Merge branch 'master' into master

This commit is contained in:
爱编程的叶一笑 2024-06-22 22:00:22 +08:00 committed by GitHub
commit 1fd02a0d11
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 21 additions and 23 deletions

View File

@ -14,22 +14,23 @@ This project adheres to [Semantic Versioning](http://semver.org/).
### Added ### Added
- added SbieIni option to modify password-protected configs [#3903](https://github.com/sandboxie-plus/Sandboxie/issues/3903) - added SbieIni option to modify password-protected configs [#3903](https://github.com/sandboxie-plus/Sandboxie/issues/3903)
- usage: set|append|insert|delete [/passwd:********] <section> <setting> <value> - usage: set|append|insert|delete [/passwd:********] <section> <setting> <value>
- note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line - Note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line
- added checkbox for "PromptForInternetAccess" option to the New Box Wizard - added checkbox for "PromptForInternetAccess" option to the New Box Wizard
- added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes. - added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes
- added option "HideSbieProcesses" to hide Sandboxie Work Process(SbieSvc,SandboxieRpcSs,etc.). - added option "HideSbieProcesses" to hide Sandboxie Work Process (SbieSvc, SandboxieRpcSs, etc.)
- added option "HideFirmwareInfo" - added option "HideFirmwareInfo"
- when it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue - when it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue
- added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI. - added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI
- added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox. - added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox
- added new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975) - added new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975)
- added RPC Port message filter mechanism to block unsafe RDP calls via the driver [#3930](https://github.com/sandboxie-plus/Sandboxie/issues/3930) - added RPC Port message filter mechanism to block unsafe RDP calls via the driver [#3930](https://github.com/sandboxie-plus/Sandboxie/issues/3930)
- Usage: "RpcPortFilter=Port,ID,Label" label is optional - Usage: "RpcPortFilter=Port,ID,Label" label is optional
- added "Job Object" Options page to colelct all job object related options - added "Job Object" Options page to colelct all job object related options
- added UI options for "ForceRestartAll" and "UseCreateToken" in OptionWindow. - added UI options for "ForceRestartAll" and "UseCreateToken" in OptionWindow.
### Changed ### Changed
- Extend "Temp Template" to make it could delete local template section. - Extend "Temp Template" to make it could delete local template section
### Fixed ### Fixed
- fixed security issue with the newly introduced experimental "UseCreateToken=y" mechanism - fixed security issue with the newly introduced experimental "UseCreateToken=y" mechanism
@ -39,7 +40,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- Sandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command line - Sandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command line
- Note: Less Privileged App Container (LPAC) don't work with sandboxie currently - Note: Less Privileged App Container (LPAC) don't work with sandboxie currently
- fixed Problem accessing a relative symlink with a target that starts with a dot [#3981](https://github.com/sandboxie-plus/Sandboxie/issues/3981) - fixed Problem accessing a relative symlink with a target that starts with a dot [#3981](https://github.com/sandboxie-plus/Sandboxie/issues/3981)
- fixed Bug - Can't open a sandbox's properties window via double-click in System Tray context window [#3861](https://github.com/sandboxie-plus/Sandboxie/issues/3861) - fixed Can't open a sandbox's properties window via double-click in System Tray context window [#3861](https://github.com/sandboxie-plus/Sandboxie/issues/3861)
- fixed Delay in launching forced programs after version 1.12.9 [#3868](https://github.com/sandboxie-plus/Sandboxie/issues/3868) - fixed Delay in launching forced programs after version 1.12.9 [#3868](https://github.com/sandboxie-plus/Sandboxie/issues/3868)
- this issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems - this issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems
- fixed issue with Misc Options list - fixed issue with Misc Options list

View File

@ -1124,7 +1124,7 @@ Sie können %USER% verwenden, um für jeden Benutzer die Sandbox in einem eigene
<message> <message>
<location filename="Wizards/NewBoxWizard.cpp" line="746"/> <location filename="Wizards/NewBoxWizard.cpp" line="746"/>
<source>Prompt user whether to allow an exemption from the blockade</source> <source>Prompt user whether to allow an exemption from the blockade</source>
<translation type="unfinished"></translation> <translation>Den Nutzer fragen, ob er eine Ausnahme von dieser Blockade erlauben will</translation>
</message> </message>
<message> <message>
<location filename="Wizards/NewBoxWizard.cpp" line="752"/> <location filename="Wizards/NewBoxWizard.cpp" line="752"/>
@ -7318,33 +7318,33 @@ an Stelle von &quot;*&quot;.</translation>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="1711"/> <location filename="Forms/OptionsWindow.ui" line="1711"/>
<source>Limit restrictions</source> <source>Limit restrictions</source>
<translation type="unfinished"></translation> <translation>Limit-Beschränkungen</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="1629"/> <location filename="Forms/OptionsWindow.ui" line="1629"/>
<location filename="Forms/OptionsWindow.ui" line="1636"/> <location filename="Forms/OptionsWindow.ui" line="1636"/>
<source>Leave it blank to disable the setting(Unit:KB)</source> <source>Leave it blank to disable the setting(Unit:KB)</source>
<translation type="unfinished"></translation> <translation>Leer lassen, um die Einstellung zu deaktivieren (Einheit: KB)</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="1643"/> <location filename="Forms/OptionsWindow.ui" line="1643"/>
<source>Leave it blank to disable the setting</source> <source>Leave it blank to disable the setting</source>
<translation type="unfinished"></translation> <translation>Leer lassen, um die Einstellung zu deaktivieren</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="1585"/> <location filename="Forms/OptionsWindow.ui" line="1585"/>
<source>Total Processes Number Limit:</source> <source>Total Processes Number Limit:</source>
<translation type="unfinished"></translation> <translation>Limit Gesamtzahl an Prozessen:</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="1615"/> <location filename="Forms/OptionsWindow.ui" line="1615"/>
<source>Total Processes Memory Limit:</source> <source>Total Processes Memory Limit:</source>
<translation type="unfinished"></translation> <translation>Speicherlimit aller Prozesse zusammen:</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="1622"/> <location filename="Forms/OptionsWindow.ui" line="1622"/>
<source>Single Process Memory Limit:</source> <source>Single Process Memory Limit:</source>
<translation type="unfinished"></translation> <translation>Speicherlimit einzelner Prozess:</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="4522"/> <location filename="Forms/OptionsWindow.ui" line="4522"/>
@ -7354,19 +7354,17 @@ an Stelle von &quot;*&quot;.</translation>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="4711"/> <location filename="Forms/OptionsWindow.ui" line="4711"/>
<source>Don&apos;t allow sandboxed processes to see processes running outside any boxes</source> <source>Don&apos;t allow sandboxed processes to see processes running outside any boxes</source>
<translation type="unfinished"></translation> <translation>Nicht erlauben, dass sandgeboxte Prozesse die Prozesse außerhalb der Boxen sehen können</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="4718"/> <location filename="Forms/OptionsWindow.ui" line="4718"/>
<source>Prevent sandboxed processes from accessing system details through WMI</source> <source>Prevent sandboxed processes from accessing system details through WMI</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI</oldsource> <translation>Hindere sandgeboxte Prozesse daran, über WMI auf Systemdetails zuzugreifen</translation>
<translation type="unfinished"></translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="4759"/> <location filename="Forms/OptionsWindow.ui" line="4759"/>
<source>Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, &apos;tasklist.exe&apos; can access a complete list of processes even if &apos;HideOtherBoxes&apos; is enabled. Enable this option to prevent such behavior.</source> <source>Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, &apos;tasklist.exe&apos; can access a complete list of processes even if &apos;HideOtherBoxes&apos; is enabled. Enable this option to prevent such behavior.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource> <translation>Einige Programme rufen Systemdetails über WMI (Windows Management Instrumentation), eine integrierte Windows-Datenbank, ab, anstatt herkömmliche Methoden zu verwenden. Zum Beispiel kann &apos;tasklist.exe&apos; auf eine komplette Liste von Prozessen zugreifen, auch wenn &apos;HideOtherBoxes&apos; aktiviert ist. Aktivieren Sie diese Option, um ein solches Verhalten zu verhindern.</translation>
<translation type="unfinished"></translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="4860"/> <location filename="Forms/OptionsWindow.ui" line="4860"/>
@ -7645,8 +7643,7 @@ Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="811"/> <location filename="Forms/OptionsWindow.ui" line="811"/>
<source>Allow sandboxed windows to cover the taskbar</source> <source>Allow sandboxed windows to cover the taskbar</source>
<oldsource>Allow sandboxed windows to cover taskbar</oldsource> <translation>Erlaube sandgeboxten Fenstern die Taskleiste zu verdecken</translation>
<translation type="unfinished"></translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="855"/> <location filename="Forms/OptionsWindow.ui" line="855"/>
@ -7661,7 +7658,7 @@ Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="1577"/> <location filename="Forms/OptionsWindow.ui" line="1577"/>
<source>Job Object</source> <source>Job Object</source>
<translation type="unfinished"></translation> <translation>Job-Objekt</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="2135"/> <location filename="Forms/OptionsWindow.ui" line="2135"/>
@ -7848,7 +7845,7 @@ Um einen Prozess anzugeben verwenden Sie &apos;$:program.exe&apos; als Pfad.</tr
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="1650"/> <location filename="Forms/OptionsWindow.ui" line="1650"/>
<source>Allow use of nested job objects (works on Windows 8 and later)</source> <source>Allow use of nested job objects (works on Windows 8 and later)</source>
<translation>Erlaube Verwendung von verschachtelten Jobobjekten (funktioniert ab Windows 8 und neuer)</translation> <translation>Erlaube Verwendung von verschachtelten Job-Objekten (funktioniert ab Windows 8 und neuer)</translation>
</message> </message>
<message> <message>
<location filename="Forms/OptionsWindow.ui" line="887"/> <location filename="Forms/OptionsWindow.ui" line="887"/>