Update SBIE language reports (RunReport)

This commit is contained in:
github-actions[bot] 2023-11-06 01:29:31 +00:00
parent b37c657666
commit 3e50400f69
1 changed files with 3 additions and 407 deletions

View File

@ -14,178 +14,10 @@ SBIE1231 Initialization failed for process %3 %2
SBIE1305 Blocked sandboxed image from being loaded - %2
.
1316;pop;inf;01
SBIE1316 Blocked request to generate device event in the sandbox
.
1317;pop;inf;02
SBIE1317 Blocked '%2' from trying to access sandbox file root '%3'
.
1318;pop;inf;02
SBIE1318 Blocked '%2' from trying to access sandboxed process '%3'
.
1319;pop;inf;01
SBIE1319 Blocked spooler print to file, %2 %3
.
1320;pop;wrn;01
SBIE1320 To allow print spooler to write outside the sandbox for this process, please double-click on this message line
.
1399;pop;inf;01
%0
.
2111;pop;inf;01
SBIE2111 Process is not accessible: %3, call %2
.
2112;pop;inf;01
SBIE2112 Object is not accessible: %3, call %2
.
2113;pop;inf;01
SBIE2113 File is too large to copy into sandbox, creating empty file - %2
.
2114;pop;inf;01
SBIE2114 File is too large to copy into sandbox, denying access - %2
.
2115;pop;inf;01
SBIE2115 File is too large to copy into sandbox, opening in read only - %2
.
2180;pop;inf;01
SBIE2180 LowLevel.dll error %2
.
2181;pop;inf;01
SBIE2181 LowLevel.dll detour failed to load SbieDll.dll into target process.
.
2194;pop;inf;01
SBIE2194 MSI installer requires %2 option to be set in the ini, what however weakens the isolation.
.
2195;pop;inf;01
SBIE2195 To run Explorer.exe sandboxed, the access for COM infrastructure must not be Open.
.
2196;pop;inf;01
SBIE2196 To run the MSI Installer sandboxed, the access for COM infrastructure must not be Open.
.
2198;pop;inf;01
%0
.
2224;pop;wrn;01
SBIE2224 Sandboxed program has crashed: %2
.
2225;pop;wrn;01
SBIE2225 An attempt was made to access an EFS file: %2
.
2226;pop;wrn;01
SBIE2226 Process failed to start due to missing elevation, to resolve add "ApplyElevateCreateProcessFix=y" to the ini section for this box %2
.
2227;pop;wrn;01
SBIE2227 '%2' is located on a volume which does not support 8.3 naming. This can cause issues with older applications and installers.
.
2230;pop;wrn;01
SBIE2230 Failed to mount root for %2
.
2231;pop;wrn;01
SBIE2231 Junction Target mismatch %2
.
2232;pop;wrn;01
SBIE2232 The ImDisk Driver is not loaded
.
2233;pop;wrn;01
SBIE2233 Cannot control the ImDisk Driver: %2
.
2234;pop;wrn;01
SBIE2234 No free Drive letter found for temporary mount
.
2235;pop;wrn;01
SBIE2235 Error undefining temporary drive letter: "%2"
.
2236;pop;wrn;01
SBIE2236 %2 could not be invoked (perhaps it is not installed?)
.
2237;pop;wrn;01
SBIE2237 Failed to unmount root %2
.
2238;pop;wrn;01
SBIE2238 Ram Disk size is not configured, or to small, set RamDiskSizeKb=1048576 (1GB in Kilobytes) in the [GlobalSettings] ini section.
.
2239;pop;wrn;01
SBIE2239 The root folder of sandbox %2 must be empty in order to mount a volume to it.
.
2240;pop;wrn;01
SBIE2240 Timeout when trying to mount ImDisk volume %2
.
2241;pop;wrn;01
SBIE2241 Box image file %2 could not be opened
.
2242;pop;wrn;01
SBIE2242 Failed to mount box image, The specified cipher is not supported
.
2243;pop;wrn;01
SBIE2243 Failed to mount box image, Wrong password
.
2244;pop;wrn;01
SBIE2244 Failed to mount box image, Password required
.
2246;pop;wrn;01
SBIE2246 Failed to mount box image, ImBox error %2
.
2302;pop;err;01
SBIE2302 Process image configuration conflict: %2
.
2325;pop;err;01
SBIE2325 Debug: %2
.
2335;pop;err;01
SBIE2335 Initialization failed for process %2
.
2336;pop;err;01
SBIE2336 Error in GUI server: %2
.
2337;pop;err;01
SBIE2337 Failed to start program: %2
.
2338;pop;err;01
SBIE2338 Encountered unsupported architecture in process: %2
.
9234;evt;err;01
SBIE9234 Service startup error %2
.
@ -194,46 +26,6 @@ SBIE9234 Service startup error %2
Type the name of a program or path to open the following file in the current sandbox:
.
3315;txt;01
Deleting Sandbox contents
.
3316;txt;01
Do you want to abort the operation?
.
3317;txt;01
Preparing to delete: %2
.
3318;txt;01
Deleting: %2
.
3426;txt;01
&Always on Top
.
3504;txt;01
&Support Sandboxie with Donations
.
3505;txt;01
Contribute to Sandboxie
.
3506;txt;01
Get Supporter Certificate
.
3507;txt;01
Apply Supporter Certificate
.
3457;txt;01
&Sandboxie Forum (Web)
.
3459;txt;01
Allow direct access to qWave driver (Google Hangouts)
.
@ -242,196 +34,10 @@ Allow direct access to qWave driver (Google Hangouts)
Function hooking customizations
.
3467;txt;01
Upgrade to Sandboxie-Plus
.
3468;txt;01
Sandboxie-Plus Migration Guide
.
3469;txt;01
What's new in Sandboxie-Plus
.
3484;txt;01
Resource Access
.
3955;txt;01
Network Files
.
3956;txt;01
Network files and folders are normally visible to sandboxed applications.
.
3957;txt;01
If you wish to block sandboxed applications from accessing files and folders on your network, you can enable this setting. Individual files and folders can be opened for sandboxed applications by adding them under Resource Access -> File Access.
.
3958;txt;01
Block network files and folders unless specifically opened.
.
4104;txt;01
Resource Access::Network Access
.
4105;txt;01
Network Access (Firewall)
.
4295;txt;01
Default exclusions File Migration presets
.
4296;txt;01
Default RPC Port Bindings
.
4297;txt;01
Open Bluetooth RPC port
.
4298;txt;01
Open Smart Card RPC port
.
4299;txt;01
Open Simple Service Discovery Protocol (SSDP, UPnP) RPC port
.
4300;txt;01
Open additional RPC Port Bindings
.
4306;txt;01
Open RPC Port Bindings for UAC
.
4307;txt;01
Block common telemetry processes
.
4308;txt;01
Filter access to \Devices\
.
4341;txt;01
Allow direct access to %2 notes
.
4342;txt;01
Enable %2 compatibility workaround
.
4393;txt;01
Media Players
.
4394;txt;01
The following exclusions allow Media players running in this sandbox to access files outside the sandbox.
.
4395;txt;01
Allow %2 direct access to the Photo folder for easier screen capture.
.
4396;txt;01
Torrent Clients
.
4397;txt;01
The following exclusions allow Torrent clients running in this sandbox to access files outside the sandbox.
.
4398;txt;01
Allow %2 direct access to the Music folder for easier music library management.
.
6001;txt;01
The classic Sandboxie UI (SbieCtrl.exe) has very limited
resource monitoring and event tracing capabilities.
For optimal troubleshooting it is highly advisable
to install the new UI, Sandboxie-Plus (SandMan.exe),
which provides excellent tracing and monitoring capabilities.
Do you want to download Sandboxie-Plus now?
.
6002;txt;01
Visit <a ID="whats_new">sandboxie-plus.com</a> to learn about the new functionality of Sandboxie-Plus,
or directly click <a ID="upgrade">here</a> to download the latest Sandboxie-Plus installer.
.
6003;txt;01
The legacy UI of Sandboxie classic does not implement support for the network firewall functionality.
You can though configure the feature supported by the core components using the ini file, rules are structured like following:
NetworkAccess=iexplorer.exe,Allow; Port=80,443; Address=192.168.0.1-192.168.100.255; Protocol=TCP
If you prefer to use a UI to control these options, please upgrade to Sandboxie-Plus, which has full UI support for all new features.
.
6004;pop;err;01
The configuration %3 of box %2 requires a supporter certificate. Processes in this box will be terminated after 5 minutes. For prolonged use, please consider supporting this project.
.
6005;txt;01
Note: Without administrative privileges installers will fail to start in the sandbox. Sandboxie-Plus offers an option to make many installers succeed without those privileges. You can enable this option also in the classic build manually, by adding "FakeAdminRights=y" to the ini section for this box.
.
6006;txt;01
The legacy UI of Sandboxie classic implements only support for a couple of restriction options.
Additional options like "ClosePrintSpooler=y", "OpenClipboard=n", "BlockNetParam=n" and much more can be set in the ini section for this box.
The modern UI (SandMan.exe) also offers more customization options for Start/Run and Internet access restrictions.
If you would prefer to use a UI to control these options, please upgrade to Sandboxie-Plus, which has full UI support for all new features.
.
6007;txt;01
Sandboxie Plus offers enhanced privacy protection by switching the old behavior from a black-list mode, i.e., allowing read access to the entire drive, except blocked by Closed Path or Write Path, to a white-list mode where sandboxed programs are only allowed to read generic system locations and read access to most user data must be first explicitly granted.
The legacy UI of Sandboxie classic does not implement support for this mode of operation. Although it can be configured using the ini file, it is recommended to use the modern Sandboxie-Plus UI (SandMan.exe) if you want to use privacy enhanced boxes.
.
6008;pop;err;01
The configuration %3 of box %2 requires a supporter certificate and can not be used without it.
.
6009;pop;err;01
The configuration %3 of box %2 requires an advanced supporter certificate.
.
6010;txt;01
You have installed Sandboxie more than %2 days ago.
So, you think David and the contributors are doing a great job?
Why don't you show it by supporting the project and getting a Supporter Certificate?
Sandboxie without a valid supporter certificate will now pause for a few seconds, to give you time to contemplate the possibility of supporting the project.
.
6011;txt;01
Wait
.
6012;txt;01
Continue
.
6013;txt;01
Quit
.
6014;txt;01
Get Certificate
.
7988;txt;01
Your Supporter Certificate is valid, Thank You :-)
.
@ -472,13 +78,8 @@ SBIE1224 Nie mo1303;pop;inf;01
SBIE1303 W tym samym czasie mo1304;pop;inf;01
SBIE1304 Zablokowano proces '%2' wej1310;pop;inf;01
SBIE1310 Rozszerzone funkcje s1311;pop;inf;01
SBIE1311 Zablokowano prób1315;pop;inf;01
SBIE1315 Prawdopodobnie z powodu konfliktu z oprogramowaniem: %2
.
2315;pop;err;01
SBIE2315 Nie mo2334;pop;err;01
SBIE2334 Nie mo9201;evt;err;01
SBIE1311 Zablokowano prób2315;pop;err;01
SBIE2315 Nie mo9201;evt;err;01
SBIE9201 B9202;evt;err;01
SBIE9202 B9203;evt;err;01
SBIE9202 B9204;evt;err;01
@ -504,10 +105,6 @@ Kliknij, aby zamkn3503;txt;01
Eksperymentalna ochrona (64-bit)
.
3455;txt;01
Za&rejestruj Sandboxie
.
3458;txt;01
Zezwól na bezpo3542;txt;01
Tryb Eksperymentalnej ochrony wzmacnia ochron3543;txt;01
@ -523,8 +120,7 @@ Zezw
Dost3953;txt;01
Zezwól programom w tej piaskownicy na zmian3954;txt;01
Zezwalaj programom zmienia3946;txt;01
Zalecane jest, pozostawienie tego ustawienia w3947;txt;01
Aby uaktywni7866;txt;01
Zalecane jest, pozostawienie tego ustawienia w7866;txt;01
W 64-bitowym systemie Windows, nale7901;txt;01
Mened7902;txt;01
Kod systemu %2