From 7b9da3f47bc8ee3189ab5eeca8f5c43721c3ef00 Mon Sep 17 00:00:00 2001 From: EdgeArcher129840 <125170682+RimacC2-EV@users.noreply.github.com> Date: Sun, 9 Jun 2024 20:19:04 +0800 Subject: [PATCH 1/9] Update sandman_zh_CN.ts This update adds some explanations of terms with my personal understanding. --- SandboxiePlus/SandMan/sandman_zh_CN.ts | 27 ++++++++++++-------------- 1 file changed, 12 insertions(+), 15 deletions(-) diff --git a/SandboxiePlus/SandMan/sandman_zh_CN.ts b/SandboxiePlus/SandMan/sandman_zh_CN.ts index 13591b9a..bc5536c8 100644 --- a/SandboxiePlus/SandMan/sandman_zh_CN.ts +++ b/SandboxiePlus/SandMan/sandman_zh_CN.ts @@ -262,14 +262,10 @@ This feature may reduce compatibility as it also prevents box located processes from writing to host located ones and even starting them. 该功能可能对兼容性造成影响,因为它阻止了沙盒内的进程向主机进程写入数据,以及启动它们。 - - Prevents the sandboxed window from being captured. - 阻止沙盒化窗口被捕获图像。 - Prevent sandboxed windows from being captured - 阻止沙盒化窗口被捕获图像。 + 阻止捕获沙盒中程序的窗口图像。 @@ -462,7 +458,8 @@ To disable this template for a sandbox, simply uncheck it in the template list.< Creating new box image, please enter a secure password, and choose a disk image size. - 正在创建新的沙盒磁盘映像。请输入强密码,并设置映像大小。 + 正在创建新的沙盒磁盘映像。 + 请输入强密码,并设置映像大小。 @@ -510,7 +507,7 @@ This length permits approximately 384 bits of entropy with a passphrase composed increases to 512 bits with the application of Leet (L337) speak modifications, and exceeds 768 bits when composed of entirely random printable ASCII characters. 密码的最大长度限制为 128 个字符。 如果密码由实际的英文单词组成,这个长度允许大约 384 位的熵, -如果使用 Leet(L337) 密语,则增加到 512 位熵,如果完全由随机的可打印 ASCII 字符组成,则超过 768 位熵。 +如果使用 Leet(L337) 密语,则增加到 512 位熵,如果完全由随机的可打印 ASCII 字符组成,则允许超过 768 位熵。 @@ -634,12 +631,12 @@ While the level of isolation is reduced compared to other box types, it offers i Access to the virtual disk when mounted is restricted to programs running within the sandbox. Sandboxie prevents other processes on the host system from accessing the sandboxed processes. This ensures the utmost level of privacy and data protection within the confidential sandbox environment. 该类型的沙盒使用加密的磁盘映像作为文件根目录,为安全性与隐私性提供了额外的保障。 -当虚拟磁盘被挂载时,只有沙盒内的程序可以访问,而其他进程将会被阻止访问。这确保了在该沙盒环境中最高级别的隐私和数据保护。 +当虚拟磁盘映像被挂载时,只有沙盒内的程序可以访问它,而其他进程将会被阻止访问。这确保了在该沙盒环境中最高级别的隐私和数据保护。 Hardened Sandbox with Data Protection - 带数据保护的加固型沙盒 + 带有数据保护的加固型沙盒 @@ -649,7 +646,7 @@ This ensures the utmost level of privacy and data protection within the confiden Sandbox with Data Protection - 带数据保护的沙盒 + 带有数据保护的沙盒 @@ -659,7 +656,7 @@ This ensures the utmost level of privacy and data protection within the confiden Application Compartment with Data Protection - 带数据保护的应用隔间 + 带有数据保护的应用隔间 @@ -812,7 +809,7 @@ Please browse to the correct user profile directory. Note: you need to run the browser unsandboxed for them to get created. Please browse to the correct user profile directory. 没有发现合适的目录 -注意:你需要在不使用沙盒的情况下运行一次浏览器,以便使它们被正确创建 +注意:你需要在不使用沙盒的情况下先运行一次浏览器,以便使它们被正确创建 请浏览并选择正确的用户资料配置文件目录 @@ -1322,7 +1319,7 @@ You can use %USER% to save each users sandbox to an own fodler. Drop rights from Administrators and Power Users groups - 撤销管理员和 Power Users 用户组的权限 + 撤销管理员和 Power Users (Windows Vista 以前 及之后的 专业版 Windows 系统) 用户组的权限 @@ -1332,7 +1329,7 @@ You can use %USER% to save each users sandbox to an own fodler. Allow MSIServer to run with a sandboxed system token - 允许 MSIServer 在沙盒内使用系统令牌运行 + 允许 MSIServer 使用沙盒化的系统令牌运行 @@ -1444,7 +1441,7 @@ You can use %USER% to save each users sandbox to an own fodler. This sandbox content will be placed in an encrypted container file, please note that any corruption of the container's header will render all its content permanently inaccessible. Corruption can occur as a result of a BSOD, a storage hardware failure, or a malicious application overwriting random files. This feature is provided under a strict <b>No Backup No Mercy</b> policy, YOU the user are responsible for the data you put into an encrypted box. <br /><br />IF YOU AGREE TO TAKE FULL RESPONSIBILITY FOR YOUR DATA PRESS [YES], OTHERWISE PRESS [NO]. This sandbox content will be placed in an encrypted container file, please note that any corruption of the container's header will render all its content permanently innaccessible. Corruption can occur as a result of a BSOD, a storage hadrware failure, or a maliciouse application overwriting random files. This feature is provided under a strickt <b>No Backup No Mercy</b> policy, YOU the user are responsible for the data you put into an encrypted box. <br /><br />IF YOU AGREE TO TAKE FULL RESPONSIBILITY FOR YOUR DATA PRESS [YES], OTHERWISE PRESS [NO]. - 该沙盒的文件将会存储在加密的容器文件中,注意:容器头文件的任何损坏都可能导致容器内文件不可读取。同时,可能导致不限于蓝屏、死机、存储设备故障、或沙盒中恶意程序随机覆写文件。该功能以严格遵守 <br />无备份、不宽容<br />的形式提供,您需要自行为该加密沙盒中的文件承担风险。 <br /><br />如果您同意为您的数据自行承担风险则选择 [确认], 否则 [取消]. + 该沙盒的文件将会存储在加密的容器文件中,注意:容器头的任何损坏都可能导致容器内文件不可读取(这等同于损坏硬盘的引导分区)。同时,可能导致不限于蓝屏、死机、存储设备故障、或沙盒中恶意程序随机覆写文件。该功能以严格遵守 <br />无备份、不宽容<br />的形式提供,您需要自行为该加密沙盒中的文件承担风险。 <br /><br />如果您同意为您的数据自行承担风险则选择 [确认], 否则 [取消]. From 4023b2325ddf348ceea5b08fe50fa3df9bc77edb Mon Sep 17 00:00:00 2001 From: EdgeArcher129840 <125170682+RimacC2-EV@users.noreply.github.com> Date: Wed, 12 Jun 2024 22:32:20 +0800 Subject: [PATCH 2/9] Update sandman_zh_CN.ts --- SandboxiePlus/SandMan/sandman_zh_CN.ts | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/SandboxiePlus/SandMan/sandman_zh_CN.ts b/SandboxiePlus/SandMan/sandman_zh_CN.ts index bc5536c8..e7d5c2d3 100644 --- a/SandboxiePlus/SandMan/sandman_zh_CN.ts +++ b/SandboxiePlus/SandMan/sandman_zh_CN.ts @@ -809,7 +809,7 @@ Please browse to the correct user profile directory. Note: you need to run the browser unsandboxed for them to get created. Please browse to the correct user profile directory. 没有发现合适的目录 -注意:你需要在不使用沙盒的情况下先运行一次浏览器,以便使它们被正确创建 +注意:您需要在不使用沙盒的情况下先运行一次浏览器,以便使它们被正确创建。 请浏览并选择正确的用户资料配置文件目录 @@ -2043,7 +2043,7 @@ Note: The update check is often behind the latest GitHub release to ensure that This sandbox has been deleted hence configuration can not be saved. - 该沙盒已被删除,因此配置无法保存 + 该沙盒已被删除,因此无法保存配置 @@ -3018,7 +3018,7 @@ Unlike the preview channel, it does not include untested, potentially breaking, Sandboxie-Plus applies strict application restrictions, which can lead to compatibility issues. Stay updated with Sandboxie-Plus, including compatibility templates and troubleshooting, to ensure smooth operation amid Windows updates and application changes. - Sandboxie Plus 应用了严格的应用程序限制,这可能会导致兼容性问题。使 Sandboxie Plus (及其兼容性模板和故障排除向导)保持在最新版本,有利于在 Windows 更新和应用程序变动时保证这些应用程序限制稳定运行。 + Sandboxie-Plus 应用了严格的应用程序限制,这可能会导致兼容性问题。使 Sandboxie-Plus (及其兼容性模板和故障排除向导)保持在最新版本,有利于在 Windows 更新和应用程序变动时保证这些应用程序限制稳定运行。 @@ -3682,7 +3682,7 @@ Do you want to do the clean up? This box does not enforce isolation, it is intended to be used as an <a href="sbie://docs/compartment-mode">application compartment</a> for software virtualization only. This box does not enforce isolation, it is intended to be used as an application compartment for software virtualization only. - 此类沙盒不执行隔离,它的目的是将一个应用程序虚拟化 + 此类沙盒不执行隔离,它用于将一个应用程序虚拟化 @@ -3826,7 +3826,7 @@ Please check if there is an update for sandboxie. Your Windows build %1 exceeds the current known support capabilities of your Sandboxie version, Sandboxie will attempt to use the last-known offsets which may cause system instability. - 您的Windows版本 %1 超过了 Sandboxie 版本的当前已知支持范围,Sandboxie 将尝试使用上一个已知的配置,这可能会导致系统不稳定。 + 您的 Windows 版本 %1 超过了 Sandboxie 版本的当前已知支持范围,Sandboxie 将尝试使用上一个已知的配置,这可能会导致系统不稳定。 From a88a83c8dfd2d3ed0c18cd3a972c520a247d4ccb Mon Sep 17 00:00:00 2001 From: isaak654 Date: Fri, 21 Jun 2024 19:26:35 +0200 Subject: [PATCH 3/9] Update Qt references --- CHANGELOG.md | 10 +++++++--- SandboxiePlus/MiscHelpers/MiscHelpers.vcxproj | 2 +- SandboxiePlus/QSbieAPI/QSbieAPI.vcxproj | 2 +- .../qtsingleapp/qtsingleapp/qtsingleapp.vcxproj | 2 +- SandboxiePlus/ReadMe.md | 2 +- SandboxiePlus/SandMan/SandMan.vcxproj | 2 +- SandboxiePlus/UGlobalHotkey/uglobalhotkey.vcxproj | 2 +- 7 files changed, 13 insertions(+), 9 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 1533503e..3c2f3511 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,6 +2,12 @@ All notable changes to this project will be documented in this file. This project adheres to [Semantic Versioning](http://semver.org/). +## [1.14.x / 5.69.x] - 2024-xx-xx + +### Changed +- changed Qt 5 version to Qt 5.15.14 with OpenSSL 3.3.1 [#3994](https://github.com/sandboxie-plus/Sandboxie/pull/3994) (thanks offhub) + + ## [1.14.2 / 5.69.2] - 2024-06-19 @@ -40,7 +46,6 @@ This project adheres to [Semantic Versioning](http://semver.org/). - ## [1.14.1 / 5.69.1] - 2024-06-06 ### Added @@ -68,7 +73,6 @@ This project adheres to [Semantic Versioning](http://semver.org/). - ## [1.14.0 / 5.69.0] - 2024-05-17 ### Added @@ -152,7 +156,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). ### Changed - on systems in test signing mode, Sandboxie will try outdated offsets by default -- changed Qt5 version to Qt5.15.13 with latest security patches [#3694](https://github.com/sandboxie-plus/Sandboxie/pull/3694) (thanks LumitoLuma) +- changed Qt 5 version to Qt 5.15.13 with latest security patches [#3694](https://github.com/sandboxie-plus/Sandboxie/pull/3694) (thanks LumitoLuma) - moved network restrictions from general restrictions tab to an own tab on the network page - improved certificate retrieval UI messages - improved MPC-BE template [#3798](https://github.com/sandboxie-plus/Sandboxie/pull/3798) diff --git a/SandboxiePlus/MiscHelpers/MiscHelpers.vcxproj b/SandboxiePlus/MiscHelpers/MiscHelpers.vcxproj index 73c6bb06..a8627a78 100644 --- a/SandboxiePlus/MiscHelpers/MiscHelpers.vcxproj +++ b/SandboxiePlus/MiscHelpers/MiscHelpers.vcxproj @@ -84,7 +84,7 @@ core;core-private;network;widgets - Qt5.15.13_msvc2019_64 + Qt5.15.14_msvc2019_64 core;core-private;network;widgets diff --git a/SandboxiePlus/QSbieAPI/QSbieAPI.vcxproj b/SandboxiePlus/QSbieAPI/QSbieAPI.vcxproj index 23bc183c..50c94238 100644 --- a/SandboxiePlus/QSbieAPI/QSbieAPI.vcxproj +++ b/SandboxiePlus/QSbieAPI/QSbieAPI.vcxproj @@ -84,7 +84,7 @@ concurrent;core - Qt5.15.13_msvc2019_64 + Qt5.15.14_msvc2019_64 concurrent;core diff --git a/SandboxiePlus/QtSingleApp/qtsingleapp/qtsingleapp/qtsingleapp.vcxproj b/SandboxiePlus/QtSingleApp/qtsingleapp/qtsingleapp/qtsingleapp.vcxproj index e7664d27..f2254654 100644 --- a/SandboxiePlus/QtSingleApp/qtsingleapp/qtsingleapp/qtsingleapp.vcxproj +++ b/SandboxiePlus/QtSingleApp/qtsingleapp/qtsingleapp/qtsingleapp.vcxproj @@ -67,7 +67,7 @@ - Qt5.15.13_msvc2019_64 + Qt5.15.14_msvc2019_64 core;network;widgets diff --git a/SandboxiePlus/ReadMe.md b/SandboxiePlus/ReadMe.md index ff3d02ea..542feb41 100644 --- a/SandboxiePlus/ReadMe.md +++ b/SandboxiePlus/ReadMe.md @@ -8,7 +8,7 @@ Sandboxie Plus builds under Visual Studio 2019, as it offers the widest compatib 1) We will be installing Visual Studio Community Edition which is sufficient for our purposes, during the installation we need to take care of selecting a Windows SDK version which matches the WDK version we will be installing in the next step. - If you have VS 2019 already installed, you can open the installer and check which SDK you have and add if necessary one matching the WDK. 2) Next, we will install WDK 20xxx which is required to build the driver, the WDK installer installs the required VS plugin at the end. -3) So far so good, at this point we already have all we need to build Sandboxie Classic. To build the SandMan UI of Sandboxie Plus, though, we also need the Qt Framework, we can use either 5.15.13 or 6.3.x, but since Qt 6.x does not support Windows 7 without custom patches to base components, we will stick with Qt 5.15.13 for this tutorial. +3) So far so good, at this point we already have all we need to build Sandboxie Classic. To build the SandMan UI of Sandboxie Plus, though, we also need the Qt Framework, we can use either 5.15.14 or 6.3.x, but since Qt 6.x does not support Windows 7 without custom patches to base components, we will stick with Qt 5.15.14 for this tutorial. - Note: however, if you want to build SandMan UI for ARM64, you will need to use Qt 6.3.x or later. 4) We use Qt's online installer and select all required components. I like to also install the source and debug information, but this is just for convenience when debugging and not needed for the build process. 5) Last but not least, we have to install the VS extension for Qt and configure it to point to our Qt installation. diff --git a/SandboxiePlus/SandMan/SandMan.vcxproj b/SandboxiePlus/SandMan/SandMan.vcxproj index 469735bf..e935e6ba 100644 --- a/SandboxiePlus/SandMan/SandMan.vcxproj +++ b/SandboxiePlus/SandMan/SandMan.vcxproj @@ -126,7 +126,7 @@ concurrent;core;gui;network;widgets;winextras - Qt5.15.13_msvc2019_64 + Qt5.15.14_msvc2019_64 core;network;gui;widgets;qml;winextras;concurrent;widgets-private;qml-private diff --git a/SandboxiePlus/UGlobalHotkey/uglobalhotkey.vcxproj b/SandboxiePlus/UGlobalHotkey/uglobalhotkey.vcxproj index 2f580682..6ff08193 100644 --- a/SandboxiePlus/UGlobalHotkey/uglobalhotkey.vcxproj +++ b/SandboxiePlus/UGlobalHotkey/uglobalhotkey.vcxproj @@ -100,7 +100,7 @@ core;gui;widgets - Qt5.15.13_msvc2019_64 + Qt5.15.14_msvc2019_64 core;gui;widgets From a94961513cc54917b318b5e5f79028659798fab0 Mon Sep 17 00:00:00 2001 From: Michael <33252157+APMichael@users.noreply.github.com> Date: Sat, 22 Jun 2024 12:35:06 +0200 Subject: [PATCH 4/9] Update sandman_de.ts - Added new translations. - Removed lines. --- SandboxiePlus/SandMan/sandman_de.ts | 29 +++++++++++++---------------- 1 file changed, 13 insertions(+), 16 deletions(-) diff --git a/SandboxiePlus/SandMan/sandman_de.ts b/SandboxiePlus/SandMan/sandman_de.ts index 7f47093b..90e3bbd3 100644 --- a/SandboxiePlus/SandMan/sandman_de.ts +++ b/SandboxiePlus/SandMan/sandman_de.ts @@ -1124,7 +1124,7 @@ Sie können %USER% verwenden, um für jeden Benutzer die Sandbox in einem eigene Prompt user whether to allow an exemption from the blockade - + Den Nutzer fragen, ob er eine Ausnahme von dieser Blockade erlauben will @@ -7318,33 +7318,33 @@ an Stelle von "*". Limit restrictions - + Limit-Beschränkungen Leave it blank to disable the setting(Unit:KB) - + Leer lassen, um die Einstellung zu deaktivieren (Einheit: KB) Leave it blank to disable the setting - + Leer lassen, um die Einstellung zu deaktivieren Total Processes Number Limit: - + Limit Gesamtzahl an Prozessen: Total Processes Memory Limit: - + Speicherlimit aller Prozesse zusammen: Single Process Memory Limit: - + Speicherlimit einzelner Prozess: @@ -7354,19 +7354,17 @@ an Stelle von "*". Don't allow sandboxed processes to see processes running outside any boxes - + Nicht erlauben, dass sandgeboxte Prozesse die Prozesse außerhalb der Boxen sehen können Prevent sandboxed processes from accessing system details through WMI - Prevent sandboxed processes from accessing system deatils through WMI - + Hindere sandgeboxte Prozesse daran, über WMI auf Systemdetails zuzugreifen Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, 'tasklist.exe' can access a complete list of processes even if 'HideOtherBoxes' is enabled. Enable this option to prevent such behavior. - Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,"tasklist.exe" could get full processes list even if "HideOtherBoxes" is opened through accessing WMI. Enable this option to stop these heavior. - + Einige Programme rufen Systemdetails über WMI (Windows Management Instrumentation), eine integrierte Windows-Datenbank, ab, anstatt herkömmliche Methoden zu verwenden. Zum Beispiel kann 'tasklist.exe' auf eine komplette Liste von Prozessen zugreifen, auch wenn 'HideOtherBoxes' aktiviert ist. Aktivieren Sie diese Option, um ein solches Verhalten zu verhindern. @@ -7645,8 +7643,7 @@ Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine Allow sandboxed windows to cover the taskbar - Allow sandboxed windows to cover taskbar - + Erlaube sandgeboxten Fenstern die Taskleiste zu verdecken @@ -7661,7 +7658,7 @@ Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine Job Object - + Job-Objekt @@ -7848,7 +7845,7 @@ Um einen Prozess anzugeben verwenden Sie '$:program.exe' als Pfad. Allow use of nested job objects (works on Windows 8 and later) - Erlaube Verwendung von verschachtelten Jobobjekten (funktioniert ab Windows 8 und neuer) + Erlaube Verwendung von verschachtelten Job-Objekten (funktioniert ab Windows 8 und neuer) From 8e7c314ad4974d6069e5dc71894a1b90a27d46be Mon Sep 17 00:00:00 2001 From: Michael <33252157+APMichael@users.noreply.github.com> Date: Sat, 22 Jun 2024 12:53:12 +0200 Subject: [PATCH 5/9] Update CHANGELOG.md - Minor corrections. --- CHANGELOG.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 3c2f3511..41700508 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -14,21 +14,21 @@ This project adheres to [Semantic Versioning](http://semver.org/). ### Added - added SbieIni option to modify password-protected configs [#3903](https://github.com/sandboxie-plus/Sandboxie/issues/3903) - usage: set|append|insert|delete [/passwd:********]
- - note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line + - Note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line - added checkbox for "PromptForInternetAccess" option to the New Box Wizard -- added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes. -- added option "HideSbieProcesses" to hide Sandboxie Work Process(SbieSvc,SandboxieRpcSs,etc.). +- added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes +- added option "HideSbieProcesses" to hide Sandboxie Work Process (SbieSvc, SandboxieRpcSs, etc.) - added option "HideFirmwareInfo" - when it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue -- added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI. -- added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox. +- added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI +- added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox - added new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975) - added RPC Port message filter mechanism to block unsafe RDP calls via the driver [#3930](https://github.com/sandboxie-plus/Sandboxie/issues/3930) - - Usage: "RpcPortFilter=Port,ID,Label" label is optional -- added "Job Object" Options page to colelct all job object related options + - usage: "RpcPortFilter=Port,ID,Label" label is optional +- added "Job Object" options page to colelct all job object related options ### Changed -- Extend "Temp Template" to make it could delete local template section. +- Extend "Temp Template" to make it could delete local template section ### Fixed - fixed security issue with the newly introduced experimental "UseCreateToken=y" mechanism @@ -38,7 +38,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - Sandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command line - Note: Less Privileged App Container (LPAC) don't work with sandboxie currently - fixed Problem accessing a relative symlink with a target that starts with a dot [#3981](https://github.com/sandboxie-plus/Sandboxie/issues/3981) -- fixed Bug - Can't open a sandbox's properties window via double-click in System Tray context window [#3861](https://github.com/sandboxie-plus/Sandboxie/issues/3861) +- fixed Can't open a sandbox's properties window via double-click in System Tray context window [#3861](https://github.com/sandboxie-plus/Sandboxie/issues/3861) - fixed Delay in launching forced programs after version 1.12.9 [#3868](https://github.com/sandboxie-plus/Sandboxie/issues/3868) - this issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems - fixed issue with Misc Options list From 5b731401e22372a25eb4ad8e229d69fc3cc6f239 Mon Sep 17 00:00:00 2001 From: isaak654 Date: Sat, 22 Jun 2024 17:45:32 +0200 Subject: [PATCH 6/9] Update .editorconfig --- .editorconfig | 3 +++ 1 file changed, 3 insertions(+) diff --git a/.editorconfig b/.editorconfig index aa6dd550..3c4b7702 100644 --- a/.editorconfig +++ b/.editorconfig @@ -13,6 +13,9 @@ indent_size = 4 [my_version.h] charset = utf-8-bom +[SandboxiePlus/SandMan/Troubleshooting/lang_*.json] +charset = utf-8-bom + [*.{c,h,cpp}] indent_style = tab indent_size = unset From 3079d58e1ef1612b185f7e2e774d0c826402f166 Mon Sep 17 00:00:00 2001 From: nkh0472 <67589323+nkh0472@users.noreply.github.com> Date: Sun, 23 Jun 2024 10:15:08 +0800 Subject: [PATCH 7/9] Update sandman_zh_CN.ts --- SandboxiePlus/SandMan/sandman_zh_CN.ts | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/SandboxiePlus/SandMan/sandman_zh_CN.ts b/SandboxiePlus/SandMan/sandman_zh_CN.ts index 90813ad8..ac6e07ca 100644 --- a/SandboxiePlus/SandMan/sandman_zh_CN.ts +++ b/SandboxiePlus/SandMan/sandman_zh_CN.ts @@ -1317,7 +1317,7 @@ You can use %USER% to save each users sandbox to an own fodler. Prompt user whether to allow an exemption from the blockade - + 提示用户是否允许豁免封锁 @@ -7733,7 +7733,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Allow sandboxed windows to cover the taskbar Allow sandboxed windows to cover taskbar - 允许沙盒内窗口遮盖任务栏 + 允许沙盒内窗口遮盖任务栏 @@ -7807,13 +7807,13 @@ If you are a great patreaon supporter already, sandboxie can check online for an Prevent sandboxed processes from accessing system details through WMI Prevent sandboxed processes from accessing system deatils through WMI - 防止沙盒内的进程通过 WMI 访问系统信息 + 防止沙盒内的进程通过 WMI 访问系统信息 Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, 'tasklist.exe' can access a complete list of processes even if 'HideOtherBoxes' is enabled. Enable this option to prevent such behavior. Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,"tasklist.exe" could get full processes list even if "HideOtherBoxes" is opened through accessing WMI. Enable this option to stop these heavior. - 一些程序通过 WMI(一个Windows内置数据库) 读取系统信息,而不是通过正常方式。例如,尽管已经打开 "隐藏其它沙盒" ,"tasklist.exe" 仍然可以通过访问 WMI 获取全部进程列表。开启此选项来阻止这些行为。 + 一些程序通过 WMI(一个Windows内置数据库) 读取系统信息,而不是通过正常方式。例如,尽管已经打开 "隐藏其它沙盒" ,"tasklist.exe" 仍然可以通过访问 WMI 获取全部进程列表。开启此选项来阻止这些行为。 From 6ecdef1c09a5707cae95776dc9f5484ac80ca453 Mon Sep 17 00:00:00 2001 From: offhub <6871698+offhub@users.noreply.github.com> Date: Sun, 23 Jun 2024 21:29:24 +0300 Subject: [PATCH 8/9] CodeQL fix? [skip ci] --- Installer/get_openssl.cmd | 4 ++-- SandboxiePlus/install_qt.cmd | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/Installer/get_openssl.cmd b/Installer/get_openssl.cmd index 5ed47076..f8a17fd9 100644 --- a/Installer/get_openssl.cmd +++ b/Installer/get_openssl.cmd @@ -1,6 +1,6 @@ echo %* -IF "%~3" == "" ( set "ghSsl_repo=openssl" ) ELSE ( set "ghSsl_repo=%~3" ) -IF "%~2" == "" ( set "ghSsl_user=DavidXanatos" ) ELSE ( set "ghSsl_user=%~2" ) +IF "%~3" == "" ( set "ghSsl_repo=openssl-builds" ) ELSE ( set "ghSsl_repo=%~3" ) +IF "%~2" == "" ( set "ghSsl_user=xanasoft" ) ELSE ( set "ghSsl_user=%~2" ) IF "%~1" == "" ( set "openssl_version=3.3.1" ) ELSE ( set "openssl_version=%~1" ) set "openssl_version_underscore=%openssl_version:.=_%" diff --git a/SandboxiePlus/install_qt.cmd b/SandboxiePlus/install_qt.cmd index d325c678..993ea4e5 100644 --- a/SandboxiePlus/install_qt.cmd +++ b/SandboxiePlus/install_qt.cmd @@ -1,6 +1,6 @@ echo %* -IF "%~7" == "" ( set "ghQtBuilds_hash_x64=f9029e02badd6a79d9bb092f9fb0772214dbcf8cd0122422514291d755860c37" ) ELSE ( set "ghQtBuilds_hash_x64=%~7" ) -IF "%~6" == "" ( set "ghQtBuilds_hash_x86=79755f2bf95d0ca305096fc33582cd557345a79aa63f9821002fdddefdc0fd94" ) ELSE ( set "ghQtBuilds_hash_x86=%~6" ) +IF "%~7" == "" ( set "ghQtBuilds_hash_x64=30290d82a02bfaa24c1bf37bcb9c074aba18a673a7176628fccdf71197cee898" ) ELSE ( set "ghQtBuilds_hash_x64=%~7" ) +IF "%~6" == "" ( set "ghQtBuilds_hash_x86=bf4124046cc50ccbbeb3f786c041e884fd4205cd6e616070a75c850105cbf1db" ) ELSE ( set "ghQtBuilds_hash_x86=%~6" ) IF "%~5" == "" ( set "ghQtBuilds_repo=qt-builds" ) ELSE ( set "ghQtBuilds_repo=%~5" ) IF "%~4" == "" ( set "ghQtBuilds_user=xanasoft" ) ELSE ( set "ghQtBuilds_user=%~4" ) IF "%~3" == "" ( set "qt6_version=6.3.1" ) ELSE ( set "qt6_version=%~3" ) From c2df90b2fd1018f8be8ce9ef103dd9cd5c0ba6a7 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Mon, 24 Jun 2024 01:31:15 +0000 Subject: [PATCH 9/9] Sync SBIE Plus language files (lupdate) --- SandboxiePlus/SandMan/sandman_zh_CN.ts | 1 - 1 file changed, 1 deletion(-) diff --git a/SandboxiePlus/SandMan/sandman_zh_CN.ts b/SandboxiePlus/SandMan/sandman_zh_CN.ts index 3ae924e3..ea62ae91 100644 --- a/SandboxiePlus/SandMan/sandman_zh_CN.ts +++ b/SandboxiePlus/SandMan/sandman_zh_CN.ts @@ -263,7 +263,6 @@ 该功能可能对兼容性造成影响,因为它阻止了沙盒内的进程向主机进程写入数据,以及启动它们。 - Prevents the sandboxed window from being captured. 阻止沙盒化窗口被捕获图像。