Update sandman_zh_CN.ts

Co-authored-by: okrc <okrc@hexo.dev>
This commit is contained in:
Zerorigin 2022-10-08 23:08:29 +08:00 committed by GitHub
parent c9929c626a
commit 0da6d77c19
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 13 additions and 13 deletions

View File

@ -732,47 +732,47 @@ Note: The update check is often behind the latest GitHub release to ensure that
<message>
<location filename="Windows/OptionsAccess.cpp" line="319"/>
<source>Regular Sandboxie behavior - allow read and also copy on write.</source>
<translation type="unfinished"></translation>
<translation> - </translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="320"/>
<source>Allow write-access outside the sandbox.</source>
<translation type="unfinished"></translation>
<translation>()</translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="321"/>
<source>Allow write-access outside the sandbox, also for applications installed inside the sandbox.</source>
<translation type="unfinished"></translation>
<translation>()</translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="322"/>
<source>Don&apos;t rename window classes.</source>
<translation type="unfinished"></translation>
<translation> Windows </translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="323"/>
<source>Deny access to host location and prevent creation of sandboxed copies.</source>
<translation type="unfinished"></translation>
<translation>访</translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="324"/>
<source>Block access to WinRT class.</source>
<translation type="unfinished"></translation>
<translation> WinRT 访</translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="325"/>
<source>Allow read-only access only.</source>
<translation type="unfinished"></translation>
<translation>访</translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="326"/>
<source>Hide host files, folders or registry keys from sandboxed processes.</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="327"/>
<source>Ignore UIPI restrictions for processes.</source>
<translation type="unfinished"></translation>
<translation> UIPI </translation>
</message>
<message>
<location filename="Windows/OptionsAccess.cpp" line="336"/>
@ -4278,7 +4278,7 @@ No will choose: %2</source>
<message>
<location filename="Forms/OptionsWindow.ui" line="1446"/>
<source>Force Folder</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1922"/>
@ -4290,7 +4290,7 @@ No will choose: %2</source>
<message>
<location filename="Forms/OptionsWindow.ui" line="1403"/>
<source>Force Program</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1319"/>
@ -4788,12 +4788,12 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to
<message>
<location filename="Forms/OptionsWindow.ui" line="1535"/>
<source>Breakout Program</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1561"/>
<source>Breakout Folder</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1568"/>