Merge pull request #4163 from VenusGirl/patch-82

Update sandman_ko.ts
This commit is contained in:
DavidXanatos 2024-08-22 10:42:39 +02:00 committed by GitHub
commit f502fb85b2
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 24 additions and 23 deletions

View File

@ -1954,18 +1954,18 @@ Note: The update check is often behind the latest GitHub release to ensure that
<location filename="Windows/OptionsAdvanced.cpp" line="730"/>
<location filename="Windows/OptionsAdvanced.cpp" line="739"/>
<source>bytes (unlimited)</source>
<translation type="unfinished"></translation>
<translation> ()</translation>
</message>
<message>
<location filename="Windows/OptionsAdvanced.cpp" line="733"/>
<location filename="Windows/OptionsAdvanced.cpp" line="742"/>
<source>bytes (%1)</source>
<translation type="unfinished"></translation>
<translation> (%1)</translation>
</message>
<message>
<location filename="Windows/OptionsAdvanced.cpp" line="748"/>
<source>unlimited</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Windows/OptionsAdvanced.cpp" line="920"/>
@ -4244,19 +4244,19 @@ No will choose: %2</source>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
<translation type="unfinished"></translation>
<translation> .</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1663"/>
<location filename="SandMan.cpp" line="1679"/>
<source>You typed a wrong box name! Nothing was changed.</source>
<translation type="unfinished"></translation>
<translation> ! .</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
<translation> .</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1872"/>
@ -5567,12 +5567,12 @@ This file is part of Sandboxie and all changed done to it will be reverted next
<message>
<location filename="Views/SbieView.cpp" line="1421"/>
<source>Please enter a new alias for the Sandbox.</source>
<translation type="unfinished"></translation>
<translation> .</translation>
</message>
<message>
<location filename="Views/SbieView.cpp" line="1430"/>
<source>The entered name is not valid, do you want to set it as an alias instead?</source>
<translation type="unfinished"></translation>
<translation> . ?</translation>
</message>
<message>
<location filename="Views/SbieView.cpp" line="1468"/>
@ -5645,7 +5645,7 @@ This file is part of Sandboxie and all changed done to it will be reverted next
<location filename="Views/SbieView.cpp" line="1807"/>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished"> / . ?</translation>
<translation> . ?</translation>
</message>
</context>
<context>
@ -8222,7 +8222,7 @@ The process match level has a higher priority than the specificity and describes
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished"> Sandboxie의 , (, ).</translation>
<translation> . . , .</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8457,8 +8457,8 @@ The process match level has a higher priority than the specificity and describes
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished"> . OpenFilePath OpenKeyPath는 . OpenPipePath OpenConfPath를 . (||Ipc) ClosedFilePath=! iexplore.exe,C:Users*&apos; . &quot; &quot; .
. . ( ) .</translation>
<translation>Sandboxie . OpenFilePath OpenKeyPath는 . OpenPipePath OpenConfPath를 . &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; Closed (File|Key|Ipc) . &quot; &quot; .
. . ( ) .</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4327"/>
@ -8545,7 +8545,7 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">&lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;박스 암호화&lt;/a&gt;가 활성화되면 Disk Cryptor의 AES-XTS 구현을 사용하여 레지스트리 하이브를 포함한 박스의 루트 폴더가 암호화된 디스크 이미지에 저장됩니다.</translation>
<translation>&lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;박스 암호화&lt;/a&gt;가 활성화되면 Disk Cryptor의 AES-XTS 구현을 사용하여 레지스트리 하이브를 포함한 박스의 루트 폴더가 암호화된 디스크 이미지에 저장됩니다.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="445"/>
@ -9018,19 +9018,20 @@ instead of &quot;*&quot;.</source>
<location filename="Forms/OptionsWindow.ui" line="1666"/>
<location filename="Forms/OptionsWindow.ui" line="1740"/>
<source>unlimited</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1724"/>
<location filename="Forms/OptionsWindow.ui" line="1754"/>
<source>bytes</source>
<translation type="unfinished"></translation>
<translation></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1926"/>
<source>Checked: A local group will also be added to the newly created sandboxed token, which allows addressing all sandboxes at once. Would be useful for auditing policies.
Partially checked: No groups will be added to the newly created sandboxed token.</source>
<translation type="unfinished"></translation>
<translation>표시됨: 새로 . .
확인됨: 새로 .</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="3451"/>
@ -9052,29 +9053,29 @@ Partially checked: No groups will be added to the newly created sandboxed token.
<location filename="Forms/OptionsWindow.ui" line="4790"/>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"> </translation>
<translation> </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4830"/>
<source>Hide Disk Serial Number</source>
<translation type="unfinished"></translation>
<translation> </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4837"/>
<source>Obfuscate known unique identifiers in the registry</source>
<translation type="unfinished"></translation>
<translation> </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4916"/>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"> WMI (Windows ) . , WMI에 &quot;HideOtherBoxes&quot; &quot;tasklist.exe&quot; . .</translation>
<translation> WMI (Windows ) . , &quot;HideOtherBoxes&quot; &quot;tasklist.exe&quot; WMI에 . .</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4919"/>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"> WMI를 ( )</translation>
<translation> WMI를 ( )</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4851"/>
@ -9095,7 +9096,7 @@ Partially checked: No groups will be added to the newly created sandboxed token.
<location filename="Forms/OptionsWindow.ui" line="4797"/>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"> HKCU\System\SbieCustom에 </translation>
<translation> HKCU\System\SbieCustom에 </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4800"/>
@ -10111,7 +10112,7 @@ Please note that this values are currently user specific and saved globally for
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"> &apos; &apos; </translation>
<translation> &apos; &apos; </translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="650"/>