Merge pull request #875 from isaak654/patch-9
Fix a lot of typos and improve readability
This commit is contained in:
commit
a02a475b59
|
@ -150,7 +150,8 @@ ALIGNED HANDLE my_CreateFileW(
|
|||
HANDLE hTemplateFile);
|
||||
|
||||
//
|
||||
// prevent SBIE1313, dont even try to access the block devcie for raw reading
|
||||
// prevent SandboxieCrypto.exe from causing SBIE1313,
|
||||
// don't even try to access to the device block for raw reading
|
||||
//
|
||||
|
||||
if (wcsnicmp(lpFileName, L"\\\\.\\PhysicalDrive", 17) == 0 && wcschr(lpFileName + 17, L'\\') == NULL) {
|
||||
|
|
|
@ -3455,9 +3455,9 @@ _FX void Com_LoadRTList(const WCHAR* setting, WCHAR** pNames)
|
|||
_FX BOOLEAN Com_IsClosedRT(const wchar_t* strClassId)
|
||||
{
|
||||
//
|
||||
// Chrome uses the FindAppUriHandlersAsync which when we dont have com open and more rights than we should have
|
||||
// fails returning a NULl value, chrome does no check for thsi faulure mode and dereferences it resulting in a fatal crash.
|
||||
// Since we don't support modern app features anyways the simplest workaround is to block this interface.
|
||||
// Chrome uses the FindAppUriHandlersAsync, which fails returning a NULL value when we don't have com open and more rights
|
||||
// than we should have. Chrome does not check for this failure mode and dereferences it, resulting in a fatal crash.
|
||||
// Since we don't support modern app features anyways, the simplest workaround is to block this interface.
|
||||
//
|
||||
if (Dll_ImageType == DLL_IMAGE_GOOGLE_CHROME) {
|
||||
|
||||
|
@ -3466,7 +3466,7 @@ _FX BOOLEAN Com_IsClosedRT(const wchar_t* strClassId)
|
|||
}
|
||||
|
||||
//
|
||||
// this seams to be broken as well
|
||||
// this seems to be broken as well
|
||||
//if (wcscmp(strClassId, L"Windows.UI.Notifications.ToastNotificationManager") == 0)
|
||||
// return TRUE;
|
||||
|
||||
|
|
|
@ -466,7 +466,7 @@ _FX void Dll_InitExeEntry(void)
|
|||
|
||||
//
|
||||
// check if running as a forced COM server process
|
||||
// note: does not return if this is the case
|
||||
// note: it does not return if this is the case
|
||||
//
|
||||
|
||||
Custom_ComServer();
|
||||
|
@ -475,11 +475,11 @@ _FX void Dll_InitExeEntry(void)
|
|||
// force load of UxTheme in a Google Chrome sandbox process
|
||||
//
|
||||
|
||||
// Note: this does not seam to longer be needed for modern chrome builds, also it breaks the vivaldi browser
|
||||
// Note: this does not seem to be needed anymore for modern Chrome builds, also it breaks Vivaldi browser
|
||||
|
||||
//Custom_Load_UxTheme();
|
||||
|
||||
UserEnv_InitVer(Dll_OsBuild >= 7600 ? Dll_KernelBase : Dll_Kernel32); // in KernelBase since win 7
|
||||
UserEnv_InitVer(Dll_OsBuild >= 7600 ? Dll_KernelBase : Dll_Kernel32); // in KernelBase since Win 7
|
||||
|
||||
//
|
||||
// Windows 8.1: hook UserEnv-related entrypoint in KernelBase
|
||||
|
|
|
@ -1232,14 +1232,14 @@ _FX HWND Gui_CreateWindowExW(
|
|||
//
|
||||
// under Sandboxie 4 the Chrome sandbox child process gets confused
|
||||
// (reason not known) and creates some top level windows, for which it
|
||||
// does not process messages. this causes DDE message broadcast to
|
||||
// hang for several seconds. to workaround this, we cause the windows
|
||||
// does not process messages. This causes DDE message broadcast to
|
||||
// hang for several seconds. To workaround this, we cause the windows
|
||||
// to be created as message-only windows
|
||||
//
|
||||
// note: the desktop window was made accessible in early v4 builds
|
||||
// but this code is still here to handle any other parent windows
|
||||
//
|
||||
// note: this code breaks chrome hw acceleration, so its no longer used
|
||||
// note: this code breaks Chrome hw acceleration, so it's no longer used
|
||||
//
|
||||
|
||||
/*if (Dll_ChromeSandbox) {
|
||||
|
|
|
@ -187,7 +187,7 @@ _FX BOOLEAN Gui_InitMisc(void)
|
|||
// Chinese instant messenger QQ.exe (aka TM.exe) uses OpenInputDesktop,
|
||||
// GetThreadDesktop and GetUserObjectInformation to determine if the
|
||||
// desktop is locked, and if OpenInputDesktop fails, it assumes lock.
|
||||
// fortunately it is enough to hook just OpenInputDesktop to fix this
|
||||
// Fortunately it is enough to hook just OpenInputDesktop to fix this
|
||||
//
|
||||
// Google Chrome also uses OpenInputDesktop and GetUserObjectInformation
|
||||
// to check if the desktop is locked, and other programs might as well
|
||||
|
@ -1202,7 +1202,7 @@ _FX LONG Gui_GetRawInputDeviceInfo_impl(
|
|||
GUI_GET_RAW_INPUT_DEVICE_INFO_REQ* req;
|
||||
GUI_GET_RAW_INPUT_DEVICE_INFO_RPL* rpl;
|
||||
|
||||
// Note: pcbSize seams to be in tchars not in bytes!
|
||||
// Note: pcbSize seems to be in tchars not in bytes!
|
||||
ULONG lenData = 0;
|
||||
if (pData && pcbSize)
|
||||
lenData = (*pcbSize) * (bUnicode ? sizeof(WCHAR) : 1);
|
||||
|
|
|
@ -997,9 +997,9 @@ _FX BOOL Proc_UpdateProcThreadAttribute(
|
|||
_Out_writes_bytes_opt_(cbSize) PVOID lpPreviousValue,
|
||||
_In_opt_ PSIZE_T lpReturnSize)
|
||||
{
|
||||
// fix for chreom 86+
|
||||
// when the PROC_THREAD_ATTRIBUTE_JOB_LIST is set the call CreateProcessAsUserW -> CreateProcessInternalW -> NtCreateProcess
|
||||
// fals with an access denided error, so we need to block this attribute form being set
|
||||
// fix for Chrome 86+
|
||||
// when the PROC_THREAD_ATTRIBUTE_JOB_LIST is set, the call CreateProcessAsUserW -> CreateProcessInternalW -> NtCreateProcess
|
||||
// fails with an access denied error, so we need to block this attribute from being set
|
||||
// if(Dll_ImageType == DLL_IMAGE_GOOGLE_CHROME)
|
||||
if (Attribute == 0x0002000d) //PROC_THREAD_ATTRIBUTE_JOB_LIST
|
||||
{
|
||||
|
@ -1128,8 +1128,8 @@ _FX BOOL Proc_CreateProcessInternalW_RS5(
|
|||
}
|
||||
|
||||
//
|
||||
// Electron based applications which work like chrome seam to fail with HW acceleration even when
|
||||
// thay get the same treatment as chrome and chromium derivatives.
|
||||
// Electron based applications which work like Chrome seem to fail with HW acceleration even when
|
||||
// they get the same treatment as Chrome and Chromium derivatives.
|
||||
// hack: by adding a parameter to the gpu renderer process we can fix the issue.
|
||||
//
|
||||
|
||||
|
@ -1686,7 +1686,7 @@ _FX void Proc_QuoteCommandLine_XP(
|
|||
|
||||
//
|
||||
// the system CreateProcessInternal may quote the first argument on
|
||||
// the command line. on Vista and later, we get the quoted string
|
||||
// the command line. On Vista and later, we get the quoted string
|
||||
// through Proc_RtlCreateProcessParametersEx, but on Windows XP we
|
||||
// abort CreateProcessInternal during NtCreateSection, before it can
|
||||
// show us the quoted command line, so add the quotes here
|
||||
|
@ -1774,9 +1774,9 @@ _FX void Proc_FixBatchCommandLine(
|
|||
// lpApplication, the system CreateProcessInternalW will try to create
|
||||
// a process using the batch file path, and will fail with "not found"
|
||||
// instead of "not exe file" if the batch file exists only in the
|
||||
// sandbox. to prepare for this case, we adjust the command line if
|
||||
// sandbox. To prepare for this case, we adjust the command line if
|
||||
// the batch file is inside the sandbox.
|
||||
// see Proc_CreateProcessInternalW above.
|
||||
// See Proc_CreateProcessInternalW above.
|
||||
//
|
||||
|
||||
if (! CommandLine)
|
||||
|
@ -1923,7 +1923,7 @@ _FX NTSTATUS Proc_RtlCreateProcessParametersEx(
|
|||
{
|
||||
//
|
||||
// on Windows Vista and later we can extract the image path from
|
||||
// the invocation of RtlCreateProcessParametersEx. it is invoked
|
||||
// the invocation of RtlCreateProcessParametersEx. It is invoked
|
||||
// before a new process object is created
|
||||
//
|
||||
|
||||
|
@ -2241,8 +2241,6 @@ _FX BOOLEAN Proc_CheckMailer(const WCHAR *ImagePath, BOOLEAN IsBoxedPath)
|
|||
// ignore rundll32.exe, because Windows Live Mail sets
|
||||
// it as the default mail program.
|
||||
//
|
||||
// ignore opera.exe, because Opera may only be used for
|
||||
// browsing and not email
|
||||
//
|
||||
// ignore other common browsers
|
||||
//
|
||||
|
@ -2485,7 +2483,7 @@ _FX BOOLEAN Proc_Init_AdvPack(HMODULE module)
|
|||
// the Protected Mode ActiveX Installation Broker
|
||||
// but this means that an ActiveX installation which involves running
|
||||
// an EXE file may not elevate correctly.
|
||||
// so we hook RunSetupCommand to force elevation.
|
||||
// So we hook RunSetupCommand to force elevation.
|
||||
//
|
||||
|
||||
extern BOOLEAN Secure_IsInternetExplorerTabProcess;
|
||||
|
|
|
@ -484,7 +484,7 @@ _FX void *Token_FilterPrimary(PROCESS *proc, void *ProcessObject)
|
|||
DropRights = (proc->drop_rights ? -1 : 0);
|
||||
|
||||
//
|
||||
// special allowance for MSIServer - does not seam to be needed with the CreateWaitableTimerW hook
|
||||
// special allowance for MSIServer - it does not seem to be needed with the CreateWaitableTimerW hook
|
||||
//
|
||||
//if (DropRights && !proc->image_from_box && _wcsicmp(proc->image_name, L"msiexec.exe") == 0
|
||||
// && Conf_Get_Boolean(proc->box->name, L"MsiInstallerExemptions", 0, FALSE))
|
||||
|
|
|
@ -219,8 +219,8 @@ MSG_HEADER *EpMapperServer::EpmapperGetPortNameHandler(MSG_HEADER *msg)
|
|||
if (rpl->h.status == STATUS_SUCCESS)
|
||||
{
|
||||
//
|
||||
// Note: it seams that chrome.exe resolves GAME_CONFIG_STORE_PORT in one process and accesses from an other
|
||||
// so since here we only open non critical ports we will use PID 0 to open them globally
|
||||
// Note: it seems that chrome.exe resolves GAME_CONFIG_STORE_PORT in one process and accesses from another.
|
||||
// So, since here we only open non critical ports, we will use PID 0 to open them globally
|
||||
// instead of only for the one process. Todo: make it per sandbox instead
|
||||
//
|
||||
|
||||
|
|
|
@ -3451,7 +3451,7 @@ ULONG GuiServer::GetRawInputDeviceInfoSlave(SlaveArgs *args)
|
|||
rpl->cbSize = req->cbSize;
|
||||
if (pcbSize && req->hasData)
|
||||
{
|
||||
// Note: pcbSize seams to be in tchars not in bytes!
|
||||
// Note: pcbSize seems to be in tchars not in bytes!
|
||||
ULONG lenData = (*pcbSize) * (req->unicode ? sizeof(WCHAR) : 1);
|
||||
|
||||
rpl->hasData = TRUE;
|
||||
|
|
|
@ -211,7 +211,7 @@
|
|||
<item row="6" column="2" colspan="6">
|
||||
<widget class="QCheckBox" name="chkFakeElevation">
|
||||
<property name="text">
|
||||
<string>Make applications think thay are running elevated (allows to run installers safely)</string>
|
||||
<string>Make applications think they are running elevated (allows to run installers safely)</string>
|
||||
</property>
|
||||
</widget>
|
||||
</item>
|
||||
|
@ -896,7 +896,7 @@
|
|||
<item row="1" column="0" colspan="2">
|
||||
<widget class="QLabel" name="label">
|
||||
<property name="text">
|
||||
<string>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</string>
|
||||
<string>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</string>
|
||||
</property>
|
||||
<property name="wordWrap">
|
||||
<bool>true</bool>
|
||||
|
@ -1409,7 +1409,7 @@ For files access you can use 'Direct All' instead to make it apply to all progra
|
|||
<item row="2" column="0" colspan="2">
|
||||
<widget class="QCheckBox" name="chkAutoRecovery">
|
||||
<property name="text">
|
||||
<string>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</string>
|
||||
<string>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</string>
|
||||
</property>
|
||||
</widget>
|
||||
</item>
|
||||
|
|
|
@ -2044,7 +2044,7 @@ Vollständiger Pfad: %4</translation>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="214"/>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation>Lässt Programme denken, sie würden mit erhöhten Rechten laufen (Erlaubt das sichere Ausführen von Installern)</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2136,7 +2136,7 @@ Vollständiger Pfad: %4</translation>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="899"/>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation>Programme die hier gelistet sind oder von den angegeben Ordnern gestartet werden, werden automatisch in dieser Sandbox ausgeführt, solange sie nicht explizit in einer anderen Sandbox gestartet werden.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2367,7 +2367,7 @@ Zum Dateizugriff können Sie 'Direkt Alle' verwenden um für alle Prog
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="1412"/>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<oldsource>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</oldsource>
|
||||
<translation>Aktivere Sofortwiederherstellungsabfrage, um alle Dateien sofort wiederherzustellen, sobald sie erzeugt werden.</translation>
|
||||
</message>
|
||||
|
|
|
@ -1929,7 +1929,7 @@ Full path: %4</oldsource>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="214"/>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation type="unfinished"></translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2177,7 +2177,7 @@ Full path: %4</oldsource>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="899"/>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation type="unfinished"></translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2344,7 +2344,7 @@ For files access you can use 'Direct All' instead to make it apply to
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="1412"/>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<translation type="unfinished"></translation>
|
||||
</message>
|
||||
<message>
|
||||
|
|
|
@ -1944,7 +1944,7 @@ Percorso completo: %4</translation>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="214"/>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation>Fai credere alle applicazioni di avviarsi con privilegi elevati (esegue gli installer in modo sicuro)</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2192,7 +2192,7 @@ Percorso completo: %4</translation>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="899"/>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation>I seguenti programmi, o i programmi avviati dai seguenti percorsi, verranno avviati automaticamente in quest'area virtuale.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2364,7 +2364,7 @@ Per accedere ai file, è possibile utilizzare l'accesso 'Completo&apos
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="1412"/>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<translation>Attiva notifica di Recupero immediato dei file, non appena questi vengono creati.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
|
|
@ -2077,7 +2077,7 @@ Full path: %4</oldsource>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="214"/>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation type="unfinished"></translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2202,7 +2202,7 @@ Full path: %4</oldsource>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="899"/>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation>To podane programy lob programy wystartowane z to podanych ścieżek będą automatycznie umieszczone w tej piaskownicy, chyba że są specjalnie umieszczone w innej.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2373,7 +2373,7 @@ Bezpośredni dostęp do plików i kluczy działa tylko z programami umieszczonyc
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="1412"/>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<translation>Aktywuj bezzwłoczne odtwarzanie plików jak tylko zostaną zapisane.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
|
|
@ -2243,7 +2243,7 @@ Faça o download da versão mais recente e configure-a em sandboxie.ini conforme
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="214"/>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation type="unfinished"></translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2335,7 +2335,7 @@ Faça o download da versão mais recente e configure-a em sandboxie.ini conforme
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="899"/>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation>Programas inseridos aqui, ou iniciados a partir de locais inseridos, serão colocados nessa caixa automaticamente, a menos que seja explicitamente iniciado em outra caixa de areia.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2566,7 +2566,7 @@ Para acesso a arquivos, você pode usar o 'Direct All' em vez de fazê
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="1412"/>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<translation>Ativar mensagem de recuperação imediata para poder recuperar arquivos assim que for criado.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
|
|
@ -1600,7 +1600,7 @@ If leader processes are defined, all others are treated as lingering processes.<
|
|||
<translation>Разрешить запуск всех программ в этой песочнице.</translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<translation>Включить запрос немедленного восстановления, чтобы иметь возможность восстанавливать файлы сразу после их создания.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -1818,7 +1818,7 @@ instead of "*".</source>
|
|||
<translation>Добавить пользователя</translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation>Введенные здесь программы, или программы запущенные из указанных мест, будут автоматически помещены в эту песочницу, если они явно не запущены в другой песочнице.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2031,7 +2031,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to
|
|||
<translation>Ограничения повышение уровня</translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation>Заставить приложения думать, что они работают с повышенными правами (позволяет безопасно запускать установщики)</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
|
|
@ -1624,7 +1624,7 @@ If leader processes are defined, all others are treated as lingering processes.<
|
|||
<translation>Tüm programların bu kutuda başlamasına izin ver.</translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<translation>Dosyaları oluşturulur oluşturulmaz kurtarabilmek için Anında Kurtarma istemini etkinleştir.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -1846,7 +1846,7 @@ Bu seçenekler olay maskesini "*" olarak ayarlar - Tüm erişim olayla
|
|||
<translation>Kullanıcı Ekle</translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation>Buraya girilen programlar veya girilen konumlardan başlatılan programlar, başka bir korumalı kutuda açıkça belirtilmedikçe otomatik olarak bu kutuya yerleştirilecektir.</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2071,7 +2071,7 @@ Not: Bir korumalı kutuya ilişkin Zorlanmış Programlar ve Zorlanmış Dizinle
|
|||
<translation type="unfinished"></translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation type="unfinished"></translation>
|
||||
</message>
|
||||
<message>
|
||||
|
|
|
@ -2020,7 +2020,7 @@ Full path: %4</source>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="214"/>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation>使应用程序自身认为被提权运行 (允许安全的运行安装程序)</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2264,7 +2264,7 @@ Full path: %4</source>
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="892"/>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation>此处输入的程序,或指定位置启动的程序,将自动入此沙盒,除非它们明确在其他沙盒启动</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2436,7 +2436,7 @@ For files access you can use 'Direct All' instead to make it apply to
|
|||
</message>
|
||||
<message>
|
||||
<location filename="Forms/OptionsWindow.ui" line="1405"/>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<translation>启用快速恢复提示以便创建文件时能尽快恢复</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
|
|
@ -1691,7 +1691,7 @@ If leader processes are defined, all others are treated as lingering processes.<
|
|||
<translation>允許所有程式在此沙盤中啟動。</translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
|
||||
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
|
||||
<translation>啟用快速恢復提示以便建立檔案時能儘快恢復。</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -1899,7 +1899,7 @@ If leader processes are defined, all others are treated as lingering processes.<
|
|||
<translation>新增使用者</translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
|
||||
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
|
||||
<translation>此處輸入的程式,或指定位置啟動的程式,將自動加入此沙盤,除非它們被確定已在其他沙盤啟動。</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
@ -2125,7 +2125,7 @@ instead of "*".</source>
|
|||
<translation>權限提升限制</translation>
|
||||
</message>
|
||||
<message>
|
||||
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
|
||||
<source>Make applications think they are running elevated (allows to run installers safely)</source>
|
||||
<translation>使應用程式認為其已在權限提升狀態下運作(允許安全地執行安裝程式)</translation>
|
||||
</message>
|
||||
<message>
|
||||
|
|
Loading…
Reference in New Issue