<slotname>=<username>:<password>'; $lang['aliasing'] = 'Enable support for aliasing:
Vulnerability Alert: A page editor might use this for SQL injections, so do not enable in an open Wiki or if unsure!'; $lang['customviews'] = 'Enable support for custom read-only views:
Vulnerability Alert: This enables a page\'s editors to send arbitrary queries to your database, so do not enable in an open Wiki or if unsure!'; $lang['checkmaildomains'] = 'E-Mail Adressen durch Namensauflösung der Domain nach der Eingabe überprüfen'; $lang['console'] = 'Enable local DB console:
Vulnerability Alert: This enables all administrators to send arbitrary queries to your local databases!'; $lang['consoleforcehistory'] = 'Force using history in console:
(Enabling this might lead to blank screen on invoking console!)'; $lang['enableallpages'] = 'Enable embedding database2 on every Wiki page:
Vulnerability Alert: On sites running plugin discussion or similar use of database2 should be limited to prevent severe vulnerability!'; $lang['enablepages'] = 'Patterns explicitly selecting enabled pages:
Provide one pattern per line. Wrap PCRE in slashes or use shell patterns!
Vulnerability Alert: On sites running plugin discussion or similar use of database2 should be limited to prevent severe vulnerability!'; $lang['develusers'] = 'Durch Komma getrennte Liste von Benutzernamen, die eine evtl. vorhandene Entwicklerversion der database2-Bibliothek verwenden sollen';