Fix text inconsistencies
Fixes some text inconsistencies between the user interface and the changelog. https://github.com/sandboxie-plus/Sandboxie/pull/3714 https://github.com/sandboxie-plus/Sandboxie/pull/3715
This commit is contained in:
parent
455ba94812
commit
47e0bd94cc
|
@ -7,9 +7,9 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
|||
## [1.13.4 / 5.68.4] - 2024-02-??
|
||||
|
||||
### Added
|
||||
- added option to prevent sandboxed programs from accessing the images of the window outside the sandbox [#1985](https://github.com/sandboxie-plus/Sandboxie/issues/1985) (thanks Yeyixiao)
|
||||
- added option to prevent sandboxed processes from accessing the images of the window outside the sandbox [#1985](https://github.com/sandboxie-plus/Sandboxie/issues/1985) (thanks Yeyixiao)
|
||||
- it can be enabled with "IsBlockCapture=y"
|
||||
- see the sandbox option "Block obtain an image of an un-sandboxied window through Windows public method" in SandMan UI
|
||||
- see the sandbox option "Prevent sandboxed processes from using public methods to capture window images" in SandMan UI
|
||||
|
||||
### Fixed
|
||||
- fixed issue with symlinks related to startmenu folders
|
||||
|
@ -35,10 +35,10 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
|||
- added menu entry to restart SandMan as admin [#3581](https://github.com/sandboxie-plus/Sandboxie/issues/3581) (thanks Yeyixiao)
|
||||
- added option to block taking screen capture/screenshot of sandboxed processes (thanks Yeyixiao)
|
||||
- it can be enabled with "IsProtectScreen=y"
|
||||
- see the sandbox option "Prevents getting an image of the window in the sandbox" in SandMan UI
|
||||
- see the sandbox option "Prevent processes from capturing window images from sandboxed windows" in SandMan UI
|
||||
- added option to prevent sandboxed processes from interfering with power operations [#3640](https://github.com/sandboxie-plus/Sandboxie/issues/3640) (thanks Yeyixiao)
|
||||
- it can be enabled with "BlockInterferePower=y"
|
||||
- see the sandbox option "Prevents processes in the sandbox from interfering with power operations" in SandMan UI
|
||||
- see the sandbox option "Prevent sandboxed processes from interfering with power operations" in SandMan UI
|
||||
- added new pattern mechanism using a `**` as a placeholder to indicate an arbitrary path element not containing a `\` [1ff2867](https://github.com/sandboxie-plus/Sandboxie/commit/1ff28679b0557a642d29f1651a90a8f7fec77171)
|
||||
|
||||
### Changed
|
||||
|
|
|
@ -813,14 +813,14 @@
|
|||
<item>
|
||||
<widget class="QCheckBox" name="chkProtectPower">
|
||||
<property name="text">
|
||||
<string>Prevents processes in the sandbox from interfering with power operation</string>
|
||||
<string>Prevent sandboxed processes from interfering with power operations</string>
|
||||
</property>
|
||||
</widget>
|
||||
</item>
|
||||
<item>
|
||||
<widget class="QCheckBox" name="chkBlockCapture">
|
||||
<property name="text">
|
||||
<string>Block process from taking screenshots of windows not belonging to the containing sandbox</string>
|
||||
<string>Prevent sandboxed processes from using public methods to capture window images</string>
|
||||
</property>
|
||||
</widget>
|
||||
</item>
|
||||
|
@ -1390,7 +1390,7 @@
|
|||
<item row="4" column="1" colspan="2">
|
||||
<widget class="QCheckBox" name="chkProtectWindow">
|
||||
<property name="text">
|
||||
<string>Prevents getting an image of the window in the sandbox.</string>
|
||||
<string>Prevent processes from capturing window images from sandboxed windows</string>
|
||||
</property>
|
||||
</widget>
|
||||
</item>
|
||||
|
@ -3669,7 +3669,7 @@ The process match level has a higher priority than the specificity and describes
|
|||
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</string>
|
||||
</property>
|
||||
<property name="text">
|
||||
<string>Prevent sandboxes programs installed on host from loading dll's from the sandbox</string>
|
||||
<string>Prevent sandboxed programs installed on the host from loading DLLs from the sandbox</string>
|
||||
</property>
|
||||
</widget>
|
||||
</item>
|
||||
|
|
|
@ -671,7 +671,7 @@ CAdvancedPage::CAdvancedPage(QWidget *parent)
|
|||
layout->addWidget(m_pBoxToken, row++, 1, 1, 3);
|
||||
registerField("boxToken", m_pBoxToken);
|
||||
|
||||
QCheckBox* pImageProtection = new QCheckBox(tr("Prevent sandboxes programs installed on host from loading dll's from the sandbox"));
|
||||
QCheckBox* pImageProtection = new QCheckBox(tr("Prevent sandboxed programs installed on the host from loading DLLs from the sandbox"));
|
||||
pImageProtection->setToolTip(tr("This feature may reduce compatibility as it also prevents box located processes from writing to host located ones and even starting them."));
|
||||
pImageProtection->setChecked(theConf->GetBool("BoxDefaults/ImagesProtection", false));
|
||||
pImageProtection->setEnabled(g_CertInfo.active);
|
||||
|
|
Loading…
Reference in New Issue