From 2a4204d1cade678edf9eb5e94dd23c729e6af320 Mon Sep 17 00:00:00 2001 From: offhub <6871698+offhub@users.noreply.github.com> Date: Sat, 19 Oct 2024 15:35:28 +0300 Subject: [PATCH] typo fixes [skip ci] --- .github/workflows/codespell.yml | 2 +- CHANGELOG.md | 2 +- Sandboxie/core/dll/guimisc.c | 2 +- Sandboxie/core/drv/process_force.c | 2 +- Sandboxie/core/svc/UserServer.cpp | 6 +++--- SandboxiePlus/SandMan/Forms/OptionsWindow.ui | 2 +- SandboxiePlus/SandMan/Windows/OptionsForce.cpp | 2 +- 7 files changed, 9 insertions(+), 9 deletions(-) diff --git a/.github/workflows/codespell.yml b/.github/workflows/codespell.yml index e485a4a8..1b957dbe 100644 --- a/.github/workflows/codespell.yml +++ b/.github/workflows/codespell.yml @@ -126,5 +126,5 @@ jobs: echo 'tailing->trailing' >> dictionary_code.txt # Only lowercase letters are allowed in --ignore-words-list codespell --dictionary=dictionary.txt --dictionary=dictionary_rare.txt --dictionary=dictionary_code.txt \ - --ignore-words-list="wil,unknwn,tolen,pevent,doubleclick,parm,parms,etcp,ois,ba,ptd,modell,namesd,stdio,uint,errorstring,ontext,atend,deque,ecounter,nmake,namess,inh,daa,varient,lite,uis,emai,ws,slanguage,woh,tne,typpos,enew,shft,seh,ser,servent,socio-economic,rime,falt,infor,vor,lets,od,fo,aas," \ + --ignore-words-list="wil,unknwn,tolen,pevent,doubleclick,parm,parms,etcp,ois,ba,ptd,modell,namesd,stdio,uint,errorstring,ontext,atend,deque,ecounter,nmake,namess,inh,daa,varient,lite,uis,emai,ws,slanguage,woh,tne,typpos,enew,shft,seh,ser,servent,socio-economic,rime,falt,infor,vor,lets,od,fo,aas,shs," \ --skip="./.git,./.github/workflows/codespell.yml,./dictionary*.txt,./Sandboxie/msgs/Text-*-*.txt,./Sandboxie/msgs/report/Report-*.txt,./SandboxiePlus/SandMan/*.ts,./Installer/Languages.iss,./Installer/isl/*.isl,./SandboxiePlus/SandMan/Troubleshooting/lang_*.json,./Sandboxie/install/build.bat,./SandboxieTools/ImBox/dc/crypto_fast/xts_fast.c" diff --git a/CHANGELOG.md b/CHANGELOG.md index 668dd1e1..92fd86ef 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -11,7 +11,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - to enable add 'EnableEFS=y' to the sandbox config - added break out document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741) - use a syntax like this 'BreakoutDocument=C:\path\*.txt' to specify path and extension - - Security Warning: do not use paths terminated with a wild card like 'BreakoutDocument=C:\path\*' as thay will allow for executeion ot maliciouse scripts outside teh sandbox!!! + - Security Warning: Do not use paths terminated with a wildcard like 'BreakoutDocument=C:\path\*' as they will allow for execution of malicious scripts outside the sandbox! - added mechanism to set set box folder ACLs to allow only the creating user access 'LockBoxToUser=y' - added option to keep original ACLs on sandboxed files 'UseOriginalACLs=y' - added option 'OpenWPADEndpoint=y' [#4292](https://github.com/sandboxie-plus/Sandboxie/issues/4292) diff --git a/Sandboxie/core/dll/guimisc.c b/Sandboxie/core/dll/guimisc.c index 53317960..f51b2f95 100644 --- a/Sandboxie/core/dll/guimisc.c +++ b/Sandboxie/core/dll/guimisc.c @@ -1353,7 +1353,7 @@ _FX LONG Gui_GetRawInputDeviceInfo_impl( memcpy(reqData, pData, lenData); // GetRawInputDeviceInfoA accesses pcbSize without testing it for being not NULL - // hence if the caller passes NULL we use a dummy value so that we dont crash the helper service + // hence if the caller passes NULL we use a dummy value so that we don't crash the helper service if (pcbSize) req->cbSize = *pcbSize; else diff --git a/Sandboxie/core/drv/process_force.c b/Sandboxie/core/drv/process_force.c index 1d442d7a..fad79906 100644 --- a/Sandboxie/core/drv/process_force.c +++ b/Sandboxie/core/drv/process_force.c @@ -222,7 +222,7 @@ _FX BOX *Process_GetForcedStartBox( } // - // initialize ParentName but only if the parrent is not a system process + // initialize ParentName but only if the parent is not a system process // if (!MyIsProcessRunningAsSystemAccount(ParentId)) { diff --git a/Sandboxie/core/svc/UserServer.cpp b/Sandboxie/core/svc/UserServer.cpp index 53482d81..1ca39208 100644 --- a/Sandboxie/core/svc/UserServer.cpp +++ b/Sandboxie/core/svc/UserServer.cpp @@ -207,7 +207,7 @@ ULONG UserServer::StartWorker(ULONG session_id) // // create an event object for the new User Worker process // the user process needs to be able to set this event - // so set the apropriate security descriptor + // so set the appropriate security descriptor // SECURITY_DESCRIPTOR sd; @@ -286,8 +286,8 @@ ULONG UserServer::StartWorker(ULONG session_id) } // - // since the worker is runnign as user it can't open this service process, even for SYNCHRONIZE only - // hence we duplicate teh required token and use APC to pass it to our new worker. + // since the worker is running as user it can't open this service process, even for SYNCHRONIZE only + // hence we duplicate the required token and use APC to pass it to our new worker. // HANDLE hThis; diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui index 8b76c954..8e5f3913 100644 --- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui +++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui @@ -1328,7 +1328,7 @@ - Use original Access Control Entries for boxed Files and Folders (for MSIServer enable excemptions) + Use original Access Control Entries for boxed Files and Folders (for MSIServer enable exemptions) diff --git a/SandboxiePlus/SandMan/Windows/OptionsForce.cpp b/SandboxiePlus/SandMan/Windows/OptionsForce.cpp index e65286c3..02fcbe1a 100644 --- a/SandboxiePlus/SandMan/Windows/OptionsForce.cpp +++ b/SandboxiePlus/SandMan/Windows/OptionsForce.cpp @@ -338,7 +338,7 @@ void COptionsWindow::OnBreakoutDoc() Ext.prepend("*."); if (Ext.right(1) == "*") { - QMessageBox::warning(this, "Sansboxie-Plus", tr("For security reasons it it not permitted to create entierly wildcard BreakoutDocument presets.")); + QMessageBox::warning(this, "Sandboxie-Plus", tr("For security reasons it it not permitted to create entirely wildcard BreakoutDocument presets.")); return; } QStringList BannedExt = QString(// from: https://learn.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/information-about-the-unsafe-file-list