diff --git a/Sandboxie/apps/com/Crypto/crypto.c b/Sandboxie/apps/com/Crypto/crypto.c
index 30804448..37dab936 100644
--- a/Sandboxie/apps/com/Crypto/crypto.c
+++ b/Sandboxie/apps/com/Crypto/crypto.c
@@ -150,7 +150,8 @@ ALIGNED HANDLE my_CreateFileW(
HANDLE hTemplateFile);
//
- // prevent SBIE1313, dont even try to access the block devcie for raw reading
+ // prevent SandboxieCrypto.exe from causing SBIE1313,
+ // don't even try to access to the device block for raw reading
//
if (wcsnicmp(lpFileName, L"\\\\.\\PhysicalDrive", 17) == 0 && wcschr(lpFileName + 17, L'\\') == NULL) {
diff --git a/Sandboxie/core/dll/com.c b/Sandboxie/core/dll/com.c
index 3997d086..d67e5fbb 100644
--- a/Sandboxie/core/dll/com.c
+++ b/Sandboxie/core/dll/com.c
@@ -3455,9 +3455,9 @@ _FX void Com_LoadRTList(const WCHAR* setting, WCHAR** pNames)
_FX BOOLEAN Com_IsClosedRT(const wchar_t* strClassId)
{
//
- // Chrome uses the FindAppUriHandlersAsync which when we dont have com open and more rights than we should have
- // fails returning a NULl value, chrome does no check for thsi faulure mode and dereferences it resulting in a fatal crash.
- // Since we don't support modern app features anyways the simplest workaround is to block this interface.
+ // Chrome uses the FindAppUriHandlersAsync, which fails returning a NULL value when we don't have com open and more rights
+ // than we should have. Chrome does not check for this failure mode and dereferences it, resulting in a fatal crash.
+ // Since we don't support modern app features anyways, the simplest workaround is to block this interface.
//
if (Dll_ImageType == DLL_IMAGE_GOOGLE_CHROME) {
@@ -3466,7 +3466,7 @@ _FX BOOLEAN Com_IsClosedRT(const wchar_t* strClassId)
}
//
- // this seams to be broken as well
+ // this seems to be broken as well
//if (wcscmp(strClassId, L"Windows.UI.Notifications.ToastNotificationManager") == 0)
// return TRUE;
diff --git a/Sandboxie/core/dll/dllmain.c b/Sandboxie/core/dll/dllmain.c
index 20d948b0..10bca3ee 100644
--- a/Sandboxie/core/dll/dllmain.c
+++ b/Sandboxie/core/dll/dllmain.c
@@ -466,7 +466,7 @@ _FX void Dll_InitExeEntry(void)
//
// check if running as a forced COM server process
- // note: does not return if this is the case
+ // note: it does not return if this is the case
//
Custom_ComServer();
@@ -475,11 +475,11 @@ _FX void Dll_InitExeEntry(void)
// force load of UxTheme in a Google Chrome sandbox process
//
- // Note: this does not seam to longer be needed for modern chrome builds, also it breaks the vivaldi browser
+ // Note: this does not seem to be needed anymore for modern Chrome builds, also it breaks Vivaldi browser
//Custom_Load_UxTheme();
- UserEnv_InitVer(Dll_OsBuild >= 7600 ? Dll_KernelBase : Dll_Kernel32); // in KernelBase since win 7
+ UserEnv_InitVer(Dll_OsBuild >= 7600 ? Dll_KernelBase : Dll_Kernel32); // in KernelBase since Win 7
//
// Windows 8.1: hook UserEnv-related entrypoint in KernelBase
diff --git a/Sandboxie/core/dll/gui.c b/Sandboxie/core/dll/gui.c
index 250bc7cd..d3e30652 100644
--- a/Sandboxie/core/dll/gui.c
+++ b/Sandboxie/core/dll/gui.c
@@ -1232,14 +1232,14 @@ _FX HWND Gui_CreateWindowExW(
//
// under Sandboxie 4 the Chrome sandbox child process gets confused
// (reason not known) and creates some top level windows, for which it
- // does not process messages. this causes DDE message broadcast to
- // hang for several seconds. to workaround this, we cause the windows
+ // does not process messages. This causes DDE message broadcast to
+ // hang for several seconds. To workaround this, we cause the windows
// to be created as message-only windows
//
// note: the desktop window was made accessible in early v4 builds
// but this code is still here to handle any other parent windows
//
- // note: this code breaks chrome hw acceleration, so its no longer used
+ // note: this code breaks Chrome hw acceleration, so it's no longer used
//
/*if (Dll_ChromeSandbox) {
diff --git a/Sandboxie/core/dll/guimisc.c b/Sandboxie/core/dll/guimisc.c
index 2b761f59..2e3cda58 100644
--- a/Sandboxie/core/dll/guimisc.c
+++ b/Sandboxie/core/dll/guimisc.c
@@ -187,7 +187,7 @@ _FX BOOLEAN Gui_InitMisc(void)
// Chinese instant messenger QQ.exe (aka TM.exe) uses OpenInputDesktop,
// GetThreadDesktop and GetUserObjectInformation to determine if the
// desktop is locked, and if OpenInputDesktop fails, it assumes lock.
- // fortunately it is enough to hook just OpenInputDesktop to fix this
+ // Fortunately it is enough to hook just OpenInputDesktop to fix this
//
// Google Chrome also uses OpenInputDesktop and GetUserObjectInformation
// to check if the desktop is locked, and other programs might as well
@@ -1202,7 +1202,7 @@ _FX LONG Gui_GetRawInputDeviceInfo_impl(
GUI_GET_RAW_INPUT_DEVICE_INFO_REQ* req;
GUI_GET_RAW_INPUT_DEVICE_INFO_RPL* rpl;
- // Note: pcbSize seams to be in tchars not in bytes!
+ // Note: pcbSize seems to be in tchars not in bytes!
ULONG lenData = 0;
if (pData && pcbSize)
lenData = (*pcbSize) * (bUnicode ? sizeof(WCHAR) : 1);
diff --git a/Sandboxie/core/dll/proc.c b/Sandboxie/core/dll/proc.c
index b38d5840..fa16b2e4 100644
--- a/Sandboxie/core/dll/proc.c
+++ b/Sandboxie/core/dll/proc.c
@@ -997,9 +997,9 @@ _FX BOOL Proc_UpdateProcThreadAttribute(
_Out_writes_bytes_opt_(cbSize) PVOID lpPreviousValue,
_In_opt_ PSIZE_T lpReturnSize)
{
- // fix for chreom 86+
- // when the PROC_THREAD_ATTRIBUTE_JOB_LIST is set the call CreateProcessAsUserW -> CreateProcessInternalW -> NtCreateProcess
- // fals with an access denided error, so we need to block this attribute form being set
+ // fix for Chrome 86+
+ // when the PROC_THREAD_ATTRIBUTE_JOB_LIST is set, the call CreateProcessAsUserW -> CreateProcessInternalW -> NtCreateProcess
+ // fails with an access denied error, so we need to block this attribute from being set
// if(Dll_ImageType == DLL_IMAGE_GOOGLE_CHROME)
if (Attribute == 0x0002000d) //PROC_THREAD_ATTRIBUTE_JOB_LIST
{
@@ -1128,8 +1128,8 @@ _FX BOOL Proc_CreateProcessInternalW_RS5(
}
//
- // Electron based applications which work like chrome seam to fail with HW acceleration even when
- // thay get the same treatment as chrome and chromium derivatives.
+ // Electron based applications which work like Chrome seem to fail with HW acceleration even when
+ // they get the same treatment as Chrome and Chromium derivatives.
// hack: by adding a parameter to the gpu renderer process we can fix the issue.
//
@@ -1686,7 +1686,7 @@ _FX void Proc_QuoteCommandLine_XP(
//
// the system CreateProcessInternal may quote the first argument on
- // the command line. on Vista and later, we get the quoted string
+ // the command line. On Vista and later, we get the quoted string
// through Proc_RtlCreateProcessParametersEx, but on Windows XP we
// abort CreateProcessInternal during NtCreateSection, before it can
// show us the quoted command line, so add the quotes here
@@ -1774,9 +1774,9 @@ _FX void Proc_FixBatchCommandLine(
// lpApplication, the system CreateProcessInternalW will try to create
// a process using the batch file path, and will fail with "not found"
// instead of "not exe file" if the batch file exists only in the
- // sandbox. to prepare for this case, we adjust the command line if
+ // sandbox. To prepare for this case, we adjust the command line if
// the batch file is inside the sandbox.
- // see Proc_CreateProcessInternalW above.
+ // See Proc_CreateProcessInternalW above.
//
if (! CommandLine)
@@ -1923,7 +1923,7 @@ _FX NTSTATUS Proc_RtlCreateProcessParametersEx(
{
//
// on Windows Vista and later we can extract the image path from
- // the invocation of RtlCreateProcessParametersEx. it is invoked
+ // the invocation of RtlCreateProcessParametersEx. It is invoked
// before a new process object is created
//
@@ -2241,8 +2241,6 @@ _FX BOOLEAN Proc_CheckMailer(const WCHAR *ImagePath, BOOLEAN IsBoxedPath)
// ignore rundll32.exe, because Windows Live Mail sets
// it as the default mail program.
//
- // ignore opera.exe, because Opera may only be used for
- // browsing and not email
//
// ignore other common browsers
//
@@ -2485,7 +2483,7 @@ _FX BOOLEAN Proc_Init_AdvPack(HMODULE module)
// the Protected Mode ActiveX Installation Broker
// but this means that an ActiveX installation which involves running
// an EXE file may not elevate correctly.
- // so we hook RunSetupCommand to force elevation.
+ // So we hook RunSetupCommand to force elevation.
//
extern BOOLEAN Secure_IsInternetExplorerTabProcess;
diff --git a/Sandboxie/core/drv/token.c b/Sandboxie/core/drv/token.c
index 7b4438ac..0de56f61 100644
--- a/Sandboxie/core/drv/token.c
+++ b/Sandboxie/core/drv/token.c
@@ -484,7 +484,7 @@ _FX void *Token_FilterPrimary(PROCESS *proc, void *ProcessObject)
DropRights = (proc->drop_rights ? -1 : 0);
//
- // special allowance for MSIServer - does not seam to be needed with the CreateWaitableTimerW hook
+ // special allowance for MSIServer - it does not seem to be needed with the CreateWaitableTimerW hook
//
//if (DropRights && !proc->image_from_box && _wcsicmp(proc->image_name, L"msiexec.exe") == 0
// && Conf_Get_Boolean(proc->box->name, L"MsiInstallerExemptions", 0, FALSE))
diff --git a/Sandboxie/core/svc/EpMapperServer.cpp b/Sandboxie/core/svc/EpMapperServer.cpp
index 12aa70d1..5a3c0765 100644
--- a/Sandboxie/core/svc/EpMapperServer.cpp
+++ b/Sandboxie/core/svc/EpMapperServer.cpp
@@ -219,8 +219,8 @@ MSG_HEADER *EpMapperServer::EpmapperGetPortNameHandler(MSG_HEADER *msg)
if (rpl->h.status == STATUS_SUCCESS)
{
//
- // Note: it seams that chrome.exe resolves GAME_CONFIG_STORE_PORT in one process and accesses from an other
- // so since here we only open non critical ports we will use PID 0 to open them globally
+ // Note: it seems that chrome.exe resolves GAME_CONFIG_STORE_PORT in one process and accesses from another.
+ // So, since here we only open non critical ports, we will use PID 0 to open them globally
// instead of only for the one process. Todo: make it per sandbox instead
//
diff --git a/Sandboxie/core/svc/GuiServer.cpp b/Sandboxie/core/svc/GuiServer.cpp
index eb939fd5..ac0ba8b0 100644
--- a/Sandboxie/core/svc/GuiServer.cpp
+++ b/Sandboxie/core/svc/GuiServer.cpp
@@ -3451,7 +3451,7 @@ ULONG GuiServer::GetRawInputDeviceInfoSlave(SlaveArgs *args)
rpl->cbSize = req->cbSize;
if (pcbSize && req->hasData)
{
- // Note: pcbSize seams to be in tchars not in bytes!
+ // Note: pcbSize seems to be in tchars not in bytes!
ULONG lenData = (*pcbSize) * (req->unicode ? sizeof(WCHAR) : 1);
rpl->hasData = TRUE;
diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui
index d71438e5..e6f006c4 100644
--- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui
+++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui
@@ -211,7 +211,7 @@
- Make applications think thay are running elevated (allows to run installers safely)
+ Make applications think they are running elevated (allows to run installers safely)
@@ -896,7 +896,7 @@
- Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.
+ Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.true
@@ -1409,7 +1409,7 @@ For files access you can use 'Direct All' instead to make it apply to all progra
- Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.
+ Enable Immediate Recovery prompt to be able to recover files as soon as they are created.
diff --git a/SandboxiePlus/SandMan/sandman_de.ts b/SandboxiePlus/SandMan/sandman_de.ts
index a4c18450..44a27b59 100644
--- a/SandboxiePlus/SandMan/sandman_de.ts
+++ b/SandboxiePlus/SandMan/sandman_de.ts
@@ -2044,7 +2044,7 @@ Vollständiger Pfad: %4
-
+
Lässt Programme denken, sie würden mit erhöhten Rechten laufen (Erlaubt das sichere Ausführen von Installern)
@@ -2136,7 +2136,7 @@ Vollständiger Pfad: %4
-
+
Programme die hier gelistet sind oder von den angegeben Ordnern gestartet werden, werden automatisch in dieser Sandbox ausgeführt, solange sie nicht explizit in einer anderen Sandbox gestartet werden.
@@ -2367,7 +2367,7 @@ Zum Dateizugriff können Sie 'Direkt Alle' verwenden um für alle Prog
-
+
Enable Immediate Recovery prompt to be able to recover files as soon as they are created.Aktivere Sofortwiederherstellungsabfrage, um alle Dateien sofort wiederherzustellen, sobald sie erzeugt werden.
diff --git a/SandboxiePlus/SandMan/sandman_es.ts b/SandboxiePlus/SandMan/sandman_es.ts
index d480dc08..cc521800 100644
--- a/SandboxiePlus/SandMan/sandman_es.ts
+++ b/SandboxiePlus/SandMan/sandman_es.ts
@@ -1929,7 +1929,7 @@ Full path: %4
-
+
@@ -2177,7 +2177,7 @@ Full path: %4
-
+
@@ -2344,7 +2344,7 @@ For files access you can use 'Direct All' instead to make it apply to
-
+
diff --git a/SandboxiePlus/SandMan/sandman_it.ts b/SandboxiePlus/SandMan/sandman_it.ts
index 1cff12b6..bcad0645 100644
--- a/SandboxiePlus/SandMan/sandman_it.ts
+++ b/SandboxiePlus/SandMan/sandman_it.ts
@@ -1944,7 +1944,7 @@ Percorso completo: %4
-
+
Fai credere alle applicazioni di avviarsi con privilegi elevati (esegue gli installer in modo sicuro)
@@ -2192,7 +2192,7 @@ Percorso completo: %4
-
+
I seguenti programmi, o i programmi avviati dai seguenti percorsi, verranno avviati automaticamente in quest'area virtuale.
@@ -2364,7 +2364,7 @@ Per accedere ai file, è possibile utilizzare l'accesso 'Completo&apos
-
+
Attiva notifica di Recupero immediato dei file, non appena questi vengono creati.
diff --git a/SandboxiePlus/SandMan/sandman_pl.ts b/SandboxiePlus/SandMan/sandman_pl.ts
index 49b3052e..9168b443 100644
--- a/SandboxiePlus/SandMan/sandman_pl.ts
+++ b/SandboxiePlus/SandMan/sandman_pl.ts
@@ -2077,7 +2077,7 @@ Full path: %4
-
+
@@ -2202,7 +2202,7 @@ Full path: %4
-
+
To podane programy lob programy wystartowane z to podanych ścieżek będą automatycznie umieszczone w tej piaskownicy, chyba że są specjalnie umieszczone w innej.
@@ -2373,7 +2373,7 @@ Bezpośredni dostęp do plików i kluczy działa tylko z programami umieszczonyc
-
+
Aktywuj bezzwłoczne odtwarzanie plików jak tylko zostaną zapisane.
diff --git a/SandboxiePlus/SandMan/sandman_pt.ts b/SandboxiePlus/SandMan/sandman_pt.ts
index ca9b40ae..2000ec39 100644
--- a/SandboxiePlus/SandMan/sandman_pt.ts
+++ b/SandboxiePlus/SandMan/sandman_pt.ts
@@ -2243,7 +2243,7 @@ Faça o download da versão mais recente e configure-a em sandboxie.ini conforme
-
+
@@ -2335,7 +2335,7 @@ Faça o download da versão mais recente e configure-a em sandboxie.ini conforme
-
+
Programas inseridos aqui, ou iniciados a partir de locais inseridos, serão colocados nessa caixa automaticamente, a menos que seja explicitamente iniciado em outra caixa de areia.
@@ -2566,7 +2566,7 @@ Para acesso a arquivos, você pode usar o 'Direct All' em vez de fazê
-
+
Ativar mensagem de recuperação imediata para poder recuperar arquivos assim que for criado.
diff --git a/SandboxiePlus/SandMan/sandman_ru.ts b/SandboxiePlus/SandMan/sandman_ru.ts
index 41aebfc7..262ec1c7 100644
--- a/SandboxiePlus/SandMan/sandman_ru.ts
+++ b/SandboxiePlus/SandMan/sandman_ru.ts
@@ -1600,7 +1600,7 @@ If leader processes are defined, all others are treated as lingering processes.<
Разрешить запуск всех программ в этой песочнице.
-
+
Включить запрос немедленного восстановления, чтобы иметь возможность восстанавливать файлы сразу после их создания.
@@ -1818,7 +1818,7 @@ instead of "*".
Добавить пользователя
-
+
Введенные здесь программы, или программы запущенные из указанных мест, будут автоматически помещены в эту песочницу, если они явно не запущены в другой песочнице.
@@ -2031,7 +2031,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to
Ограничения повышение уровня
-
+
Заставить приложения думать, что они работают с повышенными правами (позволяет безопасно запускать установщики)
diff --git a/SandboxiePlus/SandMan/sandman_tr.ts b/SandboxiePlus/SandMan/sandman_tr.ts
index 7463f534..062c14f1 100644
--- a/SandboxiePlus/SandMan/sandman_tr.ts
+++ b/SandboxiePlus/SandMan/sandman_tr.ts
@@ -1624,7 +1624,7 @@ If leader processes are defined, all others are treated as lingering processes.<
Tüm programların bu kutuda başlamasına izin ver.
-
+
Dosyaları oluşturulur oluşturulmaz kurtarabilmek için Anında Kurtarma istemini etkinleştir.
@@ -1846,7 +1846,7 @@ Bu seçenekler olay maskesini "*" olarak ayarlar - Tüm erişim olayla
Kullanıcı Ekle
-
+
Buraya girilen programlar veya girilen konumlardan başlatılan programlar, başka bir korumalı kutuda açıkça belirtilmedikçe otomatik olarak bu kutuya yerleştirilecektir.
@@ -2071,7 +2071,7 @@ Not: Bir korumalı kutuya ilişkin Zorlanmış Programlar ve Zorlanmış Dizinle
-
+
diff --git a/SandboxiePlus/SandMan/sandman_zh-CN.ts b/SandboxiePlus/SandMan/sandman_zh-CN.ts
index 9989754d..929a15ec 100644
--- a/SandboxiePlus/SandMan/sandman_zh-CN.ts
+++ b/SandboxiePlus/SandMan/sandman_zh-CN.ts
@@ -2020,7 +2020,7 @@ Full path: %4
-
+
使应用程序自身认为被提权运行 (允许安全的运行安装程序)
@@ -2264,7 +2264,7 @@ Full path: %4
-
+
此处输入的程序,或指定位置启动的程序,将自动入此沙盒,除非它们明确在其他沙盒启动
@@ -2436,7 +2436,7 @@ For files access you can use 'Direct All' instead to make it apply to
-
+
启用快速恢复提示以便创建文件时能尽快恢复
diff --git a/SandboxiePlus/SandMan/sandman_zh-TW.ts b/SandboxiePlus/SandMan/sandman_zh-TW.ts
index 16fa8139..65e761ea 100644
--- a/SandboxiePlus/SandMan/sandman_zh-TW.ts
+++ b/SandboxiePlus/SandMan/sandman_zh-TW.ts
@@ -1691,7 +1691,7 @@ If leader processes are defined, all others are treated as lingering processes.<
允許所有程式在此沙盤中啟動。
-
+
啟用快速恢復提示以便建立檔案時能儘快恢復。
@@ -1899,7 +1899,7 @@ If leader processes are defined, all others are treated as lingering processes.<
新增使用者
-
+
此處輸入的程式,或指定位置啟動的程式,將自動加入此沙盤,除非它們被確定已在其他沙盤啟動。
@@ -2125,7 +2125,7 @@ instead of "*".
權限提升限制
-
+
使應用程式認為其已在權限提升狀態下運作(允許安全地執行安裝程式)