Update sandman_zh_CN.ts

This update adds some explanations of terms with my personal understanding.
This commit is contained in:
EdgeArcher129840 2024-06-09 20:19:04 +08:00 committed by GitHub
parent b06574ddbc
commit 7b9da3f47b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 12 additions and 15 deletions

View File

@ -262,14 +262,10 @@
<source>This feature may reduce compatibility as it also prevents box located processes from writing to host located ones and even starting them.</source>
<translation></translation>
</message>
<message>
<source>Prevents the sandboxed window from being captured.</source>
<translation type="vanished"></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="849"/>
<source>Prevent sandboxed windows from being captured</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="850"/>
@ -462,7 +458,8 @@ To disable this template for a sandbox, simply uncheck it in the template list.<
<message>
<location filename="Windows/BoxImageWindow.cpp" line="37"/>
<source>Creating new box image, please enter a secure password, and choose a disk image size.</source>
<translation></translation>
<translation>
</translation>
</message>
<message>
<location filename="Windows/BoxImageWindow.cpp" line="41"/>
@ -510,7 +507,7 @@ This length permits approximately 384 bits of entropy with a passphrase composed
increases to 512 bits with the application of Leet (L337) speak modifications, and exceeds 768 bits when composed of entirely random printable ASCII characters.</source>
<translation> 128
384
使 Leet(L337) 512 ASCII 768 </translation>
使 Leet(L337) 512 ASCII 768 </translation>
</message>
<message>
<location filename="Windows/BoxImageWindow.cpp" line="164"/>
@ -634,12 +631,12 @@ While the level of isolation is reduced compared to other box types, it offers i
Access to the virtual disk when mounted is restricted to programs running within the sandbox. Sandboxie prevents other processes on the host system from accessing the sandboxed processes.
This ensures the utmost level of privacy and data protection within the confidential sandbox environment.</source>
<translation>使
访访</translation>
访访</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="436"/>
<source>Hardened Sandbox with Data Protection</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="437"/>
@ -649,7 +646,7 @@ This ensures the utmost level of privacy and data protection within the confiden
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="438"/>
<source>Sandbox with Data Protection</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="439"/>
@ -659,7 +656,7 @@ This ensures the utmost level of privacy and data protection within the confiden
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="441"/>
<source>Application Compartment with Data Protection</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="442"/>
@ -812,7 +809,7 @@ Please browse to the correct user profile directory.</source>
Note: you need to run the browser unsandboxed for them to get created.
Please browse to the correct user profile directory.</oldsource>
<translation>
使便使
使便使
</translation>
</message>
<message>
@ -1322,7 +1319,7 @@ You can use %USER% to save each users sandbox to an own fodler.</oldsource>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="745"/>
<source>Drop rights from Administrators and Power Users groups</source>
<translation> Power Users </translation>
<translation> Power Users Windows Vista Windows </translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="751"/>
@ -1332,7 +1329,7 @@ You can use %USER% to save each users sandbox to an own fodler.</oldsource>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="756"/>
<source>Allow MSIServer to run with a sandboxed system token</source>
<translation> MSIServer 使</translation>
<translation> MSIServer 使</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="763"/>
@ -1444,7 +1441,7 @@ You can use %USER% to save each users sandbox to an own fodler.</oldsource>
<location filename="Wizards/NewBoxWizard.cpp" line="76"/>
<source>This sandbox content will be placed in an encrypted container file, please note that any corruption of the container&apos;s header will render all its content permanently inaccessible. Corruption can occur as a result of a BSOD, a storage hardware failure, or a malicious application overwriting random files. This feature is provided under a strict &lt;b&gt;No Backup No Mercy&lt;/b&gt; policy, YOU the user are responsible for the data you put into an encrypted box. &lt;br /&gt;&lt;br /&gt;IF YOU AGREE TO TAKE FULL RESPONSIBILITY FOR YOUR DATA PRESS [YES], OTHERWISE PRESS [NO].</source>
<oldsource>This sandbox content will be placed in an encrypted container file, please note that any corruption of the container&apos;s header will render all its content permanently innaccessible. Corruption can occur as a result of a BSOD, a storage hadrware failure, or a maliciouse application overwriting random files. This feature is provided under a strickt &lt;b&gt;No Backup No Mercy&lt;/b&gt; policy, YOU the user are responsible for the data you put into an encrypted box. &lt;br /&gt;&lt;br /&gt;IF YOU AGREE TO TAKE FULL RESPONSIBILITY FOR YOUR DATA PRESS [YES], OTHERWISE PRESS [NO].</oldsource>
<translation> &lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;br /&gt; [], [].</translation>
<translation> &lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;br /&gt; [], [].</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="107"/>