1<?php
2$lang['authslots'] = 'Authentifizierungs-Makros für Datenbank-Server. Einer pro Zeile im Format: <br /><code>&lt;slotname&gt;=&lt;username&gt;:&lt;password&gt;</code>';
3$lang['aliasing'] = 'Enable support for aliasing:<br /><strong style="color:red;">Vulnerability Alert:</strong> A page editor might use this for SQL injections, so do not enable in an open Wiki or if unsure!';
4$lang['customviews'] = 'Enable support for custom read-only views:<br /><strong style="color:red;">Vulnerability Alert:</strong> This enables a page\'s editors to send <strong>arbitrary</strong> queries to your database, so do not enable in an open Wiki or if unsure!';
5$lang['checkmaildomains'] = 'E-Mail Adressen durch Namensauflösung der Domain nach der Eingabe überprüfen';
6$lang['console'] = 'Enable local DB console:<br /><strong style="color:red;">Vulnerability Alert:</strong> This enables all administrators to send <strong>arbitrary</strong> queries to your local databases!';
7$lang['consoleforcehistory'] = 'Force using history in console:<br />(Enabling this might lead to blank screen on invoking console!)';
8$lang['enableallpages'] = 'Enable embedding database2 on every Wiki page:<br /><strong style="color:red;">Vulnerability Alert:</strong> On sites running plugin <code>discussion</code> or similar use of database2 should be limited to prevent severe vulnerability!';
9$lang['enablepages'] = 'Patterns explicitly selecting enabled pages:<br />Provide one pattern per line. Wrap PCRE in slashes or use shell patterns!<br /><strong style="color:red;">Vulnerability Alert:</strong> On sites running plugin <code>discussion</code> or similar use of database2 should be limited to prevent severe vulnerability!';
10$lang['develusers'] = 'Durch Komma getrennte Liste von Benutzernamen, die eine evtl. vorhandene Entwicklerversion der database2-Bibliothek verwenden sollen';
11