diff --git a/Sandboxie/apps/com/Crypto/crypto.c b/Sandboxie/apps/com/Crypto/crypto.c index 30804448..37dab936 100644 --- a/Sandboxie/apps/com/Crypto/crypto.c +++ b/Sandboxie/apps/com/Crypto/crypto.c @@ -150,7 +150,8 @@ ALIGNED HANDLE my_CreateFileW( HANDLE hTemplateFile); // - // prevent SBIE1313, dont even try to access the block devcie for raw reading + // prevent SandboxieCrypto.exe from causing SBIE1313, + // don't even try to access to the device block for raw reading // if (wcsnicmp(lpFileName, L"\\\\.\\PhysicalDrive", 17) == 0 && wcschr(lpFileName + 17, L'\\') == NULL) { diff --git a/Sandboxie/core/dll/com.c b/Sandboxie/core/dll/com.c index 3997d086..d67e5fbb 100644 --- a/Sandboxie/core/dll/com.c +++ b/Sandboxie/core/dll/com.c @@ -3455,9 +3455,9 @@ _FX void Com_LoadRTList(const WCHAR* setting, WCHAR** pNames) _FX BOOLEAN Com_IsClosedRT(const wchar_t* strClassId) { // - // Chrome uses the FindAppUriHandlersAsync which when we dont have com open and more rights than we should have - // fails returning a NULl value, chrome does no check for thsi faulure mode and dereferences it resulting in a fatal crash. - // Since we don't support modern app features anyways the simplest workaround is to block this interface. + // Chrome uses the FindAppUriHandlersAsync, which fails returning a NULL value when we don't have com open and more rights + // than we should have. Chrome does not check for this failure mode and dereferences it, resulting in a fatal crash. + // Since we don't support modern app features anyways, the simplest workaround is to block this interface. // if (Dll_ImageType == DLL_IMAGE_GOOGLE_CHROME) { @@ -3466,7 +3466,7 @@ _FX BOOLEAN Com_IsClosedRT(const wchar_t* strClassId) } // - // this seams to be broken as well + // this seems to be broken as well //if (wcscmp(strClassId, L"Windows.UI.Notifications.ToastNotificationManager") == 0) // return TRUE; diff --git a/Sandboxie/core/dll/dllmain.c b/Sandboxie/core/dll/dllmain.c index 20d948b0..10bca3ee 100644 --- a/Sandboxie/core/dll/dllmain.c +++ b/Sandboxie/core/dll/dllmain.c @@ -466,7 +466,7 @@ _FX void Dll_InitExeEntry(void) // // check if running as a forced COM server process - // note: does not return if this is the case + // note: it does not return if this is the case // Custom_ComServer(); @@ -475,11 +475,11 @@ _FX void Dll_InitExeEntry(void) // force load of UxTheme in a Google Chrome sandbox process // - // Note: this does not seam to longer be needed for modern chrome builds, also it breaks the vivaldi browser + // Note: this does not seem to be needed anymore for modern Chrome builds, also it breaks Vivaldi browser //Custom_Load_UxTheme(); - UserEnv_InitVer(Dll_OsBuild >= 7600 ? Dll_KernelBase : Dll_Kernel32); // in KernelBase since win 7 + UserEnv_InitVer(Dll_OsBuild >= 7600 ? Dll_KernelBase : Dll_Kernel32); // in KernelBase since Win 7 // // Windows 8.1: hook UserEnv-related entrypoint in KernelBase diff --git a/Sandboxie/core/dll/gui.c b/Sandboxie/core/dll/gui.c index 250bc7cd..d3e30652 100644 --- a/Sandboxie/core/dll/gui.c +++ b/Sandboxie/core/dll/gui.c @@ -1232,14 +1232,14 @@ _FX HWND Gui_CreateWindowExW( // // under Sandboxie 4 the Chrome sandbox child process gets confused // (reason not known) and creates some top level windows, for which it - // does not process messages. this causes DDE message broadcast to - // hang for several seconds. to workaround this, we cause the windows + // does not process messages. This causes DDE message broadcast to + // hang for several seconds. To workaround this, we cause the windows // to be created as message-only windows // // note: the desktop window was made accessible in early v4 builds // but this code is still here to handle any other parent windows // - // note: this code breaks chrome hw acceleration, so its no longer used + // note: this code breaks Chrome hw acceleration, so it's no longer used // /*if (Dll_ChromeSandbox) { diff --git a/Sandboxie/core/dll/guimisc.c b/Sandboxie/core/dll/guimisc.c index 2b761f59..2e3cda58 100644 --- a/Sandboxie/core/dll/guimisc.c +++ b/Sandboxie/core/dll/guimisc.c @@ -187,7 +187,7 @@ _FX BOOLEAN Gui_InitMisc(void) // Chinese instant messenger QQ.exe (aka TM.exe) uses OpenInputDesktop, // GetThreadDesktop and GetUserObjectInformation to determine if the // desktop is locked, and if OpenInputDesktop fails, it assumes lock. - // fortunately it is enough to hook just OpenInputDesktop to fix this + // Fortunately it is enough to hook just OpenInputDesktop to fix this // // Google Chrome also uses OpenInputDesktop and GetUserObjectInformation // to check if the desktop is locked, and other programs might as well @@ -1202,7 +1202,7 @@ _FX LONG Gui_GetRawInputDeviceInfo_impl( GUI_GET_RAW_INPUT_DEVICE_INFO_REQ* req; GUI_GET_RAW_INPUT_DEVICE_INFO_RPL* rpl; - // Note: pcbSize seams to be in tchars not in bytes! + // Note: pcbSize seems to be in tchars not in bytes! ULONG lenData = 0; if (pData && pcbSize) lenData = (*pcbSize) * (bUnicode ? sizeof(WCHAR) : 1); diff --git a/Sandboxie/core/dll/proc.c b/Sandboxie/core/dll/proc.c index b38d5840..fa16b2e4 100644 --- a/Sandboxie/core/dll/proc.c +++ b/Sandboxie/core/dll/proc.c @@ -997,9 +997,9 @@ _FX BOOL Proc_UpdateProcThreadAttribute( _Out_writes_bytes_opt_(cbSize) PVOID lpPreviousValue, _In_opt_ PSIZE_T lpReturnSize) { - // fix for chreom 86+ - // when the PROC_THREAD_ATTRIBUTE_JOB_LIST is set the call CreateProcessAsUserW -> CreateProcessInternalW -> NtCreateProcess - // fals with an access denided error, so we need to block this attribute form being set + // fix for Chrome 86+ + // when the PROC_THREAD_ATTRIBUTE_JOB_LIST is set, the call CreateProcessAsUserW -> CreateProcessInternalW -> NtCreateProcess + // fails with an access denied error, so we need to block this attribute from being set // if(Dll_ImageType == DLL_IMAGE_GOOGLE_CHROME) if (Attribute == 0x0002000d) //PROC_THREAD_ATTRIBUTE_JOB_LIST { @@ -1128,8 +1128,8 @@ _FX BOOL Proc_CreateProcessInternalW_RS5( } // - // Electron based applications which work like chrome seam to fail with HW acceleration even when - // thay get the same treatment as chrome and chromium derivatives. + // Electron based applications which work like Chrome seem to fail with HW acceleration even when + // they get the same treatment as Chrome and Chromium derivatives. // hack: by adding a parameter to the gpu renderer process we can fix the issue. // @@ -1686,7 +1686,7 @@ _FX void Proc_QuoteCommandLine_XP( // // the system CreateProcessInternal may quote the first argument on - // the command line. on Vista and later, we get the quoted string + // the command line. On Vista and later, we get the quoted string // through Proc_RtlCreateProcessParametersEx, but on Windows XP we // abort CreateProcessInternal during NtCreateSection, before it can // show us the quoted command line, so add the quotes here @@ -1774,9 +1774,9 @@ _FX void Proc_FixBatchCommandLine( // lpApplication, the system CreateProcessInternalW will try to create // a process using the batch file path, and will fail with "not found" // instead of "not exe file" if the batch file exists only in the - // sandbox. to prepare for this case, we adjust the command line if + // sandbox. To prepare for this case, we adjust the command line if // the batch file is inside the sandbox. - // see Proc_CreateProcessInternalW above. + // See Proc_CreateProcessInternalW above. // if (! CommandLine) @@ -1923,7 +1923,7 @@ _FX NTSTATUS Proc_RtlCreateProcessParametersEx( { // // on Windows Vista and later we can extract the image path from - // the invocation of RtlCreateProcessParametersEx. it is invoked + // the invocation of RtlCreateProcessParametersEx. It is invoked // before a new process object is created // @@ -2241,8 +2241,6 @@ _FX BOOLEAN Proc_CheckMailer(const WCHAR *ImagePath, BOOLEAN IsBoxedPath) // ignore rundll32.exe, because Windows Live Mail sets // it as the default mail program. // - // ignore opera.exe, because Opera may only be used for - // browsing and not email // // ignore other common browsers // @@ -2485,7 +2483,7 @@ _FX BOOLEAN Proc_Init_AdvPack(HMODULE module) // the Protected Mode ActiveX Installation Broker // but this means that an ActiveX installation which involves running // an EXE file may not elevate correctly. - // so we hook RunSetupCommand to force elevation. + // So we hook RunSetupCommand to force elevation. // extern BOOLEAN Secure_IsInternetExplorerTabProcess; diff --git a/Sandboxie/core/drv/token.c b/Sandboxie/core/drv/token.c index 7b4438ac..0de56f61 100644 --- a/Sandboxie/core/drv/token.c +++ b/Sandboxie/core/drv/token.c @@ -484,7 +484,7 @@ _FX void *Token_FilterPrimary(PROCESS *proc, void *ProcessObject) DropRights = (proc->drop_rights ? -1 : 0); // - // special allowance for MSIServer - does not seam to be needed with the CreateWaitableTimerW hook + // special allowance for MSIServer - it does not seem to be needed with the CreateWaitableTimerW hook // //if (DropRights && !proc->image_from_box && _wcsicmp(proc->image_name, L"msiexec.exe") == 0 // && Conf_Get_Boolean(proc->box->name, L"MsiInstallerExemptions", 0, FALSE)) diff --git a/Sandboxie/core/svc/EpMapperServer.cpp b/Sandboxie/core/svc/EpMapperServer.cpp index 12aa70d1..5a3c0765 100644 --- a/Sandboxie/core/svc/EpMapperServer.cpp +++ b/Sandboxie/core/svc/EpMapperServer.cpp @@ -219,8 +219,8 @@ MSG_HEADER *EpMapperServer::EpmapperGetPortNameHandler(MSG_HEADER *msg) if (rpl->h.status == STATUS_SUCCESS) { // - // Note: it seams that chrome.exe resolves GAME_CONFIG_STORE_PORT in one process and accesses from an other - // so since here we only open non critical ports we will use PID 0 to open them globally + // Note: it seems that chrome.exe resolves GAME_CONFIG_STORE_PORT in one process and accesses from another. + // So, since here we only open non critical ports, we will use PID 0 to open them globally // instead of only for the one process. Todo: make it per sandbox instead // diff --git a/Sandboxie/core/svc/GuiServer.cpp b/Sandboxie/core/svc/GuiServer.cpp index eb939fd5..ac0ba8b0 100644 --- a/Sandboxie/core/svc/GuiServer.cpp +++ b/Sandboxie/core/svc/GuiServer.cpp @@ -3451,7 +3451,7 @@ ULONG GuiServer::GetRawInputDeviceInfoSlave(SlaveArgs *args) rpl->cbSize = req->cbSize; if (pcbSize && req->hasData) { - // Note: pcbSize seams to be in tchars not in bytes! + // Note: pcbSize seems to be in tchars not in bytes! ULONG lenData = (*pcbSize) * (req->unicode ? sizeof(WCHAR) : 1); rpl->hasData = TRUE; diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui index d71438e5..e6f006c4 100644 --- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui +++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui @@ -211,7 +211,7 @@ - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) @@ -896,7 +896,7 @@ - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. true @@ -1409,7 +1409,7 @@ For files access you can use 'Direct All' instead to make it apply to all progra - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. diff --git a/SandboxiePlus/SandMan/sandman_de.ts b/SandboxiePlus/SandMan/sandman_de.ts index a4c18450..44a27b59 100644 --- a/SandboxiePlus/SandMan/sandman_de.ts +++ b/SandboxiePlus/SandMan/sandman_de.ts @@ -2044,7 +2044,7 @@ Vollständiger Pfad: %4 - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) Lässt Programme denken, sie würden mit erhöhten Rechten laufen (Erlaubt das sichere Ausführen von Installern) @@ -2136,7 +2136,7 @@ Vollständiger Pfad: %4 - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. Programme die hier gelistet sind oder von den angegeben Ordnern gestartet werden, werden automatisch in dieser Sandbox ausgeführt, solange sie nicht explizit in einer anderen Sandbox gestartet werden. @@ -2367,7 +2367,7 @@ Zum Dateizugriff können Sie 'Direkt Alle' verwenden um für alle Prog - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Aktivere Sofortwiederherstellungsabfrage, um alle Dateien sofort wiederherzustellen, sobald sie erzeugt werden. diff --git a/SandboxiePlus/SandMan/sandman_es.ts b/SandboxiePlus/SandMan/sandman_es.ts index d480dc08..cc521800 100644 --- a/SandboxiePlus/SandMan/sandman_es.ts +++ b/SandboxiePlus/SandMan/sandman_es.ts @@ -1929,7 +1929,7 @@ Full path: %4 - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) @@ -2177,7 +2177,7 @@ Full path: %4 - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. @@ -2344,7 +2344,7 @@ For files access you can use 'Direct All' instead to make it apply to - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. diff --git a/SandboxiePlus/SandMan/sandman_it.ts b/SandboxiePlus/SandMan/sandman_it.ts index 1cff12b6..bcad0645 100644 --- a/SandboxiePlus/SandMan/sandman_it.ts +++ b/SandboxiePlus/SandMan/sandman_it.ts @@ -1944,7 +1944,7 @@ Percorso completo: %4 - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) Fai credere alle applicazioni di avviarsi con privilegi elevati (esegue gli installer in modo sicuro) @@ -2192,7 +2192,7 @@ Percorso completo: %4 - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. I seguenti programmi, o i programmi avviati dai seguenti percorsi, verranno avviati automaticamente in quest'area virtuale. @@ -2364,7 +2364,7 @@ Per accedere ai file, è possibile utilizzare l'accesso 'Completo&apos - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Attiva notifica di Recupero immediato dei file, non appena questi vengono creati. diff --git a/SandboxiePlus/SandMan/sandman_pl.ts b/SandboxiePlus/SandMan/sandman_pl.ts index 49b3052e..9168b443 100644 --- a/SandboxiePlus/SandMan/sandman_pl.ts +++ b/SandboxiePlus/SandMan/sandman_pl.ts @@ -2077,7 +2077,7 @@ Full path: %4 - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) @@ -2202,7 +2202,7 @@ Full path: %4 - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. To podane programy lob programy wystartowane z to podanych ścieżek będą automatycznie umieszczone w tej piaskownicy, chyba że są specjalnie umieszczone w innej. @@ -2373,7 +2373,7 @@ Bezpośredni dostęp do plików i kluczy działa tylko z programami umieszczonyc - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Aktywuj bezzwłoczne odtwarzanie plików jak tylko zostaną zapisane. diff --git a/SandboxiePlus/SandMan/sandman_pt.ts b/SandboxiePlus/SandMan/sandman_pt.ts index ca9b40ae..2000ec39 100644 --- a/SandboxiePlus/SandMan/sandman_pt.ts +++ b/SandboxiePlus/SandMan/sandman_pt.ts @@ -2243,7 +2243,7 @@ Faça o download da versão mais recente e configure-a em sandboxie.ini conforme - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) @@ -2335,7 +2335,7 @@ Faça o download da versão mais recente e configure-a em sandboxie.ini conforme - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. Programas inseridos aqui, ou iniciados a partir de locais inseridos, serão colocados nessa caixa automaticamente, a menos que seja explicitamente iniciado em outra caixa de areia. @@ -2566,7 +2566,7 @@ Para acesso a arquivos, você pode usar o 'Direct All' em vez de fazê - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Ativar mensagem de recuperação imediata para poder recuperar arquivos assim que for criado. diff --git a/SandboxiePlus/SandMan/sandman_ru.ts b/SandboxiePlus/SandMan/sandman_ru.ts index 41aebfc7..262ec1c7 100644 --- a/SandboxiePlus/SandMan/sandman_ru.ts +++ b/SandboxiePlus/SandMan/sandman_ru.ts @@ -1600,7 +1600,7 @@ If leader processes are defined, all others are treated as lingering processes.< Разрешить запуск всех программ в этой песочнице. - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Включить запрос немедленного восстановления, чтобы иметь возможность восстанавливать файлы сразу после их создания. @@ -1818,7 +1818,7 @@ instead of "*". Добавить пользователя - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. Введенные здесь программы, или программы запущенные из указанных мест, будут автоматически помещены в эту песочницу, если они явно не запущены в другой песочнице. @@ -2031,7 +2031,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Ограничения повышение уровня - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) Заставить приложения думать, что они работают с повышенными правами (позволяет безопасно запускать установщики) diff --git a/SandboxiePlus/SandMan/sandman_tr.ts b/SandboxiePlus/SandMan/sandman_tr.ts index 7463f534..062c14f1 100644 --- a/SandboxiePlus/SandMan/sandman_tr.ts +++ b/SandboxiePlus/SandMan/sandman_tr.ts @@ -1624,7 +1624,7 @@ If leader processes are defined, all others are treated as lingering processes.< Tüm programların bu kutuda başlamasına izin ver. - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Dosyaları oluşturulur oluşturulmaz kurtarabilmek için Anında Kurtarma istemini etkinleştir. @@ -1846,7 +1846,7 @@ Bu seçenekler olay maskesini "*" olarak ayarlar - Tüm erişim olayla Kullanıcı Ekle - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. Buraya girilen programlar veya girilen konumlardan başlatılan programlar, başka bir korumalı kutuda açıkça belirtilmedikçe otomatik olarak bu kutuya yerleştirilecektir. @@ -2071,7 +2071,7 @@ Not: Bir korumalı kutuya ilişkin Zorlanmış Programlar ve Zorlanmış Dizinle - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) diff --git a/SandboxiePlus/SandMan/sandman_zh-CN.ts b/SandboxiePlus/SandMan/sandman_zh-CN.ts index 9989754d..929a15ec 100644 --- a/SandboxiePlus/SandMan/sandman_zh-CN.ts +++ b/SandboxiePlus/SandMan/sandman_zh-CN.ts @@ -2020,7 +2020,7 @@ Full path: %4 - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) 使应用程序自身认为被提权运行 (允许安全的运行安装程序) @@ -2264,7 +2264,7 @@ Full path: %4 - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. 此处输入的程序,或指定位置启动的程序,将自动入此沙盒,除非它们明确在其他沙盒启动 @@ -2436,7 +2436,7 @@ For files access you can use 'Direct All' instead to make it apply to - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. 启用快速恢复提示以便创建文件时能尽快恢复 diff --git a/SandboxiePlus/SandMan/sandman_zh-TW.ts b/SandboxiePlus/SandMan/sandman_zh-TW.ts index 16fa8139..65e761ea 100644 --- a/SandboxiePlus/SandMan/sandman_zh-TW.ts +++ b/SandboxiePlus/SandMan/sandman_zh-TW.ts @@ -1691,7 +1691,7 @@ If leader processes are defined, all others are treated as lingering processes.< 允許所有程式在此沙盤中啟動。 - Enable Immediate Recovery prompt to be able to recover files as soon as thay are created. + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. 啟用快速恢復提示以便建立檔案時能儘快恢復。 @@ -1899,7 +1899,7 @@ If leader processes are defined, all others are treated as lingering processes.< 新增使用者 - Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox. 此處輸入的程式,或指定位置啟動的程式,將自動加入此沙盤,除非它們被確定已在其他沙盤啟動。 @@ -2125,7 +2125,7 @@ instead of "*". 權限提升限制 - Make applications think thay are running elevated (allows to run installers safely) + Make applications think they are running elevated (allows to run installers safely) 使應用程式認為其已在權限提升狀態下運作(允許安全地執行安裝程式)