diff --git a/login_security.admin.inc b/login_security.admin.inc index 6da1483..e90bff0 100644 --- a/login_security.admin.inc +++ b/login_security.admin.inc @@ -21,7 +21,7 @@ function login_security_admin_settings() { '#element_validate' => array('_login_security_valid_integer'), '#size' => 3, '#maxlength' => 3, - '#description' => t('The time window where to check for security violiations: the time in hours the login information is kept to compute the login attempts count. A common example could be 24 hours. After that time, the attempt is deleted from the list, and will never be considered again.'), + '#description' => t('The time window to check for security violiations: the time in hours the login information is kept to compute the login attempts count. A common example could be 24 hours. After that time, the attempt is deleted from the list, and will never be considered again.'), '#field_suffix' => ''. t('Hours') .'' ); $form['login_security_delay_base_time'] = array( @@ -48,7 +48,7 @@ function login_security_admin_settings() { '#element_validate' => array('_login_security_valid_integer'), '#size' => 3, '#maxlength' => 3, - '#description' => t('Enter the number of login failures a user is allowed. After that amount is reached, the user will be blocked, no matter the host attempting to log in. Use this option carefully on public sites, as an attacker may block your site users. The user blocking protection will not dissapear and should be removed manually from the !users interface.', array('!users' => l(t('user management'), 'admin/user/user'))), + '#description' => t('Enter the number of login failures a user is allowed. After this amount is reached, the user will be blocked, no matter the host attempting to log in. Use this option carefully on public sites, as an attacker may block your site users. The user blocking protection will not dissapear and should be removed manually from the !users interface.', array('!users' => l(t('user management'), 'admin/user/user'))), '#field_suffix' => ''. t('Failed attempts') .'' ); $form['login_security_host_wrong_count'] = array( @@ -58,7 +58,7 @@ function login_security_admin_settings() { '#element_validate' => array('_login_security_valid_integer'), '#size' => 3, '#maxlength' => 3, - '#description' => t('Enter the number of login failures a host is allowed. After that amount is reached, the host will not be able to submit the log in form again, but can still browse the site contents as an anonymous user. This protection is effective during the time indicated at tracking time opion.'), + '#description' => t('Enter the number of login failures a host is allowed. After this amount is reached, the host will not be able to submit the log in form again, but can still browse the site contents as an anonymous user. This protection is effective during the time indicated at tracking time opion.'), '#field_suffix' => ''. t('Failed attempts') .'' ); $form['login_security_host_wrong_count_hard'] = array( @@ -68,7 +68,7 @@ function login_security_admin_settings() { '#element_validate' => array('_login_security_valid_integer'), '#size' => 3, '#maxlength' => 3, - '#description' => t('Enter the number of login failures a host is allowed. After that number is reached, the host will be blocked, no matter the username attempting to log in. The host blocking protection will not dissapear automatically and should be removed manually from the !access administration interface.', array('!access' => l(t('access rules'), 'admin/user/rules'))), + '#description' => t('Enter the number of login failures a host is allowed. After this number is reached, the host will be blocked, no matter the username attempting to log in. The host blocking protection will not dissapear automatically and should be removed manually from the !access administration interface.', array('!access' => l(t('access rules'), 'admin/user/rules'))), '#field_suffix' => ''. t('Failed attempts') .'' ); $form['login_security_activity_threshold'] = array( @@ -242,4 +242,4 @@ function _login_security_valid_user($element, &$form_state) { function _login_security_clean_tracked_events($form, &$form_state) { drupal_set_message(t('Login Security event track list is now empty.')); _login_security_remove_all_events(); -} \ No newline at end of file +} diff --git a/login_security.module b/login_security.module index d1dfcc7..0218122 100644 --- a/login_security.module +++ b/login_security.module @@ -27,7 +27,7 @@ define('LOGIN_SECURITY_USER_BLOCKED_EMAIL_SUBJECT', t("Security action: The user define('LOGIN_SECURITY_USER_BLOCKED_EMAIL_BODY', t("The user %username (%edit_uri) has been blocked at %site due to the amount of failed login attempts. Please check the logs for more information.")); define('LOGIN_SECURITY_LOGIN_ACTIVITY_EMAIL_USER', ''); define('LOGIN_SECURITY_LOGIN_ACTIVITY_EMAIL_SUBJECT', t("Security information: Unexpected login activity has been detected at %site.")); -define('LOGIN_SECURITY_LOGIN_ACTIVITY_EMAIL_BODY', t("The configured threshold of %activity_threshold logins has been reached with a tota of %tracking_current_count invalid login attempts. You should review your log information about login attempts at %site.")); +define('LOGIN_SECURITY_LOGIN_ACTIVITY_EMAIL_BODY', t("The configured threshold of %activity_threshold logins has been reached with a total of %tracking_current_count invalid login attempts. You should review your log information about login attempts at %site.")); define('LOGIN_SECURITY_THRESHOLD_NOTIFIED', FALSE); /**