Fix text inconsistencies

Fixes some text inconsistencies between the user interface and the changelog.
https://github.com/sandboxie-plus/Sandboxie/pull/3714
https://github.com/sandboxie-plus/Sandboxie/pull/3715
This commit is contained in:
offhub 2024-03-18 20:56:34 +03:00
parent 455ba94812
commit 47e0bd94cc
No known key found for this signature in database
GPG Key ID: 7B12A8941851DA59
3 changed files with 9 additions and 9 deletions

View File

@ -7,9 +7,9 @@ This project adheres to [Semantic Versioning](http://semver.org/).
## [1.13.4 / 5.68.4] - 2024-02-?? ## [1.13.4 / 5.68.4] - 2024-02-??
### Added ### Added
- added option to prevent sandboxed programs from accessing the images of the window outside the sandbox [#1985](https://github.com/sandboxie-plus/Sandboxie/issues/1985) (thanks Yeyixiao) - added option to prevent sandboxed processes from accessing the images of the window outside the sandbox [#1985](https://github.com/sandboxie-plus/Sandboxie/issues/1985) (thanks Yeyixiao)
- it can be enabled with "IsBlockCapture=y" - it can be enabled with "IsBlockCapture=y"
- see the sandbox option "Block obtain an image of an un-sandboxied window through Windows public method" in SandMan UI - see the sandbox option "Prevent sandboxed processes from using public methods to capture window images" in SandMan UI
### Fixed ### Fixed
- fixed issue with symlinks related to startmenu folders - fixed issue with symlinks related to startmenu folders
@ -35,10 +35,10 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- added menu entry to restart SandMan as admin [#3581](https://github.com/sandboxie-plus/Sandboxie/issues/3581) (thanks Yeyixiao) - added menu entry to restart SandMan as admin [#3581](https://github.com/sandboxie-plus/Sandboxie/issues/3581) (thanks Yeyixiao)
- added option to block taking screen capture/screenshot of sandboxed processes (thanks Yeyixiao) - added option to block taking screen capture/screenshot of sandboxed processes (thanks Yeyixiao)
- it can be enabled with "IsProtectScreen=y" - it can be enabled with "IsProtectScreen=y"
- see the sandbox option "Prevents getting an image of the window in the sandbox" in SandMan UI - see the sandbox option "Prevent processes from capturing window images from sandboxed windows" in SandMan UI
- added option to prevent sandboxed processes from interfering with power operations [#3640](https://github.com/sandboxie-plus/Sandboxie/issues/3640) (thanks Yeyixiao) - added option to prevent sandboxed processes from interfering with power operations [#3640](https://github.com/sandboxie-plus/Sandboxie/issues/3640) (thanks Yeyixiao)
- it can be enabled with "BlockInterferePower=y" - it can be enabled with "BlockInterferePower=y"
- see the sandbox option "Prevents processes in the sandbox from interfering with power operations" in SandMan UI - see the sandbox option "Prevent sandboxed processes from interfering with power operations" in SandMan UI
- added new pattern mechanism using a `**` as a placeholder to indicate an arbitrary path element not containing a `\` [1ff2867](https://github.com/sandboxie-plus/Sandboxie/commit/1ff28679b0557a642d29f1651a90a8f7fec77171) - added new pattern mechanism using a `**` as a placeholder to indicate an arbitrary path element not containing a `\` [1ff2867](https://github.com/sandboxie-plus/Sandboxie/commit/1ff28679b0557a642d29f1651a90a8f7fec77171)
### Changed ### Changed

View File

@ -813,14 +813,14 @@
<item> <item>
<widget class="QCheckBox" name="chkProtectPower"> <widget class="QCheckBox" name="chkProtectPower">
<property name="text"> <property name="text">
<string>Prevents processes in the sandbox from interfering with power operation</string> <string>Prevent sandboxed processes from interfering with power operations</string>
</property> </property>
</widget> </widget>
</item> </item>
<item> <item>
<widget class="QCheckBox" name="chkBlockCapture"> <widget class="QCheckBox" name="chkBlockCapture">
<property name="text"> <property name="text">
<string>Block process from taking screenshots of windows not belonging to the containing sandbox</string> <string>Prevent sandboxed processes from using public methods to capture window images</string>
</property> </property>
</widget> </widget>
</item> </item>
@ -1390,7 +1390,7 @@
<item row="4" column="1" colspan="2"> <item row="4" column="1" colspan="2">
<widget class="QCheckBox" name="chkProtectWindow"> <widget class="QCheckBox" name="chkProtectWindow">
<property name="text"> <property name="text">
<string>Prevents getting an image of the window in the sandbox.</string> <string>Prevent processes from capturing window images from sandboxed windows</string>
</property> </property>
</widget> </widget>
</item> </item>
@ -3669,7 +3669,7 @@ The process match level has a higher priority than the specificity and describes
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</string> This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</string>
</property> </property>
<property name="text"> <property name="text">
<string>Prevent sandboxes programs installed on host from loading dll's from the sandbox</string> <string>Prevent sandboxed programs installed on the host from loading DLLs from the sandbox</string>
</property> </property>
</widget> </widget>
</item> </item>

View File

@ -671,7 +671,7 @@ CAdvancedPage::CAdvancedPage(QWidget *parent)
layout->addWidget(m_pBoxToken, row++, 1, 1, 3); layout->addWidget(m_pBoxToken, row++, 1, 1, 3);
registerField("boxToken", m_pBoxToken); registerField("boxToken", m_pBoxToken);
QCheckBox* pImageProtection = new QCheckBox(tr("Prevent sandboxes programs installed on host from loading dll's from the sandbox")); QCheckBox* pImageProtection = new QCheckBox(tr("Prevent sandboxed programs installed on the host from loading DLLs from the sandbox"));
pImageProtection->setToolTip(tr("This feature may reduce compatibility as it also prevents box located processes from writing to host located ones and even starting them.")); pImageProtection->setToolTip(tr("This feature may reduce compatibility as it also prevents box located processes from writing to host located ones and even starting them."));
pImageProtection->setChecked(theConf->GetBool("BoxDefaults/ImagesProtection", false)); pImageProtection->setChecked(theConf->GetBool("BoxDefaults/ImagesProtection", false));
pImageProtection->setEnabled(g_CertInfo.active); pImageProtection->setEnabled(g_CertInfo.active);