From 47e0bd94cc0e303e171bd19e97f23477944ef1b2 Mon Sep 17 00:00:00 2001
From: offhub <6871698+offhub@users.noreply.github.com>
Date: Mon, 18 Mar 2024 20:56:34 +0300
Subject: [PATCH] Fix text inconsistencies
Fixes some text inconsistencies between the user interface and the changelog.
https://github.com/sandboxie-plus/Sandboxie/pull/3714
https://github.com/sandboxie-plus/Sandboxie/pull/3715
---
CHANGELOG.md | 8 ++++----
SandboxiePlus/SandMan/Forms/OptionsWindow.ui | 8 ++++----
SandboxiePlus/SandMan/Wizards/NewBoxWizard.cpp | 2 +-
3 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 56bcbdc8..38747e0e 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -7,9 +7,9 @@ This project adheres to [Semantic Versioning](http://semver.org/).
## [1.13.4 / 5.68.4] - 2024-02-??
### Added
-- added option to prevent sandboxed programs from accessing the images of the window outside the sandbox [#1985](https://github.com/sandboxie-plus/Sandboxie/issues/1985) (thanks Yeyixiao)
+- added option to prevent sandboxed processes from accessing the images of the window outside the sandbox [#1985](https://github.com/sandboxie-plus/Sandboxie/issues/1985) (thanks Yeyixiao)
- it can be enabled with "IsBlockCapture=y"
- - see the sandbox option "Block obtain an image of an un-sandboxied window through Windows public method" in SandMan UI
+ - see the sandbox option "Prevent sandboxed processes from using public methods to capture window images" in SandMan UI
### Fixed
- fixed issue with symlinks related to startmenu folders
@@ -35,10 +35,10 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- added menu entry to restart SandMan as admin [#3581](https://github.com/sandboxie-plus/Sandboxie/issues/3581) (thanks Yeyixiao)
- added option to block taking screen capture/screenshot of sandboxed processes (thanks Yeyixiao)
- it can be enabled with "IsProtectScreen=y"
- - see the sandbox option "Prevents getting an image of the window in the sandbox" in SandMan UI
+ - see the sandbox option "Prevent processes from capturing window images from sandboxed windows" in SandMan UI
- added option to prevent sandboxed processes from interfering with power operations [#3640](https://github.com/sandboxie-plus/Sandboxie/issues/3640) (thanks Yeyixiao)
- it can be enabled with "BlockInterferePower=y"
- - see the sandbox option "Prevents processes in the sandbox from interfering with power operations" in SandMan UI
+ - see the sandbox option "Prevent sandboxed processes from interfering with power operations" in SandMan UI
- added new pattern mechanism using a `**` as a placeholder to indicate an arbitrary path element not containing a `\` [1ff2867](https://github.com/sandboxie-plus/Sandboxie/commit/1ff28679b0557a642d29f1651a90a8f7fec77171)
### Changed
diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui
index b80ba149..43c20cb8 100644
--- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui
+++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui
@@ -813,14 +813,14 @@
-
- Prevents processes in the sandbox from interfering with power operation
+ Prevent sandboxed processes from interfering with power operations
-
- Block process from taking screenshots of windows not belonging to the containing sandbox
+ Prevent sandboxed processes from using public methods to capture window images
@@ -1390,7 +1390,7 @@
-
- Prevents getting an image of the window in the sandbox.
+ Prevent processes from capturing window images from sandboxed windows
@@ -3669,7 +3669,7 @@ The process match level has a higher priority than the specificity and describes
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.
- Prevent sandboxes programs installed on host from loading dll's from the sandbox
+ Prevent sandboxed programs installed on the host from loading DLLs from the sandbox
diff --git a/SandboxiePlus/SandMan/Wizards/NewBoxWizard.cpp b/SandboxiePlus/SandMan/Wizards/NewBoxWizard.cpp
index ce2498ab..778cf67c 100644
--- a/SandboxiePlus/SandMan/Wizards/NewBoxWizard.cpp
+++ b/SandboxiePlus/SandMan/Wizards/NewBoxWizard.cpp
@@ -671,7 +671,7 @@ CAdvancedPage::CAdvancedPage(QWidget *parent)
layout->addWidget(m_pBoxToken, row++, 1, 1, 3);
registerField("boxToken", m_pBoxToken);
- QCheckBox* pImageProtection = new QCheckBox(tr("Prevent sandboxes programs installed on host from loading dll's from the sandbox"));
+ QCheckBox* pImageProtection = new QCheckBox(tr("Prevent sandboxed programs installed on the host from loading DLLs from the sandbox"));
pImageProtection->setToolTip(tr("This feature may reduce compatibility as it also prevents box located processes from writing to host located ones and even starting them."));
pImageProtection->setChecked(theConf->GetBool("BoxDefaults/ImagesProtection", false));
pImageProtection->setEnabled(g_CertInfo.active);