From a94961513cc54917b318b5e5f79028659798fab0 Mon Sep 17 00:00:00 2001 From: Michael <33252157+APMichael@users.noreply.github.com> Date: Sat, 22 Jun 2024 12:35:06 +0200 Subject: [PATCH 1/2] Update sandman_de.ts - Added new translations. - Removed lines. --- SandboxiePlus/SandMan/sandman_de.ts | 29 +++++++++++++---------------- 1 file changed, 13 insertions(+), 16 deletions(-) diff --git a/SandboxiePlus/SandMan/sandman_de.ts b/SandboxiePlus/SandMan/sandman_de.ts index 7f47093b..90e3bbd3 100644 --- a/SandboxiePlus/SandMan/sandman_de.ts +++ b/SandboxiePlus/SandMan/sandman_de.ts @@ -1124,7 +1124,7 @@ Sie können %USER% verwenden, um für jeden Benutzer die Sandbox in einem eigene Prompt user whether to allow an exemption from the blockade - + Den Nutzer fragen, ob er eine Ausnahme von dieser Blockade erlauben will @@ -7318,33 +7318,33 @@ an Stelle von "*". Limit restrictions - + Limit-Beschränkungen Leave it blank to disable the setting(Unit:KB) - + Leer lassen, um die Einstellung zu deaktivieren (Einheit: KB) Leave it blank to disable the setting - + Leer lassen, um die Einstellung zu deaktivieren Total Processes Number Limit: - + Limit Gesamtzahl an Prozessen: Total Processes Memory Limit: - + Speicherlimit aller Prozesse zusammen: Single Process Memory Limit: - + Speicherlimit einzelner Prozess: @@ -7354,19 +7354,17 @@ an Stelle von "*". Don't allow sandboxed processes to see processes running outside any boxes - + Nicht erlauben, dass sandgeboxte Prozesse die Prozesse außerhalb der Boxen sehen können Prevent sandboxed processes from accessing system details through WMI - Prevent sandboxed processes from accessing system deatils through WMI - + Hindere sandgeboxte Prozesse daran, über WMI auf Systemdetails zuzugreifen Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, 'tasklist.exe' can access a complete list of processes even if 'HideOtherBoxes' is enabled. Enable this option to prevent such behavior. - Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,"tasklist.exe" could get full processes list even if "HideOtherBoxes" is opened through accessing WMI. Enable this option to stop these heavior. - + Einige Programme rufen Systemdetails über WMI (Windows Management Instrumentation), eine integrierte Windows-Datenbank, ab, anstatt herkömmliche Methoden zu verwenden. Zum Beispiel kann 'tasklist.exe' auf eine komplette Liste von Prozessen zugreifen, auch wenn 'HideOtherBoxes' aktiviert ist. Aktivieren Sie diese Option, um ein solches Verhalten zu verhindern. @@ -7645,8 +7643,7 @@ Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine Allow sandboxed windows to cover the taskbar - Allow sandboxed windows to cover taskbar - + Erlaube sandgeboxten Fenstern die Taskleiste zu verdecken @@ -7661,7 +7658,7 @@ Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine Job Object - + Job-Objekt @@ -7848,7 +7845,7 @@ Um einen Prozess anzugeben verwenden Sie '$:program.exe' als Pfad. Allow use of nested job objects (works on Windows 8 and later) - Erlaube Verwendung von verschachtelten Jobobjekten (funktioniert ab Windows 8 und neuer) + Erlaube Verwendung von verschachtelten Job-Objekten (funktioniert ab Windows 8 und neuer) From 8e7c314ad4974d6069e5dc71894a1b90a27d46be Mon Sep 17 00:00:00 2001 From: Michael <33252157+APMichael@users.noreply.github.com> Date: Sat, 22 Jun 2024 12:53:12 +0200 Subject: [PATCH 2/2] Update CHANGELOG.md - Minor corrections. --- CHANGELOG.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 3c2f3511..41700508 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -14,21 +14,21 @@ This project adheres to [Semantic Versioning](http://semver.org/). ### Added - added SbieIni option to modify password-protected configs [#3903](https://github.com/sandboxie-plus/Sandboxie/issues/3903) - usage: set|append|insert|delete [/passwd:********]
- - note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line + - Note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line - added checkbox for "PromptForInternetAccess" option to the New Box Wizard -- added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes. -- added option "HideSbieProcesses" to hide Sandboxie Work Process(SbieSvc,SandboxieRpcSs,etc.). +- added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes +- added option "HideSbieProcesses" to hide Sandboxie Work Process (SbieSvc, SandboxieRpcSs, etc.) - added option "HideFirmwareInfo" - when it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue -- added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI. -- added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox. +- added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI +- added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox - added new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975) - added RPC Port message filter mechanism to block unsafe RDP calls via the driver [#3930](https://github.com/sandboxie-plus/Sandboxie/issues/3930) - - Usage: "RpcPortFilter=Port,ID,Label" label is optional -- added "Job Object" Options page to colelct all job object related options + - usage: "RpcPortFilter=Port,ID,Label" label is optional +- added "Job Object" options page to colelct all job object related options ### Changed -- Extend "Temp Template" to make it could delete local template section. +- Extend "Temp Template" to make it could delete local template section ### Fixed - fixed security issue with the newly introduced experimental "UseCreateToken=y" mechanism @@ -38,7 +38,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - Sandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command line - Note: Less Privileged App Container (LPAC) don't work with sandboxie currently - fixed Problem accessing a relative symlink with a target that starts with a dot [#3981](https://github.com/sandboxie-plus/Sandboxie/issues/3981) -- fixed Bug - Can't open a sandbox's properties window via double-click in System Tray context window [#3861](https://github.com/sandboxie-plus/Sandboxie/issues/3861) +- fixed Can't open a sandbox's properties window via double-click in System Tray context window [#3861](https://github.com/sandboxie-plus/Sandboxie/issues/3861) - fixed Delay in launching forced programs after version 1.12.9 [#3868](https://github.com/sandboxie-plus/Sandboxie/issues/3868) - this issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems - fixed issue with Misc Options list