From 7b5ff9acc64389949c4f7932ae59357ef9428daf Mon Sep 17 00:00:00 2001 From: Michael <33252157+APMichael@users.noreply.github.com> Date: Thu, 25 Jul 2024 17:26:58 +0200 Subject: [PATCH] Update OptionsWindow.ui --- SandboxiePlus/SandMan/Forms/OptionsWindow.ui | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui index d14a8653..325729b7 100644 --- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui +++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui @@ -4796,10 +4796,10 @@ This is done to prevent rogue processes inside the sandbox from creating a renam - Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, "tasklist.exe" could get full processes list even if "HideOtherBoxes" is opened through accessing WMI. Enable this option to stop this behaviour. + Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, "tasklist.exe" could get full processes list through accessing WMI, even if "HideOtherBoxes" is used. Enable this option to stop this behaviour. - Prevent sandboxed processes from accessing system details through WMI (see tooltip for more Info) + Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)