Go to your admin panel.
Click on Settings.
Click on Language Settings.
On your right you'll see "Manage Languages" screen.
On "Search for strings" ("Look for"), enter the e-mail confirmation phrases you want to change, or enter "email confirmation"... Find the strings you want to change and click "edit".
For emails, and here is what mydatery refers to as I mistakenly referred you not to the emails content, but to the "Manage Languages" Screen (my fault, I make errors):
Go to "Settings"
Click on "Email Templates"
You'll see what your looking for there.
;)
PS I have manually translated every inch of Dolphin 6.1.4, so my mind took me directly to the Lang Manager page--sorry for the mix up.
Every time I try to change anything and click SAVE I get a white screen with possible attack mesage! this is getting old....I cant change so many things in admin cos of this bug... all I changed was two words in the text of the joining email template.. and I get this:
a zillion times repeated in an email.
<p>--</p>
<p style=\"font: bold 10px Verdana; color:red\"><
SiteName> mail delivery system!!!
<br />Auto-generated e-mail, please, do not reply!!!</p></body></html>
Impact: 47 | Tags: xss, csrf, id, rfe, lfi, sqli
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: finds malicious attribute injection attempts | Tags: xss, csrf | ID: 69
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20
Description: Detects data: URL injections, VBS injections and common URI schemes | Tags: xss, rfe | ID: 27
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects comments to exploit firefox' faulty rendering and proprietary opera attacks | Tags: xss, csrf, id | ID: 36
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID: 43
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68
please fix this or tell me how I can! thanks
UPDATE: if I keep the charlengths the same it will save the change but still give the error. eg if I change 'have' to 'hate' and click save it will update.. but still gives possible attack screen !! if I change 'have' to have not' it wont even save the update..
For me this is a blocker as I cannot customize anything re these dim messages .. is someone fixing this?