Server IP : 192.168.23.10  /  Your IP : 18.221.116.226
Web Server : Apache
System : Linux echo.premieradvertising.com 5.14.0-362.8.1.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 7 14:54:22 EST 2023 x86_64
User : rrrallyteam ( 1049)
PHP Version : 8.1.31
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF
Directory (0755) :  /usr/share/locale/gwi/../ceb/../mr/../mic/../sma/../ay/../sms/../zbl/../en_GB/LC_MESSAGES/

[  Home  ][  C0mmand  ][  Upload File  ]

Current File : //usr/share/locale/gwi/../ceb/../mr/../mic/../sma/../ay/../sms/../zbl/../en_GB/LC_MESSAGES/fwupd.mo
��0�C3(D,)D
VDdDvD�D�D�D�D�D�D
EE+E;EYEvE
�E�E�E�E�E�E
FF+F
<F JFkF~F�F	�F>�F�FGG*GHGH^GZ�GHH
H HY/H_�H�H4�H/IDIYIoI!{I�I�I�I(�I:JQJbJsJ'�J�J�J*�JKK:KFKaK7xK=�K#�K-L@L`LqL(�L6�L�LM"M@MSM%fM�M�M�M�M#�MJNDRN7�N2�NRO9UO0�O?�ODP@EPD�P-�PG�PAAQH�Q�Q �QRR0RFR1_R�R�R�R�R�R�R�R/
S:SMS=TS�Sa�S
T	T4T"PTsT*{T�T
�T
�T�T�T�T
�T'U0UBUVU:uU�U�U�U,�U
VV$V3V?VQVbVnV�V*�V�V	�V
�V�V�V5W!LW-nW�W �W3�WXX%X36XjX/�X/�X.�XY(Y*HY,sY5�Y�Y;�Y(Z=Z-\Z0�Z,�Z(�Z,[3>[,r[�[�[�[�[�[�[#\2;\.n\ �\�\#�\]$]'A]Wi]$�]C�]7*^b^'�^?�^;�^$_*_#F_ j_�_�_�_�_�_�_:�_&9```
i`w`3~`�`�`�`�`�`aE/aua.}b	�b
�b��bMcYc!ec
�c�c �c'�c!�cdd1d :d&[dD�d�d$�d�deA2e*te�e�eA�e�ef!9f[ftf�f�f�f�f"�f*g0gJg [g|g�g�g�g�g�g�g\�ghWh�hn�hDiR]i�iN�ij&jDj[j`yj�j�j�jkS5k�k�k�k��kul3�l/�l:�l&%mLmfmym0m&�m�m�m=�m9nHn
Wnbnqn'�n-�n2�no"'oJo!fo"�o!�o/�o�o%p
Bp#Mpqpvp'�p:�p�p
qqq_"q �q�q�q/�q!�q*rHrphr�r&�rs:#s'^s:�si�s-+t/Yt�t�t�t �t u(u4?utu�u9�u�u�u�uv4vyQv�v�v�vw`4w�w	�w�w�w|�w]xrx*�x �xO�x#y
CyyNy�y�y�y �y+z>?z~z�z
�z�z	�z�z�z�z
{"{*{
3{A{`{h{�~{��{�|��|
�}/�}0�}�}~
"~'-~U~i~"�~!�~�~�~
*15FWn{ �e��
�+�2�E�@R�5��ɀـ
�,��%#�I�a�|�����!Ł�!��"�7�L�b�4t�����=Ђ�#�8�*M�x���	��
��������ȃ7�!�=�S�q�~���,����ӄ�'��"�*�>�Q�vd�ۅA�$0�U�r�������#Ά"�l�:����·����-�G�e�!q�	����	��"��ވ%��,"�O�
b�m�z�#����(��'�
6�
D�	O�-Y�)��
����֊*��2�H�e�0r���M��+�2�rP�1Ì,��@"�@c�"��Ǎߍ��
�#�:�N�^�g�	}���!��2����3�
Q�_�t�������ُ�
��!�)�<�$Z��"����(ΐ*��"�3�7S�*����#͑ � �&3�1Z�.��
��ɒ&�2�	B�L�[�L`���*��ߓ,��*�1�"9�\�&y�)��ʔ�)�0�(M�%v�@��&ݕ%�*�	2�
<�J�e�u�����?���	��(5�2^���-��Cט%�A�oF���"Ι$��1�D�S�\�e�z���#��������mښsH�7��}�ur�)�Z�[m�5ɞ@��K@�H��[՟F1�Vx�,Ϡ��#�?�I^�w��> �,_����-V�#��)��<ңC��S�f�fP����u=�+��Iߦ)�;�@�Q�a�f�.��-��ާ��V�En���?Ϩ�4 �U�g�x�����ĩ1٩$�0�&<�c�k�!z���&��̪<ݪ&�A�3R�	��	��������ëEЫ�"�>;�1z�0��Wݬ5�>�\�k�=��uí9�A�Q�g�(����Ůή֮ܮ�������*�2�
N�Y�:t�$��+ԯ
�
����ٰ{��l�'|���
����ϲ��
�'�?�H�)b�����:������
�+(�,T�
��������ʵ���
�$�5�G�V�f�����
��Ŷ߶����
+�9�V�
g� u�������	ӷ>ݷ�,�B�U�s�H��ZҸ-�9�
@�K�YZ�_���4%�Z�o�����!��Ⱥͺ�(
�:3�n����'��ѻ�*�6�:�W�c�~�7��=ͼ#�-/�]�}���(��6н�#�":�]�p�%������־�#�J$�Do�7��2�R�9r�0��?�D�@b�D��-�G�A^�H���� ���4�M�c�1|�������������/'�W�j�=q���a��'�	.�48�"m���*����
��
�������
�'%�M�_�s�:��������,��
#�1�A�P�\�n������*����	��
�����53�!i�-���� ��3���1�B�3S���/��/��.��,�(<�*e�,��5����;	�E�Z�-y�0��,��(�,.�3[�,����������	��#4�2X�.�� ����#���$9�'^�W��$��C�7G��'��?��;�A�G�#c� ��������������:�&V�}�
����3�����������5�EL���.��	��
�����j�v�!��
���� ��'��!�3�8�N� W�&x�D����$���6�AO�*������A���8�!V�x�����������"��*"�M�g� x��������������\�ht���n��a�Rz���N��1�C�a�x�`������3�SR������������3��/��:�&B�i�����0��&������=�V�e�
t����'��-��3��*�"E�h�!��"��!��/���%:�
`�#k�����'��:���
�)�/�_@� ������/��!�*;�f�p����&	�0�:A�'|�:��i��-I�/w������� � %�F�4]�����9������4�R�yo������5�`R���	������|��{���*�� ��O��A�
a�yl������� �+1�>]�����
����	�������(�@�H�
Q�_�~�������������
��/��0���*�
@�'K�s���"��!������
=�H�O�S�d�u�����!��e��-�
<�J�Q�d�@q�5������
�,�%B�h���������!���!�5�A�V�k���4������=��.�C�X�*m�����	��
����������7�!;�]�s�������,����	�'�:�B�J�^�q�v����A�$P�u��������#�"�l6�:�����'�0�9�N�h���!��	����	�"���%�,C�p�
������#���(�
�,�H�
W�
e�	p�-z�)��
����*	�4�T�j���0���M�+(�T�rr�1�,�AD�A��"����
,�#:�^�r�����	����!��2�03A
u������

!+M`$~�"��(�*FW7w*��#�  6&W1~.�
��&23	fpL��*�,!NU"]�&�)��
)*T(q%�@�&%(N	V
`n�����c	-	<	(Y	2�	�	-�	C�	%?
e
oj
�
"�
$:Uhw����#����m�sl7�}u�)Z6[�5�@#KdH�[�FUV�,� #?cI�w�>D,���-z#�)�<�C3�wg
fu��ub+�IN`ev��.�-�+V<E��?�44Ez�����1�$0U&a��!��&��<&?f3w	�	�����E�;G>`1�0�WZc��=�u�^fv�(�����  $ + 8 @ O W 
s ~ :� $� +� 
%!
3!�>!��!{�"l4#'�#�#
�#�#�#$)$2$L$d$m$)�$�$�$&�$�$�$%bJ�����
������X��xY|�t{",z�Se�Lh�)G�w���K���:'dR���c�y���X2�@�`&��PBO��V
D�k�_W�����h]�����u���~�$:��pO���GoPul�s�/$yo�G ��v���9�a�4�K3p2���N�c�S���*r�-������� ;		�r~0�dI6"|������pZ�t�����j{m�fM���;2��Q	������qZ�F$#T�[�*L����C��������>��������-��H&�
�	��!�����.k��@���sD�����K��/��=.R�!D��9�?��R�
���dIH�+,���&&��n�fM#bn�+9��i�gi�%�)VP���n�7����`gj"8q�4�\�'e��J�1
<���eF��a�\�X,b;vNr+�w��
��u57����B��V���h�{����������,���4%�o���l).�/��M]F"�������c��3�E��}�E�6Z�(w��6�U�T��/�-��W�����?��Lj>8�x���Y=�A�8�0�<�m'���`�3(=!�*[W�$�TJ�O�_Y����z�lz���H�U~��1��}��A�i� ����q<�%]��gI����})Q������:7�0N���������B0C .5E^(%���x�fSQt#?�@>5���!���|��Us�����Ca��
#����^��^v1�'-[�+����\*������y�k����_���A��m�(����
%.0f minute remaining%.0f minutes remaining%s BMC Update%s Battery Update%s CPU Microcode Update%s Camera Update%s Configuration Update%s Consumer ME Update%s Controller Update%s Corporate ME Update%s Device Update%s Display Update%s Dock Update%s Drive Update%s Embedded Controller Update%s Fingerprint Reader Update%s Flash Drive Update%s GPU Update%s Graphics Tablet Update%s Keyboard Update%s ME Update%s Mouse Update%s Network Interface Update%s SSD Update%s Storage Controller Update%s System Update%s TPM Update%s Thunderbolt Controller Update%s Touchpad Update%s USB Dock Update%s USB Receiver Update%s Update%s and all connected devices may not be usable while updating.%s appeared: %s%s changed: %s → %s%s disappeared: %s%s is not currently updatable%s manufacturing mode%s must remain connected for the duration of the update to avoid damage.%s must remain plugged into a power source for the duration of the update to avoid damage.%s override%s v%s%s version%u day%u days%u device has a firmware upgrade available.%u devices have a firmware upgrade available.%u device is not the best known configuration.%u devices are not the best known configuration.%u hour%u hours%u local device supported%u local devices supported%u minute%u minutes%u second%u seconds%u%% (threshold %u%%)(obsoleted)A TPM PCR is now an invalid valueA single GUIDGUIDAMD Firmware Replay ProtectionAMD Firmware Write ProtectionAMD Secure Processor Rollback ProtectionARCHIVE FIRMWARE METAINFO [FIRMWARE] [METAINFO] [JCATFILE]Action Required:Activate devicesActivate pending devicesActivate the new firmware on the deviceActivating firmware updateActivating firmware update forAdds devices to watch for future emulationAgeAgree and enable the remote?Alias to %sAll TPM PCRs are now validAll TPM PCRs are validAll devices are prevented from update by system inhibitAll devices of the same type will be updated at the same timeAllow downgrading firmware versionsAllow reinstalling existing firmware versionsAllow switching firmware branchAlternate branchAn update is in progressAn update requires a reboot to complete.An update requires the system to shutdown to complete.Answer yes to all questionsApply firmware updatesApply update even when not advisedApply update filesApplying update…Approved firmware:Approved firmware:Ask again next time?Asks the daemon to quitAttach to firmware modeAuthenticating…Authentication details are requiredAuthentication is required to downgrade the firmware on a removable deviceAuthentication is required to downgrade the firmware on this machineAuthentication is required to fix a host security issueAuthentication is required to modify BIOS settingsAuthentication is required to modify a configured remote used for firmware updatesAuthentication is required to modify daemon configurationAuthentication is required to read BIOS settingsAuthentication is required to set the list of approved firmwareAuthentication is required to sign data using the client certificateAuthentication is required to switch to the new firmware versionAuthentication is required to undo the fix for a host security issueAuthentication is required to unlock a deviceAuthentication is required to update the firmware on a removable deviceAuthentication is required to update the firmware on this machineAuthentication is required to update the stored checksums for the deviceAutomatic ReportingAutomatically upload every time?BIOS Firmware UpdatesBIOS Rollback ProtectionBIOS firmware updatesBIOS rollback protectionBIOS updates delivered via LVFS or Windows UpdateBUILDER-XML FILENAME-DSTBYTESBatteryBind new kernel driverBlocked firmware files:Blocked versionBlocking firmware:Blocks a specific firmware from being installedBootloader VersionBranchBuild a cabinet archive from a firmware blob and XML metadataBuild a firmware fileCPU Microcode must be updated to mitigate against various information-disclosure security issues.CancelCancelledCannot apply as dbx update has already been applied.Cannot apply updates on live mediaChangedChecks cryptographic hash matches firmwareChecksumChoose branchChoose deviceChoose firmwareChoose releaseChoose the ESP:Choose volumeClears the results from the last updateCommand not foundCommunity supportedConfiguration Change SuggestedConfiguration is only readable by the system administratorConvert a firmware fileCreatedCriticalCryptographic hash verification is availableCurrent ValueCurrent versionDEVICE-ID|GUIDDFU UtilityDebugging OptionsDecompressing…DescriptionDetach to bootloader modeDetailsDeviate from the best known configuration?Device FlagsDevice IDDevice added:Device already existsDevice battery power is too lowDevice battery power is too low (%u%%, requires %u%%)Device can recover flash failuresDevice cannot be used while the lid is closedDevice changed:Device emulation is not enabled.Device firmware is required to have a version checkDevice is emulatedDevice is in useDevice is lockedDevice is required to install all provided releasesDevice is unreachableDevice is unreachable, or out of wireless rangeDevice is usable for the duration of the updateDevice is waiting for the update to be appliedDevice removed:Device requires AC power to be connectedDevice requires a display to be plugged inDevice requires a software license to updateDevice software updates are provided for this device.Device stages updatesDevice supports switching to a different branch of firmwareDevice update methodDevice update needs activationDevice will backup firmware before installingDevice will not re-appear after update completesDevices that have been updated successfully:Devices that were not updated correctly:Devices with no available firmware updates: Devices with the latest available firmware version:Did not find any devices with matching GUIDsDisabledDisabled fwupdate debuggingDisables a given remoteDisplay versionDistributionDo not check for old metadataDo not check for unreported historyDo not check if download remotes should be enabledDo not check or prompt for reboot after updateDo not include log domain prefixDo not include timestamp prefixDo not perform device safety checksDo not prompt for devicesDo not prompt to fix security issuesDo not search the firmware when parsingDo not turn off your computer or remove the AC adaptor while the update is in progress.Do not write to the history databaseDo you understand the consequences of changing the firmware branch?Do you want to disable this feature for future updates?Do you want to enable it now?Do you want to refresh this remote now?Do you want to upload reports automatically for future updates?Don't prompt for authentication (less details may be shown)Done!Downgrade %s from %s to %s?Downgrades the firmware on a deviceDowngrading %s from %s to %s... Downgrading %s…Download a fileDownloading…Dump SMBIOS data from a fileDurationESP specified was not validEach system should have tests to ensure firmware security.Emulate a device using a JSON manifestEmulatedEmulated hostEnableEnable firmware update support on supported systemsEnable new remote?Enable this remote?EnabledEnabled fwupdate debuggingEnabled if hardware matchesEnables a given remoteEnabling firmware updates for the BIOS allows fixing security issues.Enabling this functionality is done at your own risk, which means you have to contact your original equipment manufacturer regarding any problems caused by these updates. Only problems with the update process itself should be filed at $OS_RELEASE:BUG_REPORT_URL$.Enabling this remote is done at your own risk.EncryptedEncrypted RAMEncrypted RAM makes it impossible for information that is stored in device memory to be read if the memory chip is removed and accessed.End of lifeEnumerationErase all firmware update historyErasing…Exit after a small delayExit after the engine has loadedExport a firmware file structure to XMLExtract a firmware blob to imagesFILEFILE [DEVICE-ID|GUID]FILENAMEFILENAME CERTIFICATE PRIVATE-KEYFILENAME DEVICE-ALT-NAME|DEVICE-ALT-IDFILENAME DEVICE-ALT-NAME|DEVICE-ALT-ID [IMAGE-ALT-NAME|IMAGE-ALT-ID]FILENAME DEVICE-IDFILENAME OFFSET DATA [FIRMWARE-TYPE]FILENAME [DEVICE-ID|GUID]FILENAME [FIRMWARE-TYPE]FILENAME-SRC FILENAME-DST [FIRMWARE-TYPE-SRC] [FIRMWARE-TYPE-DST]FILENAME|CHECKSUM1[,CHECKSUM2][,CHECKSUM3]FailedFailed to apply updateFailed to connect to Windows service, please ensure it's running.Failed to connect to daemonFailed to get pending devicesFailed to install firmware updateFailed to load local dbxFailed to load quirksFailed to load system dbxFailed to lockFailed to parse argumentsFailed to parse fileFailed to parse flags for --filterFailed to parse flags for --filter-releaseFailed to parse local dbxFailed to rebootFailed to set front-end featuresFailed to set splash modeFailed to validate ESP contentsFalseFilenameFilename SignatureFilename SourceFilename requiredFilter with a set of device flags using a ~ prefix to exclude, e.g. 'internal,~needs-reboot'Filter with a set of release flags using a ~ prefix to exclude, e.g. 'trusted-release,~trusted-metadata'Firmware AttestationFirmware Attestation checks device software using a reference copy, to make sure that it has not been changed.Firmware BIOS DescriptorFirmware BIOS Descriptor protects device firmware memory from being tampered with.Firmware BIOS RegionFirmware BIOS Region protects device firmware memory from being tampered with.Firmware Base URIFirmware Update D-Bus ServiceFirmware Update DaemonFirmware Updater VerificationFirmware Updater Verification checks that software used for updating has not been tampered with.Firmware UpdatesFirmware UtilityFirmware Write ProtectionFirmware Write Protection LockFirmware Write Protection protects device firmware memory from being tampered with.Firmware attestationFirmware is already blockedFirmware is not already blockedFirmware metadata has not been updated for %u day and may not be up to date.Firmware metadata has not been updated for %u days and may not be up to date.Firmware updatesFirmware updates are not supported on this machine.Firmware updates are supported on this machine.Firmware updates disabled; run 'fwupdmgr unlock' to enableFix a specific host security attributeFix reverted successfullyFixed successfullyFlagsForce the action by relaxing some runtime checksForce the action ignoring all warningsFoundFull Disk Encryption DetectedFull disk encryption secrets may be invalidated when updatingFused PlatformFused platformGUIDGUIDsGUID|DEVICE-IDGet BIOS settingsGet all device flags supported by fwupdGet all devices that support firmware updatesGet all enabled plugins registered with the systemGet device report metadataGets details about a firmware fileGets the configured remotesGets the host security attributesGets the list of approved firmwareGets the list of blocked firmwareGets the list of updates for connected hardwareGets the releases for a deviceGets the results from the last updateHWIDS-FILEHardware is waiting to be repluggedHighHost Security EventsHost Security ID (HSI) is not supportedHost Security ID attributes uploaded successfully, thanks!Host Security ID:INHIBIT-IDIOMMUIOMMU ProtectionIOMMU Protection prevents connected devices from accessing unauthorized parts of system memory.IOMMU device protection disabledIOMMU device protection enabledIdle…Ignore SSL strict checks when downloading filesIgnore firmware checksum failuresIgnore firmware hardware mismatch failuresIgnore validation safety checksIgnoring SSL strict checks, to do this automatically in the future export DISABLE_SSL_STRICT in your environmentInhibit ID is %s.Inhibit the system to prevent upgradesInstall DurationInstall a firmware file in cabinet format on this hardwareInstall a raw firmware blob on a deviceInstall a specific firmware file on all devices that matchInstall a specific firmware on a device, all possible devices will also be installed once the CAB matchesInstall old version of signed system firmwareInstall old version of unsigned system firmwareInstall signed device firmwareInstall signed system firmwareInstall to parent device firstInstall unsigned device firmwareInstall unsigned system firmwareInstalling Firmware…Installing a specific release is explicitly requiredInstalling firmware update…Installing on %s…Installing this update may also void any device warranty.IntegerIntel BootGuardIntel BootGuard ACM ProtectedIntel BootGuard ACM protectedIntel BootGuard Error PolicyIntel BootGuard Error Policy ensures the device does not continue to start if its device software has been tampered with.Intel BootGuard FuseIntel BootGuard OTP fuseIntel BootGuard Verified BootIntel BootGuard error policyIntel BootGuard prevents unauthorized device software from operating when the device is started.Intel BootGuard verified bootIntel CETIntel CET ActiveIntel CET EnabledIntel Control-Flow Enforcement Technology detects and prevents certain methods for running malicious software on the device.Intel GDS MitigationIntel GDS mitigationIntel Management Engine Manufacturing ModeIntel Management Engine OverrideIntel Management Engine Override disables checks for device software tampering.Intel Management Engine VersionIntel SMAPIntel Supervisor Mode Access Prevention ensures critical parts of device memory are not accessed by less secure programs.Internal deviceInvalidInvalid argumentsInvalid arguments, expected GUIDInvalid arguments, expected an AppStream IDInvalid arguments, expected at least ARCHIVE FIRMWARE METAINFOIs downgradeIs in bootloader modeIs upgradeIssueIssuesKEY,VALUEKernel is no longer taintedKernel is taintedKernel lockdown disabledKernel lockdown enabledKeyringLOCATIONLast modifiedLess than one minute remainingLicenseLinux Kernel LockdownLinux Kernel Lockdown mode prevents administrator (root) accounts from accessing and changing critical parts of system software.Linux Kernel Swap temporarily saves information to disk as you work. If the information is not protected, it could be accessed by someone if they obtained the disk.Linux Kernel VerificationLinux Kernel Verification makes sure that critical system software has not been tampered with. Using device drivers which are not provided with the system can prevent this security feature from working correctly.Linux SwapLinux Vendor Firmware Service (stable firmware)Linux Vendor Firmware Service (testing firmware)Linux kernelLinux kernel lockdownLinux swapList EFI variables with a specific GUIDList entries in dbxList supported firmware updatesList the available firmware GTypesList the available firmware typesLists files on the ESPLoad device emulation dataLoaded from an external moduleLoading…LockedLowMEI Key ManifestMEI key manifestMEI manufacturing modeMEI overrideMEI versionManually enable specific pluginsManufacturing Mode is used when the device is manufactured and security features are not yet enabled.Maximum lengthMaximum valueMediumMetadata SignatureMetadata URIMetadata can be obtained from the Linux Vendor Firmware Service.Metadata is up to date; use --force to refresh again.Minimum VersionMinimum lengthMinimum valueMismatched daemon and client, use %s insteadModifies a daemon configuration valueModifies a given remoteModify a configured remoteModify daemon configurationMonitor the daemon for eventsMounts the ESPNeeds a reboot after installationNeeds rebootNeeds shutdown after installationNew versionNo action specified!No downgrades for %sNo firmware IDs foundNo firmware foundNo hardware detected with firmware update capabilityNo plugins foundNo releases availableNo remotes are currently enabled so no metadata is available.No remotes availableNo updatable devicesNo updates availableNo updates available for remaining devicesNo updates were appliedNot approvedNot foundNot supportedOKOK!Old versionOnly show single PCR valueOnly use peer-to-peer networking when downloading filesOnly version upgrades are allowedOutput in JSON formatOverride the default ESP pathP2P FirmwareP2P MetadataPATHParse and show details about a firmware fileParsing dbx update…Parsing system dbx…PasswordPatch a firmware blob at a known offsetPayloadPendingPercentage completePerform operation?Platform DebuggingPlatform Debugging allows device security features to be disabled. This should only be used by hardware manufacturers.Platform debuggingPlease ensure you have the volume recovery key before continuing.Please enter a number from 0 to %u: Please enter either Y or N: Plugin dependencies missingPossible ValuesPre-boot DMA ProtectionPre-boot DMA protectionPre-boot DMA protection is disabledPre-boot DMA protection is enabledPre-boot DMA protection prevents devices from accessing system memory after being connected to the computer.Press unlock on the device to continue the update process.Previous versionPrint the version numberPrint verbose debug statementsPriorityProblemsProceed with upload?Processor Security ChecksProcessor rollback protectionProprietaryQuery for firmware update supportREMOTE-IDREMOTE-ID KEY VALUERead OnlyRead a firmware blob from a deviceRead a firmware from a deviceRead firmware from device into a fileRead firmware from one partition into a fileReading from %s…Reading…Rebooting…Refresh IntervalRefresh metadata from remote serverReinstall %s to %s?Reinstall current firmware on the deviceReinstall firmware on a deviceReinstalling %s with %s... Release BranchRelease FlagsRelease IDRemote IDRemoves devices to watch for future emulationReplace data in an existing firmware fileReport URIReported to remote serverRequest canceledRequired efivarfs filesystem was not foundRequired hardware was not foundRequires a bootloaderRequires internet connectionRestart now?Restart the daemon to make the change effective?Restarting device…Retrieve BIOS settings.  If no arguments are passed all settings are returnedReturn all the hardware IDs for the machineReview and upload report now?Rollback Protection prevents device software from being downgraded to an older version that has security problems.Run `fwupdmgr get-upgrades` for more information.Run `fwupdmgr sync` to complete this action.Run the plugin composite cleanup routine when using install-blobRun the plugin composite prepare routine when using install-blobRun the post-reboot cleanup actionRun without '%s' to seeRunning kernel is too oldRuntime SuffixSETTING VALUESETTING1 VALUE1 [SETTING2] [VALUE2]SPI BIOS DescriptorSPI BIOS regionSPI lockSPI replay protectionSPI writeSPI write protectionSUBSYSTEM DRIVER [DEVICE-ID|GUID]Save a file that allows generation of hardware IDsSave device emulation dataScalar IncrementSchedule installation for next reboot when possibleScheduling…Secure Boot disabledSecure Boot enabledSecurity hardening for HSISee %s for more details.See %s for more information.Selected deviceSelected volumeSerial NumberSet BIOS setting '%s' using '%s'.Set a BIOS settingSet one or more BIOS settingsSet the debugging flag during updateSets one or more BIOS settingsSets the list of approved firmwareSetting typeSettings will apply after system rebootsShare firmware history with the developersShow all resultsShow client and daemon versionsShow daemon verbose information for a particular domainShow debugging information for all domainsShow debugging optionsShow devices that are not updatableShow extra debugging informationShow history of firmware updatesShow the calculated version of the dbxShow the debug log from the last attempted updateShow the information of firmware update statusShutdown now?Sign a firmware with a new keySign data using the client certificateSign the uploaded data with the client certificateSignatureSigned PayloadSizeSome of the platform secrets may be invalidated when updating this firmware.SourceSpecify Vendor/Product ID(s) of DFU deviceSpecify the dbx database fileSpecify the number of bytes per USB transferStringSuccessSuccessfully activated all devicesSuccessfully disabled remoteSuccessfully downloaded new metadata: Successfully enabled and refreshed remoteSuccessfully enabled remoteSuccessfully installed firmwareSuccessfully modified configuration valueSuccessfully modified remoteSuccessfully refreshed metadata manuallySuccessfully updated device checksumsSuccessfully uploaded %u reportSuccessfully uploaded %u reportsSuccessfully verified device checksumsSuccessfully waited %.0fms for deviceSummarySupportedSupported CPUSupported on remote serverSuspend To IdleSuspend To RAMSuspend to Idle allows the device to quickly go to sleep in order to save power. While the device has been suspended, its memory could be physically removed and its information accessed.Suspend to RAM allows the device to quickly go to sleep in order to save power. While the device has been suspended, its memory could be physically removed and its information accessed.Suspend-to-idleSuspend-to-ramSwitch branch from %s to %s?Switch the firmware branch on the deviceSync firmware versions to the chosen configurationSystem Update InhibitedSystem power is too low to perform the updateSystem power is too low to perform the update (%u%%, requires %u%%)System requires external power sourceTEXTTPM (Trusted Platform Module) is a computer chip that detects when hardware components have been tampered with.TPM PCR0 reconstructionTPM PCR0 reconstruction is invalidTPM PCR0 reconstruction is now validTPM Platform ConfigurationTPM ReconstructionTPM empty PCRsTPM v2.0TagTagsTagged for emulationTaintedTargetTest a device using a JSON manifestTestedTested by %sTested by trusted vendorThe Intel Management Engine Key Manifest must be valid so that the device firmware can be trusted by the CPU.The Intel Management Engine controls device components and needs to have a recent version to avoid security issues.The LVFS is a free service that operates as an independent legal entity and has no connection with $OS_RELEASE:NAME$. Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices. All firmware is provided only by the original equipment manufacturer.The TPM (Trusted Platform Module) Platform Configuration is used to check whether the device start process has been modified.The TPM (Trusted Platform Module) Reconstruction is used to check whether the device start process has been modified.The TPM PCR0 differs from reconstruction.The UEFI Platform Key is used to determine if device software comes from a trusted source.The daemon has loaded 3rd party code and is no longer supported by the upstream developers!The device version did not match: got %s, expected %sThe firmware from %s is not supplied by %s, the hardware vendor.The system clock has not been set correctly and downloading files may fail.The update will continue when the device USB cable has been re-inserted.The update will continue when the device USB cable has been unplugged and then re-inserted.The update will continue when the device USB cable has been unplugged.The update will continue when the device power cable has been removed and re-inserted.The vendor did not supply any release notes.There are devices with issues:There are no blocked firmware filesThere is no approved firmware.This device will be reverted back to %s when the %s command is performed.This firmware is provided by LVFS community members and is not provided (or supported) by the original hardware vendor.This package has not been validated, it may not work properly.This program may only work correctly as rootThis remote contains firmware which is not embargoed, but is still being tested by the hardware vendor. You should ensure you have a way to manually downgrade the firmware if the firmware update fails.This system doesn't support firmware settingsThis system has HSI runtime issues.This system has a low HSI security level.This tool allows an administrator to apply UEFI dbx updates.This tool allows an administrator to debug UpdateCapsule operation.This tool allows an administrator to query and control the fwupd daemon, allowing them to perform actions such as installing or downgrading firmware.This tool allows an administrator to use the fwupd plugins without being installed on the host system.This tool can add a kernel argument of '%s', but it will only be active after restarting the computer.This tool can change the BIOS setting '%s' from '%s' to '%s' automatically, but it will only be active after restarting the computer.This tool can change the kernel argument from '%s' to '%s', but it will only be active after restarting the computer.This tool can only be used by the root userThis tool will read and parse the TPM event log from the system firmware.Transient failureTrueTrusted metadataTrusted payloadTypeUEFI Bootservice VariablesUEFI ESP partition may not be set up correctlyUEFI ESP partition not detected or configuredUEFI Firmware UtilityUEFI Platform KeyUEFI Secure BootUEFI Secure Boot prevents malicious software from being loaded when the device starts.UEFI boot service variables should not be readable from runtime mode.UEFI bootservice variablesUEFI capsule updates not available or enabled in firmware setupUEFI dbx UtilityUEFI firmware can not be updated in legacy BIOS modeUEFI platform keyUEFI secure bootUnable to connect to serviceUnable to find attributeUnbind current driverUnblocking firmware:Unblocks a specific firmware from being installedUndo the host security attribute fixUnencryptedUninhibit the system to allow upgradesUnknownUnknown DeviceUnlock the device to allow accessUnlockedUnlocks the device for firmware accessUnmounts the ESPUnplug and replug the device to continue the update process.Unset the debugging flag during updateUnsigned PayloadUnsupported daemon version %s, client version is %sUntaintedUpdatableUpdate ErrorUpdate ImageUpdate MessageUpdate StateUpdate failure is a known issue, visit this URL for more information:Update now?Update requires a rebootUpdate the stored cryptographic hash with current ROM contentsUpdate the stored device verification informationUpdate the stored metadata with current contentsUpdates all specified devices to latest firmware version, or all devices if unspecifiedUpdatingUpdating %s from %s to %s... Updating %s…Upgrade %s from %s to %s?Upload these anonymous results to the %s to help other users?Uploading firmware reports helps hardware vendors to quickly identify failing and successful updates on real devices.UrgencyUse %s for helpUse CTRL^C to cancel.Use fwupdtool --help for helpUse quirk flags when installing firmwareUser has been notifiedUsernameVID:PIDValidValidating ESP contents…VariantVendorVerifying…VersionVersion[fwupd]WARNINGWait for a device to appearWaiting…Watch for hardware changesWill measure elements of system integrity around an updateWrite firmware from file into deviceWrite firmware from file into one partitionWriting file:Writing…You should ensure you are comfortable restoring the setting from a recovery or installation disk, as this change may cause the system to not boot into Linux or cause other system instability.You should ensure you are comfortable restoring the setting from the system firmware setup, as this change may cause the system to not boot into Linux or cause other system instability.Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices.Your hardware may be damaged using this firmware, and installing this release may void any warranty with %s.Your system is set up to the BKC of %s.[APPSTREAM_ID][CHECKSUM][DEVICE-ID|GUID][DEVICE-ID|GUID] [BRANCH][DEVICE-ID|GUID] [VERSION][DEVICE][FILE FILE_SIG REMOTE-ID][FILENAME1] [FILENAME2][REASON][SETTING1] [ SETTING2]...[SETTING1] [SETTING2] [--no-authenticate][SMBIOS-FILE|HWIDS-FILE]command-argumentGUIDcommand-descriptionSign data using the client certificatedefaultfwupd TPM event log utilityfwupd pluginsProject-Id-Version: fwupd
Report-Msgid-Bugs-To: 
Language-Team: English (United Kingdom) (http://app.transifex.com/freedesktop/fwupd/language/en_GB/)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Language: en_GB
Plural-Forms: nplurals=2; plural=(n != 1);
%.0f minute remaining%.0f minutes remaining%s BMC Update%s Battery Update%s CPU Microcode Update%s Camera Update%s Configuration Update%s Consumer ME Update%s Controller Update%s Corporate ME Update%s Device Update%s Display Update%s Dock Update%s Drive Update%s Embedded Controller Update%s Fingerprint Reader Update%s Flash Drive Update%s GPU Update%s Graphics Tablet Update%s Keyboard Update%s ME Update%s Mouse Update%s Network Interface Update%s SSD Update%s Storage Controller Update%s System Update%s TPM Update%s Thunderbolt Controller Update%s Touchpad Update%s USB Dock Update%s USB Receiver Update%s Update%s and all connected devices may not be usable while updating.%s appeared: %s%s changed: %s → %s%s disappeared: %s%s is not currently updatable%s manufacturing mode%s must remain connected for the duration of the update to avoid damage.%s must remain plugged into a power source for the duration of the update to avoid damage.%s override%s v%s%s version%u day%u days%u device has a firmware upgrade available.%u devices have a firmware upgrade available.%u device is not the best known configuration.%u devices are not the best known configuration.%u hour%u hours%u local device supported%u local devices supported%u minute%u minutes%u second%u seconds%u%% (threshold %u%%)(obsoleted)A TPM PCR is now an invalid valueGUIDAMD Firmware Replay ProtectionAMD Firmware Write ProtectionAMD Secure Processor Rollback ProtectionARCHIVE FIRMWARE METAINFO [FIRMWARE] [METAINFO] [JCATFILE]Action Required:Activate devicesActivate pending devicesActivate the new firmware on the deviceActivating firmware updateActivating firmware update forAdds devices to watch for future emulationAgeAgree and enable the remote?Alias to %sAll TPM PCRs are now validAll TPM PCRs are validAll devices are prevented from update by system inhibitAll devices of the same type will be updated at the same timeAllow downgrading firmware versionsAllow reinstalling existing firmware versionsAllow switching firmware branchAlternate branchAn update is in progressAn update requires a reboot to complete.An update requires the system to shutdown to complete.Answer yes to all questionsApply firmware updatesApply update even when not advisedApply update filesApplying update…Approved firmware:Approved firmware:Ask again next time?Asks the daemon to quitAttach to firmware modeAuthenticating…Authentication details are requiredAuthentication is required to downgrade the firmware on a removable deviceAuthentication is required to downgrade the firmware on this machineAuthentication is required to fix a host security issueAuthentication is required to modify BIOS settingsAuthentication is required to modify a configured remote used for firmware updatesAuthentication is required to modify daemon configurationAuthentication is required to read BIOS settingsAuthentication is required to set the list of approved firmwareAuthentication is required to sign data using the client certificateAuthentication is required to switch to the new firmware versionAuthentication is required to undo the fix for a host security issueAuthentication is required to unlock a deviceAuthentication is required to update the firmware on a removable deviceAuthentication is required to update the firmware on this machineAuthentication is required to update the stored checksums for the deviceAutomatic ReportingAutomatically upload every time?BIOS Firmware UpdatesBIOS Rollback ProtectionBIOS firmware updatesBIOS rollback protectionBIOS updates delivered via LVFS or Windows UpdateBUILDER-XML FILENAME-DSTBYTESBatteryBind new kernel driverBlocked firmware files:Blocked versionBlocking firmware:Blocks a specific firmware from being installedBootloader VersionBranchBuild a cabinet archive from a firmware blob and XML metadataBuild a firmware fileCPU Microcode must be updated to mitigate against various information-disclosure security issues.CancelCancelledCannot apply as dbx update has already been applied.Cannot apply updates on live mediaChangedChecks cryptographic hash matches firmwareChecksumChoose branchChoose deviceChoose firmwareChoose releaseChoose the ESP:Choose volumeClears the results from the last updateCommand not foundCommunity supportedConfiguration Change SuggestedConfiguration is only readable by the system administratorConvert a firmware fileCreatedCriticalCryptographic hash verification is availableCurrent ValueCurrent versionDEVICE-ID|GUIDDFU UtilityDebugging OptionsDecompressing…DescriptionDetach to bootloader modeDetailsDeviate from the best known configuration?Device FlagsDevice IDDevice added:Device already existsDevice battery power is too lowDevice battery power is too low (%u%%, requires %u%%)Device can recover flash failuresDevice cannot be used while the lid is closedDevice changed:Device emulation is not enabled.Device firmware is required to have a version checkDevice is emulatedDevice is in useDevice is lockedDevice is required to install all provided releasesDevice is unreachableDevice is unreachable, or out of wireless rangeDevice is usable for the duration of the updateDevice is waiting for the update to be appliedDevice removed:Device requires AC power to be connectedDevice requires a display to be plugged inDevice requires a software license to updateDevice software updates are provided for this device.Device stages updatesDevice supports switching to a different branch of firmwareDevice update methodDevice update needs activationDevice will backup firmware before installingDevice will not re-appear after update completesDevices that have been updated successfully:Devices that were not updated correctly:Devices with no available firmware updates: Devices with the latest available firmware version:Did not find any devices with matching GUIDsDisabledDisabled fwupdate debuggingDisables a given remoteDisplay versionDistributionDo not check for old metadataDo not check for unreported historyDo not check if download remotes should be enabledDo not check or prompt for reboot after updateDo not include log domain prefixDo not include timestamp prefixDo not perform device safety checksDo not prompt for devicesDo not prompt to fix security issuesDo not search the firmware when parsingDo not turn off your computer or remove the AC adaptor while the update is in progress.Do not write to the history databaseDo you understand the consequences of changing the firmware branch?Do you want to disable this feature for future updates?Do you want to enable it now?Do you want to refresh this remote now?Do you want to upload reports automatically for future updates?Don't prompt for authentication (less details may be shown)Done!Downgrade %s from %s to %s?Downgrades the firmware on a deviceDowngrading %s from %s to %s... Downgrading %s…Download a fileDownloading…Dump SMBIOS data from a fileDurationESP specified was not validEach system should have tests to ensure firmware security.Emulate a device using a JSON manifestEmulatedEmulated hostEnableEnable firmware update support on supported systemsEnable new remote?Enable this remote?EnabledEnabled fwupdate debuggingEnabled if hardware matchesEnables a given remoteEnabling firmware updates for the BIOS allows fixing security issues.Enabling this functionality is done at your own risk, which means you have to contact your original equipment manufacturer regarding any problems caused by these updates. Only problems with the update process itself should be filed at $OS_RELEASE:BUG_REPORT_URL$.Enabling this remote is done at your own risk.EncryptedEncrypted RAMEncrypted RAM makes it impossible for information that is stored in device memory to be read if the memory chip is removed and accessed.End of lifeEnumerationErase all firmware update historyErasing…Exit after a small delayExit after the engine has loadedExport a firmware file structure to XMLExtract a firmware blob to imagesFILEFILE [DEVICE-ID|GUID]FILENAMEFILENAME CERTIFICATE PRIVATE-KEYFILENAME DEVICE-ALT-NAME|DEVICE-ALT-IDFILENAME DEVICE-ALT-NAME|DEVICE-ALT-ID [IMAGE-ALT-NAME|IMAGE-ALT-ID]FILENAME DEVICE-IDFILENAME OFFSET DATA [FIRMWARE-TYPE]FILENAME [DEVICE-ID|GUID]FILENAME [FIRMWARE-TYPE]FILENAME-SRC FILENAME-DST [FIRMWARE-TYPE-SRC] [FIRMWARE-TYPE-DST]FILENAME|CHECKSUM1[,CHECKSUM2][,CHECKSUM3]FailedFailed to apply updateFailed to connect to Windows service, please ensure it's running.Failed to connect to daemonFailed to get pending devicesFailed to install firmware updateFailed to load local dbxFailed to load quirksFailed to load system dbxFailed to lockFailed to parse argumentsFailed to parse fileFailed to parse flags for --filterFailed to parse flags for --filter-releaseFailed to parse local dbxFailed to rebootFailed to set front-end featuresFailed to set splash modeFailed to validate ESP contentsFalseFilenameFilename SignatureFilename SourceFilename requiredFilter with a set of device flags using a ~ prefix to exclude, e.g. 'internal,~needs-reboot'Filter with a set of release flags using a ~ prefix to exclude, e.g. 'trusted-release,~trusted-metadata'Firmware AttestationFirmware Attestation checks device software using a reference copy, to make sure that it has not been changed.Firmware BIOS DescriptorFirmware BIOS Descriptor protects device firmware memory from being tampered with.Firmware BIOS RegionFirmware BIOS Region protects device firmware memory from being tampered with.Firmware Base URIFirmware Update D-Bus ServiceFirmware Update DaemonFirmware Updater VerificationFirmware Updater Verification checks that software used for updating has not been tampered with.Firmware UpdatesFirmware UtilityFirmware Write ProtectionFirmware Write Protection LockFirmware Write Protection protects device firmware memory from being tampered with.Firmware attestationFirmware is already blockedFirmware is not already blockedFirmware metadata has not been updated for %u day and may not be up to date.Firmware metadata has not been updated for %u days and may not be up to date.Firmware updatesFirmware updates are not supported on this machine.Firmware updates are supported on this machine.Firmware updates disabled; run 'fwupdmgr unlock' to enableFix a specific host security attributeFix reverted successfullyFixed successfullyFlagsForce the action by relaxing some runtime checksForce the action ignoring all warningsFoundFull Disk Encryption DetectedFull disk encryption secrets may be invalidated when updatingFused PlatformFused platformGUIDGUIDsGUID|DEVICE-IDGet BIOS settingsGet all device flags supported by fwupdGet all devices that support firmware updatesGet all enabled plug-ins registered with the systemGet device report metadataGets details about a firmware fileGets the configured remotesGets the host security attributesGets the list of approved firmwareGets the list of blocked firmwareGets the list of updates for connected hardwareGets the releases for a deviceGets the results from the last updateHWIDS-FILEHardware is waiting to be repluggedHighHost Security EventsHost Security ID (HSI) is not supportedHost Security ID attributes uploaded successfully, thanks!Host Security ID:INHIBIT-IDIOMMUIOMMU ProtectionIOMMU Protection prevents connected devices from accessing unauthorised parts of system memory.IOMMU device protection disabledIOMMU device protection enabledIdle…Ignore SSL strict checks when downloading filesIgnore firmware checksum failuresIgnore firmware hardware mismatch failuresIgnore validation safety checksIgnoring SSL strict checks, to do this automatically in the future export DISABLE_SSL_STRICT in your environmentInhibit ID is %s.Inhibit the system to prevent upgradesInstall DurationInstall a firmware file in cabinet format on this hardwareInstall a raw firmware blob on a deviceInstall a specific firmware file on all devices that matchInstall a specific firmware on a device, all possible devices will also be installed once the CAB matchesInstall old version of signed system firmwareInstall old version of unsigned system firmwareInstall signed device firmwareInstall signed system firmwareInstall to parent device firstInstall unsigned device firmwareInstall unsigned system firmwareInstalling Firmware…Installing a specific release is explicitly requiredInstalling firmware update…Installing on %s…Installing this update may also void any device warranty.IntegerIntel BootGuardIntel BootGuard ACM ProtectedIntel BootGuard ACM protectedIntel BootGuard Error PolicyIntel BootGuard Error Policy ensures the device does not continue to start if its device software has been tampered with.Intel BootGuard FuseIntel BootGuard OTP fuseIntel BootGuard Verified BootIntel BootGuard error policyIntel BootGuard prevents unauthorised device software from operating when the device is started.Intel BootGuard verified bootIntel CETIntel CET ActiveIntel CET EnabledIntel Control-Flow Enforcement Technology detects and prevents certain methods for running malicious software on the device.Intel GDS MitigationIntel GDS mitigationIntel Management Engine Manufacturing ModeIntel Management Engine OverrideIntel Management Engine Override disables checks for device software tampering.Intel Management Engine VersionIntel SMAPIntel Supervisor Mode Access Prevention ensures critical parts of device memory are not accessed by less secure programs.Internal deviceInvalidInvalid argumentsInvalid arguments, expected GUIDInvalid arguments, expected an AppStream IDInvalid arguments, expected at least ARCHIVE FIRMWARE METAINFOIs downgradeIs in bootloader modeIs upgradeIssueIssuesKEY,VALUEKernel is no longer taintedKernel is taintedKernel lockdown disabledKernel lockdown enabledKeyringLOCATIONLast modifiedLess than one minute remainingLicenceLinux Kernel LockdownLinux Kernel Lockdown mode prevents administrator (root) accounts from accessing and changing critical parts of system software.Linux Kernel Swap temporarily saves information to disk as you work. If the information is not protected, it could be accessed by someone if they obtained the disk.Linux Kernel VerificationLinux Kernel Verification makes sure that critical system software has not been tampered with. Using device drivers which are not provided with the system can prevent this security feature from working correctly.Linux SwapLinux Vendor Firmware Service (stable firmware)Linux Vendor Firmware Service (testing firmware)Linux kernelLinux kernel lockdownLinux swapList EFI variables with a specific GUIDList entries in dbxList supported firmware updatesList the available firmware GTypesList the available firmware typesLists files on the ESPLoad device emulation dataLoaded from an external moduleLoading…LockedLowMEI Key ManifestMEI key manifestMEI manufacturing modeMEI overrideMEI versionManually enable specific plug-insManufacturing Mode is used when the device is manufactured and security features are not yet enabled.Maximum lengthMaximum valueMediumMetadata SignatureMetadata URIMetadata can be obtained from the Linux Vendor Firmware Service.Metadata is up to date; use --force to refresh again.Minimum VersionMinimum lengthMinimum valueMismatched daemon and client, use %s insteadModifies a daemon configuration valueModifies a given remoteModify a configured remoteModify daemon configurationMonitor the daemon for eventsMounts the ESPNeeds a reboot after installationNeeds rebootNeeds shutdown after installationNew versionNo action specified!No downgrades for %sNo firmware IDs foundNo firmware foundNo hardware detected with firmware update capabilityNo plug-ins foundNo releases availableNo remotes are currently enabled so no metadata is available.No remotes availableNo updatable devicesNo updates availableNo updates available for remaining devicesNo updates were appliedNot approvedNot foundNot supportedOKOK!Old versionOnly show single PCR valueOnly use peer-to-peer networking when downloading filesOnly version upgrades are allowedOutput in JSON formatOverride the default ESP pathP2P FirmwareP2P MetadataPATHParse and show details about a firmware fileParsing dbx update…Parsing system dbx…PasswordPatch a firmware blob at a known offsetPayloadPendingPercentage completePerform operation?Platform DebuggingPlatform Debugging allows device security features to be disabled. This should only be used by hardware manufacturers.Platform debuggingPlease ensure you have the volume recovery key before continuing.Please enter a number from 0 to %u: Please enter either Y or N: Plug-in dependencies missingPossible ValuesPre-boot DMA ProtectionPre-boot DMA protectionPre-boot DMA protection is disabledPre-boot DMA protection is enabledPre-boot DMA protection prevents devices from accessing system memory after being connected to the computer.Press unlock on the device to continue the update process.Previous versionPrint the version numberPrint verbose debug statementsPriorityProblemsProceed with upload?Processor Security ChecksProcessor rollback protectionProprietaryQuery for firmware update supportREMOTE-IDREMOTE-ID KEY VALUERead OnlyRead a firmware blob from a deviceRead a firmware from a deviceRead firmware from device into a fileRead firmware from one partition into a fileReading from %s…Reading…Rebooting…Refresh IntervalRefresh metadata from remote serverReinstall %s to %s?Reinstall current firmware on the deviceReinstall firmware on a deviceReinstalling %s with %s... Release BranchRelease FlagsRelease IDRemote IDRemoves devices to watch for future emulationReplace data in an existing firmware fileReport URIReported to remote serverRequest cancelledRequired efivarfs filesystem was not foundRequired hardware was not foundRequires a bootloaderRequires internet connectionRestart now?Restart the daemon to make the change effective?Restarting device…Retrieve BIOS settings.  If no arguments are passed all settings are returnedReturn all the hardware IDs for the machineReview and upload report now?Rollback Protection prevents device software from being downgraded to an older version that has security problems.Run `fwupdmgr get-upgrades` for more information.Run `fwupdmgr sync` to complete this action.Run the plug-in composite cleanup routine when using install-blobRun the plug-in composite prepare routine when using install-blobRun the post-reboot cleanup actionRun without '%s' to seeRunning kernel is too oldRuntime SuffixSETTING VALUESETTING1 VALUE1 [SETTING2] [VALUE2]SPI BIOS DescriptorSPI BIOS regionSPI lockSPI replay protectionSPI writeSPI write protectionSUBSYSTEM DRIVER [DEVICE-ID|GUID]Save a file that allows generation of hardware IDsSave device emulation dataScalar IncrementSchedule installation for next reboot when possibleScheduling…Secure Boot disabledSecure Boot enabledSecurity hardening for HSISee %s for more details.See %s for more information.Selected deviceSelected volumeSerial NumberSet BIOS setting '%s' using '%s'.Set a BIOS settingSet one or more BIOS settingsSet the debugging flag during updateSets one or more BIOS settingsSets the list of approved firmwareSetting typeSettings will apply after system rebootsShare firmware history with the developersShow all resultsShow client and daemon versionsShow daemon verbose information for a particular domainShow debugging information for all domainsShow debugging optionsShow devices that are not updatableShow extra debugging informationShow history of firmware updatesShow the calculated version of the dbxShow the debug log from the last attempted updateShow the information of firmware update statusShutdown now?Sign a firmware with a new keySign data using the client certificateSign the uploaded data with the client certificateSignatureSigned PayloadSizeSome of the platform secrets may be invalidated when updating this firmware.SourceSpecify Vendor/Product ID(s) of DFU deviceSpecify the dbx database fileSpecify the number of bytes per USB transferStringSuccessSuccessfully activated all devicesSuccessfully disabled remoteSuccessfully downloaded new metadata: Successfully enabled and refreshed remoteSuccessfully enabled remoteSuccessfully installed firmwareSuccessfully modified configuration valueSuccessfully modified remoteSuccessfully refreshed metadata manuallySuccessfully updated device checksumsSuccessfully uploaded %u reportSuccessfully uploaded %u reportsSuccessfully verified device checksumsSuccessfully waited %.0fms for deviceSummarySupportedSupported CPUSupported on remote serverSuspend To IdleSuspend To RAMSuspend to Idle allows the device to quickly go to sleep in order to save power. While the device has been suspended, its memory could be physically removed and its information accessed.Suspend to RAM allows the device to quickly go to sleep in order to save power. While the device has been suspended, its memory could be physically removed and its information accessed.Suspend-to-idleSuspend-to-ramSwitch branch from %s to %s?Switch the firmware branch on the deviceSync firmware versions to the chosen configurationSystem Update InhibitedSystem power is too low to perform the updateSystem power is too low to perform the update (%u%%, requires %u%%)System requires external power sourceTEXTTPM (Trusted Platform Module) is a computer chip that detects when hardware components have been tampered with.TPM PCR0 reconstructionTPM PCR0 reconstruction is invalidTPM PCR0 reconstruction is now validTPM Platform ConfigurationTPM ReconstructionTPM empty PCRsTPM v2.0TagTagsTagged for emulationTaintedTargetTest a device using a JSON manifestTestedTested by %sTested by trusted vendorThe Intel Management Engine Key Manifest must be valid so that the device firmware can be trusted by the CPU.The Intel Management Engine controls device components and needs to have a recent version to avoid security issues.The LVFS is a free service that operates as an independent legal entity and has no connection with $OS_RELEASE:NAME$. Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices. All firmware is provided only by the original equipment manufacturer.The TPM (Trusted Platform Module) Platform Configuration is used to check whether the device start process has been modified.The TPM (Trusted Platform Module) Reconstruction is used to check whether the device start process has been modified.The TPM PCR0 differs from reconstruction.The UEFI Platform Key is used to determine if device software comes from a trusted source.The daemon has loaded 3rd party code and is no longer supported by the upstream developers!The device version did not match: got %s, expected %sThe firmware from %s is not supplied by %s, the hardware vendor.The system clock has not been set correctly and downloading files may fail.The update will continue when the device USB cable has been re-inserted.The update will continue when the device USB cable has been unplugged and then re-inserted.The update will continue when the device USB cable has been unplugged.The update will continue when the device power cable has been removed and re-inserted.The vendor did not supply any release notes.There are devices with issues:There are no blocked firmware filesThere is no approved firmware.This device will be reverted back to %s when the %s command is performed.This firmware is provided by LVFS community members and is not provided (or supported) by the original hardware vendor.This package has not been validated, it may not work properly.This program may only work correctly as rootThis remote contains firmware which is not embargoed, but is still being tested by the hardware vendor. You should ensure you have a way to manually downgrade the firmware if the firmware update fails.This system doesn't support firmware settingsThis system has HSI runtime issues.This system has a low HSI security level.This tool allows an administrator to apply UEFI dbx updates.This tool allows an administrator to debug UpdateCapsule operation.This tool allows an administrator to query and control the fwupd daemon, allowing them to perform actions such as installing or downgrading firmware.This tool allows an administrator to use the fwupd plug-ins without being installed on the host system.This tool can add a kernel argument of '%s', but it will only be active after restarting the computer.This tool can change the BIOS setting '%s' from '%s' to '%s' automatically, but it will only be active after restarting the computer.This tool can change the kernel argument from '%s' to '%s', but it will only be active after restarting the computer.This tool can only be used by the root userThis tool will read and parse the TPM event log from the system firmware.Transient failureTrueTrusted metadataTrusted payloadTypeUEFI Bootservice VariablesUEFI ESP partition may not be set up correctlyUEFI ESP partition not detected or configuredUEFI Firmware UtilityUEFI Platform KeyUEFI Secure BootUEFI Secure Boot prevents malicious software from being loaded when the device starts.UEFI boot service variables should not be readable from runtime mode.UEFI bootservice variablesUEFI capsule updates not available or enabled in firmware setupUEFI dbx UtilityUEFI firmware can not be updated in legacy BIOS modeUEFI platform keyUEFI secure bootUnable to connect to serviceUnable to find attributeUnbind current driverUnblocking firmware:Unblocks a specific firmware from being installedUndo the host security attribute fixUnencryptedUninhibit the system to allow upgradesUnknownUnknown DeviceUnlock the device to allow accessUnlockedUnlocks the device for firmware accessUnmounts the ESPUnplug and replug the device to continue the update process.Unset the debugging flag during updateUnsigned PayloadUnsupported daemon version %s, client version is %sUntaintedUpdatableUpdate ErrorUpdate ImageUpdate MessageUpdate StateUpdate failure is a known issue, visit this URL for more information:Update now?Update requires a rebootUpdate the stored cryptographic hash with current ROM contentsUpdate the stored device verification informationUpdate the stored metadata with current contentsUpdates all specified devices to latest firmware version, or all devices if unspecifiedUpdatingUpdating %s from %s to %s... Updating %s…Upgrade %s from %s to %s?Upload these anonymous results to the %s to help other users?Uploading firmware reports helps hardware vendors to quickly identify failing and successful updates on real devices.UrgencyUse %s for helpUse CTRL^C to cancel.Use fwupdtool --help for helpUse quirk flags when installing firmwareUser has been notifiedUsernameVID:PIDValidValidating ESP contents…VariantVendorVerifying…VersionVersion[fwupd]WARNINGWait for a device to appearWaiting…Watch for hardware changesWill measure elements of system integrity around an updateWrite firmware from file into deviceWrite firmware from file into one partitionWriting file:Writing…You should ensure you are comfortable restoring the setting from a recovery or installation disk, as this change may cause the system to not boot into Linux or cause other system instability.You should ensure you are comfortable restoring the setting from the system firmware setup, as this change may cause the system to not boot into Linux or cause other system instability.Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices.Your hardware may be damaged using this firmware, and installing this release may void any warranty with %s.Your system is set up to the BKC of %s.[APPSTREAM_ID][CHECKSUM][DEVICE-ID|GUID][DEVICE-ID|GUID] [BRANCH][DEVICE-ID|GUID] [VERSION][DEVICE][FILE FILE_SIG REMOTE-ID][FILENAME1] [FILENAME2][REASON][SETTING1] [ SETTING2]...[SETTING1] [SETTING2] [--no-authenticate][SMBIOS-FILE|HWIDS-FILE]GUIDSign data using the client certificatedefaultfwupd TPM event log utilityfwupd plug-ins