Skip to content

Commit 31b7726

Browse files
vyanovskygithub-actions[bot]
authored andcommitted
automatically update translations
1 parent 3845aaa commit 31b7726

File tree

164 files changed

+2284
-394
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

164 files changed

+2284
-394
lines changed

i18n/be/docusaurus-plugin-content-docs/current/adguard-browser-extension/features/other-features.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,20 @@ You can save your settings configuration by clicking the _Export settings_ butto
2525

2626
The _Additional settings_ section contains a range of various settings that are related to the ad blocking process and application usability.
2727

28-
![Additional settings \*border](https://cdn.adtidy.org/content/Kb/ad_blocker/browser_extension/ad_blocker_browser_extension_additional_settings.png)
28+
![Additional settings \*border](https://cdn.adtidy.org/content/Kb/ad_blocker/browser_extension/additional-settings.png)
2929

30-
From this tab, you can activate optimized filters, enable notifications about extension updates, open the _Filtering log_, or clear the statistics of blocked ads and trackers.
30+
From this tab, you can invert the allowlist and add the AdGuard item to the browser’s context menu. You can also enable the display of the number of blocked ads on the AdGuard icon and notifications about extension updates. Additionally, this section lets you enable notifications about the AdGuard app, open the _Filtering log_, clear the statistics of blocked ads and trackers, or reset the settings.
3131

3232
Besides, you can opt to help us with the development of filters by sending the statistics on applied rules: which ones are triggered, on which websites, and how often. This option is disabled by default as we do not collect user data without consent. Yet, if you enable it, all data will be strictly anonymized.
3333

34+
You can also choose to help us improve the extension by sending us anonymized usage data. This includes the names of the screens you interact with, the names of the buttons you click, and session identifiers. These insights help us understand where users run into friction, refine the experience, and make the extension faster and easier to use. The _Send anonymized usage data_ option is disabled by default. If you enable it, all data will be strictly anonymized and used only internally. It will never be shared with third parties.
35+
36+
:::note
37+
38+
The _Send anonymized usage data_ option can also be enabled on the post-installation page in Chromium-based browsers.
39+
40+
:::
41+
3442
## About {#about}
3543

3644
In the _About_ section, you can find info about the current version, links to the EULA and Privacy policy, and to the repository of the Browser extension on GitHub.

i18n/be/docusaurus-plugin-content-docs/current/adguard-for-mac/installation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This article is about AdGuard for Mac, a multifunctional ad blocker that protect
1111

1212
## System requirements
1313

14-
**Operating system version:** macOS 10.15 (64 bit) or higher
14+
**Operating system version:** macOS 12 or later
1515

1616
**RAM:** at least 2 GB
1717

i18n/be/docusaurus-plugin-content-docs/current/adguard-for-mac/solving-problems/advanced-settings.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,10 @@ Blocks macOS Private Relay domains if the user has a firewall enabled, which in
171171

172172
Enabling this setting is useful in the following scenario: when macOS Private Relay is active, filtering cannot function properly and must be disabled. In macOS versions up to 14, AdGuard could automatically disable Private Relay when Protection was enabled. However, starting with macOS 15, this is no longer possible if a firewall is active. By turning on this setting, you can disable Private Relay even when the firewall is enabled, overcoming the previous limitation.
173173

174+
#### `dns.proxy.postquantum.cryptography.enabled`
175+
176+
Secures DNS proxy connections with a hybrid post-quantum key exchange, combining the classical X25519 algorithm with the ML-KEM-768 post-quantum KEM. Applies only to DoH, DoT, and DoQ upstreams.
177+
174178
### Stealth Mode settings
175179

176180
#### `stealth.antidpi.http.split.fragment.size`

i18n/be/docusaurus-plugin-content-docs/current/adguard-for-windows/solving-problems/tdi-driver-and-Chrome-142.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,8 @@ It should **not** be applied broadly across end-user machines. **Proceed only if
4949

5050
:::
5151

52+
#### Using .reg files
53+
5254
You can apply the necessary registry changes automatically by using one of the pre-generated .reg files below. Each file disables AppContainer/Network Service sandboxing for a specific Chromium-based browser:
5355

5456
- [Download Chrome.reg](https://cdn.adtidy.org/distr/windows/reg/DisableAppContainer_Chrome.reg)
@@ -58,6 +60,17 @@ You can apply the necessary registry changes automatically by using one of the p
5860
- [Download Vivaldi.reg](https://cdn.adtidy.org/distr/windows/reg/DisableAppContainer_Vivaldi.reg)
5961
- [Download YandexBrowser.reg](https://cdn.adtidy.org/distr/windows/reg/DisableAppContainer_YandexBrowser.reg)
6062

63+
You can revert these changes using the undo .reg files provided below. These files remove the registry branches that were added by the direct version:
64+
65+
- [Undo Chrome.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Chrome.reg)
66+
- [Undo Chromium.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Chromium.reg)
67+
- [Undo Edge.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Edge.reg)
68+
- [Undo Brave.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Brave.reg)
69+
- [Undo Vivaldi.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Vivaldi.reg)
70+
- [Undo YandexBrowser.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_YandexBrowser.reg)
71+
72+
#### Explicit registry editing
73+
6174
If your browser is not listed, follow the manual instructions below to create the necessary registry entries:
6275

6376
1. Determine its policy branch by checking the vendor’s official documentation or by opening the internal policy page. In Chrome, navigate to `chrome://policy`. Other browsers use a similar path.

i18n/be/docusaurus-plugin-content-docs/current/general/ad-filtering/create-own-filters.md

Lines changed: 45 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4117,6 +4117,8 @@ The syntax with an optional `value` in the attributes is supported by AdGuard fo
41174117
41184118
### Syntax
41194119
4120+
Syntax supported by AdGuard for Windows, AdGuard for Mac, AdGuard for Android, AdGuard for Linux with CoreLibs, and AdGuard Browser Extension prior to v5.2:
4121+
41204122
```text
41214123
selector = [tagName] [attributes] [pseudoClasses]
41224124
combinator = ">"
@@ -4134,6 +4136,24 @@ pseudoClasses = pseudoClass *pseudoClass
41344136
- **`pseudoArgs`** — the arguments of a function-style pseudo-class.
41354137
- **`combinator`** — an operator that works similarly to the [CSS child combinator](https://developer.mozilla.org/en-US/docs/Web/CSS/Child_combinator): that is, the `selector` on the right of the `combinator` will only match an element whose direct parent matches the `selector` on the left of the `combinator`.
41364138
4139+
Syntax supported by AdGuard Browser Extension v5.3 or later:
4140+
4141+
```text
4142+
rule = [domains] "$$" selector
4143+
domains = [domain0, domain1[, ...[, domainN]]]
4144+
```
4145+
4146+
- **`selector`** — [CSS selector](https://developer.mozilla.org/en-US/docs/Web/Guide/CSS/Getting_Started/Selectors), defines the element(s) to be removed from the HTML code before the page is loaded.
4147+
- **`domains`** — domain restriction for the rule. Same principles as in [element hiding rule syntax](#cosmetic-elemhide-rules).
4148+
4149+
:::caution Limitations
4150+
4151+
The following limitations apply to AdGuard Browser Extension v5.3 and later:
4152+
4153+
- Pseudo-elements (e.g., `::before`, `::after`) are not supported, as they are not applicable in the context of HTML filtering.
4154+
4155+
:::
4156+
41374157
### Examples
41384158
41394159
**HTML code:**
@@ -4197,6 +4217,8 @@ $$script[tag-content="banner"]
41974217
41984218
The `tag-content` special attribute must not appear in a selector to the left of a `>` combinator.
41994219
4220+
This limitation does not apply to AdGuard Browser Extension v5.3 or later.
4221+
42004222
:::
42014223
42024224
#### `wildcard`
@@ -4219,6 +4241,8 @@ It checks if the element code contains the two consecutive substrings `banner` a
42194241
42204242
The `wildcard` special attribute must not appear in a selector to the left of a `>` combinator.
42214243
4244+
This limitation does not apply to AdGuard Browser Extension v5.3 or later.
4245+
42224246
:::
42234247
42244248
#### `max-length`
@@ -4247,6 +4271,8 @@ This rule will remove all the `div` elements, whose code contains the substring
42474271
42484272
The `max-length` special attribute must not appear in a selector to the left of a `>` combinator.
42494273
4274+
This limitation does not apply to AdGuard Browser Extension v5.3 or later.
4275+
42504276
:::
42514277
42524278
#### `min-length`
@@ -4271,6 +4297,8 @@ This rule will remove all the `div` elements, whose code contains the substring
42714297
42724298
The `min-length` special attribute must not appear in a selector to the left of a `>` combinator.
42734299
4300+
This limitation does not apply to AdGuard Browser Extension v5.3 or later.
4301+
42744302
:::
42754303
42764304
### Pseudo-classes {#html-filtering-rules--pseudo-classes}
@@ -4297,7 +4325,7 @@ or
42974325
42984326
:::info Compatibility
42994327
4300-
The `:contains()` pseudo-class is supported by AdGuard for Windows, AdGuard for Mac, AdGuard for Android, and AdGuard for Linux with [CoreLibs][] v1.13 or later.
4328+
The `:contains()` pseudo-class is supported by AdGuard for Windows, AdGuard for Mac, AdGuard for Android, AdGuard for Linux with [CoreLibs][] v1.13 or later, and AdGuard Browser Extension v5.3 or later.
43014329
43024330
:::
43034331
@@ -4307,6 +4335,8 @@ Requires that the inner HTML of the element contains the specified text or match
43074335
43084336
A `:contains()` pseudo-class must not appear in a selector to the left of a `>` combinator.
43094337
4338+
This limitation does not apply to AdGuard Browser Extension v5.3 or later.
4339+
43104340
:::
43114341
43124342
### Exceptions
@@ -4529,12 +4559,12 @@ For example, `[$domain=example.com,app=test_app]##selector`.
45294559
45304560
In the modifiers values, the following characters must be escaped: `[`, `]`, `,`, and `\` (unless it is used for the escaping). Use `\` to escape them. For example, an escaped bracket looks like this: `\]`.
45314561
4532-
| Modifier \ Products | [CoreLibs apps][cl-apps] | [AdGuard for Chromium][ext-chr] | [AdGuard for Chrome MV3][ext-mv3] | [AdGuard for Firefox][ext-ff] | [AdGuard for iOS][ios-app] | [AdGuard for Safari][ext-saf] | [AdGuard Content Blocker][and-cb] |
4533-
| ------------------------------------- |:------------------------:|:---------------------------------------------:|:------------------------------------------------:|:---------------------------------------------:|:--------------------------:|:-----------------------------:|:---------------------------------:|
4534-
| [$app](#non-basic-app-modifier) | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
4535-
| [$domain](#non-basic-domain-modifier) | ✅ | ✅ | ✅ [*[1]](#non-basic-domain-modifier-limitations) | ✅ | ✅ | ✅ | ❌ |
4536-
| [$path](#non-basic-path-modifier) | ✅ | | ❌ | | ✅ | ✅ | ❌ |
4537-
| [$url](#non-basic-url-modifier) | ✅ | ✅ [*[2]](#non-basic-url-modifier-limitations) | ✅ [*[2]](#non-basic-url-modifier-limitations) | ✅ [*[2]](#non-basic-url-modifier-limitations) | ❌ | ❌ | ❌ |
4562+
| Modifier \ Products | [CoreLibs apps][cl-apps] | [AdGuard for Chromium][ext-chr] | [AdGuard for Chrome MV3][ext-mv3] | [AdGuard for Firefox][ext-ff] | [AdGuard for iOS][ios-app] | [AdGuard for Safari][ext-saf] | [AdGuard Content Blocker][and-cb] |
4563+
| ------------------------------------- |:------------------------:|:----------------------------------------------:|:------------------------------------------------:|:----------------------------------------------:|:--------------------------:|:-----------------------------:|:---------------------------------:|
4564+
| [$app](#non-basic-app-modifier) | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
4565+
| [$domain](#non-basic-domain-modifier) | ✅ | ✅ | ✅ [*[1]](#non-basic-domain-modifier-limitations) | ✅ | ✅ | ✅ | ❌ |
4566+
| [$path](#non-basic-path-modifier) | ✅ | ✅ [*[2]](#non-basic-path-modifier-limitations) | ❌ | ✅ [*[2]](#non-basic-path-modifier-limitations) | ✅ | ✅ | ❌ |
4567+
| [$url](#non-basic-url-modifier) | ✅ | ✅ [*[3]](#non-basic-url-modifier-limitations) | ✅ [*[3]](#non-basic-url-modifier-limitations) | ✅ [*[3]](#non-basic-url-modifier-limitations) | ❌ | ❌ | ❌ |
45384568
45394569
:::note
45404570
@@ -4621,6 +4651,14 @@ If `pattern` is not set for `$path`, rule will apply only on the main page of we
46214651
- `[$domain=example.com,path=/page.html]##.textad` hides a `div` with the class `textad` at `page.html` of `example.com` and all subdomains but not at `another_page.html`
46224652
- `[$path=/\\/(sub1|sub2)\\/page\\.html/]##.textad` hides a `div` with the class `textad` at both `/sub1/page.html` and `/sub2/page.html` of any domain (please note the [escaped special characters](#non-basic-rules-modifiers-syntax))
46234653
4654+
#### `$path` modifier limitations {#non-basic-path-modifier-limitations}
4655+
4656+
:::caution Limitations
4657+
4658+
In AdGuard Browser Extension, the non-basic `$path` modifier is compatible with other non-basic modifiers only when it is placed last, e.g., `[$domain=/example.(com|org)/,path=/foo]##.ad`. Otherwise, it may not work as expected.
4659+
4660+
:::
4661+
46244662
:::info Compatibility
46254663
46264664
Rules with `$path` modifier are not supported by AdGuard Content Blocker.

i18n/bn/docusaurus-plugin-content-docs/current/adguard-browser-extension/features/other-features.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,20 @@ You can save your settings configuration by clicking the _Export settings_ butto
2525

2626
The _Additional settings_ section contains a range of various settings that are related to the ad blocking process and application usability.
2727

28-
![Additional settings \*border](https://cdn.adtidy.org/content/Kb/ad_blocker/browser_extension/ad_blocker_browser_extension_additional_settings.png)
28+
![Additional settings \*border](https://cdn.adtidy.org/content/Kb/ad_blocker/browser_extension/additional-settings.png)
2929

30-
From this tab, you can activate optimized filters, enable notifications about extension updates, open the _Filtering log_, or clear the statistics of blocked ads and trackers.
30+
From this tab, you can invert the allowlist and add the AdGuard item to the browser’s context menu. You can also enable the display of the number of blocked ads on the AdGuard icon and notifications about extension updates. Additionally, this section lets you enable notifications about the AdGuard app, open the _Filtering log_, clear the statistics of blocked ads and trackers, or reset the settings.
3131

3232
Besides, you can opt to help us with the development of filters by sending the statistics on applied rules: which ones are triggered, on which websites, and how often. This option is disabled by default as we do not collect user data without consent. Yet, if you enable it, all data will be strictly anonymized.
3333

34+
You can also choose to help us improve the extension by sending us anonymized usage data. This includes the names of the screens you interact with, the names of the buttons you click, and session identifiers. These insights help us understand where users run into friction, refine the experience, and make the extension faster and easier to use. The _Send anonymized usage data_ option is disabled by default. If you enable it, all data will be strictly anonymized and used only internally. It will never be shared with third parties.
35+
36+
:::note
37+
38+
The _Send anonymized usage data_ option can also be enabled on the post-installation page in Chromium-based browsers.
39+
40+
:::
41+
3442
## About {#about}
3543

3644
In the _About_ section, you can find info about the current version, links to the EULA and Privacy policy, and to the repository of the Browser extension on GitHub.

i18n/bn/docusaurus-plugin-content-docs/current/adguard-for-mac/installation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This article is about AdGuard for Mac, a multifunctional ad blocker that protect
1111

1212
## System requirements
1313

14-
**Operating system version:** macOS 10.15 (64 bit) or higher
14+
**Operating system version:** macOS 12 or later
1515

1616
**RAM:** at least 2 GB
1717

i18n/bn/docusaurus-plugin-content-docs/current/adguard-for-mac/solving-problems/advanced-settings.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,10 @@ Blocks macOS Private Relay domains if the user has a firewall enabled, which in
171171

172172
Enabling this setting is useful in the following scenario: when macOS Private Relay is active, filtering cannot function properly and must be disabled. In macOS versions up to 14, AdGuard could automatically disable Private Relay when Protection was enabled. However, starting with macOS 15, this is no longer possible if a firewall is active. By turning on this setting, you can disable Private Relay even when the firewall is enabled, overcoming the previous limitation.
173173

174+
#### `dns.proxy.postquantum.cryptography.enabled`
175+
176+
Secures DNS proxy connections with a hybrid post-quantum key exchange, combining the classical X25519 algorithm with the ML-KEM-768 post-quantum KEM. Applies only to DoH, DoT, and DoQ upstreams.
177+
174178
### Stealth Mode settings
175179

176180
#### `stealth.antidpi.http.split.fragment.size`

i18n/bn/docusaurus-plugin-content-docs/current/adguard-for-windows/solving-problems/tdi-driver-and-Chrome-142.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,8 @@ It should **not** be applied broadly across end-user machines. **Proceed only if
4949

5050
:::
5151

52+
#### Using .reg files
53+
5254
You can apply the necessary registry changes automatically by using one of the pre-generated .reg files below. Each file disables AppContainer/Network Service sandboxing for a specific Chromium-based browser:
5355

5456
- [Download Chrome.reg](https://cdn.adtidy.org/distr/windows/reg/DisableAppContainer_Chrome.reg)
@@ -58,6 +60,17 @@ You can apply the necessary registry changes automatically by using one of the p
5860
- [Download Vivaldi.reg](https://cdn.adtidy.org/distr/windows/reg/DisableAppContainer_Vivaldi.reg)
5961
- [Download YandexBrowser.reg](https://cdn.adtidy.org/distr/windows/reg/DisableAppContainer_YandexBrowser.reg)
6062

63+
You can revert these changes using the undo .reg files provided below. These files remove the registry branches that were added by the direct version:
64+
65+
- [Undo Chrome.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Chrome.reg)
66+
- [Undo Chromium.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Chromium.reg)
67+
- [Undo Edge.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Edge.reg)
68+
- [Undo Brave.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Brave.reg)
69+
- [Undo Vivaldi.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_Vivaldi.reg)
70+
- [Undo YandexBrowser.reg](https://cdn.adtidy.org/distr/windows/reg/Undo_DisableAppContainer_YandexBrowser.reg)
71+
72+
#### Explicit registry editing
73+
6174
If your browser is not listed, follow the manual instructions below to create the necessary registry entries:
6275

6376
1. Determine its policy branch by checking the vendor’s official documentation or by opening the internal policy page. In Chrome, navigate to `chrome://policy`. Other browsers use a similar path.

0 commit comments

Comments
 (0)