing on your site while on development or persist the <strong>Brute Attacks</strong> by locking the Admin Pages."

#: admin/class-prevent-xss-vulnerability-about.php:75
msgid "HTTP Auth"
msgstr "HTTP Auth"

#: admin/class-prevent-xss-vulnerability-about.php:68
msgid "Our List of Plugins provides the services which helps you to manage your site URLs(Permalinks), Prevent your site from XSS Attacks, Brute force attacks, increase your site visitors by adding Structured JSON Markup and so on."
msgstr "Our List of Plugins provides the services which helps you to manage your site URLs(Permalinks), Prevent your site from XSS Attacks, Brute force attacks, increase your site visitors by adding Structured JSON Markup and so on."

#: admin/class-prevent-xss-vulnerability-about.php:67
msgid "More from YAS Global"
msgstr "More from YAS Global"

#: admin/class-prevent-xss-vulnerability-about.php:58
msgid "To support future development and help to make it even better by just leaving a <a href=\"%s\" title=\"Permalinks Customizer Rating\" target=\"_blank\">%s</a> rating with a nice message to me :)"
msgstr "To support future development and help to make it even better by just leaving a <a href=\"%s\" title=\"Permalinks Customizer Rating\" target=\"_blank\">%s</a> rating with a nice message to me :)"

#: admin/class-prevent-xss-vulnerability-about.php:57
msgid "Thank you for choosing Prevent XSS Vulnerability! I hope, that this plugin helps you to reduce the XSS Attacks on your site."
msgstr "Thank you for choosing Prevent XSS Vulnerability! I hope, that this plugin helps you to reduce the XSS Attacks on your site."

#: admin/class-prevent-xss-vulnerability-about.php:28
msgid "Check it out"
msgstr "Check it out"

#: admin/class-prevent-xss-vulnerability-reflected-settings.php:175
msgid "Save Changes"
msgstr "Save Changes"

#: admin/class-prevent-xss-vulnerability-settings.php:58
msgid "Mutated XSS happens, when the attacker injects something that is seemingly safe, but rewritten and modified by the browser, while parsing the markup. This makes it extremely hard to detect or sanitize within the websites application logic. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters on parameters to CSS font-family."
msgstr "Mutated XSS happens, when the attacker injects something that is seemingly safe, but rewritten and modified by the browser, while parsing the markup. This makes it extremely hard to detect or sanitize within the websites application logic. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters on parameters to CSS font-family."

#: admin/class-prevent-xss-vulnerability-settings.php:56
msgid "Mutated Cross-site Scripting"
msgstr "Mutated Cross-site Scripting"

#: admin/class-prevent-xss-vulnerability-settings.php:53
msgid "The persistent (or stored) XSS vulnerability is a more devastating variant of a cross-site scripting flaw: it occurs when the data provided by the attacker is saved by the server, and then permanently displayed on \"normal\" pages returned to other users in the course of regular browsing, without proper HTML escaping. A classic example of this is with online message boards where users are allowed to post HTML formatted messages for other users to read."
msgstr "The persistent (or stored) XSS vulnerability is a more devastating variant of a cross-site scripting flaw: it occurs when the data provided by the attacker is saved by the server, and then permanently displayed on \"normal\" pages returned to other users in the course of regular browsing, without proper HTML escaping. A classic example of this is with online message boards where users are allowed to post HTML formatted messages for other users to read."

#: admin/class-prevent-xss-vulnerability-settings.php:51
msgid "Persistent Cross-site Scripting"
msgstr "Persistent Cross-site Scripting"

#: admin/class-prevent-xss-vulnerability-settings.php:48
msgid "Please make sure to Check the <a href=\"/wp-admin/admin.php?page=prevent-xss-vulnerability-reflected-settings\" title=\"Reflected XSS\">Reflected XSS</a> Settings Page to allow it work."
msgstr "Please make sure to check the <a href=\"/wp-admin/admin.php?page=prevent-xss-vulnerability-reflected-settings\" title=\"Reflected XSS\">Reflected XSS</a> Settings page to allow it work."

#: admin/class-prevent-xss-vulnerability-settings.php:47
msgid "A reflected attack is typically delivered via email or a neutral web site. The bait is an innocent-looking URL, pointing to a trusted site but containing the XSS vector. If the trusted site is vulnerable to the vector, clicking the link can cause the victim's browser to execute the injected script."
msgstr "A reflected attack is typically delivered via email or a neutral web site. The bait is an innocent-looking URL, pointing to a trusted site but containing the XSS vector. If the trusted site is vulnerable to the vector, clicking the link can cause the victim's browser to execute the injected script."

#: admin/class-prevent-xss-vulnerability-settings.php:46
msgid "The non-persistent (or reflected) cross-site scripting vulnerability is by far the most basic type of web vulnerability. These holes show up when the data provided by a web client, most commonly in HTTP query parameters (e.g. HTML form submission), is used immediately by server-side scripts to parse and display a page of results for and to that user, without properly sanitizing the request."
msgstr "The non-persistent (or reflected) cross-site scripting vulnerability is by far the most basic type of web vulnerability. These holes show up when the data provided by a web client, most commonly in HTTP query parameters (e.g. HTML form submission), is used immediately by server-side scripts to parse and display a page of results for and to that user, without properly sanitizing the request."

#: admin/class-prevent-xss-vulnerability-settings.php:44
msgid "Reflected Cross-site Scripting"
msgstr "Reflected Cross-site Scripting"

#: admin/class-prevent-xss-vulnerability-settings.php:41
msgid "Cross-site scripting carried out on websites accounted for roughly <strong>84%</strong> of all security vulnerabilities documented by Symantec as of <em>2007</em>. <strong>Bug bounty company HackerOne</strong> in <em>2017</em> reported that XSS is still a major threat vector. XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner."
msgstr "Cross-site scripting carried out on websites accounted for roughly <strong>84%</strong> of all security vulnerabilities documented by Symantec as of <em>2007</em>. <strong>Bug bounty company HackerOne</strong> in <em>2017</em> reported that XSS is still a major threat vector. XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner."

#: admin/class-prevent-xss-vulnerability-settings.php:40
msgid "Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy."
msgstr "Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy."

#: admin/class-prevent-xss-vulnerability-settings.php:34
msgid "If you are running <strong>WooCommerce</strong> Site so, please go through with all the steps of the Product Purchase (Cart, Checkout etc) to make sure that your Products can be purchased without having any diffuclty to customers."
msgstr "If you are running <strong>WooCommerce</strong> Site so, please go through with all the steps of the Product Purchase (Cart, Checkout etc) to make sure that your Products can be purchased without having any diffuclty to customers."

#: admin/class-prevent-xss-vulnerability-settings.php:33
msgid "After Configuring the Settings Please check the pages randomly to verify that your site is working properly."
msgstr "After Configuring the Settings Please check the pages randomly to verify that your site is working properly."

#: admin/class-prevent-xss-vulnerability-settings.php:28
msgid "Cross-site scripting"
msgstr "Cross-site scripting"

#: admin/class-prevent-xss-vulnerability-admin.php:138
msgid "<a href=\"%s\" title=\"Settings\">Settings</a>"
msgstr "<a href=\"%s\" title=\"Settings\">Settings</a>"

#: admin/class-prevent-xss-vulnerability-admin.php:134
msgid "<a href=\"%s\" title=\"Contact\">Contact</a>"
msgstr "<a href=\"%s\" title=\"Contact\">Contact</a>"

#: admin/class-prevent-xss-vulnerability-admin.php:130
msgid "<a href=\"%s\" title=\"About\">About</a>"
msgstr "<a href=\"%s\" title=\"About\">About</a>"

#: admin/class-prevent-xss-vulnerability-admin.php:106
msgid "Prevent XSS Vulnerability version %s by <a href=\"%s\" title=\"YAS Global Website\" target=\"_blank\">Sami Ahmed Siddiqui</a> - <a href=\"%s\" title=\"Support forums\" target=\"_blank\">Support forums</a> - Follow on Twitter: <a href=\"%s\" title=\"Follow Sami Ahmed Siddiqui on Twitter\" target=\"_blank\">Sami Ahmed Siddiqui</a>"
msgstr "Prevent XSS Vulnerability version %s by <a href=\"%s\" title=\"YAS Global Website\" target=\"_blank\">Sami Ahmed Siddiqui</a> - <a href=\"%s\" title=\"Support forums\" target=\"_blank\">Support forums</a> - Follow on Twitter: <a href=\"%s\" title=\"Follow Sami Ahmed Siddiqui on Twitter\" target=\"_blank\">Sami Ahmed Siddiqui</a>"

#. Author URI of the plugin
msgid "https://www.yasglobal.com/web-design-development/wordpress/prevent-xss-vulnerability/"
msgstr "https://www.yasglobal.com/web-design-development/wordpress/prevent-xss-vulnerability/"

#. Author of the plugin
msgid "Sami Ahmed Siddiqui"
msgstr "Sami Ahmed Siddiqui"

#. Description of the plugin
msgid "Allow you to make your site prevent from the XSS Vulnerability."
msgstr "Allow you to make your site prevent from the XSS Vulnerability."

#. Plugin URI of the plugin
msgid "https://wordpress.org/plugins/prevent-xss-vulnerability/"
msgstr "https://en-ca.wordpress.org/plugins/prevent-xss-vulnerability/"

#. Plugin Name of the plugin
#: admin/class-prevent-xss-vulnerability-about.php:27
msgid "Prevent XSS Vulnerability"
msgstr "Prevent XSS Vulnerability"

#: admin/class-prevent-xss-vulnerability-reflected-settings.php:25
msgid "You do not have sufficient permissions to access this page."
msgstr "You do not have sufficient permissions to access this page."