Merge branch 'master' into master

This commit is contained in:
爱编程的叶一笑 2024-06-22 22:00:22 +08:00 committed by GitHub
commit 1fd02a0d11
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 21 additions and 23 deletions

View File

@ -14,22 +14,23 @@ This project adheres to [Semantic Versioning](http://semver.org/).
### Added
- added SbieIni option to modify password-protected configs [#3903](https://github.com/sandboxie-plus/Sandboxie/issues/3903)
- usage: set|append|insert|delete [/passwd:********] <section> <setting> <value>
- note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line
- Note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line
- added checkbox for "PromptForInternetAccess" option to the New Box Wizard
- added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes.
- added option "HideSbieProcesses" to hide Sandboxie Work Process(SbieSvc,SandboxieRpcSs,etc.).
- added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes
- added option "HideSbieProcesses" to hide Sandboxie Work Process (SbieSvc, SandboxieRpcSs, etc.)
- added option "HideFirmwareInfo"
- when it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue
- added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI.
- added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox.
- added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI
- added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox
- added new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975)
- added RPC Port message filter mechanism to block unsafe RDP calls via the driver [#3930](https://github.com/sandboxie-plus/Sandboxie/issues/3930)
- Usage: "RpcPortFilter=Port,ID,Label" label is optional
- added "Job Object" Options page to colelct all job object related options
- added UI options for "ForceRestartAll" and "UseCreateToken" in OptionWindow.
### Changed
- Extend "Temp Template" to make it could delete local template section.
- Extend "Temp Template" to make it could delete local template section
### Fixed
- fixed security issue with the newly introduced experimental "UseCreateToken=y" mechanism
@ -39,7 +40,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- Sandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command line
- Note: Less Privileged App Container (LPAC) don't work with sandboxie currently
- fixed Problem accessing a relative symlink with a target that starts with a dot [#3981](https://github.com/sandboxie-plus/Sandboxie/issues/3981)
- fixed Bug - Can't open a sandbox's properties window via double-click in System Tray context window [#3861](https://github.com/sandboxie-plus/Sandboxie/issues/3861)
- fixed Can't open a sandbox's properties window via double-click in System Tray context window [#3861](https://github.com/sandboxie-plus/Sandboxie/issues/3861)
- fixed Delay in launching forced programs after version 1.12.9 [#3868](https://github.com/sandboxie-plus/Sandboxie/issues/3868)
- this issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems
- fixed issue with Misc Options list

View File

@ -1124,7 +1124,7 @@ Sie können %USER% verwenden, um für jeden Benutzer die Sandbox in einem eigene
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="746"/>
<source>Prompt user whether to allow an exemption from the blockade</source>
<translation type="unfinished"></translation>
<translation>Den Nutzer fragen, ob er eine Ausnahme von dieser Blockade erlauben will</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="752"/>
@ -7318,33 +7318,33 @@ an Stelle von &quot;*&quot;.</translation>
<message>
<location filename="Forms/OptionsWindow.ui" line="1711"/>
<source>Limit restrictions</source>
<translation type="unfinished"></translation>
<translation>Limit-Beschränkungen</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1629"/>
<location filename="Forms/OptionsWindow.ui" line="1636"/>
<source>Leave it blank to disable the setting(Unit:KB)</source>
<translation type="unfinished"></translation>
<translation>Leer lassen, um die Einstellung zu deaktivieren (Einheit: KB)</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1643"/>
<source>Leave it blank to disable the setting</source>
<translation type="unfinished"></translation>
<translation>Leer lassen, um die Einstellung zu deaktivieren</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1585"/>
<source>Total Processes Number Limit:</source>
<translation type="unfinished"></translation>
<translation>Limit Gesamtzahl an Prozessen:</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1615"/>
<source>Total Processes Memory Limit:</source>
<translation type="unfinished"></translation>
<translation>Speicherlimit aller Prozesse zusammen:</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1622"/>
<source>Single Process Memory Limit:</source>
<translation type="unfinished"></translation>
<translation>Speicherlimit einzelner Prozess:</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4522"/>
@ -7354,19 +7354,17 @@ an Stelle von &quot;*&quot;.</translation>
<message>
<location filename="Forms/OptionsWindow.ui" line="4711"/>
<source>Don&apos;t allow sandboxed processes to see processes running outside any boxes</source>
<translation type="unfinished"></translation>
<translation>Nicht erlauben, dass sandgeboxte Prozesse die Prozesse außerhalb der Boxen sehen können</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4718"/>
<source>Prevent sandboxed processes from accessing system details through WMI</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI</oldsource>
<translation type="unfinished"></translation>
<translation>Hindere sandgeboxte Prozesse daran, über WMI auf Systemdetails zuzugreifen</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4759"/>
<source>Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, &apos;tasklist.exe&apos; can access a complete list of processes even if &apos;HideOtherBoxes&apos; is enabled. Enable this option to prevent such behavior.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<translation type="unfinished"></translation>
<translation>Einige Programme rufen Systemdetails über WMI (Windows Management Instrumentation), eine integrierte Windows-Datenbank, ab, anstatt herkömmliche Methoden zu verwenden. Zum Beispiel kann &apos;tasklist.exe&apos; auf eine komplette Liste von Prozessen zugreifen, auch wenn &apos;HideOtherBoxes&apos; aktiviert ist. Aktivieren Sie diese Option, um ein solches Verhalten zu verhindern.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4860"/>
@ -7645,8 +7643,7 @@ Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine
<message>
<location filename="Forms/OptionsWindow.ui" line="811"/>
<source>Allow sandboxed windows to cover the taskbar</source>
<oldsource>Allow sandboxed windows to cover taskbar</oldsource>
<translation type="unfinished"></translation>
<translation>Erlaube sandgeboxten Fenstern die Taskleiste zu verdecken</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="855"/>
@ -7661,7 +7658,7 @@ Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine
<message>
<location filename="Forms/OptionsWindow.ui" line="1577"/>
<source>Job Object</source>
<translation type="unfinished"></translation>
<translation>Job-Objekt</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="2135"/>
@ -7848,7 +7845,7 @@ Um einen Prozess anzugeben verwenden Sie &apos;$:program.exe&apos; als Pfad.</tr
<message>
<location filename="Forms/OptionsWindow.ui" line="1650"/>
<source>Allow use of nested job objects (works on Windows 8 and later)</source>
<translation>Erlaube Verwendung von verschachtelten Jobobjekten (funktioniert ab Windows 8 und neuer)</translation>
<translation>Erlaube Verwendung von verschachtelten Job-Objekten (funktioniert ab Windows 8 und neuer)</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>