typo fixes

[skip ci]
This commit is contained in:
offhub 2024-10-19 15:35:28 +03:00
parent 01c6011972
commit 2a4204d1ca
No known key found for this signature in database
GPG Key ID: 7B12A8941851DA59
7 changed files with 9 additions and 9 deletions

View File

@ -126,5 +126,5 @@ jobs:
echo 'tailing->trailing' >> dictionary_code.txt echo 'tailing->trailing' >> dictionary_code.txt
# Only lowercase letters are allowed in --ignore-words-list # Only lowercase letters are allowed in --ignore-words-list
codespell --dictionary=dictionary.txt --dictionary=dictionary_rare.txt --dictionary=dictionary_code.txt \ codespell --dictionary=dictionary.txt --dictionary=dictionary_rare.txt --dictionary=dictionary_code.txt \
--ignore-words-list="wil,unknwn,tolen,pevent,doubleclick,parm,parms,etcp,ois,ba,ptd,modell,namesd,stdio,uint,errorstring,ontext,atend,deque,ecounter,nmake,namess,inh,daa,varient,lite,uis,emai,ws,slanguage,woh,tne,typpos,enew,shft,seh,ser,servent,socio-economic,rime,falt,infor,vor,lets,od,fo,aas," \ --ignore-words-list="wil,unknwn,tolen,pevent,doubleclick,parm,parms,etcp,ois,ba,ptd,modell,namesd,stdio,uint,errorstring,ontext,atend,deque,ecounter,nmake,namess,inh,daa,varient,lite,uis,emai,ws,slanguage,woh,tne,typpos,enew,shft,seh,ser,servent,socio-economic,rime,falt,infor,vor,lets,od,fo,aas,shs," \
--skip="./.git,./.github/workflows/codespell.yml,./dictionary*.txt,./Sandboxie/msgs/Text-*-*.txt,./Sandboxie/msgs/report/Report-*.txt,./SandboxiePlus/SandMan/*.ts,./Installer/Languages.iss,./Installer/isl/*.isl,./SandboxiePlus/SandMan/Troubleshooting/lang_*.json,./Sandboxie/install/build.bat,./SandboxieTools/ImBox/dc/crypto_fast/xts_fast.c" --skip="./.git,./.github/workflows/codespell.yml,./dictionary*.txt,./Sandboxie/msgs/Text-*-*.txt,./Sandboxie/msgs/report/Report-*.txt,./SandboxiePlus/SandMan/*.ts,./Installer/Languages.iss,./Installer/isl/*.isl,./SandboxiePlus/SandMan/Troubleshooting/lang_*.json,./Sandboxie/install/build.bat,./SandboxieTools/ImBox/dc/crypto_fast/xts_fast.c"

View File

@ -11,7 +11,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- to enable add 'EnableEFS=y' to the sandbox config - to enable add 'EnableEFS=y' to the sandbox config
- added break out document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741) - added break out document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741)
- use a syntax like this 'BreakoutDocument=C:\path\*.txt' to specify path and extension - use a syntax like this 'BreakoutDocument=C:\path\*.txt' to specify path and extension
- Security Warning: do not use paths terminated with a wild card like 'BreakoutDocument=C:\path\*' as thay will allow for executeion ot maliciouse scripts outside teh sandbox!!! - Security Warning: Do not use paths terminated with a wildcard like 'BreakoutDocument=C:\path\*' as they will allow for execution of malicious scripts outside the sandbox!
- added mechanism to set set box folder ACLs to allow only the creating user access 'LockBoxToUser=y' - added mechanism to set set box folder ACLs to allow only the creating user access 'LockBoxToUser=y'
- added option to keep original ACLs on sandboxed files 'UseOriginalACLs=y' - added option to keep original ACLs on sandboxed files 'UseOriginalACLs=y'
- added option 'OpenWPADEndpoint=y' [#4292](https://github.com/sandboxie-plus/Sandboxie/issues/4292) - added option 'OpenWPADEndpoint=y' [#4292](https://github.com/sandboxie-plus/Sandboxie/issues/4292)

View File

@ -1353,7 +1353,7 @@ _FX LONG Gui_GetRawInputDeviceInfo_impl(
memcpy(reqData, pData, lenData); memcpy(reqData, pData, lenData);
// GetRawInputDeviceInfoA accesses pcbSize without testing it for being not NULL // GetRawInputDeviceInfoA accesses pcbSize without testing it for being not NULL
// hence if the caller passes NULL we use a dummy value so that we dont crash the helper service // hence if the caller passes NULL we use a dummy value so that we don't crash the helper service
if (pcbSize) if (pcbSize)
req->cbSize = *pcbSize; req->cbSize = *pcbSize;
else else

View File

@ -222,7 +222,7 @@ _FX BOX *Process_GetForcedStartBox(
} }
// //
// initialize ParentName but only if the parrent is not a system process // initialize ParentName but only if the parent is not a system process
// //
if (!MyIsProcessRunningAsSystemAccount(ParentId)) { if (!MyIsProcessRunningAsSystemAccount(ParentId)) {

View File

@ -207,7 +207,7 @@ ULONG UserServer::StartWorker(ULONG session_id)
// //
// create an event object for the new User Worker process // create an event object for the new User Worker process
// the user process needs to be able to set this event // the user process needs to be able to set this event
// so set the apropriate security descriptor // so set the appropriate security descriptor
// //
SECURITY_DESCRIPTOR sd; SECURITY_DESCRIPTOR sd;
@ -286,8 +286,8 @@ ULONG UserServer::StartWorker(ULONG session_id)
} }
// //
// since the worker is runnign as user it can't open this service process, even for SYNCHRONIZE only // since the worker is running as user it can't open this service process, even for SYNCHRONIZE only
// hence we duplicate teh required token and use APC to pass it to our new worker. // hence we duplicate the required token and use APC to pass it to our new worker.
// //
HANDLE hThis; HANDLE hThis;

View File

@ -1328,7 +1328,7 @@
<item row="12" column="1" colspan="5"> <item row="12" column="1" colspan="5">
<widget class="QCheckBox" name="chkACLs"> <widget class="QCheckBox" name="chkACLs">
<property name="text"> <property name="text">
<string>Use original Access Control Entries for boxed Files and Folders (for MSIServer enable excemptions)</string> <string>Use original Access Control Entries for boxed Files and Folders (for MSIServer enable exemptions)</string>
</property> </property>
</widget> </widget>
</item> </item>

View File

@ -338,7 +338,7 @@ void COptionsWindow::OnBreakoutDoc()
Ext.prepend("*."); Ext.prepend("*.");
if (Ext.right(1) == "*") { if (Ext.right(1) == "*") {
QMessageBox::warning(this, "Sansboxie-Plus", tr("For security reasons it it not permitted to create entierly wildcard BreakoutDocument presets.")); QMessageBox::warning(this, "Sandboxie-Plus", tr("For security reasons it it not permitted to create entirely wildcard BreakoutDocument presets."));
return; return;
} }
QStringList BannedExt = QString(// from: https://learn.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/information-about-the-unsafe-file-list QStringList BannedExt = QString(// from: https://learn.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/information-about-the-unsafe-file-list