From 3079d58e1ef1612b185f7e2e774d0c826402f166 Mon Sep 17 00:00:00 2001 From: nkh0472 <67589323+nkh0472@users.noreply.github.com> Date: Sun, 23 Jun 2024 10:15:08 +0800 Subject: [PATCH] Update sandman_zh_CN.ts --- SandboxiePlus/SandMan/sandman_zh_CN.ts | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/SandboxiePlus/SandMan/sandman_zh_CN.ts b/SandboxiePlus/SandMan/sandman_zh_CN.ts index 90813ad8..ac6e07ca 100644 --- a/SandboxiePlus/SandMan/sandman_zh_CN.ts +++ b/SandboxiePlus/SandMan/sandman_zh_CN.ts @@ -1317,7 +1317,7 @@ You can use %USER% to save each users sandbox to an own fodler. Prompt user whether to allow an exemption from the blockade - + 提示用户是否允许豁免封锁 @@ -7733,7 +7733,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Allow sandboxed windows to cover the taskbar Allow sandboxed windows to cover taskbar - 允许沙盒内窗口遮盖任务栏 + 允许沙盒内窗口遮盖任务栏 @@ -7807,13 +7807,13 @@ If you are a great patreaon supporter already, sandboxie can check online for an Prevent sandboxed processes from accessing system details through WMI Prevent sandboxed processes from accessing system deatils through WMI - 防止沙盒内的进程通过 WMI 访问系统信息 + 防止沙盒内的进程通过 WMI 访问系统信息 Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, 'tasklist.exe' can access a complete list of processes even if 'HideOtherBoxes' is enabled. Enable this option to prevent such behavior. Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,"tasklist.exe" could get full processes list even if "HideOtherBoxes" is opened through accessing WMI. Enable this option to stop these heavior. - 一些程序通过 WMI(一个Windows内置数据库) 读取系统信息,而不是通过正常方式。例如,尽管已经打开 "隐藏其它沙盒" ,"tasklist.exe" 仍然可以通过访问 WMI 获取全部进程列表。开启此选项来阻止这些行为。 + 一些程序通过 WMI(一个Windows内置数据库) 读取系统信息,而不是通过正常方式。例如,尽管已经打开 "隐藏其它沙盒" ,"tasklist.exe" 仍然可以通过访问 WMI 获取全部进程列表。开启此选项来阻止这些行为。