Merge pull request #4034 from TragicLifeHu/patch-8

Update sandman_zh_TW.ts
This commit is contained in:
DavidXanatos 2024-06-27 14:55:42 +02:00 committed by GitHub
commit db70bbfb38
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 71 additions and 71 deletions

View File

@ -57,7 +57,7 @@
<message>
<location filename="Forms/BoxImageWindow.ui" line="163"/>
<source>Lock the box when all processes stop.</source>
<translation></translation>
<translation></translation>
</message>
</context>
<context>
@ -256,7 +256,7 @@
<source>Prevent sandboxed programs on the host from loading sandboxed DLLs</source>
<oldsource>Prevent sandboxed programs installed on the host from loading DLLs from the sandbox</oldsource>
<translatorcomment>&quot;&quot; is the actual translation showed in Windows for TradChinese</translatorcomment>
<translation type="unfinished"> (DLL) </translation>
<translation> (DLL) </translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="875"/>
@ -1271,83 +1271,83 @@ You can use %USER% to save each users sandbox to an own fodler.</oldsource>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="717"/>
<source>Sandbox Isolation options</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="718"/>
<source>On this page sandbox isolation options can be configured.</source>
<translation type="unfinished"></translation>
<translation>調</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="723"/>
<source>Network Access</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="731"/>
<source>Allow network/internet access</source>
<translation type="unfinished">/</translation>
<translation>/</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="732"/>
<source>Block network/internet by denying access to Network devices</source>
<translation type="unfinished">/</translation>
<translation>/</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="734"/>
<source>Block network/internet using Windows Filtering Platform</source>
<translation type="unfinished">使 Windows /</translation>
<translation>使 Windows /</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="740"/>
<source>Allow access to network files and folders</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="741"/>
<location filename="Wizards/NewBoxWizard.cpp" line="768"/>
<source>This option is not recommended for Hardened boxes</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="746"/>
<source>Prompt user whether to allow an exemption from the blockade</source>
<translation type="unfinished"></translation>
<translation>使</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="752"/>
<source>Admin Options</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="756"/>
<source>Drop rights from Administrators and Power Users groups</source>
<translation type="unfinished"> Power Users 使</translation>
<translation> Power Users (使) </translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="762"/>
<source>Make applications think they are running elevated</source>
<translation type="unfinished">使</translation>
<translation>使</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="767"/>
<source>Allow MSIServer to run with a sandboxed system token</source>
<translation type="unfinished"> MSIServer 使</translation>
<translation> MSIServer 使</translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="774"/>
<source>Box Options</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="778"/>
<source>Use a Sandboxie login instead of an anonymous token</source>
<translation type="unfinished">使 Sandboxie </translation>
<translation>使 Sandboxie </translation>
</message>
<message>
<location filename="Wizards/NewBoxWizard.cpp" line="779"/>
<source>Using a custom Sandboxie Token allows to isolate individual sandboxes from each other better, and it shows in the user column of task managers the name of the box a process belongs to. Some 3rd party security solutions may however have problems with custom tokens.</source>
<translation type="unfinished">使 Sandboxie 使</translation>
<translation>使 Sandboxie 使</translation>
</message>
</context>
<context>
@ -2331,27 +2331,27 @@ Note: The update check is often behind the latest GitHub release to ensure that
<message>
<location filename="Windows/OptionsNetwork.cpp" line="802"/>
<source>Please enter a domain to be filtered</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/OptionsNetwork.cpp" line="832"/>
<source>Yes</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/OptionsNetwork.cpp" line="833"/>
<source>No</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/OptionsNetwork.cpp" line="857"/>
<source>Please enter IP and Port.</source>
<translation type="unfinished"></translation>
<translation> IP </translation>
</message>
<message>
<location filename="Windows/OptionsNetwork.cpp" line="1030"/>
<source> entry: IP or Port cannot be empty</source>
<translation type="unfinished"></translation>
<translation> 輸入: IP </translation>
</message>
<message>
<location filename="Windows/OptionsAdvanced.cpp" line="1168"/>
@ -4130,7 +4130,7 @@ No will choose: %2</source>
<location filename="SandMan.cpp" line="513"/>
<location filename="SandMan.cpp" line="657"/>
<source>Suspend All Processes</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="SandMan.cpp" line="515"/>
@ -5458,7 +5458,7 @@ This file is part of Sandboxie and all changed done to it will be reverted next
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to edit it?</source>
<oldsource>This sandbox is disabled, do you want to enable it?</oldsource>
<translation type="unfinished"></translation>
<translation>/使</translation>
</message>
</context>
<context>
@ -7513,18 +7513,18 @@ If you are a great patreaon supporter already, sandboxie can check online for an
<message>
<source>Prevent sandboxed processes from interfering with power operations</source>
<oldsource>Prevents processes in the sandbox from interfering with power operation</oldsource>
<translation type="obsolete"></translation>
<translation type="obsolete"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1545"/>
<source>Prevent processes from capturing window images from sandboxed windows</source>
<oldsource>Prevents getting an image of the window in the sandbox.</oldsource>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1516"/>
<source>Allow useful Windows processes access to protected processes</source>
<translation> Windows </translation>
<translation> Windows </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1808"/>
@ -7564,7 +7564,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an
<message>
<location filename="Forms/OptionsWindow.ui" line="2428"/>
<source>Don&apos;t stop lingering processes with windows</source>
<translation> Windows </translation>
<translation> Windows </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="2468"/>
@ -7763,7 +7763,7 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
<location filename="Forms/OptionsWindow.ui" line="4231"/>
<source>Sandboxie&apos;s functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box.</source>
<oldsource>Sandboxies functionality can be enhanced using optional dlls which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box.</oldsource>
<translation>Sandboxie 使 DLL DLL SbieDll.dll </translation>
<translation>Sandboxie 使 DLL DLL SbieDll.dll </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1727"/>
@ -7830,39 +7830,39 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
<location filename="Forms/OptionsWindow.ui" line="818"/>
<source>This feature does not block all means of obtaining a screen capture, only some common ones.</source>
<oldsource>This feature does not block all means of optaining a screen capture only some common once.</oldsource>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="801"/>
<source>Prevent move mouse, bring in front, and similar operations, this is likely to cause issues with games.</source>
<oldsource>Prevent move mouse, bring in front, and simmilar operations, this is likely to cause issues with games.</oldsource>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="811"/>
<source>Allow sandboxed windows to cover the taskbar</source>
<oldsource>Allow sandboxed windows to cover taskbar</oldsource>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="855"/>
<source>Isolation</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1569"/>
<source>Only Administrator user accounts can make changes to this sandbox</source>
<translation type="unfinished"></translation>
<translation>使</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1577"/>
<source>Job Object</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="2165"/>
<source>&lt;b&gt;&lt;font color=&apos;red&apos;&gt;SECURITY ADVISORY&lt;/font&gt;:&lt;/b&gt; Using &lt;a href=&quot;sbie://docs/breakoutfolder&quot;&gt;BreakoutFolder&lt;/a&gt; and/or &lt;a href=&quot;sbie://docs/breakoutprocess&quot;&gt;BreakoutProcess&lt;/a&gt; in combination with Open[File/Pipe]Path directives can compromise security. Please review the security section for each option in the documentation before use.</source>
<translation type="unfinished"></translation>
<translation>&lt;b&gt;&lt;font color=&apos;red&apos;&gt;&lt;/font&gt;:&lt;/b&gt; 使 &lt;a href=&quot;sbie://docs/breakoutfolder&quot;&gt;BreakoutFolder&lt;/a&gt; / &lt;a href=&quot; sbie://docs/breakoutprocess&quot;&gt;BreakoutProcess&lt;/a&gt; Open[File/Pipe]Path 使使</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="2238"/>
@ -7888,13 +7888,13 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
<location filename="Forms/OptionsWindow.ui" line="2574"/>
<source>This setting can be used to prevent programs from running in the sandbox without the user&apos;s knowledge or consent.</source>
<oldsource>This can be used to prevent a host malicious program from breaking through by launching a pre-designed malicious program into an unlocked encrypted sandbox.</oldsource>
<translation type="unfinished"></translation>
<translation>使使</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="2577"/>
<source>Display a pop-up warning before starting a process in the sandbox from an external source</source>
<oldsource>A pop-up warning before launching a process into the sandbox from an external source.</oldsource>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="2596"/>
@ -8104,17 +8104,17 @@ To specify a process use &apos;$:program.exe&apos; as path.</source>
<message>
<location filename="Forms/OptionsWindow.ui" line="794"/>
<source>Prevent sandboxed processes from interfering with power operations (Experimental)</source>
<translation> ()</translation>
<translation> ()</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="804"/>
<source>Prevent interference with the user interface (Experimental)</source>
<translation>使 ()</translation>
<translation>使 ()</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="821"/>
<source>Prevent sandboxed processes from capturing window images (Experimental, may cause UI glitches)</source>
<translation> ( UI )</translation>
<translation> ( UI )</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1864"/>
@ -8139,62 +8139,62 @@ To specify a process use &apos;$:program.exe&apos; as path.</source>
<message>
<location filename="Forms/OptionsWindow.ui" line="3523"/>
<source>DNS Filter</source>
<translation type="unfinished"></translation>
<translation>DNS </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3540"/>
<source>Add Filter</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3560"/>
<source>With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect.</source>
<translation type="unfinished"></translation>
<translation>使 DNS IP IP </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3586"/>
<source>Domain</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3602"/>
<source>Internet Proxy</source>
<translation type="unfinished"></translation>
<translation> Proxy</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3663"/>
<source>Add Proxy</source>
<translation type="unfinished"></translation>
<translation> Proxy</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3636"/>
<source>Test Proxy</source>
<translation type="unfinished"></translation>
<translation> Proxy</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3689"/>
<source>Auth</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3694"/>
<source>Login</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3699"/>
<source>Password</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3619"/>
<source>Sandboxed programs can be forced to use a preset SOCKS5 proxy.</source>
<translation type="unfinished"></translation>
<translation>使 SOCKS5 Proxy</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3629"/>
<source>Resolve hostnames via proxy</source>
<translation type="unfinished"></translation>
<translation> Proxy </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3752"/>
@ -8486,7 +8486,7 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<source>This command runs after all processes in the sandbox have finished.</source>
<translation type="vanished"></translation>
<translation type="vanished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4522"/>
@ -8546,12 +8546,12 @@ The process match level has a higher priority than the specificity and describes
<message>
<location filename="Forms/OptionsWindow.ui" line="4072"/>
<source>Exclude this sandbox from being terminated when &quot;Terminate All Processes&quot; is invoked.</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4519"/>
<source>These commands are run UNBOXED after all processes in the sandbox have finished.</source>
<translation></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4589"/>
@ -8810,50 +8810,50 @@ Please note that this values are currently user specific and saved globally for
<message>
<location filename="Forms/OptionsWindow.ui" line="1711"/>
<source>Limit restrictions</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1629"/>
<location filename="Forms/OptionsWindow.ui" line="1636"/>
<source>Leave it blank to disable the setting(Unit:KB)</source>
<translation type="unfinished"></translation>
<translation> (單位: KB)</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1643"/>
<source>Leave it blank to disable the setting</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1585"/>
<source>Total Processes Number Limit:</source>
<translation type="unfinished"></translation>
<translation>:</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1615"/>
<source>Total Processes Memory Limit:</source>
<translation type="unfinished"></translation>
<translation>:</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1622"/>
<source>Single Process Memory Limit:</source>
<translation type="unfinished"></translation>
<translation>:</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4711"/>
<source>Don&apos;t allow sandboxed processes to see processes running outside any boxes</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4718"/>
<source>Prevent sandboxed processes from accessing system details through WMI</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI</oldsource>
<translation type="unfinished"></translation>
<translation> WMI </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4759"/>
<source>Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, &apos;tasklist.exe&apos; can access a complete list of processes even if &apos;HideOtherBoxes&apos; is enabled. Enable this option to prevent such behavior.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<translation type="unfinished"></translation>
<translation> WMI (Windows ) Windows 使使HideOtherBoxes()tasklist.exe</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4962"/>
@ -9026,7 +9026,7 @@ Please note that this values are currently user specific and saved globally for
<message>
<location filename="Forms/SelectBoxWindow.ui" line="45"/>
<source>Force direct child to be sandboxed, but does not include indirect child processes that are opened through the DCOM and IPC interface.</source>
<translation type="unfinished"></translation>
<translation> DCOM IPC </translation>
</message>
<message>
<location filename="Forms/SelectBoxWindow.ui" line="105"/>
@ -9041,7 +9041,7 @@ Please note that this values are currently user specific and saved globally for
<message>
<location filename="Forms/SelectBoxWindow.ui" line="48"/>
<source>Force Children</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/SelectBoxWindow.ui" line="56"/>
@ -9312,13 +9312,13 @@ Please note that this values are currently user specific and saved globally for
<message>
<location filename="Forms/SettingsWindow.ui" line="212"/>
<source>Hotkey for suspending process/folder forcing:</source>
<translation> / :</translation>
<translation> / :</translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="80"/>
<source>Hotkey for suspending all processes:</source>
<oldsource>Hotkey for suspending all process</oldsource>
<translation type="unfinished"></translation>
<translation>:</translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="236"/>
@ -9893,7 +9893,7 @@ Unlike the preview channel, it does not include untested, potentially breaking,
<message>
<location filename="Forms/SettingsWindow.ui" line="2165"/>
<source>Add &quot;Sandboxie\All Sandboxes&quot; group to the sandboxed token (experimental)</source>
<translation type="unfinished"></translation>
<translation>Sandboxie\All Sandboxes () ()</translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="2368"/>