From e5f33da8c8693c30db020b0838682a07015a5382 Mon Sep 17 00:00:00 2001 From: isaak654 Date: Sun, 20 Dec 2020 14:48:59 +0100 Subject: [PATCH] Several typos corrections in OptionsWindow I hope to not have missed anything, please review my changes. --- SandboxiePlus/SandMan/Forms/OptionsWindow.ui | 38 ++++++++++---------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui index 52613f06..9964209f 100644 --- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui +++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui @@ -302,7 +302,7 @@ - File Mrigration + File Migration @@ -491,7 +491,7 @@ - Programs enteres here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in an otehr sandbox. + Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox. true @@ -504,7 +504,7 @@ - Stop Behavioure + Stop Behaviour @@ -512,7 +512,7 @@ - Remove Progam + Remove Program @@ -570,9 +570,9 @@ - Lingering programs will be automatically terminated is thay are still running after all other processes have terminated. + Lingering programs will be automatically terminated if they are still running after all other processes have been terminated. -If leader processes are defined all others are threated as lingering processes. +If leader processes are defined, all others are treated as lingering processes. true @@ -644,14 +644,14 @@ If leader processes are defined all others are threated as lingering processes.< - Allow only sellected programs to start in this sandbox. * + Allow only selected programs to start in this sandbox. * - Prevent sellected programs from starting in this sandbox. + Prevent selected programs from starting in this sandbox. @@ -665,7 +665,7 @@ If leader processes are defined all others are threated as lingering processes.< - * Note: Programs installed to this sandbox wont be able to start at all. + * Note: Programs installed to this sandbox won't be able to start at all. true @@ -714,7 +714,7 @@ If leader processes are defined all others are threated as lingering processes.< - Note: Programs installed to this sandbox wont be able access the internet at all. + Note: Programs installed to this sandbox won't be able to access the internet at all. @@ -884,7 +884,7 @@ If leader processes are defined all others are threated as lingering processes.< Configure which processes can access what resources. Double click on an entry to edit it. 'Direct' File and Key access only applies to program binaries located outside the sandbox. -Note that all Close...=!<program>,... excludes have the same limitations. +Note that all Close...=!<program>,... exclusions have the same limitations. For files access you can use 'Direct All' instead to make it apply to all programs. @@ -1072,14 +1072,14 @@ For files access you can use 'Direct All' instead to make it apply to all progra - Compatybility + Compatibility - Limit access to the emulated service controll manager to privileged processes + Limit access to the emulated service control manager to privileged processes @@ -1102,7 +1102,7 @@ For files access you can use 'Direct All' instead to make it apply to all progra - Force usage of custom dummy Manifest files (legacy behavioure) + Force usage of custom dummy Manifest files (legacy behaviour) @@ -1225,7 +1225,7 @@ For files access you can use 'Direct All' instead to make it apply to all progra - Dont allow sandboxed processes to see processes running in other boxes + Don't allow sandboxed processes to see processes running in other boxes @@ -1325,10 +1325,10 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Log all access events as seen by the driver to the resource access log. -This options set the event amsk to "*" - All access events +This options set the event mask to "*" - All access events You can customize the logging using the ini by specifying "A" - Allowed accesses -"D" - Denidec accesses +"D" - Denied accesses "I" - Ignore access requests instead of "*". @@ -1466,7 +1466,7 @@ instead of "*". - These options are intended for debugging compatybility issues, please do not use them in productive use. + These options are intended for debugging compatibility issues, please do not use them in production use. true @@ -1531,7 +1531,7 @@ instead of "*". - This list contains a large amount of sandbox comatybility enchancing templates + This list contains a large amount of sandbox compatibility enhancing templates true