1<?php 2$lang['authslots'] = 'Authentifizierungs-Makros für Datenbank-Server. Einer pro Zeile im Format: <br /><code><slotname>=<username>:<password></code>'; 3$lang['aliasing'] = 'Enable support for aliasing:<br /><strong style="color:red;">Vulnerability Alert:</strong> A page editor might use this for SQL injections, so do not enable in an open Wiki or if unsure!'; 4$lang['customviews'] = 'Enable support for custom read-only views:<br /><strong style="color:red;">Vulnerability Alert:</strong> This enables a page\'s editors to send <strong>arbitrary</strong> queries to your database, so do not enable in an open Wiki or if unsure!'; 5$lang['checkmaildomains'] = 'E-Mail Adressen durch Namensauflösung der Domain nach der Eingabe überprüfen'; 6$lang['console'] = 'Enable local DB console:<br /><strong style="color:red;">Vulnerability Alert:</strong> This enables all administrators to send <strong>arbitrary</strong> queries to your local databases!'; 7$lang['consoleforcehistory'] = 'Force using history in console:<br />(Enabling this might lead to blank screen on invoking console!)'; 8$lang['enableallpages'] = 'Enable embedding database2 on every Wiki page:<br /><strong style="color:red;">Vulnerability Alert:</strong> On sites running plugin <code>discussion</code> or similar use of database2 should be limited to prevent severe vulnerability!'; 9$lang['enablepages'] = 'Patterns explicitly selecting enabled pages:<br />Provide one pattern per line. Wrap PCRE in slashes or use shell patterns!<br /><strong style="color:red;">Vulnerability Alert:</strong> On sites running plugin <code>discussion</code> or similar use of database2 should be limited to prevent severe vulnerability!'; 10$lang['develusers'] = 'Durch Komma getrennte Liste von Benutzernamen, die eine evtl. vorhandene Entwicklerversion der database2-Bibliothek verwenden sollen'; 11