Merge pull request #4002 from offhub/typo012

Typo fixes
This commit is contained in:
DavidXanatos 2024-06-19 16:18:18 +02:00 committed by GitHub
commit 837f983d34
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 14 additions and 13 deletions

View File

@ -9,13 +9,14 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- added SbieIni option to modify password-protected configs [#3903](https://github.com/sandboxie-plus/Sandboxie/issues/3903) - added SbieIni option to modify password-protected configs [#3903](https://github.com/sandboxie-plus/Sandboxie/issues/3903)
- usage: set|append|insert|delete [/passwd:********] <section> <setting> <value> - usage: set|append|insert|delete [/passwd:********] <section> <setting> <value>
- note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line - note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line
- added checkbox for PromptForInternetAccess option to the New Box Wizard - added checkbox for "PromptForInternetAccess" option to the New Box Wizard
- Add option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes. - added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes.
- Add option "HideSbieProcesses" to hide Sandboxie Work Process(SbieSvc,SandboxieRpcSs,etc.). - added option "HideSbieProcesses" to hide Sandboxie Work Process(SbieSvc,SandboxieRpcSs,etc.).
- When "HideFirmwareInfo" is set,the programs which try getting fireware info will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue - added option "HideFirmwareInfo"
- Add template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI. - when it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue
- Add template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to loaclhost to breakout sandbox. - added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI.
- Add new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975) - added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox.
- added new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975)
- added RPC Port message filter mechanism to block unsafe RDP calls via the driver [#3930](https://github.com/sandboxie-plus/Sandboxie/issues/3930) - added RPC Port message filter mechanism to block unsafe RDP calls via the driver [#3930](https://github.com/sandboxie-plus/Sandboxie/issues/3930)
- Usage: "RpcPortFilter=Port,ID,Label" label is optional - Usage: "RpcPortFilter=Port,ID,Label" label is optional
- added "Job Object" Options page to colelct all job object related options - added "Job Object" Options page to colelct all job object related options
@ -24,7 +25,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- Extend "Temp Template" to make it could delete local template section. - Extend "Temp Template" to make it could delete local template section.
### Fixed ### Fixed
- fixed security issue with the newly introduced experimental "UseCreateToken=y" machanism - fixed security issue with the newly introduced experimental "UseCreateToken=y" mechanism
- fixed issue with "UseCreateToken=y" when using a MSFT online account - fixed issue with "UseCreateToken=y" when using a MSFT online account
- fixed Export sandbox not containing hidden files [#3980](https://github.com/sandboxie-plus/Sandboxie/issues/3980) (thanks L4cache) - fixed Export sandbox not containing hidden files [#3980](https://github.com/sandboxie-plus/Sandboxie/issues/3980) (thanks L4cache)
- fixed Chrome stopped printing [#3926](https://github.com/sandboxie-plus/Sandboxie/issues/3926) - fixed Chrome stopped printing [#3926](https://github.com/sandboxie-plus/Sandboxie/issues/3926)
@ -35,7 +36,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- fixed Delay in launching forced programs after version 1.12.9 [#3868](https://github.com/sandboxie-plus/Sandboxie/issues/3868) - fixed Delay in launching forced programs after version 1.12.9 [#3868](https://github.com/sandboxie-plus/Sandboxie/issues/3868)
- this issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems - this issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems
- fixed issue with Misc Options list - fixed issue with Misc Options list
- improved compatybility with steam running sandboxed - improved compatibility with steam running sandboxed
@ -54,7 +55,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- added option for EditAdminOnly in SetupWizard - added option for EditAdminOnly in SetupWizard
### Changed ### Changed
- splited the advanced new box wizard page in two - split the advanced new box wizard page in two
- reorganized box options a bit - reorganized box options a bit
### Fixed ### Fixed

View File

@ -226,7 +226,7 @@ MSG_HEADER *EpMapperServer::EpmapperGetPortNameHandler(MSG_HEADER *msg)
// So, since here we only open non critical ports, we will use PID 0 to open them globally // So, since here we only open non critical ports, we will use PID 0 to open them globally
// instead of only for the one process. Todo: make it per sandbox instead // instead of only for the one process. Todo: make it per sandbox instead
// //
// Note: Filter is only support for globaly open ports, i.e. when process_id == 0 // Note: Filter is only support for globally open ports, i.e. when process_id == 0
// Todo: Add per process ALPC message filter // Todo: Add per process ALPC message filter
// //

View File

@ -4715,7 +4715,7 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
<item row="8" column="0"> <item row="8" column="0">
<widget class="QCheckBox" name="chkBlockWMI"> <widget class="QCheckBox" name="chkBlockWMI">
<property name="text"> <property name="text">
<string>Prevent sandboxed processes from accessing system deatils through WMI</string> <string>Prevent sandboxed processes from accessing system details through WMI</string>
</property> </property>
</widget> </widget>
</item> </item>
@ -4756,7 +4756,7 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
<item row="9" column="0"> <item row="9" column="0">
<widget class="QLabel" name="label_59"> <widget class="QLabel" name="label_59">
<property name="text"> <property name="text">
<string>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</string> <string>Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, 'tasklist.exe' can access a complete list of processes even if 'HideOtherBoxes' is enabled. Enable this option to prevent such behavior.</string>
</property> </property>
<property name="wordWrap"> <property name="wordWrap">
<bool>true</bool> <bool>true</bool>