Update sandman_zh_CN.ts

This commit is contained in:
yuedongxu 2024-08-27 15:10:14 +08:00 committed by GitHub
parent 3909ad93c4
commit 44f8a4cbc8
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 23 additions and 22 deletions

View File

@ -5787,12 +5787,12 @@ Error: %1</source>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1340"/>
<source>Options: %1</source>
<translation type="unfinished"></translation>
<translation>%1</translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1345"/>
<source>Security/Privacy Enhanced &amp; App Boxes (SBox): %1</source>
<translation type="unfinished"></translation>
<translation>/&amp; (SBox): %1</translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1345"/>
@ -5800,7 +5800,7 @@ Error: %1</source>
<location filename="Windows/SettingsWindow.cpp" line="1347"/>
<location filename="Windows/SettingsWindow.cpp" line="1348"/>
<source>Enabled</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1345"/>
@ -5808,22 +5808,22 @@ Error: %1</source>
<location filename="Windows/SettingsWindow.cpp" line="1347"/>
<location filename="Windows/SettingsWindow.cpp" line="1348"/>
<source>Disabled</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1346"/>
<source>Encrypted Sandboxes (EBox): %1</source>
<translation type="unfinished"></translation>
<translation> (EBox): %1</translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1347"/>
<source>Network Interception (NetI): %1</source>
<translation type="unfinished"></translation>
<translation>(NetI): %1</translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1348"/>
<source>Sandboxie Desktop (Desk): %1</source>
<translation type="unfinished"></translation>
<translation>(Desk): %1</translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1363"/>
@ -5857,13 +5857,14 @@ Error: %1</source>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1409"/>
<source>Sandboxie-Plus - Get EVALUATION Certificate</source>
<translation type="unfinished"></translation>
<translation>Sandboxie-Plus - </translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1409"/>
<source>Please enter your email address to receive a free %1-day evaluation certificate, which will be issued to %2 and locked to the current hardware.
You can request up to %3 evaluation certificates for each unique hardware ID.</source>
<translation type="unfinished"></translation>
<translation>%1%2
ID请求%3</translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1435"/>
@ -5884,7 +5885,7 @@ You can request up to %3 evaluation certificates for each unique hardware ID.</s
<message>
<location filename="Windows/SettingsWindow.cpp" line="2018"/>
<source>The evaluation certificate has been successfully applied. Enjoy your free trial!</source>
<translation type="unfinished"></translation>
<translation> </translation>
</message>
<message>
<location filename="Engine/BoxObject.cpp" line="91"/>
@ -6133,12 +6134,12 @@ You can request up to %3 evaluation certificates for each unique hardware ID.</s
<message>
<location filename="Windows/SettingsWindow.cpp" line="1692"/>
<source>Set Force in Sandbox</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1701"/>
<source>Set Open Path in Sandbox</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/SettingsWindow.cpp" line="1990"/>
@ -8189,7 +8190,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Sandboxie 访
<translation>Sandboxie 访
OpenFilePath OpenKeyPath 宿宿
使 OpenPipePath OpenConfPath
@ -8240,13 +8241,13 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
<location filename="Forms/OptionsWindow.ui" line="1666"/>
<location filename="Forms/OptionsWindow.ui" line="1740"/>
<source>unlimited</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1724"/>
<location filename="Forms/OptionsWindow.ui" line="1754"/>
<source>bytes</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1837"/>
@ -8548,7 +8549,7 @@ The process match level has a higher priority than the specificity and describes
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">使 Sandboxie </translation>
<translation>使 Sandboxie </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -9186,19 +9187,19 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行
<location filename="Forms/OptionsWindow.ui" line="4790"/>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4916"/>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished">WMIWindows内置数据库使访WMI打开HideOtherBoxstasklist.exe</translation>
<translation>WMIWindows内置数据库使访WMI打开HideOtherBoxstasklist.exe</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4919"/>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished">WMI访问系统细节信息</translation>
<translation>WMI访问系统细节信息</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4851"/>
@ -9219,7 +9220,7 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行
<location filename="Forms/OptionsWindow.ui" line="4797"/>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished">HKCU\System\SbieCustom</translation>
<translation>HKCU\System\SbieCustom</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4800"/>
@ -9229,12 +9230,12 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行
<message>
<location filename="Forms/OptionsWindow.ui" line="4830"/>
<source>Hide Disk Serial Number</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4837"/>
<source>Obfuscate known unique identifiers in the registry</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="5142"/>