diff --git a/SandboxiePlus/SandMan/sandman_de.ts b/SandboxiePlus/SandMan/sandman_de.ts index 5bbabf2e..ae86c2cf 100644 --- a/SandboxiePlus/SandMan/sandman_de.ts +++ b/SandboxiePlus/SandMan/sandman_de.ts @@ -1791,9 +1791,9 @@ Notiz: Die Updateprüfung ist oft zeitversetzt zu den letzten GitHub-Veröffentl - - - + + + Group: %1 Gruppe: %1 @@ -2077,11 +2077,11 @@ Bitte wählen Sie einen Ordner, der diese Datei enthält. - - - - - + + + + + All Programs Alle Programme @@ -2106,7 +2106,7 @@ Bitte wählen Sie einen Ordner, der diese Datei enthält. - + Template values can not be edited. Vorlagenwerte können nicht bearbeitet werden. @@ -2147,82 +2147,82 @@ Bitte wählen Sie einen Ordner, der diese Datei enthält. - + Any Alle - + TCP TCP - + UDP UPD - + ICMP ICMP - + Allow access Erlaube Zugriff - + Block using Windows Filtering Platform Blockieren durch Verwendung der Windows Filtering Platform - + Block by denying access to Network devices Blockieren durch Zugriffsverweigerung auf Netzwerkgeräte - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Erlauben - + Block (WFP) Blockieren (WFP) - + Block (NDev) Blockieren (NDev) - + A non empty program name is required. Ein nicht leerer Programmname wird benötigt. - + Block Blockieren @@ -6557,12 +6557,12 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac - + Protect the system from sandboxed processes Schütze das System vor Prozessen in der Sandbox - + Block network files and folders, unless specifically opened. Blockiere Netzwerkdateien und Ordner, außer diese wurden explizit geöffnet. @@ -6590,11 +6590,11 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac - - - - - + + + + + Name Name @@ -6619,15 +6619,15 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac - - - - - - - - - + + + + + + + + + Remove Entfernen @@ -6683,7 +6683,7 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac Lässt Programme denken, sie würden mit erhöhten Rechten laufen (Erlaubt das sichere Ausführen von Installern) - + Network restrictions Netzwerkbeschränkungen @@ -6758,11 +6758,11 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac - - - - - + + + + + Show Templates Zeige Vorlagen @@ -6859,7 +6859,7 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac Druckerbeschränkungen - + Prevent change to network and firewall parameters (user mode) Verhindere Änderungen an Netzwerk und Firewall-Parametern (Nutzermodus) @@ -6936,9 +6936,9 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac - - - + + + Program Programm @@ -6978,52 +6978,52 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac Füge IPC-Pfad hinzu - + File Recovery Dateiwiederherstellung - + Add Folder Füge Ordner hinzu - + Ignore Extension Ignoriere Erweiterungen - + Ignore Folder Ignoriere Ordner - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Aktivere Sofortwiederherstellungsabfrage, um alle Dateien sofort wiederherzustellen, sobald sie erzeugt werden. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Sie können Ordner und Dateitypen (oder Dateierweiterungen) von der Sofortwiederherstellung ausnehmen. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Wenn die Schnellwiederherstellungsfunktion aufgerufen wird, werden die folgenden Ordner in der Sandbox auf Inhalte geprüft. - + Immediate Recovery Sofortwiederherstellung - + Advanced Options Erweiterte Optionen - + Miscellaneous Diverses @@ -7038,7 +7038,7 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac Blockiere Lesezugriff auf die Zwischenablage - + Force usage of custom dummy Manifest files (legacy behaviour) Erzwinge die Verwendung von eigenen dummy Manifestdateien (veraltetes Verhalten) @@ -7069,13 +7069,13 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac - + Protect the sandbox integrity itself Die Sandboxintegrität selbst schützen - - + + Compatibility Kompatibilität @@ -7085,7 +7085,7 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac ACHTUNG: Bei Ausführung unter dem eingebauten Administrator, können Prozesse ihre administrativen Rechten nicht abgeben. - + Emulate sandboxed window station for all processes Emuliere sandgeboxte 'Window Stations' für alle Prozesse @@ -7095,42 +7095,42 @@ Wenn Sie bereits ein Great Supporter auf Patreon sind, kann Sandboxie online nac Öffne Zugriff auf Windows Security Account Manager - + Hide Processes Verstecke Prozesse - + Add Process Prozess hinzufügen - + Hide host processes from processes running in the sandbox. Verstecke Host-Prozesse vor Prozessen in der Sandbox. - + Don't allow sandboxed processes to see processes running in other boxes Nicht erlauben, dass sandgeboxte Prozesse die Prozesse in anderen Boxen sehen können - + Users Benutzer - + Restrict Resource Access monitor to administrators only Beschränke den Ressourcenzugriffsmonitor auf Administratoren - + Add User Benutzer hinzufügen - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -7139,22 +7139,22 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Notiz: Erzwungene Programme und Ordner für eine Sandbox finden keine Anwendung auf Konten, die diese Sandbox nicht nutzen können. - + Tracing Rückverfolgung - + Log all SetError's to Trace log (creates a lot of output) Protokolliere alle SetError ins Rückverfolgungsprotokoll (Erzeugt große Ausgabemenge) - + Pipe Trace Pipe-Rückverfolgung - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -7173,162 +7173,157 @@ Sie können die Protokollierung in der INI anpassen, indem Sie wie folgt wählen an Stelle von "*". - + Access Tracing Zugriffsrückverfolgung - + GUI Trace GUI-Rückverfolgung - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + On Box Terminate Beim Box Beenden - + API call Trace (traces all SBIE hooks) API-Aufrufrückverfolgung (verfolgt alle SBIE-Hooks) - + Key Trace Schlüsselrückverfolgung - + File Trace Dateirückverfolgung - + IPC Trace IPC-Rückverfolgung - + Log Debug Output to the Trace Log Protokolliere Debug-Ausgabe in das Rückverfolgungsprotokoll - + DNS Request Logging - + COM Class Trace COM-Klassenrückverfolgung - + Debug Debug - + WARNING, these options can disable core security guarantees and break sandbox security!!! WARNUNG, diese Optionen können Kernsicherheitsgarantien deaktivieren und die Sandboxsicherheit zerstören!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Diese Optionen sind nur zur Fehlersuche bei Kompatibilitätsproblemen gedacht, bitte nicht im produktiven Einsatz verwenden. - + App Templates Programmvorlagen - + Filter Categories Filterkategorien - + Text Filter Textfilter - + Add Template Füge Vorlage hinzu - + Category Kategorie - + This list contains a large amount of sandbox compatibility enhancing templates Diese Liste enthält eine große Menge an Vorlagen, welche die Kompatibilität der Sandbox verbessern @@ -7379,13 +7374,13 @@ an Stelle von "*". - + Move Up Nach oben verschieben - + Move Down Nach unten verschieben @@ -7415,39 +7410,39 @@ an Stelle von "*". Zugriffsisolation - + Image Protection Abbildschutz - + Issue message 1305 when a program tries to load a sandboxed dll Gebe Nachricht 1305 aus, wenn ein Programm versucht eine sandgeboxte DLL zu laden - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Hindere sandgeboxte Programme, die auf dem Hostsystem installiert sind, daran, DLLs aus der Sandbox zu laden - + Dlls && Extensions DLLs && Erweiterungen - + Description Beschreibung - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Sandboxies Ressourcenzugriffsregeln benachteiligen häufiger Programme in der Sandbox. OpenFilePath und OpenKeyPath funktionieren nur für Programme, die sich auf dem Host befinden. Um eine Regel ohne diese Beschränkungen zu definieren, müssen OpenPipePath oder OpenConfPath verwendet werden. Ebenso werden alle Closed(File|Key|Ipc)Path Anweisungen, welche durch eine Negation definiert werden, z.B. ‘ClosedFilePath=! iexplore.exe,C:Users*’, immer für Programmdateien (Binaries), die sich innerhalb einer Sandbox befinden, geschlossen sein. Beide Beschränkungen lassen sich auf der “Zugriffsrichtlinien”-Seite ausschalten. Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine umbenannte Kopie von sich selbst zu erstellen, um so auf geschützte Ressourcen zuzugreifen. Ein anderes Einfallstor ist die Injektion einer Programmbibliothek in einen befugten Prozess um Zugang zu allem zu erhalten, auf das dieser Prozess Zugriff hat. Mit der Verwendung des Abbildschutzes (Host Image Protection), kann dies verhindert werden, durch die Blockierung des Ladens von Programmbibliotheken innerhalb der Sandbox in Programme (installiert auf dem Hostrechner) die in einer Sandbox laufen. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Die Funktionalität von Sandboxie kann durch die Verwendung optionaler DLLs erweitert werden, die beim Start in jeden sandgeboxten Prozess durch die Datei SbieDll.dll geladen werden können. Der Erweiterungsmanager in den globalen Einstellungen bietet ein paar nützliche Erweiterungen, die, nachdem diese installiert wurden, hier für die aktuelle Box aktiviert werden können. @@ -7646,20 +7641,20 @@ Um einen Prozess anzugeben verwenden Sie '$:program.exe' als Pfad. - + Action Aktion - + Port Port - - + + IP IP @@ -7669,22 +7664,22 @@ Um einen Prozess anzugeben verwenden Sie '$:program.exe' als Pfad.Protokoll - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. ACHTUNG: Die Windows Filtering Platform wird nicht durch den Treiber ermöglicht, deshalb können diese Regeln nur im Nutzerkontext angewendet und nicht erzwungen werden!!! Dies bedeutet, dass ein bösartiges Programm diese umgehen könnte. - + Quick Recovery Schnellwiederherstellung - + Various Options Verschiedene Optionen - + Allow use of nested job objects (works on Windows 8 and later) Erlaube Verwendung von verschachtelten Jobobjekten (funktioniert ab Windows 8 und neuer) @@ -7797,7 +7792,7 @@ Der Prozessübereinstimmungslevel hat eine höhere Priorität als die Genauigkei Gebe Nachricht 2111 aus, falls ein Prozesszugriff abgelehnt wird - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Deaktiviere standardmäßig die Benutzung von RpcMgmtSetComTimeout (Dies könnte Kompatibilitätsprobleme lösen) @@ -7827,82 +7822,82 @@ Der Prozessübereinstimmungslevel hat eine höhere Priorität als die Genauigkei Die unterstehenden Optionen können sicher genutzt werden, wenn Sie keine Adminrechte gewähren. - + Triggers Auslöser - + Event Vorgang - - - - + + + + Run Command Kommando ausführen - + Start Service Dienst starten - + These events are executed each time a box is started Diese Vorgänge werden jedes Mal ausgeführt, wenn eine Box gestartet wird - + On Box Start Beim Boxstart - - + + These commands are run UNBOXED just before the box content is deleted Diese Kommandos werden NICHT-sandgeboxt ausgeführt, direkt bevor der Boxinhalt gelöscht wird - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Diese Kommandos werden nur ausgeführt wenn eine Box initialisiert wird. Um diese erneut auszuführen, muss der Boxinhalt gelöscht werden. - + On Box Init Bei Boxinitialisierung - + Here you can specify actions to be executed automatically on various box events. Hier können Sie Aktionen angeben, die automatisch bei bestimmten Boxvorgängen ausgeführt werden. - + Disable Resource Access Monitor Deaktiviere Ressourcenzugriffsmonitor - + Resource Access Monitor Ressourcenzugriffsmonitor - + Network Firewall Netzwerk-Firewall - + Template Folders Vorlagenordner - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -7911,23 +7906,23 @@ Please note that this values are currently user specific and saved globally for Bitte beachten Sie, dass diese Werte aktuell nutzerspezifisch sind und global für alle Boxen gespeichert werden. - - + + Value Wert - + Accessibility Barrierefreiheit - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Zur Kompensation des verlorenen Schutzes, suchen Sie die Einstellungsseite der Rechteabgabe in der Gruppe der Beschränkungen auf. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Screenreader, JAWS, NVDA, Window-Eyes, Systemzugriff @@ -8082,47 +8077,47 @@ Bitte beachten Sie, dass diese Werte aktuell nutzerspezifisch sind und global f Konfiguriere welche Prozesse Zugriff auf Desktopobjekte wie Fenster und dergleichen haben. - + Apply ElevateCreateProcess Workaround (legacy behaviour) Wende die ElevateCreateProcess-Problemumgehung an (veraltetes Verhalten) - + Use desktop object workaround for all processes Wende den Workaround für Desktopobjekt auf alle Prozesse an - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. Wenn der globale Hotkey 3x kurz hintereinander gedrückt wird, wird diese Ausnahme ignoriert. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. Schließe diese Sandbox davon aus, dass sie beendet wird, wenn "Alle Prozesse beenden" aufgerufen wird. - + This command will be run before the box content will be deleted Dieses Kommando wird ausgeführt bevor der Boxinhalt gelöscht wird - + On File Recovery Bei Dateiwiederherstellung - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked Dieses Kommando wird ausgeführt bevor eine Datei wiederhergestellt wird und der Dateipfad wird als erstes Argument weitergegeben und falls dieses Kommando etwas anderes als den Wert 0 zurückgibt, wird die Wiederherstellung blockiert - + Run File Checker Starte Dateiprüfer - + On Delete Content Beim Löschen von Inhalten @@ -8158,87 +8153,87 @@ Bitte beachten Sie, dass diese Werte aktuell nutzerspezifisch sind und global f - + Process Prozess - + Other Options Andere Optionen - + Port Blocking Portblockade - + Block common SAMBA ports Blockiere übliche SAMBA-Ports - + Block DNS, UDP port 53 Blockiere DNS, UPD Port 53 - + Add Option Füge Option hinzu - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Hier können Sie pro Prozess Optionen konfigurieren, um die Kompatibilität zu verbessern und/oder das Sandboxverhalten zu personalisieren. - + Option Option - + These commands are run UNBOXED after all processes in the sandbox have finished. Diese Befehle werden AUẞERHALB der Sandbox ausgeführt, nachdem alle Prozesse in der Sandbox beendet wurden. - + Syscall Trace (creates a lot of output) Systemaufrufrückverfolgung (erzeugt große Ausgabemenge) - + Templates Vorlagen - + Open Template Öffne Vorlage - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Die folgenden Einstellungen ermöglichen die Verwendung von Sandboxie in Verbindung mit Barrierefreiheitssoftware. Bitte beachten Sie, dass ein gewisser Umfang des Schutzes von Sandboxie notwendigerweise verloren geht, wenn diese Einstellungen aktiv sind. - + Edit ini Section INI Sektion bearbeiten - + Edit ini INI bearbeiten - + Cancel Abbrechen - + Save Speichern diff --git a/SandboxiePlus/SandMan/sandman_en.ts b/SandboxiePlus/SandMan/sandman_en.ts index 79998242..e2f17b07 100644 --- a/SandboxiePlus/SandMan/sandman_en.ts +++ b/SandboxiePlus/SandMan/sandman_en.ts @@ -1532,11 +1532,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs @@ -1547,9 +1547,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 @@ -1584,7 +1584,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. @@ -1991,82 +1991,82 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Any - + TCP - + UDP - + ICMP - + Allow access - + Block using Windows Filtering Platform - + Block by denying access to Network devices - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow - + Block (WFP) - + Block (NDev) - + A non empty program name is required. - + Block @@ -6584,7 +6584,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Protect the system from sandboxed processes @@ -6721,12 +6721,12 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Network restrictions - + Block network files and folders, unless specifically opened. @@ -6749,11 +6749,11 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - + + + + + Name @@ -6783,15 +6783,15 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - - - - - + + + + + + + + + Remove @@ -6857,11 +6857,11 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - + + + + + Show Templates @@ -6911,7 +6911,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Prevent change to network and firewall parameters (user mode) @@ -7085,13 +7085,13 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Move Up - + Move Down @@ -7162,49 +7162,49 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + Image Protection - + Issue message 1305 when a program tries to load a sandboxed dll - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox - + Dlls && Extensions - + Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. @@ -7433,9 +7433,9 @@ To specify a process use '$:program.exe' as path. - - - + + + Program @@ -7443,20 +7443,20 @@ To specify a process use '$:program.exe' as path. - + Action - + Port - - + + IP @@ -7466,7 +7466,7 @@ To specify a process use '$:program.exe' as path. - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. @@ -7563,142 +7563,137 @@ To specify a process use '$:program.exe' as path. - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Other Options - + Port Blocking - + Block common SAMBA ports - + Block DNS, UDP port 53 - + File Recovery - + Quick Recovery - + Add Folder - + Immediate Recovery - + Ignore Extension - + Ignore Folder - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. - + Advanced Options - + Miscellaneous @@ -7719,7 +7714,7 @@ To specify a process use '$:program.exe' as path. - + Protect the sandbox integrity itself @@ -7740,7 +7735,7 @@ To specify a process use '$:program.exe' as path. - + Force usage of custom dummy Manifest files (legacy behaviour) @@ -7791,8 +7786,8 @@ The process match level has a higher priority than the specificity and describes - - + + Compatibility @@ -7802,7 +7797,7 @@ The process match level has a higher priority than the specificity and describes - + Emulate sandboxed window station for all processes @@ -7832,7 +7827,7 @@ The process match level has a higher priority than the specificity and describes - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) @@ -7857,76 +7852,76 @@ The process match level has a higher priority than the specificity and describes - + Triggers - + Event - - - - + + + + Run Command - + Start Service - + These events are executed each time a box is started - + On Box Start - - + + These commands are run UNBOXED just before the box content is deleted - + Allow use of nested job objects (works on Windows 8 and later) - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. - + On Box Init - + Here you can specify actions to be executed automatically on various box events. - + Hide Processes - + Add Process - + Hide host processes from processes running in the sandbox. @@ -7936,48 +7931,48 @@ The process match level has a higher priority than the specificity and describes - + Various Options - + Apply ElevateCreateProcess Workaround (legacy behaviour) - + Use desktop object workaround for all processes - + This command will be run before the box content will be deleted - + On File Recovery - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked - + Run File Checker - + On Delete Content - + Don't allow sandboxed processes to see processes running in other boxes @@ -7988,80 +7983,80 @@ The process match level has a higher priority than the specificity and describes - + Process - + Users - + Restrict Resource Access monitor to administrators only - + Add User - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. - + Add Option - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. - + Option - + These commands are run UNBOXED after all processes in the sandbox have finished. - + Tracing - + Pipe Trace - + API call Trace (traces all SBIE hooks) - + Log all SetError's to Trace log (creates a lot of output) - + Log Debug Output to the Trace Log - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8073,176 +8068,176 @@ instead of "*". - + File Trace - + Disable Resource Access Monitor - + IPC Trace - + GUI Trace - + Resource Access Monitor - + Access Tracing - + COM Class Trace - + Key Trace - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. - + Network Firewall - + Debug - + WARNING, these options can disable core security guarantees and break sandbox security!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. - + App Templates - + Filter Categories - + Text Filter - + Add Template - + This list contains a large amount of sandbox compatibility enhancing templates - + Category - + Template Folders - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. - - + + Value - + On Box Terminate - + DNS Request Logging - + Syscall Trace (creates a lot of output) - + Templates - + Open Template - + Accessibility - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. - + Edit ini Section - + Edit ini - + Cancel - + Save diff --git a/SandboxiePlus/SandMan/sandman_es.ts b/SandboxiePlus/SandMan/sandman_es.ts index 637f5b11..479ce0d0 100644 --- a/SandboxiePlus/SandMan/sandman_es.ts +++ b/SandboxiePlus/SandMan/sandman_es.ts @@ -1966,9 +1966,9 @@ Nota: La comprobación de actualización a menudo está atrasada respecto al úl - - - + + + Group: %1 Grupo: %1 @@ -2186,11 +2186,11 @@ Nota: La comprobación de actualización a menudo está atrasada respecto al úl - - - - - + + + + + All Programs Todos los programas @@ -2225,7 +2225,7 @@ Nota: La comprobación de actualización a menudo está atrasada respecto al úl - + Template values can not be edited. Los valores de plantilla no se pueden editar. @@ -2354,82 +2354,82 @@ Por favor, selecciona una carpeta que contenga este archivo. - + Any Cualquiera - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Permitir acceso - + Block using Windows Filtering Platform Bloquear usando plataforma de filtrado de Windows - + Block by denying access to Network devices Bloquear denegando acceso a dispositivos de red - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Permitir - + Block (WFP) Bloquear (WFP) - + Block (NDev) Bloquear (NDev) - + A non empty program name is required. Un nombre de programa no vacío es requerido. - + Block Bloquear @@ -7262,7 +7262,7 @@ Si ya eres un Gran Patrocinador en Patreon, Sandboxie puede comprobar online por - + Protect the system from sandboxed processes Protejer al sistema de procesos en sandboxes @@ -7277,7 +7277,7 @@ Si ya eres un Gran Patrocinador en Patreon, Sandboxie puede comprobar online por Abrir Credenciales de Windows (modo usuario) - + Block network files and folders, unless specifically opened. Bloquear archivos de red y carpetas, salvo especificamente abiertos. @@ -7286,7 +7286,7 @@ Si ya eres un Gran Patrocinador en Patreon, Sandboxie puede comprobar online por Hace creer a las aplicaciones que son ejecutadas con permisos elevados (permite ejecutar instaladores con seguridad) - + Network restrictions Restricciones de Red @@ -7425,11 +7425,11 @@ Si ya eres un Gran Patrocinador en Patreon, Sandboxie puede comprobar online por - - - - - + + + + + Name Nombre @@ -7459,15 +7459,15 @@ Si ya eres un Gran Patrocinador en Patreon, Sandboxie puede comprobar online por - - - - - - - - - + + + + + + + + + Remove Remover @@ -7553,11 +7553,11 @@ Si ya eres un Gran Patrocinador en Patreon, Sandboxie puede comprobar online por - - - - - + + + + + Show Templates Mostrar Plantillas @@ -7662,14 +7662,14 @@ Si los procesos lider son definidos, todos los demas son tratados como persisten - - - + + + Program Programa - + Prevent change to network and firewall parameters (user mode) Prevenir cambiar parametros de red y cortafuegos (modo usuario) @@ -7726,13 +7726,13 @@ Ud. puede usar 'Abrir para todos' en vez de aplicar a todos los progra - + Move Up Mover Arriba - + Move Down Mover Abajo @@ -7747,22 +7747,22 @@ Note que Cerrar todos los ...=!<program>,... exclusiones tienen la misma l Para acceso a archivos Ud. puede usar 'Directo Todo' en vez de hacerlo aplicar a todos los programas. - + File Recovery Recuperación de archivos - + Add Folder Agregar Carpeta - + Ignore Extension Ignorar Extension - + Ignore Folder Ignorar Carpeta @@ -7771,22 +7771,22 @@ Para acceso a archivos Ud. puede usar 'Directo Todo' en vez de hacerlo Habilitar consulta de Recuperación Inmediata que pueda recuperar archivos al momento de crearse. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Ud. puede excluir carpetas y tipos de archivos (o extensiones de archivos) de la Recuperación Instantanea. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Cuando la función de Recuperación Rapida es solicitada, las siguientes carpetas seran verificadas por contenido. - + Advanced Options Opciones Avanzadas - + Miscellaneous Miscelaneas @@ -7797,7 +7797,7 @@ Para acceso a archivos Ud. puede usar 'Directo Todo' en vez de hacerlo - + Protect the sandbox integrity itself Protejer la integridad de la sandbox @@ -7820,13 +7820,13 @@ Para acceso a archivos Ud. puede usar 'Directo Todo' en vez de hacerlo Proteger procesos de sistema dentro de la sandbox contra procesos no privilegiados fuera de la sandbox - - + + Compatibility Compatibilidad - + Force usage of custom dummy Manifest files (legacy behaviour) Forzar el uso de archivos de manifesto de prueba (comportamiento heredado) @@ -7857,42 +7857,42 @@ Para acceso a archivos Ud. puede usar 'Directo Todo' en vez de hacerlo Aqui Ud. puede especificar una lista de comandos que son ejecutados cada vez que la sandbox es creada inicialmente. - + Hide Processes Esconder Procesos - + Add Process Agregar Proceso - + Hide host processes from processes running in the sandbox. Esconder procesos del anfitrion de procesos ejecutandose en la sandbox. - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked Este comando se ejecutará antes de que un archivo se recupere y la ruta del archivo se pasará como primer argumento. Si este comando devuelve algo distinto de 0, la recuperación será bloqueada - + Don't allow sandboxed processes to see processes running in other boxes No permitir procesos en la sandbox ver procesos ejecutandose en otras sandboxes - + Users Usuarios - + Restrict Resource Access monitor to administrators only Restringir monitor de acceso a recursos solo para administradores - + Add User Agregar Usuario @@ -7909,27 +7909,27 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to u Nota: Configuración de Programas Forzados y Carpetas Forzadas para una sandbox no aplican a cuentas de usuario que no pueden usar la sandbox. - + Tracing Rastreo - + COM Class Trace Rastreo COM Class - + IPC Trace Rastreo IPC - + Key Trace Rastreo de llave - + GUI Trace Rastreo GUI @@ -8047,22 +8047,22 @@ El proceso de nivel de coincidencia tiene mayor prioridad que la especificidad y Rastreo de llamadas API (requiere logapi estar instalado en el directorio de sbie) - + Log all SetError's to Trace log (creates a lot of output) Registrar todos los SetErrors al Log de Rastreo (crea mucha salida de datos) - + File Trace Rastreo de archivo - + Pipe Trace Rastreo Pipe - + Access Tracing Rastreo de acceso @@ -8071,12 +8071,12 @@ El proceso de nivel de coincidencia tiene mayor prioridad que la especificidad y <- para esta lo de arriba no aplica - + Log Debug Output to the Trace Log Registrar salida de depuración al log de Rastreo - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8099,42 +8099,42 @@ en cambio de "*". Rastreo Ntdll syscall (crea mucha información de salida) - + Debug Depuracion - + WARNING, these options can disable core security guarantees and break sandbox security!!! ADVERTENCIA, estas opciones pueden deshabilitar garantias de seguridad de nucleo y romper la seguridad de la sandbox!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Estas opciones son para depurar problemas de compatibilidad, por favor no las use en produccion. - + App Templates Plantillas de Aplicacion - + Filter Categories Filtros de Categorias - + Text Filter Filtro de Texto - + Category Categoria - + This list contains a large amount of sandbox compatibility enhancing templates Esta lista contiene gran cantidad de plantillas para mejorar la compatibilidad de la sandbox @@ -8189,50 +8189,50 @@ en cambio de "*". Aislamiento de acceso - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. Cuando la tecla de acceso rápido global se presione 3 veces en rápida sucesión, esta excepción será ignorada. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. Excluir esta sandbox de ser finalizada cuando se invoque "Terminar Todos los Procesos". - + Image Protection Protección de Imagen - + Issue message 1305 when a program tries to load a sandboxed dll Emitir el mensaje 1305 cuando un programa intenta cargar una dll en un entorno aislado - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox Evitar que los programas de sandbox instalados en el host carguen DLLs desde esta sandbox - + Dlls && Extensions DLLs y Extensiones - + Description Descripción - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Las reglas de acceso a recursos de Sandboxie a menudo discriminan contra los binarios de programas ubicados dentro de la sandbox. OpenFilePath y OpenKeyPath funcionan solo para binarios de aplicaciones ubicadas de manera nativa en el ordenador. Para definir una regla sin esta restricción, se debe usar OpenPipePath o OpenConfPath. De igual manera, todas las directivas Closed(File|Key|Ipc)Path que se definen por negación, por ejemplo, 'ClosedFilePath=! iexplore.exe,C:Users*' siempre estarán cerradas para binarios ubicados dentro de una sandbox. Ambas políticas de restricción pueden ser desactivadas en la página de "Políticas de acceso". Esto se hace para evitar que procesos maliciosos dentro de la sandbox creen una copia renombrada de sí mismos y accedan a recursos protegidos. Otro vector de explotación es la inyección de una biblioteca en un proceso autorizado para obtener acceso a todo lo que se le permite acceder. Utilizando la Protección de Imagen del Host, esto puede prevenirse bloqueando a las aplicaciones (instaladas en el host) que se ejecuten dentro de una sandbox y que carguen bibliotecas desde la propia sandbox. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. La funcionalidad de Sandboxie puede mejorarse mediante el uso de DLLs opcionales que pueden cargarse en cada proceso confinado en uns sandbox al iniciarse por el archivo SbieDll.dll. El administrador de extensiones en la configuración global ofrece un par de extensiones útiles; una vez instaladas, pueden activarse aquí para el sandbox actual. @@ -8468,7 +8468,7 @@ Para especificar un proceso, utiliza '$:program.exe' como ruta. - + Action Acción @@ -8656,14 +8656,14 @@ Para especificar un proceso, utiliza '$:program.exe' como ruta. - + Port Puerto - - + + IP IP @@ -8673,52 +8673,52 @@ Para especificar un proceso, utiliza '$:program.exe' como ruta.Protocolo - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. Precaución: Plataforma de Filtrado de Windows no esta habilitada con el controlador, por lo tanto estas reglas seran aplicadas solo en modo usuario y no pueden ser reforzadas!!! Esto significa que aplicaciones maliciosas pueden saltearlas. - + Other Options Otras Opciones - + Port Blocking Bloqueo de Puerto - + Block common SAMBA ports Bloquear puertos SAMBA comunes - + Block DNS, UDP port 53 Bloquear DNS, UDP puerto 53 - + Quick Recovery Recuperación Rápida - + Immediate Recovery Recuperación Inmediata - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Habilitar que Recuperación Inmediata pueda recuperar archivos tan rapido como son creados. - + Various Options Varias opciones - + Emulate sandboxed window station for all processes Emular ventanas de sandbox para todos los procesos @@ -8727,13 +8727,13 @@ Para especificar un proceso, utiliza '$:program.exe' como ruta.COM/RPC - + Allow use of nested job objects (works on Windows 8 and later) Allow use of nested job objects (experimental, works on Windows 8 and later) Permitir el uso de objetos de trabajos anidados (experimental, funciona en Windows 8 y posterior) - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Deshabilitar el uso de RpcMgmtSetComTimeout por defecto (esto puede resolver temas de compatibilidad) @@ -8791,46 +8791,46 @@ Para especificar un proceso, utiliza '$:program.exe' como ruta.Aislamiento de Acceso - + Triggers Disparadores - + This command will be run before the box content will be deleted Este comando se ejecutará antes de que el contenido de la caja sea borrado - + Event Evento - - - - + + + + Run Command Ejecutar Comando - + Start Service Iniciar Servicio - + These events are executed each time a box is started Estos eventos son excluidos acada vez que la caja es iniciada - + On Box Start Al inicio de la caja - - + + These commands are run UNBOXED just before the box content is deleted Estos comandos son ejecutados fuera de la Sandbox justo despues de que el contenido de la caja es eliminado @@ -8839,27 +8839,27 @@ Para especificar un proceso, utiliza '$:program.exe' como ruta.Al eliminar la caja - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Estos comandos son ejecutados solo cuando la caja es inicializada. Para hacer que se ejecuten de nuevo, el contenido de la caja debe ser eliminado. - + On Box Init Al inicializar la caja - + On Box Terminate Al finalizar la caja - + Here you can specify actions to be executed automatically on various box events. Aqui puede especificar acciones a ser ejecutadas automaticamente en varios eventos de la caja. - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8868,23 +8868,23 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Nota: Las configuraciones de Programas Forzados y Carpetas Forzadas para una sandbox no se aplican a cuentas de usuario que no pueden usar la sandbox. - + API call Trace (traces all SBIE hooks) Rastreo de llamadas API (rastrea todos los ganchos de SBIE) - + Disable Resource Access Monitor Deshabilitar Monitor de Acceso a Recursos - + Resource Access Monitor Monitor de Acceso a Recursos - + Network Firewall Cortafuegos de Red @@ -8893,7 +8893,7 @@ Nota: Las configuraciones de Programas Forzados y Carpetas Forzadas para una san Plantillas/Templates de Compatibilidad - + Add Template Agregar Plantilla @@ -8902,12 +8902,12 @@ Nota: Las configuraciones de Programas Forzados y Carpetas Forzadas para una san Remover Plantilla - + Template Folders Plantillas de Carpetas - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8916,23 +8916,23 @@ Please note that this values are currently user specific and saved globally for Por favor note que estos valores son especificos para usuario y guardados globalmente para todas las cajas. - - + + Value Valor - + Accessibility Accesibilidad - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Para compensar la perdida de protección, por favor consulte configuración de "Soltar Permisos"en la pagina de seteo de Restricciones de grupo. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Lector de pantallas: JAWS, NVDA, Window-Eyes, Acceso a Sistema @@ -8942,32 +8942,32 @@ Por favor note que estos valores son especificos para usuario y guardados global Restricciones - + Apply ElevateCreateProcess Workaround (legacy behaviour) Aplicar solución alternativa para ElevateCreateProcess (comportamiento heredado) - + Use desktop object workaround for all processes Usar comportamiento alternativo de objetos de escritorio para todos los procesos - + On File Recovery Al Recuperar Archivo - + These commands are run UNBOXED after all processes in the sandbox have finished. Estos comandos son ejecutados SIN AISLAR después de que todos los procesos en esta sandbox hayan finalizado. - + Run File Checker Ejecutar Comprobador de Archivos - + On Delete Content Al Borrar Contenido @@ -8978,133 +8978,128 @@ Por favor note que estos valores son especificos para usuario y guardados global - + Process Proceso - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Add Option Añadir Opción - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. Aquí puedes configurar opciones avanzadas por proceso para mejorar la compatibilidad y/o personalizar el comportamiento del aislamiento. - + Option Opción - + DNS Request Logging Registro de peticiones DNS - + Syscall Trace (creates a lot of output) Rastreo de Syscall (crea una gran cantidad de salida) - + Templates Plantillas - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. La configuración siguiente habilita el uso de Sandboxie en combinación con software de accesibilidad. Por favor note que algunas medidas de seguridad de Sandboxie se pierden cuando esta configuración esta activo. - + Edit ini Section Editar sección ini - + Edit ini Editar ini - + Cancel Cancelar - + Save Guardar diff --git a/SandboxiePlus/SandMan/sandman_fr.ts b/SandboxiePlus/SandMan/sandman_fr.ts index 0891b35c..b3ae4639 100644 --- a/SandboxiePlus/SandMan/sandman_fr.ts +++ b/SandboxiePlus/SandMan/sandman_fr.ts @@ -1744,11 +1744,11 @@ Remarque : La recherche de mise à jour est souvent en retard par rapport à la - - - - - + + + + + All Programs Tous les programmes @@ -1759,9 +1759,9 @@ Remarque : La recherche de mise à jour est souvent en retard par rapport à la - - - + + + Group: %1 Groupe : %1 @@ -1796,7 +1796,7 @@ Remarque : La recherche de mise à jour est souvent en retard par rapport à la - + Template values can not be edited. Les valeurs des modèles ne peuvent pas être modifiées. @@ -2240,82 +2240,82 @@ Remarque : La recherche de mise à jour est souvent en retard par rapport à la - + Any Tous - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Autoriser l'accès - + Block using Windows Filtering Platform Bloquer à l'aide de la plateforme de filtrage Windows - + Block by denying access to Network devices Bloquer en refusant l'accès aux périphériques réseaux - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Autoriser - + Block (WFP) Bloquer (WFP) - + Block (NDev) Bloquer (NDev) - + A non empty program name is required. Un nom de programme non vide est nécessaire. - + Block Bloquer @@ -7365,7 +7365,7 @@ Idéal s'il y a un grand nombre de petits fichiers, cela rendra l'arch - + Protect the system from sandboxed processes Protège le système des processus du bac à sable @@ -7538,12 +7538,12 @@ Idéal s'il y a un grand nombre de petits fichiers, cela rendra l'arch Restrictions d'impression - + Network restrictions Restrictions de réseau - + Block network files and folders, unless specifically opened. Bloquer les fichiers et dossiers du réseau, sauf s'ils sont spécifiquement ouverts @@ -7570,11 +7570,11 @@ Idéal s'il y a un grand nombre de petits fichiers, cela rendra l'arch - - - - - + + + + + Name Nom @@ -7604,15 +7604,15 @@ Idéal s'il y a un grand nombre de petits fichiers, cela rendra l'arch - - - - - - - - - + + + + + + + + + Remove Supprimer @@ -7699,11 +7699,11 @@ Idéal s'il y a un grand nombre de petits fichiers, cela rendra l'arch - - - - - + + + + + Show Templates Afficher les modèles @@ -7757,7 +7757,7 @@ Idéal s'il y a un grand nombre de petits fichiers, cela rendra l'arch Ouvrir le magasin d'identifiants Windows (mode utilisateur) - + Prevent change to network and firewall parameters (user mode) Empêcher les changements aux paramètres réseaux et règles du pare-feu (mode utilisateur) @@ -7969,9 +7969,9 @@ Si des processus directeurs sont définis, tous les autres sont traités comme d - - - + + + Program Programme @@ -8208,20 +8208,20 @@ Pour définir un processus, utiliser « $:programme.exe » comme chemin. - + Action Action - + Port Port - - + + IP IP @@ -8231,7 +8231,7 @@ Pour définir un processus, utiliser « $:programme.exe » comme chemin.Protocole - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. ATTENTION : La plateforme de filtrage Windows n'est pas activée avec le pilote, par conséquent ces règles seront exécutées uniquement en mode utilisateur et ne pourront pas être imposées !!! Cela signifie que les applications malveillantes peuvent les contourner. @@ -8264,7 +8264,7 @@ Pour l'accès aux fichiers, vous pouvez utiliser « Autorisé pour tous » - + Move Down Descendre @@ -8285,7 +8285,7 @@ Pour l'accès aux fichiers, vous pouvez utiliser « Autorisé pour tous » - + Move Up Monter @@ -8302,47 +8302,47 @@ Pour l'accès aux fichiers, vous pouvez utiliser « Toujours direct » pour Appliquer ferme les directives de...=!<programme>,... ainsi que tous les binaires situés dans le bac à sable. - + File Recovery Récupération de fichiers - + Add Folder Ajouter un dossier - + Ignore Extension Ignorer une extension - + Ignore Folder Ignorer un dossier - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Activer l'invite de récupération immédiate pour pouvoir récupérer les fichiers dès leur création - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Vous pouvez exclure des dossiers, des types de fichiers, ou des extensions de fichiers de la récupération immédiate. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Lorsque la fonction de récupération rapide est invoquée, les dossiers suivants sont contrôlés pour vérifier la présence de contenu dans le bac à sable. - + Advanced Options Options avancées - + Miscellaneous Divers @@ -8363,7 +8363,7 @@ Pour l'accès aux fichiers, vous pouvez utiliser « Toujours direct » pour - + Protect the sandbox integrity itself Protège la propre intégrité du bac à sable @@ -8388,7 +8388,7 @@ Pour l'accès aux fichiers, vous pouvez utiliser « Toujours direct » pour Isolation du bac à sable - + Force usage of custom dummy Manifest files (legacy behaviour) Forcer l'utilisation de fichiers Manifest factices personnalisés (ancien comportement) @@ -8457,8 +8457,8 @@ Le niveau de correspondance du processus a une priorité plus élevée que la sp Autoriser uniquement les processus privilégiés à accéder au gestionnaire des services - - + + Compatibility Compatibilité @@ -8476,7 +8476,7 @@ Le niveau de correspondance du processus a une priorité plus élevée que la sp Isolation COM - + Emulate sandboxed window station for all processes Émuler une Station Windows en bac à sable pour tous les processus @@ -8485,13 +8485,13 @@ Le niveau de correspondance du processus a une priorité plus élevée que la sp COM/RPC - + Allow use of nested job objects (works on Windows 8 and later) Allow use of nested job objects (experimental, works on Windows 8 and later) Autoriser l'utilisation d'objets de travail imbriqués (fonctionne sur Windows 8 et plus) - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Désactiver l'utilisation de RpcMgmtSetComTimeout par défaut (cela peut résoudre des problèmes de compatibilité) @@ -8569,41 +8569,41 @@ Le niveau de correspondance du processus a une priorité plus élevée que la sp Ici, vous pouvez spécifier une liste de commandes qui sont exécutées chaque fois que le bac à sable est initialement rempli. - + Triggers Déclencheurs - + Event Évènements - - - - + + + + Run Command Lancer une commande - + Start Service Démarrer un service - + These events are executed each time a box is started Ces évènements sont exécutés à chaque fois qu'un bac à sable est démarré. - + On Box Start Au démarrage du bac - - + + These commands are run UNBOXED just before the box content is deleted Ces commandes sont lancées EN DEHORS DU BAC juste avant que le contenu du bac soit supprimé. @@ -8612,52 +8612,52 @@ Le niveau de correspondance du processus a une priorité plus élevée que la sp À la suppression - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Ces commandes sont exécutées lorsqu'un bac à sable est initialisé. Pour les lancer à nouveau, le contenu du bac doit être supprimé. - + On Box Init À l'initialisation du bac - + Here you can specify actions to be executed automatically on various box events. Vous pouvez spécifier ici des actions à exécuter automatiquement lors de divers évènements. - + Hide Processes Masquage des processus - + Add Process Ajouter un processus - + Hide host processes from processes running in the sandbox. Masquer les processus de l'hôte des processus s'exécutant dans le bac à sable. - + Don't allow sandboxed processes to see processes running in other boxes Ne pas permettre aux processus en bac à sable de voir les processus en cours d'exécution dans d'autres bacs - + Users Utilisateurs - + Restrict Resource Access monitor to administrators only Restreindre le moniteur d'accès aux ressources aux administrateurs uniquement - + Add User Ajouter un utilisateur @@ -8666,7 +8666,7 @@ Le niveau de correspondance du processus a une priorité plus élevée que la sp Supprimer l'utilisateur - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8675,7 +8675,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Remarque : Les paramètres Programmes forcés et Dossiers forcés d'un bac à sable ne s'appliquent pas aux comptes utilisateurs qui ne peuvent pas utiliser le bac. - + Tracing Traçage @@ -8685,22 +8685,22 @@ Remarque : Les paramètres Programmes forcés et Dossiers forcés d'un bac Tracer les appels API (nécessite que LogAPI soit installé dans le répertoire de Sandboxie) - + Pipe Trace Tracer les Pipes - + Log all SetError's to Trace log (creates a lot of output) Enregistrer toutes les SetError dans le journal de traçage (crée beaucoup de sorties) - + Log Debug Output to the Trace Log Enregistrer la sortie de débogage dans le journal de traçage - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8723,42 +8723,42 @@ au lieu de « * ». Tracer les appels système Ntdll (crée beaucoup de sorties) - + File Trace Tracer les fichiers - + Disable Resource Access Monitor Désactiver le moniteur d'accès aux ressources - + IPC Trace Tracer IPC - + GUI Trace Tracer l'interface graphique - + Resource Access Monitor Moniteur d'accès aux ressources - + Access Tracing Traçage des accès - + COM Class Trace Tracer les classes COM - + Key Trace Tracer les clés @@ -8791,102 +8791,97 @@ au lieu de « * ». - + Network Firewall Pare-feu réseau - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + These commands are run UNBOXED after all processes in the sandbox have finished. Ces commandes s'exécutent EN DEHORS DU BAC après que tous les processus dans le bac à sable se soient arrêtés. - + API call Trace (traces all SBIE hooks) Tracer les appels API (trace tous les crochets SBIE) - + Debug Débogage - + WARNING, these options can disable core security guarantees and break sandbox security!!! ATTENTION, ces options peuvent désactiver les garanties de sécurité de base et briser la sécurité du bac à sable !!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Ces options sont destinées à déboguer les problèmes de compatibilité, veuillez ne pas les utiliser en production. - + App Templates Modèles d'applications @@ -8895,22 +8890,22 @@ au lieu de « * ». Modèles de compatibilité - + Filter Categories Filtre de catégorie : - + Text Filter Filtre de texte : - + Add Template Ajouter un modèle - + This list contains a large amount of sandbox compatibility enhancing templates Cette liste contient un grand nombre de modèles améliorant la compatibilité du bac à sable. @@ -8919,17 +8914,17 @@ au lieu de « * ». Supprimer le modèle - + Category Catégorie - + Template Folders Dossiers des modèles - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8938,23 +8933,23 @@ Please note that this values are currently user specific and saved globally for Veuillez noter que ces valeurs sont actuellement spécifiques à l'utilisateur et enregistrées globalement pour tous les bacs. - - + + Value Valeur - + Accessibility Accessibilité - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Pour compenser la perte de protection, veuillez consulter la page d'Abandon des droits dans le groupe de paramètres Restrictions. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Lecteurs d'écran : JAWS, NVDA, Window-Eyes, System Access @@ -9046,40 +9041,40 @@ Veuillez noter que ces valeurs sont actuellement spécifiques à l'utilisat Isolation d'accès - + Image Protection Protection d'image - + Issue message 1305 when a program tries to load a sandboxed dll Émettre un message 1305 lorsqu'un programme essaye de charger une DLL dans un bac à sable - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox Empêcher les programmes dans un bac à sable installé sur l'hôte de charger des DLL depuis le bac à sable - + Dlls && Extensions DLL && extensions - + Description Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Les règles d'accès aux ressources de Sandboxie discriminent souvent les binaires des programmes situés dans le bac à sable. OpenFilePath et OpenKeyPath fonctionnent uniquement pour les binaires des applications situées nativement sur l'hôte. Afin de définir une règle sans cette restriction, OpenPipePath et OpenConfPath doivent être utilisés. De même, toutes les directives Closed(File|Key|Ipc)Path qui sont définies par une négation (par exemple « ClosedFilePath=! iexplore.exe,C:Users* ») seront toujours fermées aux binaires situés dans un bac à sable. Les deux politiques de restriction peuvent être désactivées sur la page « Politiques d'accès ». Ceci est fait pour empêcher les processus malveillants à l'intérieur du bac à sable de créer une copie renommée d'eux-mêmes et d'accéder aux ressources protégées. Un autre vecteur d'exploit est l'injection d'une bibliothèque dans un processus autorisé afin d'accéder à tout ce qu'il est autorisé d'accéder. En utilisant la Protection d'Image de l'Hôte, cela peut être empêché en bloquant les applications (installées sur l'hôte) lancées dans un bac à sable de charger des bibliothèques depuis le bac à sable lui-même. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. Les fonctions de Sandboxie peuvent être améliorées en utilisant des DLL optionnels qui peuvent être chargés dans chaque processus dans un bac à sable lors de leur démarrage par SbieDll.dll. Le gestionnaire de modules dans les paramètres généraux offre quelques extensions utiles ; une fois installées, celles-ci peuvent être activées ici pour le bac à sable actuel. @@ -9100,57 +9095,57 @@ Ceci est fait pour empêcher les processus malveillants à l'intérieur du Configure quels processus peuvent accéder aux objets de bureau tels que les fenêtres et similaires. - + Other Options Autres options - + Port Blocking Blocage des ports - + Block common SAMBA ports Bloquer les ports SAMBA habituels - + Block DNS, UDP port 53 Bloquer le DNS (UDP port 53) - + Quick Recovery Récupération rapide - + Immediate Recovery Récupération immédiate - + Various Options Options diverses - + Apply ElevateCreateProcess Workaround (legacy behaviour) Appliquer le palliatif ElevateCreateProcess (ancien comportement) - + Use desktop object workaround for all processes Utiliser le palliatif d'objet de bureau pour tous les processus - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. Lorsque le raccourci général est utilisé 3 fois rapidement et successivement, cette exception sera ignorée. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. Empêcher ce bac à sable d'être arrêté lorsque « Arrêter tous les processus » est invoqué. @@ -9159,33 +9154,33 @@ Ceci est fait pour empêcher les processus malveillants à l'intérieur du Cette commande s'exécute après que tous les processus dans le bac à sable se soient arrêtés. - + On Box Terminate Lors de l'arrêt du bac - + This command will be run before the box content will be deleted Cette commande sera exécutée avant que le contenu du bac ne soit supprimé. - + On File Recovery Lors de la récupération de fichiers - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked Cette commande sera exécutée avant qu'un fichier ne soit récupéré et le chemin du fichier sera transmis en tant que premier argument ; si cette commande retourne autre chose que « 0 », la récupération sera bloquée. - + Run File Checker Exécuter la vérification de fichiers - + On Delete Content Lors de la suppression de contenu @@ -9196,7 +9191,7 @@ Ceci est fait pour empêcher les processus malveillants à l'intérieur du - + Process Processus @@ -9205,63 +9200,63 @@ Ceci est fait pour empêcher les processus malveillants à l'intérieur du Bloquer également l'accès en lecture des processus de ce bac à sable - + Add Option Ajouter une option - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Ici vous pouvez configurer des options en fonction des processus, pour améliorer la compatibilité et/ou personnaliser le comportement de mise en bac à sable. - + Option Option - + DNS Request Logging Dns Request Logging Enregistrer les requêtes DNS dans le journal - + Syscall Trace (creates a lot of output) Tracer les appels système (crée beaucoup de sorties) - + Templates Modèles - + Open Template Ouvrir le modèle - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Les paramètres suivants permettent l'utilisation de Sandboxie en combinaison avec un logiciel d'accessibilité. Veuillez noter que certaines mesures de protection de Sandboxie sont nécessairement perdues lorsque ces paramètres sont en vigueur. - + Edit ini Section Édition de la section ini - + Edit ini Éditer l'ini - + Cancel Annuler - + Save Enregistrer diff --git a/SandboxiePlus/SandMan/sandman_hu.ts b/SandboxiePlus/SandMan/sandman_hu.ts index 949552d3..a72f66a1 100644 --- a/SandboxiePlus/SandMan/sandman_hu.ts +++ b/SandboxiePlus/SandMan/sandman_hu.ts @@ -1611,11 +1611,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs Minden program @@ -1626,9 +1626,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 Csoport: %1 @@ -1663,7 +1663,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. A sablonértékek nem szerkeszthetők. @@ -2082,82 +2082,82 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Any Bármilyen - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Hozzáférés engedélyezése - + Block using Windows Filtering Platform Letiltás a Windows szűrőplatform használatával - + Block by denying access to Network devices Letiltás a hálózati eszközökhöz való hozzáférés megtagadásával - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Engedélyezés - + Block (WFP) Letiltás (WFP) - + Block (NDev) Letiltás (NDev) - + A non empty program name is required. - + Block Letiltás @@ -6831,7 +6831,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes A rendszer védelme a homokozóban futó folyamatoktól @@ -6968,12 +6968,12 @@ If you are a great patreaon supporter already, sandboxie can check online for an Nyomtatási korlátozások - + Network restrictions Hálózati korlátozások - + Block network files and folders, unless specifically opened. Hálózati fájlok és mappák blokkolása, hacsak nincs külön megnyitva. @@ -6996,11 +6996,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name Név @@ -7030,15 +7030,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove Eltávolítás @@ -7104,11 +7104,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates Sablonok megjelenítése @@ -7183,7 +7183,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Nyissa meg a Windows hitelesítő adatok áruházát (felhasználói mód) - + Prevent change to network and firewall parameters (user mode) A hálózati és tűzfalparaméterek módosításának megakadályozása (felhasználói mód) @@ -7394,13 +7394,13 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Move Up Mozgatás felfelé - + Move Down Mozgatás lefelé @@ -7446,134 +7446,129 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Other Options - + Port Blocking - + Block common SAMBA ports - + Block DNS, UDP port 53 - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + Image Protection - + Issue message 1305 when a program tries to load a sandboxed dll - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox - + Dlls && Extensions - + Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. @@ -7810,9 +7805,9 @@ A folyamat megadásához használja a '$:program.exe-t' útvonalként. - - - + + + Program Program @@ -7820,20 +7815,20 @@ A folyamat megadásához használja a '$:program.exe-t' útvonalként. - + Action Művelet - + Port Port - - + + IP IP @@ -7843,7 +7838,7 @@ A folyamat megadásához használja a '$:program.exe-t' útvonalként. Protokoll - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. FIGYELEM: A Windows szűrőplatform nincs engedélyezve az illesztőprogrammal, ezért ezeket a szabályokat csak felhasználói módban kell alkalmazni, és nem lehet érvényesíteni !!! Ez azt jelenti, hogy a rosszindulatú alkalmazások megkerülhetik őket. @@ -7921,57 +7916,57 @@ A folyamat megadásához használja a '$:program.exe-t' útvonalként. Alkalmazza a Bezárás...=!<program>,... szabályokat a homokozóban található összes bináris fájlra is. - + File Recovery Fájl helyreállítás - + Quick Recovery Gyors helyreállítás - + Add Folder Mappa hozzáadása - + Immediate Recovery Azonnali helyreállítás - + Ignore Extension Kiterjesztés kihagyása - + Ignore Folder Mappa kihagyása - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Azonnali helyreállítási kérés engedélyezése, hogy a fájlokat a létrehozásuk után azonnal helyreállíthassa. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Az "Azonnali helyreállításból" kizárhat mappákat és fájltípusokat (vagy fájlkiterjesztéseket). - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. A "Gyors helyreállítás" funkció meghívása után a következő mappákat ellenőrzik a homokozós tartalom szempontjából. - + Advanced Options Fejlett beállítások - + Miscellaneous Egyebek @@ -7992,7 +7987,7 @@ A folyamat megadásához használja a '$:program.exe-t' útvonalként. - + Protect the sandbox integrity itself A homokozó integritásának védelme @@ -8013,7 +8008,7 @@ A folyamat megadásához használja a '$:program.exe-t' útvonalként. Védje meg az izolált SYSTEM folyamatokat a nem privilegizált folyamatoktól - + Force usage of custom dummy Manifest files (legacy behaviour) Egyéni dummy manifest fájlok használatának kikényszerítése (örökölt viselkedés) @@ -8065,8 +8060,8 @@ A folyamategyezési szint magasabb prioritású, mint a specifikusság, és leí Csak a privilegizált folyamatok számára engedélyezze a szolgáltatásvezérlő menedzser (Service Control Manager) elérését - - + + Compatibility Kompatibilitás @@ -8076,7 +8071,7 @@ A folyamategyezési szint magasabb prioritású, mint a specifikusság, és leí Sandbox-folyamatok hozzáadása munkaobjektumokhoz (ajánlott) - + Emulate sandboxed window station for all processes A homokozós ablakállomás emulálása minden folyamathoz @@ -8110,7 +8105,7 @@ A folyamategyezési szint magasabb prioritású, mint a specifikusság, és leí A nem homokozós folyamatok memóriájának olvasásának engedélyezése (nem ajánlott) - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Alapértelmezés szerint tiltsa le az "RpcMgmtSetComTimeout" használatát (ez megoldhatja a kompatibilitási problémákat) @@ -8135,81 +8130,81 @@ A folyamategyezési szint magasabb prioritású, mint a specifikusság, és leí Az alábbi lehetőségek biztonságosan használhatók, ha nem ad rendszergazdai jogokat. - + Triggers Indítók - + Event Esemény - - - - + + + + Run Command Parancs futtatása - + Start Service Szolgáltatás indítása - + These events are executed each time a box is started Ezek az események minden alkalommal végrehajtódnak, amikor egy homokozó elindul - + On Box Start Homokozó indításakor - - + + These commands are run UNBOXED just before the box content is deleted Ezek a parancsok NEM IZOLÁLTAN futnak le közvetlenül a homokozó tartalmának törlése előtt - + Allow use of nested job objects (works on Windows 8 and later) Beágyazott munkaobjektumok használatának engedélyezése (Windows 8 és újabb rendszeren működik) - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Ezek a parancsok csak akkor hajtódnak végre, ha egy homokozó inicializálva van. Az újrafuttatáshoz a homokozó tartalmát törölni kell. - + On Box Init Homokozó inicializálásakor - + These commands are run UNBOXED after all processes in the sandbox have finished. - + Here you can specify actions to be executed automatically on various box events. Itt adhatja meg a különféle homokozó eseményeken automatikusan végrehajtandó műveleteket. - + Hide Processes Folyamatok elrejtése - + Add Process Folyamat hozzáadása - + Hide host processes from processes running in the sandbox. Gazdafolyamatok elrejtése a homokozóban futó folyamatok elől. @@ -8219,48 +8214,48 @@ A folyamategyezési szint magasabb prioritású, mint a specifikusság, és leí Korlátozások - + Various Options Különféle lehetőségek - + Apply ElevateCreateProcess Workaround (legacy behaviour) Az "ElevateCreateProcess" megoldás alkalmazása (örökölt viselkedés) - + Use desktop object workaround for all processes - + This command will be run before the box content will be deleted Ez a parancs a homokozó tartalmának törlése előtt fut le - + On File Recovery Fájl helyreállításkor - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked Ez a parancs a fájl helyreállítása előtt fut le, és a fájl elérési útja lesz átadva első argumentumként. Ha ez a parancs a 0-tól eltérő értéket ad vissza, a helyreállítás blokkolva lesz - + Run File Checker Fájlellenőrző futtatása - + On Delete Content Tartalom törlésekor - + Don't allow sandboxed processes to see processes running in other boxes Ne engedje, hogy a homokozós folyamatok más homokozóban futó folyamatokat lássák @@ -8271,7 +8266,7 @@ A folyamategyezési szint magasabb prioritású, mint a specifikusság, és leí - + Process Folyamat @@ -8280,45 +8275,45 @@ A folyamategyezési szint magasabb prioritású, mint a specifikusság, és leí A folyamatokhoz való olvasási hozzáférés letiltása ebben a sandboxban - + Users Felhasználó - + Restrict Resource Access monitor to administrators only Az erőforrás-hozzáférés figyelőjét csak a rendszergazdákra korlátozhatja - + Add User Felhasználó hozzáadása - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. Adjon hozzá felhasználói fiókokat és felhasználói csoportokat az alábbi listához, hogy a homokozó használatát csak azokra a fiókokra korlátozza. Ha a lista üres, akkor a homokozót minden felhasználói fiók használhatja. - + Add Option Opció hozzáadása - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. Itt konfigurálhat speciális folyamatonkénti beállításokat a kompatibilitás javítása és/vagy a homokozó viselkedésének testreszabása érdekében. - + Option Opció - + Tracing Nyomkövetés @@ -8327,22 +8322,22 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to API-hívás nyomkövetése (a LogAPI-t telepíteni kell az Sbie-könyvtárba) - + Pipe Trace Pipe nyomkövetés - + Log all SetError's to Trace log (creates a lot of output) Minden SetError rögzítése a nyomkövetési naplóban (sok kimeneti adatot generál) - + Log Debug Output to the Trace Log Napló hibakeresési kimenete a nyomkövetési naplóba - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8365,113 +8360,113 @@ A naplózást az ini használatával testreszabhatja, ha megadja: Ntdll rendszerhívások nyomon követése (sok kimenetet hoz létre) - + File Trace Fájl nyomkövetés - + Disable Resource Access Monitor Erőforrás-hozzáférés figyelő letiltása - + IPC Trace IPC nyomok - + GUI Trace GUI nyomkövetés - + Resource Access Monitor Erőforrás-hozzáférés figyelő - + Access Tracing Hozzáférés nyomon követése - + COM Class Trace COM Class nyom - + Key Trace Kulcskövetés - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Az elveszett védelem kompenzálásához tekintse meg a 'Drop Rights' beállítási oldalát a 'Korlátozások beállításai' csoportban. - + Network Firewall Hálózati tűzfal - + API call Trace (traces all SBIE hooks) - + Debug Hibakeresés - + WARNING, these options can disable core security guarantees and break sandbox security!!! FIGYELEM, ezek az opciók letilthatják az alapvető biztonsági garanciákat és megszakíthatják a homokozó biztonságát!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Ezeket az opciókat a kompatibilitási problémák hibakeresésére tervezték. Kérjük, csak tesztelési célra használja. - + App Templates Program sablonok - + Filter Categories Szűrő kategóriák - + Text Filter Szöveg szűrő - + Add Template Sablon hozzáadása - + This list contains a large amount of sandbox compatibility enhancing templates Ez a lista nagy mennyiségű homokozó kompatibilitást javító sablont tartalmaz - + Category Kategória - + Template Folders Sablon mappák - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8480,68 +8475,68 @@ Please note that this values are currently user specific and saved globally for Felhívjuk figyelmét, hogy ezek az értékek jelenleg felhasználóspecifikusak és globálisan vannak mentve az összes homokozóhoz. - - + + Value Érték - + On Box Terminate - + DNS Request Logging - + Syscall Trace (creates a lot of output) - + Templates Sablonok - + Open Template - + Accessibility Hozzáférhetőség - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Képernyőolvasók: JAWS, NVDA, Window-Eyes, System Acces - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. A következő beállítások lehetővé teszik a Sandboxie használatát akadálymentes szoftverrel kombinálva. Felhívjuk figyelmét, hogy a Sandboxie bizonyos mértékű védelme szükségszerűen elvész, amikor ezek a beállítások érvénybe lépnek. - + Edit ini Section Konfiguráció szerkesztése - + Edit ini INI szerkesztése - + Cancel Mégse - + Save Mentés diff --git a/SandboxiePlus/SandMan/sandman_it.ts b/SandboxiePlus/SandMan/sandman_it.ts index 2983e33d..4b21cf91 100644 --- a/SandboxiePlus/SandMan/sandman_it.ts +++ b/SandboxiePlus/SandMan/sandman_it.ts @@ -1933,9 +1933,9 @@ Nota: Il controllo degli aggiornamenti è solitamente indietro rispetto all&apos - - - + + + Group: %1 Gruppo: %1 @@ -2133,11 +2133,11 @@ Nota: Il controllo degli aggiornamenti è solitamente indietro rispetto all&apos - - - - - + + + + + All Programs Tutti i programmi @@ -2172,7 +2172,7 @@ Nota: Il controllo degli aggiornamenti è solitamente indietro rispetto all&apos - + Template values can not be edited. I valori predefiniti non possono essere modificati. @@ -2283,82 +2283,82 @@ Please select a folder which contains this file. - + Any Qualsiasi - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Consenti accesso - + Block using Windows Filtering Platform Imposta blocco mediante la piattaforma di filtraggio di Windows - + Block by denying access to Network devices Blocca accesso ai dispositivi di rete - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Consenti - + Block (WFP) Blocca (WFP) - + Block (NDev) Blocca (NDev) - + A non empty program name is required. È richiesto un nome di programma non vuoto. - + Block Blocca @@ -6905,7 +6905,7 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen - + Protect the system from sandboxed processes Proteggi il sistema dai processi avviati nell'area virtuale @@ -6915,7 +6915,7 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen Restrizioni di elevazione - + Block network files and folders, unless specifically opened. Blocca i file e le cartelle di rete, a meno che non siano aperti individualmente. @@ -6925,7 +6925,7 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen Fai credere alle applicazioni di avviarsi con privilegi elevati (esegue gli installer in modo sicuro) - + Network restrictions Restrizioni di rete @@ -7065,11 +7065,11 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen - - - - - + + + + + Name Nome @@ -7099,15 +7099,15 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen - - - - - - - - - + + + + + + + + + Remove Rimuovi @@ -7173,11 +7173,11 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen - - - - - + + + + + Show Templates Mostra modelli @@ -7232,7 +7232,7 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen Apri il servizio di gestione credenziali di Windows (user mode) - + Prevent change to network and firewall parameters (user mode) Blocca la modifica dei parametri di rete e firewall (user mode) @@ -7392,9 +7392,9 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen - - - + + + Program Programma @@ -7434,47 +7434,47 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen Aggiungi percorso IPC - + File Recovery Recupero file - + Add Folder Aggiungi cartella - + Ignore Extension Ignora estensione - + Ignore Folder Ignora cartella - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Attiva notifica di Recupero immediato dei file, non appena questi vengono creati. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. È possibile escludere estensioni di file e cartelle dal Recupero immediato. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Una volta richiamata la funzione di Recupero veloce, verrà analizzato il contenuto delle seguenti cartelle nell'area virtuale. - + Advanced Options Opzioni avanzate - + Miscellaneous Opzioni varie @@ -7485,7 +7485,7 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen - + Protect the sandbox integrity itself Proteggi l'integrità dell'area virtuale @@ -7495,13 +7495,13 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen Non avviare servizi nell'area virtuale tramite token di sistema (raccomandato) - - + + Compatibility Compatibilità - + Force usage of custom dummy Manifest files (legacy behaviour) Forza l'utilizzo dei file manifest fittizi (legacy) @@ -7527,7 +7527,7 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen Avvisa l'utente durante la copia dei file - + Emulate sandboxed window station for all processes Emula window station per tutti i processi nell'area virtuale @@ -7656,13 +7656,13 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen - + Move Up Sposta in alto - + Move Down Sposta in basso @@ -7692,47 +7692,47 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen Isolamento degli accessi - + Other Options - + Port Blocking - + Block common SAMBA ports - + Block DNS, UDP port 53 - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + Image Protection Protezione immagine - + Issue message 1305 when a program tries to load a sandboxed dll Mostra messaggio 1305 quando un programma tenta di caricare un file DLL nell'area virtuale - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox Impedisci ai programmi in esecuzione nell'area virtuale (installati sul sistema host) di caricare file DLL @@ -7743,24 +7743,24 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen La selezione parziale impedisce la rimozione dell'area virtuale, ma non la cancellazione del contenuto. - + Dlls && Extensions DLL ed estensioni - + Description Descrizione - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Le regole di accesso alle risorse di Sandboxie spesso discriminano i programmi eseguibili all'interno dell'area virtuale. OpenFilePath e OpenKeyPath funzionano solo per gli eseguibili delle applicazioni situati sull'host in modo nativo. Per definire una regola senza questa restrizione, è necessario utilizzare OpenPipePath o OpenConfPath. Allo stesso modo, tutte le regole Closed(File|Key|Ipc)Path che sono definite per negazione, ad esempio ‘ClosedFilePath=!iexplore.exe,C:\Users*’ saranno sempre chiuse per gli eseguibili situati all'interno dell'area virtuale. Entrambi i criteri di restrizione possono essere disattivati dalla pagina “Criteri di accesso”. In questo modo si impedisce che i processi dannosi all'interno dell'area virtuale creino una copia rinominata di se stessi e accedano alle risorse protette. Un altro vettore di exploit è l'iniezione di una libreria DLL in un processo autorizzato per ottenere l'accesso a tutto ciò a cui è consentito accedere. Utilizzando la protezione dell'immagine host, questo può essere evitato impedendo alle applicazioni (installate sull'host) in esecuzione nell'area virtuale di caricare le librerie DLL dalla stessa area virtuale. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. Segnalare eventuali errori di inglese direttamente all'autore di Sandboxie Plus @@ -7944,7 +7944,7 @@ Per specificare un processo, utilizza '$:program.exe' come percorso. - + Action Azione @@ -7977,14 +7977,14 @@ Per specificare un processo, utilizza '$:program.exe' come percorso. - + Port Porta - - + + IP IP @@ -7994,92 +7994,87 @@ Per specificare un processo, utilizza '$:program.exe' come percorso.Protocollo - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. ATTENZIONE: La piattaforma di filtraggio di Windows non è attiva come impostazione predefinita. Qualora non venisse attivata manualmente, queste regole verranno applicate solo in user mode e le applicazioni dannose potrebbero bypassarle. - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Quick Recovery Recupero veloce - + Immediate Recovery Recupero immediato - + Various Options Opzioni varie - + Allow use of nested job objects (works on Windows 8 and later) Consenti l'uso dei processi nidificati (per Windows 8 e versioni successive) @@ -8157,7 +8152,7 @@ Il livello di corrispondenza del processo ha una priorità più alta della speci Proteggi i processi di sistema nell'area virtuale dai processi senza privilegi - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Disattiva l'utilizzo di RpcMgmtSetComTimeout per impostazione predefinita (potrebbe risolvere problemi di compatibilità) @@ -8191,47 +8186,47 @@ Il livello di corrispondenza del processo ha una priorità più alta della speci Le opzioni sottostanti possono essere usate senza rischi quando non si concedono privilegi amministrativi. - + Hide Processes Nascondi processi - + Add Process Aggiungi processo - + Hide host processes from processes running in the sandbox. Nascondi i processi di host dai processi in esecuzione nell'area virtuale. - + Don't allow sandboxed processes to see processes running in other boxes Non consentire ai processi dell'area virtuale di vedere i processi avviati in altre aree virtuali - + These commands are run UNBOXED after all processes in the sandbox have finished. - + Users Utenti - + Restrict Resource Access monitor to administrators only Limita il log di accesso risorse ai soli amministratori - + Add User Aggiungi utente - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8240,32 +8235,32 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Nota: le impostazioni dei programmi e delle cartelle forzate nell'area virtuale non si applicano agli account utente non abilitati all'utilizzo dell'area virtuale. - + Tracing Tracing - + API call Trace (traces all SBIE hooks) - + COM Class Trace Traccia classe COM - + IPC Trace Traccia IPC - + Key Trace Traccia chiavi di registro - + GUI Trace Traccia GUI @@ -8274,28 +8269,28 @@ Nota: le impostazioni dei programmi e delle cartelle forzate nell'area virt Traccia chiamata API (richiede l'installazione di LogAPI nella cartella di Sandboxie Plus) - + Log all SetError's to Trace log (creates a lot of output) Sostituibile con "log di traccia", tuttavia "log di accesso" mi sembra più adatto per i non esperti Registra tutti i SetError nel log di accesso (genera molto output) - + File Trace Traccia file - + Pipe Trace Traccia pipe - + Access Tracing Log di accesso - + Log Debug Output to the Trace Log Sostituibile con "log di traccia", tuttavia "log di accesso" mi sembra più adatto per i non esperti Registra output di debug nel log di accesso @@ -8336,63 +8331,63 @@ Nota: le impostazioni dei programmi e delle cartelle forzate nell'area virt Mostra messaggio 2111 quando è negato l'accesso a un processo - + Triggers Attivazioni - + Event Evento - - - - + + + + Run Command Avvia comando - + Start Service Avvia servizio - + These events are executed each time a box is started Questi eventi vengono eseguiti a ogni avvio di un'area virtuale - + On Box Start Qui ho forzato di proposito un ritorno a capo per ragioni di lunghezza All'avvio<br />dell'area virtuale - - + + These commands are run UNBOXED just before the box content is deleted Questi comandi vengono eseguiti FUORI dall'area virtuale poco prima dell'eliminazione del contenuto - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Questi comandi vengono eseguiti solamente all'inizializzazione di un'area virtuale. Per eseguirli nuovamente, il contenuto dell'area virtuale dovrà essere rimosso. - + On Box Init Qui ho forzato di proposito un ritorno a capo per ragioni di lunghezza All'inizializzazione<br />dell'area virtuale - + Here you can specify actions to be executed automatically on various box events. È possibile specificare una lista di azioni che verranno eseguite automaticamente in base agli eventi dell'area virtuale. - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8414,73 +8409,73 @@ Queste opzioni impostano la maschera degli eventi a "*" - tutti gli ev Traccia chiamata di sistema Ntdll (genera molto output) - + Disable Resource Access Monitor Disattiva monitor di accesso risorse per quest'area virtuale - + Resource Access Monitor Monitor accesso risorse - + Network Firewall Firewall di rete - + Debug Debug - + WARNING, these options can disable core security guarantees and break sandbox security!!! ATTENZIONE! Queste opzioni possono disattivare le misure di sicurezza e compromettere la sicurezza dell'area virtuale!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Queste opzioni sono destinate al debug dei problemi di compatibilità, si prega di utilizzarle solo per scopi di test. - + App Templates Modelli applicazioni - + Filter Categories Filtra categorie - + Text Filter Cerca - + Add Template Aggiungi modello - + Category Categoria - + This list contains a large amount of sandbox compatibility enhancing templates Questo elenco contiene un gran numero di modelli di compatibilità software - + Template Folders Percorsi modelli - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8489,23 +8484,23 @@ Please note that this values are currently user specific and saved globally for I seguenti valori sono specifici per l'utente e salvati a livello globale per tutte le aree virtuali. - - + + Value Valore - + Accessibility Accessibilità - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Per compensare alla disabilitazione delle misure di protezione, consultare la pagina Limitazione dei diritti, nel gruppo Restrizioni. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Screen reader: JAWS, NVDA, Window-Eyes, System Access @@ -8515,37 +8510,37 @@ I seguenti valori sono specifici per l'utente e salvati a livello globale p Restrizioni - + Apply ElevateCreateProcess Workaround (legacy behaviour) Applica il workaround ElevateCreateProcess (legacy) - + Use desktop object workaround for all processes Usa il workaround dell'oggetto desktop per tutti i processi - + This command will be run before the box content will be deleted Questo comando verrà eseguito prima che il contenuto dell'area virtuale venga eliminato - + On File Recovery Al recupero dei file - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked Questo comando verrà eseguito prima del recupero di un file e il percorso del file passato come primo argomento. Se questo comando restituisce qualcosa di diverso da 0, il recupero viene bloccato - + Run File Checker Avvia controllo dei file - + On Delete Content Alla rimozione del<br />contenuto @@ -8556,7 +8551,7 @@ I seguenti valori sono specifici per l'utente e salvati a livello globale p - + Process Processo @@ -8565,69 +8560,69 @@ I seguenti valori sono specifici per l'utente e salvati a livello globale p Blocca anche l'accesso in lettura ai processi in questa area virtuale - + Add Option Aggiungi opzione - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Qui è possibile configurare opzioni avanzate per processo al fine di migliorare la compatibilità e/o personalizzare il comportamento dell'area virtuale. - + Option Opzione - + On Box Terminate - + DNS Request Logging - + Syscall Trace (creates a lot of output) - + Templates Modelli - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Le seguenti impostazioni consentono di usare Sandboxie in combinazione con i programmi per l'accesso facilitato. Tuttavia, alcune misure di protezione di Sandboxie vengono disabilitate quando queste impostazioni sono attive. - + Edit ini Section Qui ho forzato di proposito un ritorno a capo Modifica configurazione area virtuale - + Edit ini Modifica Sandboxie.ini - + Cancel Annulla - + Save Salva diff --git a/SandboxiePlus/SandMan/sandman_ja.ts b/SandboxiePlus/SandMan/sandman_ja.ts index 03c423f1..c2a31433 100644 --- a/SandboxiePlus/SandMan/sandman_ja.ts +++ b/SandboxiePlus/SandMan/sandman_ja.ts @@ -1405,9 +1405,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 @@ -1419,11 +1419,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs @@ -1609,7 +1609,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. @@ -1749,8 +1749,8 @@ Note: The update check is often behind the latest GitHub release to ensure that - - + + Allow @@ -2019,75 +2019,75 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Any - + TCP - + UDP - + ICMP - + Allow access - + Block using Windows Filtering Platform - + Block by denying access to Network devices - + Block (WFP) - + Block (NDev) - + A non empty program name is required. - + Block - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty @@ -6661,11 +6661,11 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - + + + + + Show Templates @@ -6673,7 +6673,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Action @@ -6685,9 +6685,9 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - + + + Program @@ -6737,7 +6737,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Prevent change to network and firewall parameters (user mode) @@ -6757,7 +6757,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Block network files and folders, unless specifically opened. @@ -6781,7 +6781,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Protect the system from sandboxed processes @@ -6796,7 +6796,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Network restrictions @@ -6821,15 +6821,15 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - - - - - + + + + + + + + + Remove @@ -6847,11 +6847,11 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - + + + + + Name 名前 @@ -6862,13 +6862,13 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Move Up 上に移動 - + Move Down 下に移動 @@ -6994,7 +6994,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Protect the sandbox integrity itself @@ -7036,7 +7036,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Process @@ -7501,7 +7501,7 @@ The process match level has a higher priority than the specificity and describes - + Network Firewall @@ -7537,14 +7537,14 @@ The process match level has a higher priority than the specificity and describes - + Port - - + + IP @@ -7554,340 +7554,335 @@ The process match level has a higher priority than the specificity and describes - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Other Options - + Port Blocking - + Block common SAMBA ports - + Block DNS, UDP port 53 - + File Recovery - + Quick Recovery - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. - + Add Folder フォルダを追加 - + Immediate Recovery 直接リカバリ - + You can exclude folders and file types (or file extensions) from Immediate Recovery. - + Ignore Extension - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. - + Ignore Folder - + Various Options - - + + Compatibility - + Apply ElevateCreateProcess Workaround (legacy behaviour) - + Emulate sandboxed window station for all processes - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) - + Force usage of custom dummy Manifest files (legacy behaviour) - + Use desktop object workaround for all processes - + Allow use of nested job objects (works on Windows 8 and later) - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + Dlls && Extensions - + Image Protection - + Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox - + Issue message 1305 when a program tries to load a sandboxed dll - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. - + Advanced Options - + Miscellaneous - + Add Option - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. - + Option - - + + Value - + Triggers - + On Box Terminate - + This command will be run before the box content will be deleted - - - - + + + + Run Command - + Event - - + + These commands are run UNBOXED just before the box content is deleted - + On File Recovery - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked - + Run File Checker - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. - + On Box Init - + Here you can specify actions to be executed automatically on various box events. - + These events are executed each time a box is started - + On Box Start - + Start Service - + On Delete Content @@ -7914,94 +7909,94 @@ This is done to prevent rogue processes inside the sandbox from creating a renam - + Hide Processes - + Add Process - + Don't allow sandboxed processes to see processes running in other boxes - + Hide host processes from processes running in the sandbox. - + Users - + Restrict Resource Access monitor to administrators only - + Add User - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. - + Tracing - + API call Trace (traces all SBIE hooks) - + Key Trace - + DNS Request Logging - + GUI Trace - + Log Debug Output to the Trace Log - + Log all SetError's to Trace log (creates a lot of output) - + Access Tracing - + Syscall Trace (creates a lot of output) - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8013,144 +8008,144 @@ instead of "*". - + Resource Access Monitor - + COM Class Trace - + Pipe Trace - + File Trace - + Disable Resource Access Monitor - + IPC Trace - + These commands are run UNBOXED after all processes in the sandbox have finished. - + Debug - + WARNING, these options can disable core security guarantees and break sandbox security!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. - + App Templates アプリテンプレート - + Templates - + This list contains a large amount of sandbox compatibility enhancing templates - + Text Filter - + Add Template - + Filter Categories - + Category - + Open Template - + Template Folders - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. - + Accessibility - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. - + Edit ini Section ini 編集セクション - + Edit ini ini を編集 - + Cancel キャンセル - + Save 保存 diff --git a/SandboxiePlus/SandMan/sandman_ko.ts b/SandboxiePlus/SandMan/sandman_ko.ts index cdf826de..f2be2c34 100644 --- a/SandboxiePlus/SandMan/sandman_ko.ts +++ b/SandboxiePlus/SandMan/sandman_ko.ts @@ -1746,11 +1746,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs 모든 프로그램 @@ -1761,9 +1761,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 그룹: %1 @@ -1798,7 +1798,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. 템플릿 값은 편집할 수 없습니다. @@ -2221,82 +2221,82 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Any 모두 - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access 액세스 허용 - + Block using Windows Filtering Platform Windows 필터링 플랫폼을 사용하여 차단 - + Block by denying access to Network devices 네트워크 장치에 대한 액세스를 거부하여 차단 - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow 허용 - + Block (WFP) 차단 (WFP) - + Block (NDev) 차단 (NDev) - + A non empty program name is required. 비어 있지 않은 프로그램 이름이 필요합니다. - + Block 차단 @@ -7168,7 +7168,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes 샌드박스 프로세스로부터 시스템 보호 @@ -7178,13 +7178,13 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Move Up 위로 이동 - + Move Down 아래로 이동 @@ -7329,12 +7329,12 @@ If you are a great patreaon supporter already, sandboxie can check online for an 인쇄 제한 - + Network restrictions 네트워크 제한 - + Block network files and folders, unless specifically opened. 특별히 열지 않는 한 네트워크 파일 및 폴더를 차단합니다. @@ -7357,11 +7357,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name 이름 @@ -7391,15 +7391,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove 제거 @@ -7465,11 +7465,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates 템플릿 표시 @@ -7519,7 +7519,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Windows 자격 증명 저장소 열기 (사용자 모드) - + Prevent change to network and firewall parameters (user mode) 네트워크 및 방화벽 매개 변수 (사용자 모드) 변경 방지 @@ -7707,9 +7707,9 @@ If leader processes are defined, all others are treated as lingering processes.< - - - + + + Program 프로그램 @@ -7717,20 +7717,20 @@ If leader processes are defined, all others are treated as lingering processes.< - + Action 동작 - + Port 포트 - - + + IP IP @@ -7740,7 +7740,7 @@ If leader processes are defined, all others are treated as lingering processes.< 프로토콜 - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. 주의: Windows 필터링 플랫폼이 드라이버에서 사용할 수 없으므로 이 규칙은 사용자 모드에서만 적용되며 강제 적용할 수 없습니다!!! 즉, 악성 프로그램이 이를 무시할 수 있습니다. @@ -7791,47 +7791,47 @@ You can use 'Open for All' instead to make it apply to all programs, o COM 개체 추가 - + File Recovery 파일 복구 - + Add Folder 폴더 추가 - + Ignore Extension 확장자 무시 - + Ignore Folder 폴더 무시 - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. 파일이 생성되는 즉시 복구할 수 있도록 즉시 복구 프롬프트를 실행합니다. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. 즉시 복구에서 폴더 및 파일 유형 (또는 파일 확장자)을 제외할 수 있습니다. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. 빠른 복구 기능이 호출되면 샌드박스 내용에 대해 다음 폴더가 확인됩니다. - + Advanced Options 고급 옵션 - + Miscellaneous 기타 @@ -7852,7 +7852,7 @@ You can use 'Open for All' instead to make it apply to all programs, o - + Protect the sandbox integrity itself 샌드박스 무결성 자체 보호 @@ -7877,7 +7877,7 @@ You can use 'Open for All' instead to make it apply to all programs, o 샌드박스 격리 - + Force usage of custom dummy Manifest files (legacy behaviour) 사용자 지정 더미 매니페스트 파일 강제 사용 (레거시 동작) @@ -7941,8 +7941,8 @@ The process match level has a higher priority than the specificity and describes 권한 있는 프로세스만 서비스 제어 관리자에 액세스할 수 있도록 허용 - - + + Compatibility 호환성 @@ -7956,12 +7956,12 @@ The process match level has a higher priority than the specificity and describes 작업 개체에 샌드박스 프로세스 추가 (권장) - + Emulate sandboxed window station for all processes 모든 프로세스에 대해 샌드박스 창 스테이션 에뮬레이트 - + Allow use of nested job objects (works on Windows 8 and later) 중첩된 작업 개체 사용 허용 (Windows 8 이상에서 작동) @@ -8031,7 +8031,7 @@ The process match level has a higher priority than the specificity and describes COM/RPC - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) 기본적으로 RpcMgmtSetComTimeout 사용 안 함 (호환성 문제가 해결될 수 있음) @@ -8060,41 +8060,41 @@ The process match level has a higher priority than the specificity and describes 액세스 격리 - + Triggers 트리거 - + Event 이벤트 - - - - + + + + Run Command 명령 실행 - + Start Service 서비스 시작 - + These events are executed each time a box is started 이 이벤트는 박스가 시작될 때마다 실행됩니다 - + On Box Start 박스 시작 시 - - + + These commands are run UNBOXED just before the box content is deleted 이 명령은 박스 내용이 삭제되기 직전에 UNBOXED로 실행됩니다 @@ -8103,32 +8103,32 @@ The process match level has a higher priority than the specificity and describes 박스 삭제 시 - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. 이러한 명령은 박스가 초기화될 때만 실행됩니다. 다시 실행하려면 박스 내용을 삭제해야 합니다. - + On Box Init 박스 초기화 시 - + Here you can specify actions to be executed automatically on various box events. 여기서 다양한 박스 이벤트에 대해 자동으로 실행할 동작을 지정할 수 있습니다. - + Hide Processes 프로세스 숨기기 - + Add Process 프로세스 추가 - + Hide host processes from processes running in the sandbox. 샌드박스에서 실행 중인 프로세스에서 호스트 프로세스를 숨깁니다. @@ -8177,40 +8177,40 @@ The process match level has a higher priority than the specificity and describes 액세스 격리 - + Image Protection 이미지 보호 - + Issue message 1305 when a program tries to load a sandboxed dll 프로그램이 샌드박스된 dll을 로드하려고 할 때 1305 메시지 발생 - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox 호스트에 설치된 샌드박스 프로그램이 샌드박스에서 DLL을 로드하지 못하도록 방지 - + Dlls && Extensions Dll 및 확장자 - + Description 설명 - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. 샌드박스의 리소스 액세스 규칙은 샌드박스 내부에 있는 프로그램 이진 파일을 차별하는 경우가 많습니다. OpenFilePath 및 OpenKeyPath는 호스트에 기본적으로 있는 응용 프로그램 이진 파일에만 작동합니다. 이 제한이 없는 규칙을 정의하려면 OpenPipePath 또는 OpenConfPath를 사용해야 합니다. 마찬가지로 모두 닫힘 (파일|키|Ipc)예를 들어 ‘ClosedFilePath=! iexplore.exe,C:Users*'는 샌드박스 내에 있는 이진 파일의 경우 항상 닫혀 있습니다. 두 제한 정책 모두 "액세스 정책" 페이지에서 사용 불가능으로 설정할 수 있습니다. 이 작업은 샌드박스 내부의 악성 프로세스가 자신의 이름이 변경된 복사본을 생성하여 보호된 리소스에 액세스하는 것을 방지하기 위해 수행됩니다. 또 다른 공격 벡터는 라이브러리가 액세스할 수 있는 모든 항목에 액세스하기 위해 승인된 프로세스에 라이브러리를 주입하는 것입니다. 호스트 이미지 보호를 사용하면 샌드박스 내부에서 실행 중인 응용 프로그램 (호스트에 설치)이 샌드박스 자체에서 라이브러리를 로드하지 못하도록 차단하여 이러한 문제를 방지할 수 있습니다. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. Sandboxies 기능은 SbieDll.dll에 의해 시작할 때 각 샌드박스 프로세스에 로드될 수 있는 옵션 DLL을 사용하여 향상될 수 있습니다. 전역 설정의 애드온 관리자는 몇 가지 유용한 확장 기능을 제공합니다. 일단 설치되면 현재 박스에 대해 활성화할 수 있습니다. @@ -8498,57 +8498,57 @@ To specify a process use '$:program.exe' as path. 네트워크 옵션 - + Other Options 기타 옵션 - + Port Blocking 포트 차단 - + Block common SAMBA ports 공통 SAMBA 포트 차단 - + Block DNS, UDP port 53 DNS, UDP 포트 53 차단 - + Quick Recovery 빠른 복구 - + Immediate Recovery 즉시 복구 - + Various Options 다양한 옵션 - + Apply ElevateCreateProcess Workaround (legacy behaviour) ElevateCreateProcess 해결 방법 적용 (레거시 동작) - + Use desktop object workaround for all processes 모든 프로세스에 대해 데스크톱 개체 해결 방법 사용 - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. 전역 단축키를 짧게 3번 누르면 이 예외가 무시됩니다. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. "모든 프로세스 종료"가 호출될 때 이 샌드박스가 종료되지 않도록 제외합니다. @@ -8557,38 +8557,38 @@ To specify a process use '$:program.exe' as path. 이 명령은 샌드박스의 모든 프로세스가 완료된 후에 실행됩니다. - + On Box Terminate 박스 종료 시 - + This command will be run before the box content will be deleted 박스 내용이 삭제되기 전에 이 명령이 실행됩니다 - + On File Recovery 파일 복구 시 - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked 이 명령은 파일을 복구하기 전에 실행되며 파일 경로가 첫 번째 인수로 전달됩니다. 이 명령이 0이 아닌 다른 것을 반환하는 경우 복구가 차단됩니다 - + Run File Checker 파일 검사 실행 - + On Delete Content 콘텐츠 삭제 시 - + Don't allow sandboxed processes to see processes running in other boxes 샌드박스 프로세스에서 다른 박스에서 실행 중인 프로세스 보기 허용 안 함 @@ -8599,7 +8599,7 @@ To specify a process use '$:program.exe' as path. - + Process 프로세스 @@ -8608,22 +8608,22 @@ To specify a process use '$:program.exe' as path. 이 샌드박스의 프로세스에 대한 읽기 액세스도 차단 - + Users 사용자 - + Restrict Resource Access monitor to administrators only 리소스 액세스 모니터를 관리자로만 제한 - + Add User 사용자 추가 - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8632,23 +8632,23 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to 참고: 샌드박스에 대한 강제 프로그램 및 강제 폴더 설정은 샌드박스를 사용할 수 없는 사용자 계정에는 적용되지 않습니다. - + Add Option 옵션 추가 - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. 여기서 호환성 향상 및/또는 샌드박스 동작을 사용자 정의하도록 고급 프로세스별 옵션을 구성할 수 있습니다. - + Option 옵션 - + Tracing 추적 @@ -8658,22 +8658,22 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to API 호출 추적 (Sbie 디렉터리에 LogAPI를 설치해야 함) - + Pipe Trace 파이프 추적 - + Log all SetError's to Trace log (creates a lot of output) 모든 SetError를 추적 로그에 기록 (많은 출력을 생성) - + Log Debug Output to the Trace Log 추적 로그에 디버그 출력 기록 - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8696,78 +8696,78 @@ instead of "*". Ntdll syscall 추적 (많은 출력을 생성합니다) - + File Trace 파일 추적 - + Disable Resource Access Monitor 리소스 액세스 모니터 사용 안 함 - + IPC Trace IPC 추적 - + GUI Trace GUI 추적 - + Resource Access Monitor 리소스 액세스 모니터 - + Access Tracing 액세스 추적 - + COM Class Trace COM 클래스 추적 - + Key Trace 키 추적 - + Network Firewall 네트워크 방화벽 - + These commands are run UNBOXED after all processes in the sandbox have finished. 이러한 명령은 샌드박스의 모든 프로세스가 완료된 후 언박스 상태로 실행됩니다. - + API call Trace (traces all SBIE hooks) API 호출 추적 (모든 SBIE 후크 추적) - + Debug 디버그 - + WARNING, these options can disable core security guarantees and break sandbox security!!! 경고, 이러한 옵션은 핵심 보안 보장을 비활성화하고 샌드박스 보안을 파괴할 수 있습니다!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. 이러한 옵션은 호환성 문제를 디버깅하기 위한 것이므로 프로덕션에서 사용하지 마십시오. - + App Templates 앱 템플릿 @@ -8776,22 +8776,22 @@ instead of "*". 템플릿 호환성 - + Filter Categories 필터 범주 - + Text Filter 텍스트 필터 - + Add Template 템플릿 추가 - + This list contains a large amount of sandbox compatibility enhancing templates 이 목록에는 많은 양의 샌드박스 호환성 향상 템플릿이 포함되어 있습니다 @@ -8800,17 +8800,17 @@ instead of "*". 템플릿 제거 - + Category 범주 - + Template Folders 템플릿 폴더 - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8819,134 +8819,129 @@ Please note that this values are currently user specific and saved globally for 이 값은 현재 사용자마다 다르며 모든 박스에 대해 전역으로 저장됩니다. - - + + Value - + Accessibility 접근성 - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. 손실된 보호를 보상하려면 제한 설정 그룹의 삭제 권한 설정 페이지를 참조하십시오. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access 화면 판독기: JAWS, NVDA, Window-Eyes, 시스템 액세스 - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + DNS Request Logging Dns Request Logging DNS 요청 로깅 - + Syscall Trace (creates a lot of output) Syscall 추적 (출력이 많이 생성됨) - + Templates 템플릿 - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. 다음 설정은 내게 필요한 옵션 소프트웨어와 함께 Sandboxie를 사용할 수 있도록 합니다. 이러한 설정이 적용되면 일부 Sandboxie 보호 기능이 손실됩니다. - + Edit ini Section 이 섹션 편집 - + Edit ini ini 편집 - + Cancel 취소 - + Save 저장 diff --git a/SandboxiePlus/SandMan/sandman_nl.ts b/SandboxiePlus/SandMan/sandman_nl.ts index 14fde007..a3475a46 100644 --- a/SandboxiePlus/SandMan/sandman_nl.ts +++ b/SandboxiePlus/SandMan/sandman_nl.ts @@ -1638,11 +1638,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs Alle programma's @@ -1653,9 +1653,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 Groep: %1 @@ -1690,7 +1690,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. Sjabloonwaarden kunnen niet worden bewerkt. @@ -2109,82 +2109,82 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Any Elke - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Toegang toestaan - + Block using Windows Filtering Platform Blokkeren met Windows Filtering Platform - + Block by denying access to Network devices Blokkeren door toegang tot netwerkapparaten te weigeren - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Toestaan - + Block (WFP) Blokkeren (WFP) - + Block (NDev) Blokkeren (NDev) - + A non empty program name is required. - + Block Blokkeren @@ -6975,7 +6975,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes Het systeem beschermen tegen gesandboxte processen @@ -7120,12 +7120,12 @@ If you are a great patreaon supporter already, sandboxie can check online for an Afdrukbeperkingen - + Network restrictions Netwerkbeperkingen - + Block network files and folders, unless specifically opened. Netwerkbestanden en -mappen blokkeren, tenzij ze specifiek worden geopend. @@ -7148,11 +7148,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name Naam @@ -7182,15 +7182,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove Verwijderen @@ -7265,11 +7265,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates Sjablonen weergeven @@ -7323,7 +7323,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Windows Credentials Store openen (gebruikersmodus) - + Prevent change to network and firewall parameters (user mode) Wijziging aan netwerk- en firewall-parameters voorkomen (gebruikersmodus) @@ -7526,13 +7526,13 @@ Als leidende processen gedefinieerd zijn, worden alle andere als achterblijvende - + Move Up Omhoog verplaatsen - + Move Down Omlaag verplaatsen @@ -7603,49 +7603,49 @@ Als leidende processen gedefinieerd zijn, worden alle andere als achterblijvende - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + Image Protection - + Issue message 1305 when a program tries to load a sandboxed dll - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox - + Dlls && Extensions - + Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. @@ -7879,9 +7879,9 @@ To specify a process use '$:program.exe' as path. - - - + + + Program Programma @@ -7889,20 +7889,20 @@ To specify a process use '$:program.exe' as path. - + Action Actie - + Port Poort - - + + IP IP @@ -7912,7 +7912,7 @@ To specify a process use '$:program.exe' as path. Protocol - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. WAARSCHUWING: Windows Filtering Platform is niet ingeschakeld met de driver. Daardoor zullen deze regels alleen toegepast worden in gebruikersmodus en kunnen ze niet geforceerd worden! Dit betekent dat kwaadaardige toepassingen ze kunnen omzeilen. @@ -7959,57 +7959,57 @@ U kunt in plaats daarvan 'open voor iedereen' gebruiken om het op alle COM-object toevoegen - + File Recovery Bestandsherstel - + Quick Recovery - + Add Folder Map toevoegen - + Immediate Recovery - + Ignore Extension Extensie negeren - + Ignore Folder Map negeren - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Inschakelen dat onmiddellijk herstel bestanden kan herstellen van zodra ze aangemaakt worden. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. U kunt mappen en bestandstypes (of bestandextensies) uitsluiten van onmiddellijk herstel. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Wanneer de snel-herstel-functie ingeroepen wordt, worden de volgende mappen gecontroleerd op gesandboxte inhoud. - + Advanced Options Geavanceerde opties - + Miscellaneous Diverse @@ -8030,7 +8030,7 @@ U kunt in plaats daarvan 'open voor iedereen' gebruiken om het op alle - + Protect the sandbox integrity itself Integriteit van de sandbox zelf beschermen @@ -8055,7 +8055,7 @@ U kunt in plaats daarvan 'open voor iedereen' gebruiken om het op alle Sandbox-isolatie - + Force usage of custom dummy Manifest files (legacy behaviour) Gebruik van aangepaste dummy-manifest-bestanden forceren (oud gedrag) @@ -8119,8 +8119,8 @@ Het proces-overeenstemmingsniveau heeft een hogere prioriteit dan de specificite Alleen processen met rechten toegang geven tot de Service Control Manager - - + + Compatibility Compatibiliteit @@ -8134,12 +8134,12 @@ Het proces-overeenstemmingsniveau heeft een hogere prioriteit dan de specificite Gesandboxte processen aan job-objecten toevoegen (aanbevolen) - + Emulate sandboxed window station for all processes Gesandboxt venster station emuleren voor alle processen - + Allow use of nested job objects (works on Windows 8 and later) Allow use of nested job objects (experimental, works on Windows 8 and later) Gebruik van geneste job-objecten toestaan (experimenteel, wekt op Windows 8 en later) @@ -8206,7 +8206,7 @@ Het proces-overeenstemmingsniveau heeft een hogere prioriteit dan de specificite COM/RPC - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Het gebruik van RpcMgmtSetComTimeout standaard uitschakelen (dit kan compatibiliteitsproblemen oplossen) @@ -8235,41 +8235,41 @@ Het proces-overeenstemmingsniveau heeft een hogere prioriteit dan de specificite Toegangsisolatie - + Triggers Triggers - + Event Gebeurtenis - - - - + + + + Run Command Opdracht uitvoeren - + Start Service Service starten - + These events are executed each time a box is started Deze gebeurtenissen worden uitgevoerd telkens wanneer een box wordt gestart - + On Box Start Bij starten van box - - + + These commands are run UNBOXED just before the box content is deleted Deze opdrachten worden NIET-GEBOXT uitgevoerd vlak voordat de inhoud van de box verwijderd wordt @@ -8278,52 +8278,52 @@ Het proces-overeenstemmingsniveau heeft een hogere prioriteit dan de specificite Bij verwijderen van box - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Deze opdrachten worden alleen uitgevoerd wanneer een box geïnitialiseerd wordt. Om ze opnieuw te laten uitvoeren, moet de inhoud van de box verwijderd worden. - + On Box Init Bij initialisatie van de box - + Here you can specify actions to be executed automatically on various box events. Hier kunt u aangeven welke acties automatisch moeten worden uitgevoerd bij diverse boxgebeurtenissen. - + Hide Processes Processen verbergen - + Add Process Processen toevoegen - + Hide host processes from processes running in the sandbox. Host-processen verbergen van processen die in de sandbox worden uitgevoerd. - + Don't allow sandboxed processes to see processes running in other boxes Gesandboxte processen niet toestaan om processen te zien die in andere boxen worden uitgevoerd - + Users Gebruikers - + Restrict Resource Access monitor to administrators only Brontoegang-monitor beperken tot alleen administrators - + Add User Gebruiker toevoegen @@ -8332,7 +8332,7 @@ Het proces-overeenstemmingsniveau heeft een hogere prioriteit dan de specificite Gebruiker verwijderen - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8341,23 +8341,23 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Opmerking: Instellingen voor geforceerde programma's en geforceerde mappen voor een zandbak zijn niet van toepassing op gebruikersaccounts die de zandbak niet kunnen gebruiken. - + Add Option - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. - + Option - + Tracing Traceren @@ -8367,22 +8367,22 @@ Opmerking: Instellingen voor geforceerde programma's en geforceerde mappen API call trace (logapi moet geïnstalleerd zijn in de sbie-map) - + Pipe Trace Pipe-trace - + Log all SetError's to Trace log (creates a lot of output) Alle SetErrors loggen naar trace-log (maakt veel uitvoer aan) - + Log Debug Output to the Trace Log Debug-uitvoer naar de trace-log loggen - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8405,78 +8405,78 @@ in plaats van "*". Ntdll syscall Trace (maakt veel uitvoer aan) - + File Trace Bestand-trace - + Disable Resource Access Monitor Brontoegang-monitor uitschakelen - + IPC Trace IPC-trace - + GUI Trace GUI-trace - + Resource Access Monitor Brontoegang-monitor - + Access Tracing Toegang-tracing - + COM Class Trace COM Class trace - + Key Trace Key-trace - + Network Firewall Netwerk-firewall - + These commands are run UNBOXED after all processes in the sandbox have finished. - + Syscall Trace (creates a lot of output) - + Debug Debug - + WARNING, these options can disable core security guarantees and break sandbox security!!! WAARSCHUWING, deze opties kunnen kernbeveiligingsgaranties uitschakelen en sandbox-beveiliging breken! - + These options are intended for debugging compatibility issues, please do not use them in production use. Deze opties zijn bedoeld voor het debuggen van compatibiliteitsproblemen, gebruik ze niet in productiegebruik. - + App Templates App-sjablonen @@ -8485,22 +8485,22 @@ in plaats van "*". Compatibiliteit-sjablonen - + Filter Categories Filter categorieën - + Text Filter Tekstfilter - + Add Template Sjabloon toevoegen - + This list contains a large amount of sandbox compatibility enhancing templates Deze lijst bevat een groot aantal sjablonen om sandbox-compatibiliteit te verbeteren @@ -8509,17 +8509,17 @@ in plaats van "*". Sjabloon verwijderen - + Category Categorie - + Template Folders Sjabloonmappen - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8528,23 +8528,23 @@ Please note that this values are currently user specific and saved globally for Merk op dat deze waarden momenteel gebruikersspecifiek zijn en globaal worden opgeslagen voor alle boxen. - - + + Value Waarde - + Accessibility Toegankelijkheid - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Om te compenseren voor de verloren bescherming, raadpleeg de "rechten ontnemen"-instellingenpagina in de beperking-instellingen-groep. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Schermlezers: JAWS, NVDA, Window-Eyes, System Access @@ -8554,43 +8554,43 @@ Merk op dat deze waarden momenteel gebruikersspecifiek zijn en globaal worden op - + Various Options - + Apply ElevateCreateProcess Workaround (legacy behaviour) - + Use desktop object workaround for all processes - + This command will be run before the box content will be deleted - + On File Recovery - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked - + Run File Checker - + On Delete Content @@ -8628,142 +8628,137 @@ Merk op dat deze waarden momenteel gebruikersspecifiek zijn en globaal worden op - + Process Proces - + Other Options - + Port Blocking - + Block common SAMBA ports - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Block DNS, UDP port 53 - + On Box Terminate - + API call Trace (traces all SBIE hooks) - + DNS Request Logging - + Templates - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. De volgende instellingen schakelen het gebruik van Sandboxie in combinatie met toegankelijkheidssoftware in. Merk op dat sommige beschermingsmaatregelen van Sandboxie noodzakelijk verloren gaan wanneer deze instellingen van toepassing zijn. - + Edit ini Section Ini-sectie bewerken - + Edit ini Ini bewerken - + Cancel Annuleren - + Save Opslaan diff --git a/SandboxiePlus/SandMan/sandman_pl.ts b/SandboxiePlus/SandMan/sandman_pl.ts index 0fa50893..11ae69cc 100644 --- a/SandboxiePlus/SandMan/sandman_pl.ts +++ b/SandboxiePlus/SandMan/sandman_pl.ts @@ -1997,9 +1997,9 @@ Uwaga: Sprawdzanie aktualizacji często pomija najnowsze wydania GitHub, aby zap - - - + + + Group: %1 Grupa: %1 @@ -2205,11 +2205,11 @@ Uwaga: Sprawdzanie aktualizacji często pomija najnowsze wydania GitHub, aby zap - - - - - + + + + + All Programs Wszystkie programy @@ -2244,7 +2244,7 @@ Uwaga: Sprawdzanie aktualizacji często pomija najnowsze wydania GitHub, aby zap - + Template values can not be edited. Wartości szablonów nie mogą być zmienione. @@ -2373,82 +2373,82 @@ Wybierz folder, który zawiera ten plik. - + Any każdy - + TCP - + UDP - + ICMP - + Allow access Zezwól na dostęp - + Block using Windows Filtering Platform Blokuj przy użyciu platformy filtrowania systemu Windows - + Block by denying access to Network devices Blokuj, odmawiając dostępu do urządzeń sieciowych - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Pozwól - + Block (WFP) Blokada (WFP) - + Block (NDev) Blokada (NDev) - + A non empty program name is required. Wymagana jest niepusta nazwa programu. - + Block Blokada @@ -7206,7 +7206,7 @@ Jeśli jesteś już Wielkim Wspierającym na Patreon, Sandboxie może sprawdzić - + Block network files and folders, unless specifically opened. Zablokuj dostęp do dysków sieciowych, chyba że specjalnie dopuszczone. @@ -7235,7 +7235,7 @@ Jeśli jesteś już Wielkim Wspierającym na Patreon, Sandboxie może sprawdzić - + Protect the system from sandboxed processes Chroń system przed programami w piaskownicy @@ -7268,11 +7268,11 @@ Jeśli jesteś już Wielkim Wspierającym na Patreon, Sandboxie może sprawdzić - - - - - + + + + + Name Nazwa @@ -7302,15 +7302,15 @@ Jeśli jesteś już Wielkim Wspierającym na Patreon, Sandboxie może sprawdzić - - - - - - - - - + + + + + + + + + Remove Usuń @@ -7367,7 +7367,7 @@ Jeśli jesteś już Wielkim Wspierającym na Patreon, Sandboxie może sprawdzić Spraw, by aplikacje uznały, że działają z podwyższonym poziomem uprawnień (umożliwia bezpieczne uruchamianie instalatorów) - + Network restrictions Ograniczenia sieciowe @@ -7488,11 +7488,11 @@ Jeśli jesteś już Wielkim Wspierającym na Patreon, Sandboxie może sprawdzić - - - - - + + + + + Show Templates Pokaż szablony @@ -7550,7 +7550,7 @@ Jeśli jesteś już Wielkim Wspierającym na Patreon, Sandboxie może sprawdzić Otwórz Windows Credentials Store (tryb użytkownika) - + Prevent change to network and firewall parameters (user mode) Zapobiegaj zmianom parametrów sieci i zapory (tryb użytkownika) @@ -7661,9 +7661,9 @@ Jeśli zdefiniowane są procesy wiodące, wszystkie inne są traktowane jako pro - - - + + + Program Program @@ -7703,47 +7703,47 @@ Jeśli zdefiniowane są procesy wiodące, wszystkie inne są traktowane jako pro Dodaj ścieżkę IPC - + File Recovery Przywracanie plików - + Add Folder Dodaj folder - + Ignore Extension Ignoruj rozszerzenie pliku - + Ignore Folder Ignoruj folder - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Włącz monit Natychmiastowego Przywracania, aby móc odzyskać pliki zaraz po ich utworzeniu. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Możesz wykluczyć foldery i typy plików (lub rozszerzenia plików) z Natychmiastowego Odzyskiwania. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Po wywołaniu funkcji szybkiego odzyskiwania następujące foldery zostaną sprawdzone pod kątem zawartości w piaskownicy. - + Advanced Options Opcje zaawansowane - + Miscellaneous Różne @@ -7759,7 +7759,7 @@ Jeśli zdefiniowane są procesy wiodące, wszystkie inne są traktowane jako pro - + Protect the sandbox integrity itself Chroń integralność piaskownicy @@ -7793,13 +7793,13 @@ Jeśli zdefiniowane są procesy wiodące, wszystkie inne są traktowane jako pro Dodaj procesy w piaskownicy do obiektów zadań (zalecane) - + Force usage of custom dummy Manifest files (legacy behaviour) Wymuś użycie niestandardowych fałszywych plików manifestu (zachowanie starszego typu) - - + + Compatibility Zgodność @@ -7816,42 +7816,42 @@ Jeśli zdefiniowane są procesy wiodące, wszystkie inne są traktowane jako pro Tutaj można określić listę poleceń do wykonania przy inicjalizacji pustej piaskownicy. - + Hide Processes Ukryj procesy - + Add Process Dodaj proces - + Hide host processes from processes running in the sandbox. Ukryj procesy hosta piaskownicy przed procesami działającymi w piaskownicy. - + Don't allow sandboxed processes to see processes running in other boxes Nie zezwalaj procesom w trybie piaskownicy widzieć procesów działających w innych boksach - + These commands are run UNBOXED after all processes in the sandbox have finished. - + Users Użytkownicy - + Restrict Resource Access monitor to administrators only Ogranicz dostęp do monitora dostępu do zasobów tylko dla administratorów - + Add User Dodaj użytkownika @@ -7860,7 +7860,7 @@ Jeśli zdefiniowane są procesy wiodące, wszystkie inne są traktowane jako pro Usuń użytkownika - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -7869,47 +7869,47 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Uwaga: ustawienia Wymuszonych Programów i Wymuszania Folderów dla piaskownicy nie mają zastosowania do kont użytkowników, które nie mogą korzystać z piaskownicy. - + Tracing Śledzenie - + GUI Trace Śledzenie GUI - + IPC Trace Śledzenie IPC - + Pipe Trace Śledzenie pipe - + Access Tracing Śledzenie dostępów - + Log Debug Output to the Trace Log Rejestruj dane wyjściowe debugowania w dzienniku śledzenia - + File Trace Śledzenie plikow - + Key Trace Śledzenie kluczy - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -7928,12 +7928,12 @@ Możesz dostosować rejestrowanie za pomocą ini, określając zamiast "*". - + COM Class Trace Śledzenie klas COM - + Emulate sandboxed window station for all processes Emuluj piaskownicę dla wszystkich procesów @@ -7946,38 +7946,38 @@ zamiast "*". Izolacja dostępu - + Apply ElevateCreateProcess Workaround (legacy behaviour) Zastosuj obejście ElevateCreateProcess (starsze zachowanie) - + Use desktop object workaround for all processes Użyj obejścia dla obiektów pulpitu dla wszystkich procesów - + This command will be run before the box content will be deleted To polecenie zostanie uruchomione zanim zawartość boksu zostanie usunięta - + On File Recovery O odzyskiwaniu plików - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked To polecenie zostanie uruchomione przed odzyskaniem pliku i ścieżka do pliku zostanie przekazana jako pierwszy argument, jeśli to polecenie zwrócić coś innego niż 0 odzyskanie zostanie zablokowane - + Run File Checker Uruchom sprawdzanie plików - + On Delete Content Uruchom, Usuń zawartość @@ -7988,7 +7988,7 @@ zamiast "*". - + Process Proces @@ -7997,7 +7997,7 @@ zamiast "*". Zablokuj również dostęp do odczytu procesów w tej piaskownicy - + Add Option Dodaj opcję @@ -8006,7 +8006,7 @@ zamiast "*". Tutaj możesz skonfigurować zaawansowane opcje dla każdego procesu, aby poprawić kompatybilność i/lub dostosować zachowanie piaskownicy. - + Option Opcja @@ -8016,7 +8016,7 @@ zamiast "*". Śledzenie wywołań API (wymaga zainstalowania logapi w katalogu sbie) - + Log all SetError's to Trace log (creates a lot of output) Rejestruj wszystkie błędy SetError do dziennika śledzenia (tworzy dużo danych wyjściowych) @@ -8025,28 +8025,28 @@ zamiast "*". Śledzenie Ntdll syscall (tworzy dużo danych wyjściowych) - + DNS Request Logging Dns Request Logging Rejestrowanie żądań DNS - + Debug Debug - + WARNING, these options can disable core security guarantees and break sandbox security!!! UWAGA, te opcje mogą wyłączyć podstawowe gwarancje bezpieczeństwa i złamać zabezpieczenia sandboxa! - + These options are intended for debugging compatibility issues, please do not use them in production use. Te opcje są przeznaczone do debugowania problemów z kompatybilnością, proszę nie używać ich w zastosowaniach produkcyjnych. - + App Templates Dodaj szablony @@ -8055,17 +8055,17 @@ zamiast "*". Szablony zgodności - + Filter Categories Filtruj kategorie - + Text Filter Filtruj text - + Add Template Dodaj szablon @@ -8074,12 +8074,12 @@ zamiast "*". Usuń szablon - + Category Kategoria - + This list contains a large amount of sandbox compatibility enhancing templates Ta lista zawiera dużą ilość szablonów poprawiających kompatybilność z piaskownicą @@ -8158,33 +8158,33 @@ zamiast "*". Izolacja dostępu - + Image Protection Ochrona obrazu - + Issue message 1305 when a program tries to load a sandboxed dll Problem z komunikatem 1305, gdy program próbuje załadować bibliotekę DLL w trybie piaskownicy - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox Zapobieganie ładowaniu dll'ów z piaskownicy przez programy zainstalowane na hoście - + Dlls && Extensions Dll-e && Rozszerzenia - + Description Opis - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Zasady dostępu do zasobów Sandboxa często dyskryminują binarki programów znajdujących się wewnątrz piaskownicy. OpenFilePath i OpenKeyPath działają tylko dla binarek aplikacji znajdujących się natywnie na hoście. Aby zdefiniować regułę bez tego ograniczenia, należy użyć OpenPipePath lub OpenConfPath. Podobnie, wszystkie dyrektywy Closed(File|Key|Ipc)Path, które są zdefiniowane przez negację np. 'ClosedFilePath=! iexplore.exe,C:Users*' będą zawsze zamknięte dla binariów znajdujących się wewnątrz sandboxa. Obie polityki ograniczeń mogą być wyłączone na stronie "Zasady dostępu". @@ -8477,7 +8477,7 @@ Aby określić proces, użyj jako ścieżki '$:program.exe'. - + Action Akcja @@ -8560,13 +8560,13 @@ Aby określić proces, użyj jako ścieżki '$:program.exe'. - + Move Up Przesuń w górę - + Move Down Przesuń w dół @@ -8577,14 +8577,14 @@ Aby określić proces, użyj jako ścieżki '$:program.exe'. - + Port Port - - + + IP IP @@ -8594,27 +8594,27 @@ Aby określić proces, użyj jako ścieżki '$:program.exe'.Protokół - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. UWAGA: Platforma filtrowania Windows nie jest włączona w sterowniku, dlatego te reguły będą stosowane tylko w trybie użytkownika i nie mogą być egzekwowane! Oznacza to, że złośliwe aplikacje mogą je ominąć. - + Quick Recovery Szybkie odzyskiwanie - + Immediate Recovery Natychmiastowe Przywracanie - + Various Options Różne opcje - + Allow use of nested job objects (works on Windows 8 and later) Allow use of nested job objects (experimental, works on Windows 8 and later) Zezwalaj na używanie zagnieżdżonych obiektów zadań (eksperymentalne, działa od Windows 8 i w następnych) @@ -8758,7 +8758,7 @@ Poziom dopasowania do procesu ma wyższy priorytet niż specyfika i opisuje spos COM/RPC - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Wyłączenie domyślnego użycia RpcMgmtSetComTimeout (może rozwiązać problemy z kompatybilnością) @@ -8796,41 +8796,41 @@ Poziom dopasowania do procesu ma wyższy priorytet niż specyfika i opisuje spos Poniższe opcje mogą być bezpiecznie użyte, gdy nie nadano uprawnień administratora. - + Triggers Wyzwalacze - + Event Zdarzenie - - - - + + + + Run Command Uruchom polecenie - + Start Service Uruchom usługę - + These events are executed each time a box is started Zdarzenia te wykonywane są za każdym razem, gdy uruchamiany jest boks - + On Box Start Włącz w start boksu - - + + These commands are run UNBOXED just before the box content is deleted Te polecenia uruchamiane są tuż przed usunięciem zawartości boksu @@ -8839,43 +8839,43 @@ Poziom dopasowania do procesu ma wyższy priorytet niż specyfika i opisuje spos Przy usuwaniu boksu - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Polecenia te wykonywane są tylko wtedy, gdy boks jest inicjalizowany. Aby je ponownie uruchomić, należy usunąć zawartość boksu. - + On Box Init Włącz w Init boksu - + Here you can specify actions to be executed automatically on various box events. W tym miejscu można określić akcje, które mają być wykonywane automatycznie w przypadku różnych zdarzeń w boksie. - + Disable Resource Access Monitor Wyłącz monitor dostępu do zasobów - + Resource Access Monitor Monitor dostępu do zasobów - + Network Firewall Zapora sieciowa - + Template Folders Foldery szablonów - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8884,179 +8884,174 @@ Please note that this values are currently user specific and saved globally for Należy pamiętać, że te wartości są obecnie specyficzne dla użytkownika i zapisywane globalnie dla wszystkich boksów. - - + + Value Wartość - + Accessibility Dostępność - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Aby zrekompensować utratę ochrony, zapoznaj się ze stroną ustawień Usuwania Uprawnień w grupie ustawień Ograniczenia. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Czytniki ekranu: JAWS, NVDA, Window-Eyes, System Access - + Other Options - + Port Blocking - + Block common SAMBA ports - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Block DNS, UDP port 53 - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. Gdy globalny klawisz skrótu zostanie naciśnięty 3 razy w krótkim odstępie czasu, wyjątek ten zostanie zignorowany. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. Wyklucza tę piaskownicę z zakończenia po wywołaniu opcji "Zakończ wszystkie procesy". - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. Funkcjonalność Sandboxie można rozszerzyć za pomocą opcjonalnych bibliotek DLL, które mogą być ładowane do każdego procesu sandboxie podczas uruchamiania przez plik SbieDll.dll, menedżer dodatków w ustawieniach globalnych oferuje kilka przydatnych rozszerzeń, po zainstalowaniu można je tutaj włączyć dla bieżącej skrzynki. - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Tutaj można skonfigurować zaawansowane opcje dla poszczególnych procesów, aby poprawić zgodność i/lub dostosować zachowanie piaskownicy. - + On Box Terminate - + API call Trace (traces all SBIE hooks) - + Syscall Trace (creates a lot of output) Syscall Trace (tworzy dużo danych wyjściowych) - + Templates Szablony - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Poniższe ustawienia umożliwiają korzystanie z usługi Sandboxie w połączeniu z oprogramowaniem zapewniającym dostępność. Należy pamiętać, że niektóre środki ochrony Sandboxie są z konieczności tracone, gdy te ustawienia są aktywne. - + Edit ini Section Edytuj sekcję ini - + Edit ini Edytuj ini - + Cancel Anuluj - + Save Zapisz diff --git a/SandboxiePlus/SandMan/sandman_pt_BR.ts b/SandboxiePlus/SandMan/sandman_pt_BR.ts index e4fb06cd..377c23a7 100644 --- a/SandboxiePlus/SandMan/sandman_pt_BR.ts +++ b/SandboxiePlus/SandMan/sandman_pt_BR.ts @@ -1688,11 +1688,11 @@ Nota: A verificação de atualização geralmente está por trás da versão mai - - - - - + + + + + All Programs Todos os Programas @@ -1703,9 +1703,9 @@ Nota: A verificação de atualização geralmente está por trás da versão mai - - - + + + Group: %1 Grupo: %1 @@ -1740,7 +1740,7 @@ Nota: A verificação de atualização geralmente está por trás da versão mai - + Template values can not be edited. Os valores de modelo não podem ser editados. @@ -2183,82 +2183,82 @@ Nota: A verificação de atualização geralmente está por trás da versão mai - + Any Qualquer - + TCP - + UDP - + ICMP - + Allow access Permitir acesso - + Block using Windows Filtering Platform Bloquear usando a Plataforma de Filtragem do Windows - + Block by denying access to Network devices Bloquear, negando acesso a Dispositivos de rede - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Permitir - + Block (WFP) Bloquear (WFP) - + Block (NDev) Bloquear (NDev) - + A non empty program name is required. É necessário um nome de programa não vazio. - + Block Bloquear @@ -7199,7 +7199,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes Proteger o sistema de processos do sandbox @@ -7388,12 +7388,12 @@ If you are a great patreaon supporter already, sandboxie can check online for an Restrições de Impressão - + Network restrictions Restrições de Rede - + Block network files and folders, unless specifically opened. Bloquear arquivos e pastas de rede, a menos que especificamente abertos. @@ -7420,11 +7420,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name Nome @@ -7454,15 +7454,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove Remover @@ -7552,11 +7552,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates Mostrar Modelos @@ -7595,7 +7595,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Abrir Credencias de Armazenamento do Windows (modo de usuário) - + Prevent change to network and firewall parameters (user mode) Impedir a alteração de parâmetros de rede e firewall (modo de usuário) @@ -7811,9 +7811,9 @@ Se os processos líderes forem definidos, todos os outros serão tratados como p - - - + + + Program Programa @@ -7900,40 +7900,40 @@ Se os processos líderes forem definidos, todos os outros serão tratados como p Isolamento de Acesso - + Image Protection Proteção de Imagem - + Issue message 1305 when a program tries to load a sandboxed dll Emitir mensagem 1305 quando um programa tenta carregar uma dll na caixa de areia - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox Impedir que programas das caixas instalados no host carreguem dll's do sandbox - + Dlls && Extensions - + Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. As regras de acesso a recursos do sandboxie geralmente discriminam os binários do programa localizados dentro do sandbox. OpenFilePath e OpenKeyPath funcionam apenas para binários de aplicativos localizados no host nativamente. Para definir uma regra sem essa restrição, deve-se usar OpenPipePath ou OpenConfPath. Da mesma forma, todas as diretivas Closed(File|Key|Ipc)Path que são definidas por negação, por exemplo 'ClosedFilePath =! iexplore.exe,C:Users*’ será sempre fechado para binários localizados dentro de uma caixa. Ambas as políticas de restrição podem ser desativadas na página “Políticas de Acesso”. Isso é feito para evitar que processos invasores dentro do sandbox criem uma cópia renomeada de si mesmos e acessem recursos protegidos. Outro vetor de exploração é a injeção de uma biblioteca em um processo autorizado para obter acesso a tudo o que é permitido acessar.Usando a proteção de imagem do host, isso pode ser evitado bloqueando os aplicativos (instalados no host) executados dentro de uma caixa de carregar bibliotecas do próprio sandbox. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. @@ -8160,20 +8160,20 @@ Para especificar um processo, use '$:program.exe' como caminho. - + Action Ação - + Port Porta - - + + IP @@ -8183,7 +8183,7 @@ Para especificar um processo, use '$:program.exe' como caminho.Protocolo - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. CUIDADO: A Plataforma de Filtragem do Windows não está ativada com o driver, portanto, essas regras serão aplicadas apenas no modo de usuário e não podem ser impostas!!! Isso significa que as aplicações maliciosas podem contorná-las. @@ -8216,7 +8216,7 @@ Você pode usar 'Abrir para Todos' em vez de fazê-lo aplicar a todos - + Move Down Mover para Baixo @@ -8237,7 +8237,7 @@ Você pode usar 'Abrir para Todos' em vez de fazê-lo aplicar a todos - + Move Up Mover para Cima @@ -8259,47 +8259,47 @@ Para acessar arquivos, você pode usar o 'Direto a Todos' em vez de fa Aplicar e Fechar...=!<programa>,... diretivas também para todos os binários localizados na caixa de areia. - + File Recovery Recuperação de Arquivos - + Add Folder Adicionar Pasta - + Ignore Extension Ignorar Extensão - + Ignore Folder Ignorar Pasta - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Ativar mensagem de recuperação imediata para poder recuperar arquivos assim que forem criados. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Você pode excluir pastas e tipos de arquivos (ou extensões de arquivos) da Recuperação Imediata. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Quando a função Recuperação Rápida for invocada, as seguintes pastas serão verificadas para obter conteúdo da caixa de areia. - + Advanced Options Opções Avançadas - + Miscellaneous Diversos @@ -8320,7 +8320,7 @@ Para acessar arquivos, você pode usar o 'Direto a Todos' em vez de fa - + Protect the sandbox integrity itself Proteger integridade da própria caixa de areia @@ -8345,7 +8345,7 @@ Para acessar arquivos, você pode usar o 'Direto a Todos' em vez de fa Isolamento da caixa de areia - + Force usage of custom dummy Manifest files (legacy behaviour) Forçar uso de arquivos de manifesto fictícios personalizados (comportamento legado) @@ -8409,8 +8409,8 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Permitir apenas processos privilegiados para acessar o Gerenciador de Controle de Serviços - - + + Compatibility Compatibilidade @@ -8424,12 +8424,12 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Adicionar processos de caixa de areia a objetos de trabalho (recomendado) - + Emulate sandboxed window station for all processes Emular estação de janela da caixa de areia para todos os processos - + Allow use of nested job objects (works on Windows 8 and later) Allow use of nested job objects (experimental, works on Windows 8 and later) Permitir o uso de objetos de trabalho aninhados (experimental, funciona no Windows 8 e anteriores) @@ -8472,7 +8472,7 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Controle de Programa - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Desativar o uso de RpcMgmtSetComTimeout por padrão (isso pode resolver problemas de compatibilidade) @@ -8525,37 +8525,37 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Aqui você pode especificar uma lista de comandos que serão executados sempre que o sandbox for iniciado. - + Hide Processes Ocultar Processo - + Add Process Adicionar Processo - + Hide host processes from processes running in the sandbox. Ocultar processos do host de processos em execução no sandbox. - + Don't allow sandboxed processes to see processes running in other boxes Não permitir que processos do sandbox vejam processos em execução de outras caixas - + Users Usuários - + Restrict Resource Access monitor to administrators only Restringir o monitor de acesso a recursos apenas para administradores - + Add User Adicionar Usuário @@ -8564,7 +8564,7 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Remover Usuário - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8573,7 +8573,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Nota: As configurações de programas e pastas forçadas para uma caixa de areia não se aplicam a contas de usuários que não podem usar o sandbox. - + Tracing Rastreamento @@ -8583,22 +8583,22 @@ Nota: As configurações de programas e pastas forçadas para uma caixa de areia Rastreamento de chamada de API (requer logapi instalado na pasta sbie) - + Pipe Trace Rastreamento de Pipe - + Log all SetError's to Trace log (creates a lot of output) Log SetError's para todas os log de Rastreamento (cria muitas saídas) - + Log Debug Output to the Trace Log Registrar a saída de depuração no log de rastreamento - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8621,37 +8621,37 @@ ao invés de "*". Rastreamento Ntdll syscall (cria muita saída) - + File Trace Rastreamento de Arquivo - + Disable Resource Access Monitor Desativar Monitor de Acesso ao Recurso - + IPC Trace Rastreamento IPC - + GUI Trace Rastreamento de GUI - + Resource Access Monitor Monitor de Acesso ao Recurso - + Access Tracing Rastrear Acesso - + COM Class Trace Rastreamento de Classe COM @@ -8660,41 +8660,41 @@ ao invés de "*". <- para um desses acima não se aplica - + Triggers Gatilhos - + Event Evento - - - - + + + + Run Command Executar Comando - + Start Service Iniciar Serviço - + These events are executed each time a box is started Esses eventos são executados sempre que uma caixa é iniciada - + On Box Start Ao iniciar uma caixa - - + + These commands are run UNBOXED just before the box content is deleted Esses comandos são executados FORA DA CAIXA logo antes do conteúdo da caixa ser excluído @@ -8726,118 +8726,113 @@ ao invés de "*". - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Esses comandos são executados apenas quando uma caixa é inicializada. Para fazê-los funcionar novamente, o conteúdo da caixa deve ser excluído. - + On Box Init Ao criar uma caixa - + Here you can specify actions to be executed automatically on various box events. Aqui você pode especificar ações a serem executadas automaticamente em vários eventos de caixa. - + API call Trace (traces all SBIE hooks) - + Key Trace Rastreamento de Chave - + Network Firewall Firewall de Rede - + Debug Depurar - + WARNING, these options can disable core security guarantees and break sandbox security!!! AVISO, essas opções podem desativar as garantias de segurança essenciais e interromper a segurança da sandbox!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Essas opções destinam-se a depurar problemas de compatibilidade, não as use em produção. - + App Templates Modelos de Aplicativos @@ -8846,22 +8841,22 @@ ao invés de "*". Modelos de Compatibilidade - + Filter Categories Categorias de Filtro - + Text Filter Filtro de Texto - + Add Template Adicionar Modelo - + This list contains a large amount of sandbox compatibility enhancing templates Essa lista contém uma grande quantidade de modelos de compatibilidade de caixa de areia @@ -8870,17 +8865,17 @@ ao invés de "*". Remover Modelo - + Category Categoria - + Template Folders Pasta de Modelos - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8889,23 +8884,23 @@ Please note that this values are currently user specific and saved globally for Por favor, note que esse valores são atualmente para o usuário específico e salvos globalmente para todas as caixas. - - + + Value Valor - + Accessibility Acessibilidade - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Para compensar a proteção perdida, consulte a página de configurações de Liberar Direitos no grupo de configurações de Restrições. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Leitores de tela: JAWS, NVDA, Window-Eyes, Acesso ao Sistema @@ -8930,88 +8925,88 @@ Por favor, note que esse valores são atualmente para o usuário específico e s - + Other Options - + Port Blocking - + Block common SAMBA ports - + Block DNS, UDP port 53 - + Quick Recovery Recuperação Rápida - + Immediate Recovery Recuperação Imediata - + Various Options Várias opções - + Apply ElevateCreateProcess Workaround (legacy behaviour) Aplicar ElevateCreateProcess solução alternativa (comportamento herdado) - + Use desktop object workaround for all processes Usar solução alternativa de objeto da área de trabalho para todos os processos - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + On Box Terminate - + This command will be run before the box content will be deleted Esse comando será executado antes que o conteúdo da caixa seja excluído - + On File Recovery Ao recuperar arquivos - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked Esse comando será executado antes de um arquivo ser recuperado e o caminho do arquivo será passado como primeiro argumento. Se esse comando retornar algo diferente de 0, a recuperação será bloqueada - + Run File Checker Executar Verificador de Arquivos - + On Delete Content Ao Excluir Conteúdo @@ -9022,7 +9017,7 @@ Por favor, note que esse valores são atualmente para o usuário específico e s - + Process Processo @@ -9031,68 +9026,68 @@ Por favor, note que esse valores são atualmente para o usuário específico e s Bloquear também o acesso de leitura aos processos nessa caixa - + Add Option Adicionar Opção - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. Aqui você pode configurar opções avançadas por processo para melhorar a compatibilidade e/ou personalizar o comportamento do sandbox. - + Option Opção - + These commands are run UNBOXED after all processes in the sandbox have finished. - + DNS Request Logging - + Syscall Trace (creates a lot of output) - + Templates Modelos - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. As configurações a seguir permitem usar o sandboxie em combinação com software de acessibilidade. Note que algumas medidas de proteção do sandboxie seram perdidas quando essas configurações estiverem em vigor. - + Edit ini Section Editar Seção ini - + Edit ini Editar ini - + Cancel Cancelar - + Save Salvar diff --git a/SandboxiePlus/SandMan/sandman_pt_PT.ts b/SandboxiePlus/SandMan/sandman_pt_PT.ts index c3adb49e..08cee2cb 100644 --- a/SandboxiePlus/SandMan/sandman_pt_PT.ts +++ b/SandboxiePlus/SandMan/sandman_pt_PT.ts @@ -1688,11 +1688,11 @@ Nota: A verificação de actualização geralmente está por trás da versão ma - - - - - + + + + + All Programs Todos os Programas @@ -1703,9 +1703,9 @@ Nota: A verificação de actualização geralmente está por trás da versão ma - - - + + + Group: %1 Grupo: %1 @@ -1740,7 +1740,7 @@ Nota: A verificação de actualização geralmente está por trás da versão ma - + Template values can not be edited. Os valores do modelo não podem ser editados. @@ -2183,82 +2183,82 @@ Nota: A verificação de actualização geralmente está por trás da versão ma - + Any Qualquer - + TCP - + UDP - + ICMP - + Allow access Permitir acesso - + Block using Windows Filtering Platform Bloquear usando a Plataforma de Filtragem do Windows - + Block by denying access to Network devices Bloquear negando acesso a Dispositivos de rede - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Permitir - + Block (WFP) Bloquear (WFP) - + Block (NDev) Bloquear (NDev) - + A non empty program name is required. É necessário um nome de programa não vazio. - + Block Bloquear @@ -7203,7 +7203,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes Proteger o sistema de processos do sandbox @@ -7392,12 +7392,12 @@ If you are a great patreaon supporter already, sandboxie can check online for an Restrições de impressão - + Network restrictions Restrições de rede - + Block network files and folders, unless specifically opened. Bloquear ficheiros e pastas de rede, a menos que especificamente abertos. @@ -7424,11 +7424,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name Nome @@ -7458,15 +7458,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove Remover @@ -7556,11 +7556,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates Mostrar Modelos @@ -7599,7 +7599,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Abrir Credencias de Armazenamento do Windows (modo de utilizador) - + Prevent change to network and firewall parameters (user mode) Impedir a alteração de parâmetros de rede e firewall (modo de utilizador) @@ -7815,9 +7815,9 @@ Se os processos líderes forem definidos, todos os outros serão tratados como p - - - + + + Program Programa @@ -7900,40 +7900,40 @@ Se os processos líderes forem definidos, todos os outros serão tratados como p Isolamento de Acesso - + Image Protection Proteção de Imagem - + Issue message 1305 when a program tries to load a sandboxed dll Emitir mensagem 1305 quando um programa tenta carregar uma dll na caixa de areia - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox Impedir que programas das caixas instalados no host carreguem dll's do sandbox - + Dlls && Extensions - + Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. As regras de acesso a recursos do sandboxie geralmente discriminam os binários do programa localizados dentro do sandbox. OpenFilePath e OpenKeyPath funcionam apenas para binários de aplicativos localizados no host nativamente. Para definir uma regra sem essa restrição, deve-se utilizar OpenPipePath ou OpenConfPath. Da mesma forma, todas as diretivas Closed(File|Key|Ipc)Path que são definidas por negação, por exemplo 'ClosedFilePath =! iexplore.exe,C:Users*’ será sempre fechado para binários localizados dentro de uma caixa. Ambas as políticas de restrição podem ser desativadas na página “Políticas de Acesso”. Isso é feito para evitar que processos invasores dentro do sandbox criem uma cópia renomeada de si mesmos e acessem recursos protegidos. Outro vetor de exploração é a injeção de uma biblioteca em um processo autorizado para obter acesso a tudo o que é permitido acessar.Usando a proteção de imagem do host, isso pode ser evitado bloqueando os aplicativos (instalados no host) executados dentro de uma caixa de carregar bibliotecas do próprio sandbox. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. @@ -8160,20 +8160,20 @@ Para especificar um processo, use '$:program.exe' como localização.< - + Action Ação - + Port Porta - - + + IP @@ -8183,7 +8183,7 @@ Para especificar um processo, use '$:program.exe' como localização.< Protocolo - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. CUIDADO: A Plataforma de Filtragem do Windows não está ativada com o controlador, portanto, essas regras serão aplicadas apenas no modo de utilizador e não podem ser impostas!!! Isso significa que as aplicações maliciosas podem contorná-las. @@ -8216,7 +8216,7 @@ Você pode utilizar 'Abrir para Todos' em vez de fazê-lo aplicar a to - + Move Down Mover para Baixo @@ -8237,7 +8237,7 @@ Você pode utilizar 'Abrir para Todos' em vez de fazê-lo aplicar a to - + Move Up Mover para Cima @@ -8259,47 +8259,47 @@ Para aceder ficheiros, você pode utilizar o 'Direto a Todos' em vez d Aplicar e Fechar...=!<programa>,... diretivas também para todos os binários localizados na caixa de areia. - + File Recovery Recuperação de Ficheiros - + Add Folder Adicionar Pasta - + Ignore Extension Ignorar Extensão - + Ignore Folder Ignorar Pasta - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Activar mensagem de recuperação imediata para poder recuperar ficheiros assim que for criado. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Você pode apagar pastas e tipos de ficheiros (ou extensões de ficheiros) da Recuperação Imediata. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Quando a função Recuperação Rápida for invocada, as seguintes pastas serão verificadas para obter conteúdo da caixa de areia. - + Advanced Options Opções Avançadas - + Miscellaneous Diversos @@ -8320,7 +8320,7 @@ Para aceder ficheiros, você pode utilizar o 'Direto a Todos' em vez d - + Protect the sandbox integrity itself Proteger integridade da própria caixa de areia @@ -8345,7 +8345,7 @@ Para aceder ficheiros, você pode utilizar o 'Direto a Todos' em vez d Isolamento da caixa de areia - + Force usage of custom dummy Manifest files (legacy behaviour) Forçar uso de ficheiros de manifesto fictícios personalizados (comportamento legado) @@ -8409,8 +8409,8 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Permitir apenas processos privilegiados para acessar o Gerenciador de Controlo de Serviços - - + + Compatibility Compatibilidade @@ -8424,12 +8424,12 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Adicionar processos de caixa de areia a objetos de trabalho (recomendado) - + Emulate sandboxed window station for all processes Emular estação de janela da caixa de areia para todos os processos - + Allow use of nested job objects (works on Windows 8 and later) Allow use of nested job objects (experimental, works on Windows 8 and later) Permitir o uso de objetos de trabalho aninhados (experimental, funciona no Windows 8 e posterior) @@ -8472,7 +8472,7 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Controlo de Programa - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Desactivar o uso do RpcMgmtSetComTimeout predefinido (isso pode resolver problemas de compatibilidade) @@ -8525,37 +8525,37 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Aqui você pode especificar uma lista de comandos que serão executados sempre que o sandbox for iniciado. - + Hide Processes Esconder Processo - + Add Process Adicionar Processo - + Hide host processes from processes running in the sandbox. Esconder processos do host de processos em execução na sandbox. - + Don't allow sandboxed processes to see processes running in other boxes Não permitir que processos do sandbox vejam processos em execução de outras caixas - + Users Usuários - + Restrict Resource Access monitor to administrators only Restringir o monitor de acesso a recursos apenas para administradores - + Add User Adicionar Utilizador @@ -8564,7 +8564,7 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec Remover Utilizador - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8573,7 +8573,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Nota: As definições de programas e pastas forçadas para uma caixa de areia não se aplicam a contas de usuários que não podem utilizar o sandbox. - + Tracing Rastreamento @@ -8583,22 +8583,22 @@ Nota: As definições de programas e pastas forçadas para uma caixa de areia n Rastreamento de chamada de API (requer logapi instalado na pasta sbie) - + Pipe Trace Rastreamento de Pipe - + Log all SetError's to Trace log (creates a lot of output) Registro SetError's para todas os registro de Rastreamento (cria muitas saídas) - + Log Debug Output to the Trace Log Registrar a saída de depuração no registro de rastreamento - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8621,37 +8621,37 @@ ao invés de "*". Rastreamento Ntdll syscall (cria muita saída) - + File Trace Rastreamento de Ficheiro - + Disable Resource Access Monitor Desactivar Monitor de Acesso ao Recurso - + IPC Trace Rastreamento IPC - + GUI Trace Rastreamento de GUI - + Resource Access Monitor Monitor de Acesso ao Recurso - + Access Tracing Rastrear acesso - + COM Class Trace Rastreamento de Classe COM @@ -8660,41 +8660,41 @@ ao invés de "*". <- para um desses acima não se aplica - + Triggers Gatilhos - + Event Evento - - - - + + + + Run Command Rodar Comando - + Start Service Iniciar Serviço - + These events are executed each time a box is started Esses eventos são executados sempre que uma caixa é iniciada - + On Box Start Ao iniciar uma caixa - - + + These commands are run UNBOXED just before the box content is deleted Esses comandos são executados FORA DA CAIXA logo antes do conteúdo da caixa ser excluído @@ -8726,118 +8726,113 @@ ao invés de "*". - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Esses comandos são executados apenas quando uma caixa é inicializada. Para fazê-los funcionar novamente, o conteúdo da caixa deve ser excluído. - + On Box Init Ao criar uma caixa - + Here you can specify actions to be executed automatically on various box events. Aqui você pode especificar acções a serem executadas automaticamente em vários eventos de caixa. - + API call Trace (traces all SBIE hooks) - + Key Trace Rastreamento de Chave - + Network Firewall Firewall de Rede - + Debug Depurar - + WARNING, these options can disable core security guarantees and break sandbox security!!! ADVERTÊNCIA, essas opções podem desactivar as garantias de segurança essenciais e interromper a segurança da sandbox!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Essas opções destinam-se a depurar problemas de compatibilidade, não as use em produção. - + App Templates Modelos de Aplicação @@ -8846,22 +8841,22 @@ ao invés de "*". Modelos de Compatibilidade - + Filter Categories Categorias de Filtro - + Text Filter Filtro de Texto - + Add Template Adicionar Modelo - + This list contains a large amount of sandbox compatibility enhancing templates Esta lista contém uma grande quantidade de modelos de compatibilidade de caixa de areia @@ -8870,17 +8865,17 @@ ao invés de "*". Remover Modelo - + Category Categoria - + Template Folders Pasta de Modelos - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8889,23 +8884,23 @@ Please note that this values are currently user specific and saved globally for Por favor, note que este valores são atualmente para o utilizador específico e salvo globalmente para todas as caixas. - - + + Value Valor - + Accessibility Acessibilidade - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Para compensar a proteção perdida, consulte a página de definições de Liberar Direitos no grupo de definições de Restrições. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Leitores de eclã: JAWS, NVDA, Window-Eyes, Acesso ao Sistema @@ -8930,88 +8925,88 @@ Por favor, note que este valores são atualmente para o utilizador específico e - + Other Options - + Port Blocking - + Block common SAMBA ports - + Block DNS, UDP port 53 - + Quick Recovery Recuperação Rápida - + Immediate Recovery Recuperação Imediata - + Various Options Várias opções - + Apply ElevateCreateProcess Workaround (legacy behaviour) Aplicar ElevateCreateProcess solução alternativa (comportamento herdado) - + Use desktop object workaround for all processes - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + On Box Terminate - + This command will be run before the box content will be deleted Este comando será executado antes que o conteúdo da caixa seja excluído - + On File Recovery Ao recuperar ficheiros - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked Este comando será executado antes de um ficheiro ser recuperado e o localização do ficheiro será passado como primeiro argumento. Se este comando retornar algo diferente de 0, a recuperação será bloqueada - + Run File Checker Rodar Verificador de Ficheiros - + On Delete Content Ao apagar conteúdo @@ -9022,7 +9017,7 @@ Por favor, note que este valores são atualmente para o utilizador específico e - + Process Processo @@ -9031,68 +9026,68 @@ Por favor, note que este valores são atualmente para o utilizador específico e Bloquear também o acesso de leitura aos processos nesta caixa - + Add Option Adicionar Opção - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. Aqui você pode configurar opções avançadas por processo para melhorar a compatibilidade e/ou personalizar o comportamento do sandbox. - + Option Opção - + These commands are run UNBOXED after all processes in the sandbox have finished. - + DNS Request Logging - + Syscall Trace (creates a lot of output) - + Templates Modelos - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. As definições a seguir permitem utilizar o sandboxie em combinação com software de acessibilidade. Note que algumas medidas de proteção do sandboxie será perdida quando essas definições estão em vigor. - + Edit ini Section Editar Seção ini - + Edit ini Editar ini - + Cancel Cancelar - + Save Salvar diff --git a/SandboxiePlus/SandMan/sandman_ru.ts b/SandboxiePlus/SandMan/sandman_ru.ts index 1a170025..8268d87e 100644 --- a/SandboxiePlus/SandMan/sandman_ru.ts +++ b/SandboxiePlus/SandMan/sandman_ru.ts @@ -1547,11 +1547,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs Все программы @@ -1562,9 +1562,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 Группа: %1 @@ -1599,7 +1599,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. Значения шаблона нельзя редактировать. @@ -2002,82 +2002,82 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Any Любой - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Разрешить доступ - + Block using Windows Filtering Platform Блокировать с помощью платформы фильтрации Windows - + Block by denying access to Network devices Блокировать путем запрета доступа к сетевым устройствам - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Разрешить - + Block (WFP) Block (WFP) - + Block (NDev) Block (NDev) - + A non empty program name is required. Требуется непустое имя программы. - + Block Блокировать @@ -6602,7 +6602,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Protect the system from sandboxed processes Защита системы от изолированных процессов @@ -6739,12 +6739,12 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Ограничения печати - + Network restrictions Сетевые ограничения - + Block network files and folders, unless specifically opened. Блокировать сетевые файлы и папки, если они специально не открываются. @@ -6767,11 +6767,11 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - + + + + + Name Имя @@ -6801,15 +6801,15 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - - - - - + + + + + + + + + Remove Удалить @@ -6875,11 +6875,11 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - + + + + + Show Templates Показать шаблоны @@ -7013,89 +7013,84 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Открыть хранилище учетных данных Windows (пользовательский режим) - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Other Options - + Prevent change to network and firewall parameters (user mode) Запретить изменение параметров сети и брандмауэра (пользовательский режим) - + Move Up Сдвинуть вверх - + Move Down Сдвинуть вниз @@ -7166,33 +7161,33 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Настроить, какие процессы могут получать доступ к объектам рабочего стола, таким как Windows и т.п. - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. При нажатии глобальной горячей клавиши 3 раза подряд это исключение будет проигнорировано. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. Исключить завершение этой песочницы при вызове "Завершить все процессы". - + Image Protection Защита изображения - + Issue message 1305 when a program tries to load a sandboxed dll Выдать сообщение 1305, когда программа пытается загрузить изолированную dll - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox Запретить программам в песочнице, установленным на хосте, загружать dll из песочницы - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Правила доступа к ресурсам Sandboxie часто дискриминируют двоичные файлы программ, расположенные внутри песочницы. OpenFilePath и OpenKeyPath работают только для двоичных файлов приложений, изначально расположенных на хосте. Чтобы определить правило без этого ограничения, необходимо использовать OpenPipePath или OpenConfPath. Аналогично, все директивы Closed(File|Key|Ipc)Path, которые определены отрицанием, например. ‘ClosedFilePath=! iexplore.exe,C:Users*’ всегда будет закрыт для двоичных файлов, находящихся внутри песочницы. Обе политики ограничения можно отключить на странице "Политики доступа". @@ -7350,17 +7345,17 @@ This is done to prevent rogue processes inside the sandbox from creating a renam Ограничения - + Dlls && Extensions DLL и расширения - + Description Описание - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Функциональность Sandboxie можно расширить с помощью дополнительных dll, которые можно загружать в каждый изолированный процесс при запуске с помощью SbieDll.dll. Менеджер надстроек в глобальных настройках предлагает несколько полезных расширений, после установки их можно включить здесь для текущей песочницы. @@ -7543,9 +7538,9 @@ To specify a process use '$:program.exe' as path. - - - + + + Program Программа @@ -7553,20 +7548,20 @@ To specify a process use '$:program.exe' as path. - + Action Действие - + Port Порт - - + + IP IP @@ -7576,7 +7571,7 @@ To specify a process use '$:program.exe' as path. Протокол - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. ВНИМАНИЕ: Платформа фильтрации Windows не включена с драйвером, поэтому эти правила будут применяться только в пользовательском режиме и не могут быть применены!!! Это означает, что вредоносные приложения могут их обойти. @@ -7611,57 +7606,57 @@ To specify a process use '$:program.exe' as path. Добавить COM объект - + File Recovery Восстановление файлов - + Quick Recovery Быстрое восстановление - + Add Folder Добавить папку - + Immediate Recovery Немедленное восстановление - + Ignore Extension Игнорировать расширение - + Ignore Folder Игнорировать папку - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Включить запрос немедленного восстановления, чтобы иметь возможность восстанавливать файлы сразу после их создания. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Вы можете исключить папки и типы файлов (или расширения файлов) из немедленного восстановления. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. При вызове функции быстрого восстановления следующие папки будут проверяться на наличие изолированного содержимого. - + Advanced Options Расширенные настройки - + Miscellaneous Разное @@ -7682,7 +7677,7 @@ To specify a process use '$:program.exe' as path. - + Protect the sandbox integrity itself Защитить целостность самой песочницы @@ -7703,7 +7698,7 @@ To specify a process use '$:program.exe' as path. Защитить изолированные процессы SYSTEM от непривилегированных процессов - + Force usage of custom dummy Manifest files (legacy behaviour) Принудительное использование пользовательских фиктивных файлов манифеста (устаревшее поведение) @@ -7755,8 +7750,8 @@ The process match level has a higher priority than the specificity and describes Разрешить доступ к диспетчеру управления службами только привилегированным процессам - - + + Compatibility Совместимость @@ -7766,12 +7761,12 @@ The process match level has a higher priority than the specificity and describes Добавить изолированные процессы к объектам задания (рекомендуется) - + Emulate sandboxed window station for all processes Эмуляция оконной станции в песочнице для всех процессов - + Allow use of nested job objects (works on Windows 8 and later) Разрешить использование вложенных объектов заданий (работает в Windows 8 и новее) @@ -7796,7 +7791,7 @@ The process match level has a higher priority than the specificity and describes Открыть доступ к серверу проверки подлинности локальной системы безопасности - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Отключить использование RpcMgmtSetComTimeout по умолчанию (это может решить проблемы совместимости) @@ -7821,27 +7816,27 @@ The process match level has a higher priority than the specificity and describes Приведенные ниже параметры можно безопасно использовать, если вы не предоставляете прав администратора. - + These commands are run UNBOXED after all processes in the sandbox have finished. Эти команды запускаются ВНЕ ПЕСОЧНИЦЫ после завершения всех процессов в песочнице. - + Hide Processes Скрыть процессы - + Add Process Добавить процесс - + Hide host processes from processes running in the sandbox. Скрыть хост-процессы от процессов, запущенных в песочнице. - + Don't allow sandboxed processes to see processes running in other boxes Не позволять изолированным процессам видеть процессы, запущенные в других песочницах @@ -7873,42 +7868,42 @@ The process match level has a higher priority than the specificity and describes - + Port Blocking - + Block common SAMBA ports - + Block DNS, UDP port 53 - + On Box Terminate При завершении песочницы - + Users Пользователи - + Restrict Resource Access monitor to administrators only Ограничить мониторинг доступа к ресурсам только администраторам - + Add User Добавить пользователя - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -7917,27 +7912,27 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Примечание. Параметры принудительных программ и принудительных папок для песочницы не применяются к учетным записям пользователей, которые не могут использовать эту песочницу. - + Tracing Трассировка - + Pipe Trace Трассировка pipe - + API call Trace (traces all SBIE hooks) API-вызов Trace (отслеживает все хуки SBIE) - + Log all SetError's to Trace log (creates a lot of output) Записывать все SetError в журнал трассировки (создает много выходных данных) - + Log Debug Output to the Trace Log Записывать вывод отладки в журнал трассировки @@ -7977,71 +7972,71 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Выдать сообщение 2111, когда доступ к процессу запрещен - + Triggers Триггеры - + Event Событие - - - - + + + + Run Command Выполнить комманду - + Start Service Запустить службу - + These events are executed each time a box is started Эти события выполняются каждый раз при запуске песочницы - + On Box Start При запуске песочницы - - + + These commands are run UNBOXED just before the box content is deleted Эти команды запускаются вне песочницы непосредственно перед удалением содержимого песочницы - + Apply ElevateCreateProcess Workaround (legacy behaviour) Применение обходного пути ElevateCreateProcess (устаревшее поведение) - + Use desktop object workaround for all processes Использовать обходной путь для объектов рабочего стола для всех процессов - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Эти команды выполняются только при инициализации песочницы. Чтобы они снова запустились, содержимое песочницы должно быть удалено. - + On Box Init При инициализации песочницы - + Here you can specify actions to be executed automatically on various box events. Здесь вы можете указать действия, которые будут выполняться автоматически при различных событиях песочницы. - + On Delete Content При удалении контента @@ -8052,27 +8047,27 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to - + Process Процесс - + Add Option Добавить опцию - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Здесь вы можете настроить расширенные параметры для каждого процесса, чтобы улучшить совместимость и/или настроить поведение песочницы. - + Option Опция - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8091,103 +8086,103 @@ instead of "*". вместо "*". - + File Trace Трассировка файлов - + Disable Resource Access Monitor Отключить монитор доступа к ресурсам - + IPC Trace Трассировка IPC - + GUI Trace Трассировка GUI - + Resource Access Monitor Монитор доступа к ресурсам - + Access Tracing Отслеживание доступа - + COM Class Trace Трассировка COM класса - + Key Trace Трассировка ключей - + Network Firewall Сетевой брандмауэр - + Debug Отладка - + WARNING, these options can disable core security guarantees and break sandbox security!!! ВНИМАНИЕ, эти параметры могут отключить основные гарантии безопасности и нарушить безопасность песочницы!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Эти параметры предназначены для устранения проблем совместимости, не используйте их в продакшен среде. - + App Templates Шаблоны приложений - + Filter Categories Категории фильтров - + Text Filter Текстовый фильтр - + Add Template Добавить шаблон - + This list contains a large amount of sandbox compatibility enhancing templates Этот список содержит большое количество шаблонов для улучшения совместимости песочницы - + Category Категория - + Template Folders Папки шаблонов - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8196,93 +8191,93 @@ Please note that this values are currently user specific and saved globally for Обратите внимание, что эти значения в настоящее время специфичны для пользователя и сохраняются глобально для всех песочниц. - - + + Value Значение - + Accessibility Доступность - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Чтобы компенсировать потерю защиты, обратитесь к странице настроек Сброс прав в группе настроек Ограничения. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Чтение экрана: JAWS, NVDA, Window-Eyes, System Access - + Various Options Различные опции - + This command will be run before the box content will be deleted Эта команда будет запущена до того, как содержимое песочницы будет удалено - + On File Recovery При восстановлении файлов - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked Эта команда будет запущена перед восстановлением файла, и путь к файлу будет передан в качестве первого аргумента. Если эта команда возвращает значение, отличное от 0, восстановление будет заблокировано - + Run File Checker Запустить проверку файлов - + DNS Request Logging - + Syscall Trace (creates a lot of output) Трассировка системных вызовов (создает много выходных данных) - + Templates Шаблоны - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Следующие настройки позволяют использовать Sandboxie в сочетании с программным обеспечением специальных возможностей. Обратите внимание, что когда действуют эти настройки, определенная степень защиты Sandboxie обязательно теряется. - + Edit ini Section Редактировать раздел ini - + Edit ini Редактировать ini - + Cancel Отмена - + Save Сохранить diff --git a/SandboxiePlus/SandMan/sandman_sv_SE.ts b/SandboxiePlus/SandMan/sandman_sv_SE.ts index 6e611ebe..b40f5dfe 100644 --- a/SandboxiePlus/SandMan/sandman_sv_SE.ts +++ b/SandboxiePlus/SandMan/sandman_sv_SE.ts @@ -1696,9 +1696,9 @@ Notera: Uppdateringskontrollen är ofta bakom senaste GitHub-utgivningen för at - - - + + + Group: %1 Grupp: %1 @@ -1861,11 +1861,11 @@ Notera: Uppdateringskontrollen är ofta bakom senaste GitHub-utgivningen för at - - - - - + + + + + All Programs Alla program @@ -1900,7 +1900,7 @@ Notera: Uppdateringskontrollen är ofta bakom senaste GitHub-utgivningen för at - + Template values can not be edited. Mallvärden kan inte redigeras. @@ -2323,82 +2323,82 @@ Notera: Uppdateringskontrollen är ofta bakom senaste GitHub-utgivningen för at - + Any Varje - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Tillåt tillgång - + Block using Windows Filtering Platform Blockera användande av Windows Filtering Platform - + Block by denying access to Network devices Blockera genom att neka tillgång till nätverksenheter - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Tillåt - + Block (WFP) Blockera (WFP) - + Block (NDev) Blockera (NDev) - + A non empty program name is required. Ett icke tomt programnamn krävs. - + Block Blockera @@ -7386,7 +7386,7 @@ Om du redan är en Great Supporter on Patreon, kan Sandboxie söka på nätet f - + Protect the system from sandboxed processes Skydda systemet från sandlådade processer @@ -7463,7 +7463,7 @@ Om du redan är en Great Supporter on Patreon, kan Sandboxie söka på nätet f Utskriftsbegränsningar - + Prevent change to network and firewall parameters (user mode) Förhindra ändring av nätverks- och brandväggsparametrar (användarläge) @@ -7473,7 +7473,7 @@ Om du redan är en Great Supporter on Patreon, kan Sandboxie söka på nätet f Tillåt läsning av minne av osandlådade processer (inte rekommenderat) - + Network restrictions Nätverksbegränsningar @@ -7488,7 +7488,7 @@ Om du redan är en Great Supporter on Patreon, kan Sandboxie söka på nätet f Tillåt Print Spooler att skriva ut till filer utanför sandlådan - + Block network files and folders, unless specifically opened. Blockera nätverksfiler och mappar, förutom om specifikt öppnade. @@ -7525,11 +7525,11 @@ Om du redan är en Great Supporter on Patreon, kan Sandboxie söka på nätet f - - - - - + + + + + Name Namn @@ -7591,15 +7591,15 @@ Om du redan är en Great Supporter on Patreon, kan Sandboxie söka på nätet f - - - - - - - - - + + + + + + + + + Remove Ta bort @@ -7688,11 +7688,11 @@ Om du redan är en Great Supporter on Patreon, kan Sandboxie söka på nätet f - - - - - + + + + + Show Templates Visa mallar @@ -7906,9 +7906,9 @@ Om ledarprocesser är definierade, behandlas alla andra som kvardröjande progra - - - + + + Program Program @@ -7991,13 +7991,13 @@ Om ledarprocesser är definierade, behandlas alla andra som kvardröjande progra - + Move Up Flytta upp - + Move Down Flytta ner @@ -8013,40 +8013,40 @@ Om ledarprocesser är definierade, behandlas alla andra som kvardröjande progra Tillgångsisolering - + Image Protection Avbildsskydd - + Issue message 1305 when a program tries to load a sandboxed dll Utfärda meddelande 1305 när ett program försöker ladda en sandlådad dll - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox Förhindra sandlådade program installerade på värden från att ladda DLL:s från sandlådan - + Dlls && Extensions Dll:s && förlängningar - + Description Beskrivning - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Sandboxie:s resurstillgångsregler särskiljer ofta emot programbinärer lokaliserade inuti sandlådan. OpenFilePath och OpenKeyPath fungerar bara för app-binärer lokaliserade på värden ursprungligen. För att kunna definiera en regel utan denna begränsning, måste OpenPipePath eller OpenConPath användas. Likaså, alla stängda(File|Key|Ipc)sökvägsdirektiv vilka är definierade via negation e.x. ClosedFilePath=!iexplore.exe,CUsers* kommer alltid vara stängda för binärer lokaliserade inuti en sandlåda. Båda begränsningspolicyerna kan inaktiveras på sidan Tillgångspolicy. Detta görs för att förhindra Rogue-processer inuti sandlådan från att skapa en namnändrad kopia av sig själva och tillgå skyddade resurser. En annan exploateringsvektor är injicerandet av ett bibliotek in i en auktoriserad process för att få tillgång till allting det ges tillgång till. Användande av Host Image Protection, kan detta förhindras genom att blockera applikationer (installerade på värden) körandes inuti en sandlåda från att ladda bibliotek från sandlådan självt. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. Sandboxies funktionalitet kan utökas genom att använda valfria dll`s som kan laddas in i varje sandlådad process av SbieDll.dll vid starten, tilläggshanteraren i globala inställningar erbjuder ett antal användbara förlängningar, väl installerade kan de aktiveras här för nuvarande låda. @@ -8258,20 +8258,20 @@ För att specificera en process, använd '$:program.exe' som sökväg. - + Action Aktion - + Port Port - - + + IP IP @@ -8281,7 +8281,7 @@ För att specificera en process, använd '$:program.exe' som sökväg. Protokoll - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. BEAKTA: Windows Filtering Platform är inte aktiverad med drivrutinen, därför tillämpas dessa regler endast i användarläge och kan inte påtvingas!!! Detta betyder att skadliga applikationer kan passera dem. @@ -8374,42 +8374,42 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver Tillämpa fil- och nyckelöppnardirektiv endast till binärer lokaliserade utanför sandlådan. - + File Recovery Filåterställning - + Add Folder Addera mapp - + Ignore Extension Ignorera förlängning - + Ignore Folder Ignorera mapp - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Aktivera meddelandet Omedelbart återställande för att kunna återställa filer så fort som de är skapade. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Du kan utesluta mappar och filtyper (eller filförlängningar) från omedelbart återställande. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. När funktionen Omedelbart återställande är åberopad, kommer följande mappar bli kontrollerade för sandlådat innehåll. - + Immediate Recovery Omedelbart återställande @@ -8418,17 +8418,17 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver Diverse alternativ - + Advanced Options Avancerade alternativ - + Miscellaneous Övrigt - + Emulate sandboxed window station for all processes Efterlikna sandlådad fönsterstation för alla processer @@ -8462,7 +8462,7 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver Tillåt endast priviligerade processer att tillgå Service Control Manager - + Force usage of custom dummy Manifest files (legacy behaviour) Tvinga användandet av anpassade modellmanifestfiler (legacy beteende) @@ -8483,8 +8483,8 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver Ändra inte fönsterklassnamn skapade av sandlådade program - - + + Compatibility Kompatibilitet @@ -8495,7 +8495,7 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver - + Protect the sandbox integrity itself Skydda själva sandlådans integritet @@ -8512,7 +8512,7 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver Tillåt användande av kapslade jobbobjekt (experimentell, fungerar på Windows 8 och senare) - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Inaktivera användandet av RpcMgmtSetComTimeout som standard (det kan lösa kompatibilitetsproblem) @@ -8577,57 +8577,57 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver Avancerad - + Add Option Addera alternativ - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. Här kan du konfigurera avancerade per process alternativ för förbättrande av kompatibiliteten och/eller anpassa sandlådningsbeteende. - + Option Alternativ - + Triggers Utlösare - + Event Händelse - - - - + + + + Run Command Kör kommandot - + Start Service Starta tjänsten - + These events are executed each time a box is started Dessa händelser verkställs varje gång en låda startas - + On Box Start Vid lådstart - - + + These commands are run UNBOXED just before the box content is deleted Dessa kommandon körs OLÅDADE precis innan lådinnehållet raderas @@ -8636,57 +8636,57 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver Vid lådraderande - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Dessa kommandon verkställs endast när en låda påbörjas. För att köra dem igen, måste lådinnehållet raderas. - + On Box Init Vid lådstart - + These commands are run UNBOXED after all processes in the sandbox have finished. Dessa kommandon körs OLÅDADE efter att alla processer i sandlådan har avslutats. - + Here you can specify actions to be executed automatically on various box events. Här kan du specificera aktioner att verkställas automatiskt vid varierande lådhändelser. - + Hide Processes Dölj processer - + Add Process Addera process - + Hide host processes from processes running in the sandbox. Dölj värdprocesser från processer körandes i sandlådan. - + Don't allow sandboxed processes to see processes running in other boxes Tillåt inte sandlådade processer att se processer som körs i andra lådor - + Users Användare - + Restrict Resource Access monitor to administrators only Begränsa resurstillgångsövervakning till administratörer endast - + Add User Addera användare @@ -8695,7 +8695,7 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver Ta bort användare - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8704,7 +8704,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Notera: Inställningarna Tvingade program och Tvinga mappar, för en sandlåda, gäller inte för användarkonton som inte kan använda sandlådan. - + Tracing Spårning @@ -8714,22 +8714,22 @@ Notera: Inställningarna Tvingade program och Tvinga mappar, för en sandlåda, API call spårning (kräver att LogAPI är installerat i sbie:s katalog) - + Pipe Trace Pipe Trace - + API call Trace (traces all SBIE hooks) API-anropspår (spårar alla SBIE hooks) - + Log all SetError's to Trace log (creates a lot of output) Logga alla SetError's till spårloggen (skapar en massa utflöde) - + Log Debug Output to the Trace Log Logga Debug Output till spårloggen @@ -8760,78 +8760,78 @@ istället för "*". Ntdll syscall-spår (skapar en massa utflöde) - + File Trace Filspår - + Disable Resource Access Monitor Inaktivera resurstillgångsövervakning - + IPC Trace IPC-spår - + GUI Trace GUI-spår - + Resource Access Monitor Resurstillgångsövervakare - + Access Tracing Tillgångsspårning - + COM Class Trace COM-class spår - + Key Trace Nyckelspår - + Network Firewall Nätverksbrandvägg - + DNS Request Logging Loggning av DNS-förfrågan - + Syscall Trace (creates a lot of output) Syscall spår (skapar en logg av utdata) - + Debug Felsök - + WARNING, these options can disable core security guarantees and break sandbox security!!! VARNING, dessa alternativ kan inaktivera kärnsäkerhetsgarantier och bryta sandlådesäkerhet!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Dessa alternativ är avsedda för felsökning av kompatibilitetsproblem, vänligen använd dem inte vid produktionsanvändning. - + App Templates Appmallar @@ -8840,22 +8840,22 @@ istället för "*". Kompatibilitetsmallar - + Filter Categories Filterkategorier - + Text Filter Textfilter - + Add Template Addera mall - + This list contains a large amount of sandbox compatibility enhancing templates Denna lista innehåller en stor mängd av kompatibilitetsutökande sandlådemallar @@ -8864,17 +8864,17 @@ istället för "*". Ta bort mall - + Category Kategori - + Template Folders Mallmappar - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8883,13 +8883,13 @@ Please note that this values are currently user specific and saved globally for Vänligen notera att detta värde är för tillfället användarspecifikt och sparas globalt för alla lådor. - - + + Value Värde - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8921,22 +8921,22 @@ istället för "*". Tillämpa Stäng...=!<programmet>,... regler även till alla binärer lokaliserade i sandlådan. - + Allow use of nested job objects (works on Windows 8 and later) Tillåt användning av kapslade jobbobjekt (fungerar på Windows 8 och senare) - + Accessibility Tillgänglighet - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. För att kompensera för det förlorade skyddet, vänligen konsultera inställningen Skippa rättigheter i Säkerhetsalternativ > Säkerhetshärdning > Förhöjningsbegränsningar. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Skärmläsare: JAWS, NVDA, Window-Eyes, Systemtillgång @@ -8956,148 +8956,143 @@ istället för "*". Konfigurera vilka processer som kan tillgå skrivbordsobjekt såsom Windows och liknande. - + Other Options Andra alternativ - + Port Blocking Portblockering - + Block common SAMBA ports Blockera vanliga SAMBA-portar - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Block DNS, UDP port 53 Blockera DNS, UDP-port 53 - + Quick Recovery Omedelbart återställande - + Various Options Olika alternativ - + Apply ElevateCreateProcess Workaround (legacy behaviour) Tillämpa ElevateCreateProcess-lösningen (legacy beteende) - + Use desktop object workaround for all processes Använd skrivbordsobjektlösningen för alla processer - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. När den globala snabbtangenten trycks 3 gånger i kort följd kommer detta undantag att ignoreras. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. Exkludera denna sandlåda från att bli avslutad när Avsluta alla processer är anropat. - + On Box Terminate Vid Låd Terminerande - + This command will be run before the box content will be deleted Detta kommando kommer köras före det att lådinnehållet raderas - + On File Recovery Vid filåterställande - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked Detta kommando kommer köras före det att en fil återställs och filsökvägen kommer att passeras som första argument. Om detta kommando returnerar något annat än 0, blockeras återställningen - + Run File Checker Kör filkontrolleraren - + On Delete Content Vid Radera innehåll @@ -9108,7 +9103,7 @@ istället för "*". - + Process Process @@ -9117,37 +9112,37 @@ istället för "*". Blockera även lästillgång till processer i denna sandlåda - + Templates Mallar - + Open Template Öppna mall - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Följande inställningar aktiverar användandet av Sandboxie i kombination med tillgänglighetsprogram. Vänligen notera att ett visst mått av Sandboxies skydd av nödvändighet förloras när dessa inställningar aktiveras. - + Edit ini Section Redigera ini-sektionen - + Edit ini Redigera ini - + Cancel Avbryt - + Save Spara diff --git a/SandboxiePlus/SandMan/sandman_tr.ts b/SandboxiePlus/SandMan/sandman_tr.ts index 0d41bf42..38cfb866 100644 --- a/SandboxiePlus/SandMan/sandman_tr.ts +++ b/SandboxiePlus/SandMan/sandman_tr.ts @@ -1371,7 +1371,7 @@ Not: Güncellemeler, yalnızca test edilen güncellemelerin sunulmasını sağla - + Template values can not be edited. Şablon değerleri düzenlenemez. @@ -1447,9 +1447,9 @@ Not: Güncellemeler, yalnızca test edilen güncellemelerin sunulmasını sağla - - - + + + Group: %1 Grup: %1 @@ -1552,11 +1552,11 @@ Not: Güncellemeler, yalnızca test edilen güncellemelerin sunulmasını sağla - - - - - + + + + + All Programs Tüm Programlar @@ -1846,82 +1846,82 @@ Lütfen bu dosyayı içeren bir klasör seçin. - + Any Herhangi - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Erişime izin ver - + Block using Windows Filtering Platform Windows Filtreleme Platformunu kullanarak engelle - + Block by denying access to Network devices Ağ cihazlarına erişimi reddederek engelle - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow İzin ver - + Block (WFP) Engelle (WFP) - + Block (NDev) Engelle (NDev) - + A non empty program name is required. Boş olmayan bir program adı gereklidir. - + Block Engelle @@ -6506,11 +6506,11 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - + + + + + Name Ad @@ -6522,7 +6522,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Yol - + Save Kaydet @@ -6558,17 +6558,17 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Başlıktaki korumalı alan göstergesi: - + Debug Hata Ayıklama - + Users Kullanıcılar - + Block network files and folders, unless specifically opened. Özel olarak açılmadıkça ağ dosyalarını ve klasörlerini engelle. @@ -6583,7 +6583,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Korumalı alandaki programlar tarafından oluşturulan pencere sınıfı adları değiştirilmesin - + Log Debug Output to the Trace Log Hata Ayıklama Çıktısını İzleme Günlüğüne Kaydet @@ -6593,7 +6593,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Wnd Sınıfı Ekle - + Access Tracing Erişim İzleme @@ -6618,7 +6618,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Tüm programların bu alanda başlamasına izin ver. - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Dosyalar oluşturulur oluşturulmaz kurtarabilmek için Anında Kurtarma istemini etkinleştir. @@ -6633,27 +6633,27 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Erişim - + These options are intended for debugging compatibility issues, please do not use them in production use. Bu seçenekler uyumluluk sorunlarındaki hataları ayıklamaya yönelik tasarlanmıştır, lütfen bu ayarları üretim amaçlı kullanmayın. - + Templates Şablonlar - + Text Filter Metin Filtresi - + Cancel İptal - + Restrict Resource Access monitor to administrators only Kaynak Erişimi İzleyicisini yalnızca yöneticilerle kısıtla @@ -6664,12 +6664,12 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Protect the sandbox integrity itself Korumalı alan bütünlüğünün kendisini koruyun - + Add Folder Klasör Ekle @@ -6679,7 +6679,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Kullanıcıya ablukadan muafiyete izin verip vermeyeceğini sor. - + IPC Trace IPC İzleme @@ -6699,15 +6699,15 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - - - - - - - + + + + + + + + + Remove Kaldır @@ -6722,8 +6722,8 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Bir programın internet erişimi reddedildiğinde 1307 mesajını yayınla - - + + Compatibility Uyumluluk @@ -6738,7 +6738,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Alan Seçenekleri - + Don't allow sandboxed processes to see processes running in other boxes Korumalı alandaki işlemlerin diğer alanlarda çalışan işlemleri görmesine izin verilmesin @@ -6758,7 +6758,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Seçili programların bu alanda başlamasını önle. - + Miscellaneous Çeşitli @@ -6768,7 +6768,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Dosya çok büyükse 2102 mesajını yayınla - + File Recovery Dosya Kurtarma @@ -6778,12 +6778,12 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Alan Silme Seçenekleri - + Pipe Trace Boru İzleme - + File Trace Dosya İzleme @@ -6795,14 +6795,14 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - - - + + + Program Program - + Add Process İşlem Ekle @@ -6816,7 +6816,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Program Ekle - + Filter Categories Kategorileri Filtrele @@ -6835,7 +6835,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for - + Protect the system from sandboxed processes Sistemi korumalı alandaki işlemlerden koru @@ -6845,7 +6845,7 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for SandboxiePlus Ayarları - + Category Kategori @@ -6860,17 +6860,17 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for Kayıt Anahtarı Ekle - + Hide Processes İşlemleri Gizle - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Hızlı Kurtarma işlevi çağrıldığında, aşağıdaki klasörler korumalı alan içeriği için denetlenecektir. - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -6894,7 +6894,7 @@ günlüğe kaydetme özelleştirilebilir. px Genişliği - + Add User Kullanıcı Ekle @@ -6909,12 +6909,12 @@ günlüğe kaydetme özelleştirilebilir. Program Zorla - + WARNING, these options can disable core security guarantees and break sandbox security!!! UYARI, bu seçenekler temel güvenlik garantilerini devre dışı bırakabilir ve korumalı alan güvenliğini bozabilir! - + Edit ini Ini Düzenle @@ -6933,31 +6933,31 @@ günlüğe kaydetme özelleştirilebilir. - - - - - + + + + + Show Templates Şablonları Göster - + Ignore Folder Klasörü Yok Say - + GUI Trace GKA İzleme - + Key Trace Tuş İzleme - + Tracing İzleme @@ -6972,7 +6972,7 @@ günlüğe kaydetme özelleştirilebilir. Korumalı alan işlemlerini iş nesnelerine ekle (Önerilir) - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Klasörleri ve dosya türlerini (veya dosya uzantılarını) Anında Kurtarma'nın dışında bırakabilirsiniz. @@ -6982,12 +6982,12 @@ günlüğe kaydetme özelleştirilebilir. Çalıştır Menüsü - + App Templates Uygulama Şablonları - + Ignore Extension Uzantıyı Yok Say @@ -6997,7 +6997,7 @@ günlüğe kaydetme özelleştirilebilir. Bu korumalı alanı silinmeye veya boşaltılmaya karşı koru - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -7011,7 +7011,7 @@ Not: Bir korumalı alana ilişkin Zorunlu Programlar ve Zorunlu Klasörler ayarl * Not: Bu korumalı alana yüklenen programlar hiçbir şekilde başlatılamaz. - + This list contains a large amount of sandbox compatibility enhancing templates Bu liste, korumalı alan uyumluluğunu geliştiren çok sayıda şablonlar içerir @@ -7031,12 +7031,12 @@ Not: Bir korumalı alana ilişkin Zorunlu Programlar ve Zorunlu Klasörler ayarl Kaynak Erişimi - + Advanced Options Gelişmiş Seçenekler - + Hide host processes from processes running in the sandbox. Korumalı alanda çalışan işlemlerden ana sistem işlemlerini gizler. @@ -7067,17 +7067,17 @@ Not: Bir korumalı alana ilişkin Zorunlu Programlar ve Zorunlu Klasörler ayarl Başlatma Kısıtlamaları - + Force usage of custom dummy Manifest files (legacy behaviour) Özel sahte Manifest dosyalarının kullanımını zorla (Eski davranış) - + Edit ini Section Ini Düzenleme Bölümü - + COM Class Trace COM Sınıf İzleme @@ -7117,7 +7117,7 @@ Not: Bir korumalı alana ilişkin Zorunlu Programlar ve Zorunlu Klasörler ayarl Uygulamaların yetkilendirilmiş çalıştıklarını düşünmelerini sağla (Yükleyicileri güvenli bir şekilde çalıştırmanıza izin verir) - + Network restrictions Ağ Kısıtlamaları @@ -7297,13 +7297,13 @@ Not: Bir korumalı alana ilişkin Zorunlu Programlar ve Zorunlu Klasörler ayarl - + Move Up Yukarı Taşı - + Move Down Aşağı Taşı @@ -7374,42 +7374,42 @@ Not: Bir korumalı alana ilişkin Zorunlu Programlar ve Zorunlu Klasörler ayarl Hangi işlemlerin pencereler ve benzeri masaüstü nesnelerine erişebileceğini yapılandırın. - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. Genel kısayol tuşuna art arda 3 kez basıldığında bu istisna göz ardı edilecektir. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. "Tüm İşlemleri Sonlandır" çalıştırıldığında bu korumalı alanı sonlandırılma dışında tut. - + Image Protection Görüntü Koruması - + Issue message 1305 when a program tries to load a sandboxed dll Bir program korumalı alandan bir DLL dosyası yüklemeye çalıştığında 1305 mesajını yayınla - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Sistemde yüklü korumalı alanda çalışan programların alan içinden DLL yüklemesini önle - + Dlls && Extensions DLL'ler && Uzantılar - + Description Açıklama - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Sandboxie'nin kaynak erişim kuralları, genellikle korumalı alan içinde bulunan program ikili dosyalarına göre ayrım yapar. OpenFilePath ve OpenKeyPath yalnızca ana sistemde yerel olarak bulunan uygulama ikili dosyaları için çalışır. @@ -7417,7 +7417,7 @@ Bu kısıtlama olmaksızın bir kural tanımlamak için OpenPipePath veya OpenCo Bu, korumalı alan içindeki haydut işlemlerin kendilerinin yeniden adlandırılmış bir kopyasını oluşturmasını ve korunan kaynaklara erişmesini önlemek için yapılır. Başka bir istismar vektörü de bir kütüphanenin yetkili bir işleme yerleşerek ona izin verilen her şeye erişim hakkı elde etmesidir. Ana Sistem Görüntü Koruması kullanılarak, bir korumalı alanda çalışan uygulamaların (ana sistemde yüklü) korumalı alanda bulunan kütüphaneleri yüklemesi engellenerek bu durum önlenebilir. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxie'nin işlevselliği, korumalı alanda herhangi bir işlem başlatıldığında SbieDll.dll tarafından ona yüklenebilen, isteğe bağlı DLL'ler kullanılarak genişletilebilir. Genel ayarlardaki Eklenti Yöneticisinde bazı yararlı uzantılar sunulmaktadır. Bunlar kurulduktan sonra geçerli korumalı alan için buradan etkinleştirilebilirler. @@ -7619,142 +7619,137 @@ Bir işlemi belirtmek için yol olarak '$:program.exe' kullanın.Ağ Seçenekleri - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Other Options Diğer Seçenekler - + Port Blocking Bağlantı Noktası Engelleme - + Block common SAMBA ports Yaygın SAMBA bağlantı noktalarını engelle - + Block DNS, UDP port 53 DNS, UDP bağlantı noktası 53'ü engelle - + Quick Recovery Hızlı Kurtarma - + Immediate Recovery Anında Kurtarma - + Various Options Çeşitli Seçenekler - + Apply ElevateCreateProcess Workaround (legacy behaviour) ElevateCreateProcess geçici çözümünü uygula (Eski davranış) - + Use desktop object workaround for all processes Masaüstü nesnesi geçici çözümünü tüm işlemler için kullan - + On Box Terminate Alan Sonlandığında - + This command will be run before the box content will be deleted Bu komut, alan içeriği silinmeden önce çalıştırılacaktır - + On File Recovery Dosya Kurtarmada - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked Bu komut, bir dosya kurtarılmadan önce çalıştırılacak ve dosya yolu ilk bağımsız değişken olarak aktarılacaktır. Bu komut 0'dan başka bir değer döndürürse, kurtarma işlemi engellenecektir - + Run File Checker Dosya Denetleyicisini Gir - + On Delete Content İçerik Silmede @@ -7765,37 +7760,37 @@ Bir işlemi belirtmek için yol olarak '$:program.exe' kullanın. - + Process İşlem - + Add Option Seçenek Ekle - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Burada, uyumluluğu artırmak veya korumalı alan davranışını özelleştirmek için işlem başına gelişmiş seçenekleri yapılandırabilirsiniz. - + Option Seçenek - + These commands are run UNBOXED after all processes in the sandbox have finished. Bu komutlar korumalı alandaki tüm işlemler sonlandıktan sonra ALAN DIŞINDAN çalıştırılır. - + API call Trace (traces all SBIE hooks) API çağrısı İzleme (tüm SBIE kancalarını izler) - + Log all SetError's to Trace log (creates a lot of output) Tüm SetError Mesajlarını İzleme Günlüğüne Kaydet (Çok fazla çıktı oluşturur) @@ -7810,37 +7805,37 @@ Bir işlemi belirtmek için yol olarak '$:program.exe' kullanın.Panoya okuma erişimini engelle - + Emulate sandboxed window station for all processes Tüm işlemler için korumalı alan pencere istasyonunu taklit et - + DNS Request Logging - + Syscall Trace (creates a lot of output) Syscall İzleme (Çok fazla çıktı oluşturur) - + Add Template Şablon Ekle - + Open Template Şablonu Aç - + Template Folders Şablon Klasörleri - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -7849,28 +7844,28 @@ Please note that this values are currently user specific and saved globally for Lütfen bu değerlerin kullanıcıya özel olduğunu ve tüm alanlar için global olarak kaydedildiğini unutmayın. - - + + Value Değer - + Accessibility Erişilebilirlik - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Kaybedilen korumayı telafi etmek için lütfen Güvenlik Seçenekleri > Güvenlik Sıkılaştırması altındaki Yetkilendirme Kısıtlamaları bölümü Hak Bırakma ayarlarına bakın. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Ekran Okuyucuları: JAWS, NVDA, Window-Eyes, System Access - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Aşağıdaki ayarlar, Sandboxie'nin erişilebilirlik yazılımıyla birlikte kullanılmasını sağlar. Lütfen bu ayarlar etkin olduğunda Sandboxie korumasının bir kısmının ister istemez kaybedildiğini unutmayın. @@ -7885,12 +7880,12 @@ Lütfen bu değerlerin kullanıcıya özel olduğunu ve tüm alanlar için globa Windows Güvenlik Hesap Yöneticisine açık erişim - + Disable Resource Access Monitor Kaynak Erişim İzleyicisini Devre Dışı Bırak - + Resource Access Monitor Kaynak Erişim İzleyicisi @@ -7983,20 +7978,20 @@ Lütfen bu değerlerin kullanıcıya özel olduğunu ve tüm alanlar için globa - + Action Eylem - + Port Bağlantı Noktası - - + + IP IP @@ -8006,7 +8001,7 @@ Lütfen bu değerlerin kullanıcıya özel olduğunu ve tüm alanlar için globa Protokol - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. DİKKAT: Windows Filtreleme Platformu sürücü ile etkinleştirilmemiştir, bu nedenle bu kurallar yalnızca kullanıcı modunda uygulanacaktır ve zorlanmaz! Bu, kötü amaçlı uygulamaların bunları atlayabileceği anlamına gelir. @@ -8022,7 +8017,7 @@ Lütfen bu değerlerin kullanıcıya özel olduğunu ve tüm alanlar için globa - + Network Firewall Ağ Güvenlik Duvarı @@ -8052,7 +8047,7 @@ Lütfen bu değerlerin kullanıcıya özel olduğunu ve tüm alanlar için globa Windows Kimlik Bilgileri Deposunu aç (Kullanıcı modu) - + Prevent change to network and firewall parameters (user mode) Ağ ve güvenlik duvarı parametrelerinde değişikliği engelle (Kullanıcı modu) @@ -8150,61 +8145,61 @@ The process match level has a higher priority than the specificity and describes İşlem eşleştirme düzeyi, özgüllükten daha yüksek bir önceliğe sahiptir ve bir kuralın belirli bir işleme nasıl uygulanacağını tanımlar. İşlem adına veya grubuna göre uygulanan kurallar en güçlü eşleştirme düzeyine sahiptir. Ardından olumsuzlama ile eşleştirme gelir, yani belirtilen işlem dışındaki tüm işlemlere uygulanan kurallara aittir; en düşük eşleştirme düzeyleri ise genel eşleştirmelere, yani herhangi bir işleme uygulanan kurallara aittir. - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Varsayılan olarak RpcMgmtSetComTimeout kullanımını devre dışı bırak (Uyumluluk sorunlarını çözebilir) - + Triggers Tetikleyiciler - + Event Olay - - - - + + + + Run Command Komut Gir - + Start Service Hizmeti Gir - + These events are executed each time a box is started Bu olaylar, bir alan her başlatıldığında yürütülür - + On Box Start Alan Başlangıcında - - + + These commands are run UNBOXED just before the box content is deleted Bu komutlar alan içeriği silinmeden hemen önce ALAN DIŞINDAN çalıştırılır - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Bu komutlar yalnızca bir alan ilk kullanıma hazırlandığında yürütülür. Tekrar çalışması için alan içeriğinin silinmesi gerekir. - + On Box Init Alan İlk Kullanımında - + Here you can specify actions to be executed automatically on various box events. Burada, çeşitli alan olaylarında otomatik olarak yürütülecek eylemleri belirleyebilirsiniz. @@ -8219,7 +8214,7 @@ The process match level has a higher priority than the specificity and describes Bir işlem erişimi reddedildiğinde 2111 mesajını yayınla - + Allow use of nested job objects (works on Windows 8 and later) İç içe iş nesnelerinin kullanımına izin ver (Windows 8 ve sonraki sürümlerde çalışır) diff --git a/SandboxiePlus/SandMan/sandman_uk.ts b/SandboxiePlus/SandMan/sandman_uk.ts index b722559e..7a6df68a 100644 --- a/SandboxiePlus/SandMan/sandman_uk.ts +++ b/SandboxiePlus/SandMan/sandman_uk.ts @@ -1632,11 +1632,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs Усі програми @@ -1647,9 +1647,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 Група: %1 @@ -1684,7 +1684,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. Шаблон не можна редагувати. @@ -2103,82 +2103,82 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Any Будь-який - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Дозволити доступ - + Block using Windows Filtering Platform Заборонити за допомогою Windows Filtering Platform - + Block by denying access to Network devices Заборонити, заблокувавши доступ до пристроїв мережі - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Дозволити - + Block (WFP) Заборонити (WFP) - + Block (NDev) Заборонити (NDev) - + A non empty program name is required. - + Block Заборонити @@ -6949,7 +6949,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes Захистити систему від процесів у пісочниці @@ -7094,12 +7094,12 @@ If you are a great patreaon supporter already, sandboxie can check online for an Обмеження друку - + Network restrictions Обмеження мережі - + Block network files and folders, unless specifically opened. Блокувати файли та папки у мережі, якщо вони не відкриті. @@ -7122,11 +7122,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name Назва @@ -7156,15 +7156,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove Прибрати @@ -7234,11 +7234,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates Показати шаблони @@ -7292,7 +7292,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Відкрити Сховище Windows Credentials (user mode) - + Prevent change to network and firewall parameters (user mode) Заборонити змінювати налаштування мережі та файрволу (user mode) @@ -7495,13 +7495,13 @@ If leader processes are defined, all others are treated as lingering processes.< - + Move Up Перемістити вгору - + Move Down Перемістити вниз @@ -7572,49 +7572,49 @@ If leader processes are defined, all others are treated as lingering processes.< - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + Image Protection - + Issue message 1305 when a program tries to load a sandboxed dll - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox - + Dlls && Extensions - + Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. @@ -7857,9 +7857,9 @@ To specify a process use '$:program.exe' as path. - - - + + + Program Програма @@ -7867,20 +7867,20 @@ To specify a process use '$:program.exe' as path. - + Action Дія - + Port Порт - - + + IP IP @@ -7890,7 +7890,7 @@ To specify a process use '$:program.exe' as path. Протокол - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. УВАГА: Windows Filtering Platform не увімнений у драйвері, тому ці правила можуть працювати тільки в користувальницькому режимі та можуть бути не застосовані!!! Шкідливі програми можуть це обійти. @@ -7937,57 +7937,57 @@ You can use 'Open for All' instead to make it apply to all programs, o Додати об'єкт COM - + File Recovery Відновлення файлів - + Quick Recovery - + Add Folder Додати папку - + Immediate Recovery Негайне відновлення - + Ignore Extension Ігнорувати розширення - + Ignore Folder Ігнорувати папку - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Увімкнути термінове відновлення файлів, щоб швидко відновити файли після їх створення. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Ви можете виключити деякі папки та типи файлів (або розширення файлів) з термінового відновлення. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Коли швидке відновлення викликано, ці папки будуть перевірені в пісочниці. - + Advanced Options Додаткові налаштування - + Miscellaneous Різне @@ -8008,7 +8008,7 @@ You can use 'Open for All' instead to make it apply to all programs, o - + Protect the sandbox integrity itself Захистити цілісність пісочниці @@ -8033,7 +8033,7 @@ You can use 'Open for All' instead to make it apply to all programs, o Ізоляція пісочниці - + Force usage of custom dummy Manifest files (legacy behaviour) Примусове використання користувальницьких файлів маніфесту (застаріле) @@ -8097,8 +8097,8 @@ The process match level has a higher priority than the specificity and describes Дозволити доступ до Service Control Manager тільки привільованим процесам - - + + Compatibility Сумістність @@ -8112,12 +8112,12 @@ The process match level has a higher priority than the specificity and describes Додати процеси у пісочниці до об'єктів завдань (рекомендовано) - + Emulate sandboxed window station for all processes Емулювати віконну станцію для всіх процесів у пісочниці - + Allow use of nested job objects (works on Windows 8 and later) Дозволити використання вкладених об'єктів завдань (працює тільки в Windows 8 та вище) @@ -8183,7 +8183,7 @@ The process match level has a higher priority than the specificity and describes COM/RPC - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Вимкнути використання RpcMgmtSetComTimeout за замовчуванням (може визивати проблеми з сумісністю) @@ -8212,41 +8212,41 @@ The process match level has a higher priority than the specificity and describes Ізоляція доступу - + Triggers Тригери - + Event Подія - - - - + + + + Run Command Виконати команду - + Start Service Запустити слубжу - + These events are executed each time a box is started Ці події виконуються щоразу, коли запускається контейнер - + On Box Start При запуску контейнера - - + + These commands are run UNBOXED just before the box content is deleted Ці команди виконуються ПОЗА ПІСОЧНИЦЕЮ безпосередньо перед видаленням вмісту контейнера @@ -8255,52 +8255,52 @@ The process match level has a higher priority than the specificity and describes При видаленні контейнера - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Ці команди виконуються лише після ініціалізації контейнера. Щоб запустити їх знову, вміст контейнера потрібно видалити. - + On Box Init При ініціалізації контейнера - + Here you can specify actions to be executed automatically on various box events. Тут ви можете вказати дії, які будуть виконуватися автоматично для різних подій контейнера. - + Hide Processes Сховати процеси - + Add Process Додати процес - + Hide host processes from processes running in the sandbox. Сховати процеси хоста від процесів, які виконуються в пісочниці. - + Don't allow sandboxed processes to see processes running in other boxes Не дозволяти ізольованим процесам бачити процеси, що виконуються в інших контейнерах - + Users Користувачі - + Restrict Resource Access monitor to administrators only Обмежити монітор доступу до ресурсів лише адміністраторам - + Add User Додати користувача @@ -8309,7 +8309,7 @@ The process match level has a higher priority than the specificity and describes Видалити користувача - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8318,23 +8318,23 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Примітка: Примусові налаштування програм і примусових папок для пісочниці не застосовуються до облікових записів користувачів, які не можуть використовувати пісочницю. - + Add Option - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. - + Option - + Tracing Відстежування @@ -8344,22 +8344,22 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Відстежування викликів API (потрібен logapi, який повинен бути встановлений у папку sbie) - + Pipe Trace Трасування pipe - + Log all SetError's to Trace log (creates a lot of output) Записувати всі SetError у журналі трасування (створює багато вихідних даних) - + Log Debug Output to the Trace Log Записувати дані відладки до журналу трасування - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8382,78 +8382,78 @@ instead of "*". Трасування системних викликів NTDLL (створює багато даних у виході) - + File Trace Трасування файлів - + Disable Resource Access Monitor Виключити монітор доступу до ресурсів - + IPC Trace Трасування IPC - + GUI Trace Трасування GUI - + Resource Access Monitor Монітор доступу до ресурсів - + Access Tracing Трасування доступу - + COM Class Trace Трасування COM Class - + Key Trace Трасування Key Trace - + Network Firewall Мережевий брандмауер - + These commands are run UNBOXED after all processes in the sandbox have finished. - + Syscall Trace (creates a lot of output) - + Debug Відладка - + WARNING, these options can disable core security guarantees and break sandbox security!!! УВАГА, ці налаштування можуть вимкнути захист ядра та зламати захист пісочниці!!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Ці параметри призначені для налагодження проблем із сумісністю, будь ласка, не використовуйте їх у виробництві. - + App Templates Шаблони для додатків @@ -8462,22 +8462,22 @@ instead of "*". Шаблони сумісності - + Filter Categories Категорії фільтрів - + Text Filter Текстовий фільтр - + Add Template Додати шаблон - + This list contains a large amount of sandbox compatibility enhancing templates Цей список має багату кількість шаблонів сумісності @@ -8486,17 +8486,17 @@ instead of "*". Прибрати - + Category Категорія - + Template Folders Папка з шаблонами - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8505,23 +8505,23 @@ Please note that this values are currently user specific and saved globally for Зауважте, що наразі ці значення є специфічними для користувача та зберігаються глобально для всіх контейнерів. - - + + Value Значення - + Accessibility Доступність - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Щоб компенсувати втрачений захист, зверніться до сторінки налаштувань Скинути права у групі налаштувань Обмежень. - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Читачі екрану: JAWS, NVDA, Window-Eyes, System Access @@ -8531,43 +8531,43 @@ Please note that this values are currently user specific and saved globally for - + Various Options - + Apply ElevateCreateProcess Workaround (legacy behaviour) - + Use desktop object workaround for all processes - + This command will be run before the box content will be deleted - + On File Recovery - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked - + Run File Checker - + On Delete Content @@ -8605,142 +8605,137 @@ Please note that this values are currently user specific and saved globally for - + Process Процес - + Other Options - + Port Blocking - + Block common SAMBA ports - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Block DNS, UDP port 53 - + On Box Terminate - + API call Trace (traces all SBIE hooks) - + DNS Request Logging - + Templates - + Open Template - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Ці налаштування допомагають використовувати Sandboxie з програмний забезпеченням для спеціальних можливостей. Зауважте, що при використанні цих параметрів, деякі функції захисту можуть не діяти. - + Edit ini Section Редагувати розділ ini файлу - + Edit ini Редагувати ini - + Cancel Скасувати - + Save Зберігти diff --git a/SandboxiePlus/SandMan/sandman_vi.ts b/SandboxiePlus/SandMan/sandman_vi.ts index 34c2f7f5..fdf138b1 100644 --- a/SandboxiePlus/SandMan/sandman_vi.ts +++ b/SandboxiePlus/SandMan/sandman_vi.ts @@ -1624,11 +1624,11 @@ Ghi chú: Việc kiểm tra bản cập nhật thường nằm sau bản phát h - - - - - + + + + + All Programs Tất cả Chương Trình @@ -1639,9 +1639,9 @@ Ghi chú: Việc kiểm tra bản cập nhật thường nằm sau bản phát h - - - + + + Group: %1 Nhóm: %1 @@ -1676,7 +1676,7 @@ Ghi chú: Việc kiểm tra bản cập nhật thường nằm sau bản phát h - + Template values can not be edited. Không thể chỉnh sửa giá trị mẫu. @@ -2095,82 +2095,82 @@ Ghi chú: Việc kiểm tra bản cập nhật thường nằm sau bản phát h - + Any Mọi Loại - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access Cho phép truy cập - + Block using Windows Filtering Platform Chặn bằng cách sử dụng Nền tảng lọc của Windows - + Block by denying access to Network devices Chặn bằng cách từ chối quyền truy cập vào các thiết bị Mạng - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow Cho phép - + Block (WFP) Chặn (WFP) - + Block (NDev) Chặn (NDev) - + A non empty program name is required. - + Block Chặn @@ -6873,7 +6873,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes Bảo vệ hệ thống khỏi các tiến trình Sandbox @@ -7014,12 +7014,12 @@ If you are a great patreaon supporter already, sandboxie can check online for an Hạn chế in ấn - + Network restrictions Hạn chế mạng - + Block network files and folders, unless specifically opened. Chặn các tệp và thư mục mạng, trừ khi được mở cụ thể. @@ -7042,11 +7042,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name Tên @@ -7076,15 +7076,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove Loại bỏ @@ -7150,11 +7150,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates Hiển thị Mẫu @@ -7204,7 +7204,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an Mở Windows Credentials Store (chế độ người dùng) - + Prevent change to network and firewall parameters (user mode) Ngăn chặn sự thay đổi đối với các thông số mạng và tường lửa (chế độ người dùng) @@ -7398,13 +7398,13 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Move Up Đi lên - + Move Down Đi xuống @@ -7486,49 +7486,49 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. - + Image Protection - + Issue message 1305 when a program tries to load a sandboxed dll - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox - + Dlls && Extensions - + Description - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. @@ -7738,9 +7738,9 @@ To specify a process use '$:program.exe' as path. - - - + + + Program Chương trình @@ -7748,20 +7748,20 @@ To specify a process use '$:program.exe' as path. - + Action Hoạt động - + Port Port - - + + IP IP @@ -7771,7 +7771,7 @@ To specify a process use '$:program.exe' as path. Giao thức - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. THẬN TRỌNG:Nền tảng lọc của Windows không được kích hoạt với trình điều khiển, do đó các quy tắc này sẽ chỉ được áp dụng trong chế độ người dùng và không thể được thực thi !!! Điều này có nghĩa là các ứng dụng độc hại có thể bỏ qua chúng. @@ -7849,57 +7849,57 @@ To specify a process use '$:program.exe' as path. Áp dụng Đóng...=!<chương trình>,... quy tắc cũng cho tất cả các tệp nhị phân nằm trong Sandbox. - + File Recovery Phục hồi tập tin - + Quick Recovery Khôi phục nhanh - + Add Folder Thêm thư mục - + Immediate Recovery Phục hồi ngay lập tức - + Ignore Extension Bỏ qua phần mở rộng - + Ignore Folder Bỏ qua thư mục - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. Bật lời nhắc Khôi phục ngay lập tức để có thể khôi phục tệp ngay sau khi chúng được tạo. - + You can exclude folders and file types (or file extensions) from Immediate Recovery. Bạn có thể loại trừ các thư mục và loại tệp (hoặc phần mở rộng tệp) khỏi Khôi phục ngay lập tức. - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. Khi chức năng Khôi phục nhanh được gọi, các thư mục sau sẽ được kiểm tra nội dung Sandbox. - + Advanced Options Tùy chọn nâng cao - + Miscellaneous Khác @@ -7920,7 +7920,7 @@ To specify a process use '$:program.exe' as path. - + Protect the sandbox integrity itself Bảo vệ tính toàn vẹn của hộp cát @@ -7941,7 +7941,7 @@ To specify a process use '$:program.exe' as path. Bảo vệ các quy trình HỆ THỐNG hộp cát khỏi các quy trình không có đặc quyền - + Force usage of custom dummy Manifest files (legacy behaviour) Buộc sử dụng các tệp Tệp kê khai giả tùy chỉnh (hành vi kế thừa) @@ -7993,8 +7993,8 @@ Mức độ đối sánh tiến trình có mức độ ưu tiên cao hơn mức Chỉ cho phép các quy trình đặc quyền truy cập Trình quản lý kiểm soát dịch vụ - - + + Compatibility Khả năng tương thích @@ -8004,7 +8004,7 @@ Mức độ đối sánh tiến trình có mức độ ưu tiên cao hơn mức Thêm các quy trình Sandbox vào các đối tượng công việc (được khuyến nghị) - + Emulate sandboxed window station for all processes Mô phỏng trạm cửa sổ Sandbox cho tất cả các quy trình @@ -8038,7 +8038,7 @@ Mức độ đối sánh tiến trình có mức độ ưu tiên cao hơn mức Cho phép đọc bộ nhớ của các quy trình không trong Sandbox (không được khuyến nghị) - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) Vô hiệu hóa việc sử dụng RpcMgmtSetComTimeout theo mặc định (điều này có thể giải quyết các vấn đề tương thích) @@ -8063,81 +8063,81 @@ Mức độ đối sánh tiến trình có mức độ ưu tiên cao hơn mức Các tùy chọn dưới đây có thể được sử dụng một cách an toàn khi bạn không cấp quyền quản trị viên. - + Triggers Triggers - + Event Event - - - - + + + + Run Command Chạy lệnh - + Start Service Bắt đầu dịch vụ - + These events are executed each time a box is started Các sự kiện này được thực thi mỗi khi một Sandbox được khởi động - + On Box Start Khi bắt đầu Sandbox - - + + These commands are run UNBOXED just before the box content is deleted Các lệnh này được chạy ngoài Sandbox ngay trước khi nội dung Sandbox bị xóa - + Allow use of nested job objects (works on Windows 8 and later) Cho phép sử dụng các đối tượng công việc lồng ghép nhau (hoạt động trên Windows 8 trở lên) - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. Các lệnh này chỉ được thực thi khi một Sandbox được khởi tạo. Để làm cho chúng chạy lại, nội dung Sandbox phải được xóa. - + On Box Init Khi khởi động Sandbox - + These commands are run UNBOXED after all processes in the sandbox have finished. - + Here you can specify actions to be executed automatically on various box events. Tại đây, bạn có thể chỉ định các hành động được thực thi tự động trên các sự kiện Sandbox khác nhau. - + Hide Processes Ẩn các tiến trình - + Add Process Thêm tiến trình - + Hide host processes from processes running in the sandbox. Ẩn các tiến trình máy chủ khỏi các tiến trình đang chạy trong Sandbox. @@ -8147,48 +8147,48 @@ Mức độ đối sánh tiến trình có mức độ ưu tiên cao hơn mức Những hạn chế - + Various Options Các tùy chọn khác nhau - + Apply ElevateCreateProcess Workaround (legacy behaviour) Áp dụng ElevateCreateProcess Workaround (hành vi cũ) - + Use desktop object workaround for all processes - + This command will be run before the box content will be deleted Lệnh này sẽ được chạy trước khi nội dung Sandbox bị xóa - + On File Recovery Khi phục hồi tệp - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked Lệnh này sẽ được chạy trước khi tệp được khôi phục và đường dẫn tệp sẽ được chuyển làm đối số đầu tiên. Nếu lệnh này trả về bất kỳ điều gì khác với 0, quá trình khôi phục sẽ bị chặn - + Run File Checker Chạy trình kiểm tra tệp - + On Delete Content Khi xóa nội dung - + Don't allow sandboxed processes to see processes running in other boxes Không cho phép các tiến trình trong Sandbox cát xem các quy trình đang chạy trong các Sandbox khác @@ -8199,7 +8199,7 @@ Mức độ đối sánh tiến trình có mức độ ưu tiên cao hơn mức - + Process Tiến trình @@ -8208,22 +8208,22 @@ Mức độ đối sánh tiến trình có mức độ ưu tiên cao hơn mức Chặn cũng đọc quyền truy cập vào các tiến trình trong Sandbox này - + Users Người dùng - + Restrict Resource Access monitor to administrators only Giới hạn giám sát Quyền truy cập tài nguyên chỉ dành cho quản trị viên - + Add User Thêm người dùng - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8232,23 +8232,23 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to Ghi chú: Cài đặt Buộc chương trình và Thư mục bắt buộc cho Sandbox không áp dụng cho các tài khoản người dùng không thể sử dụng Sandbox. - + Add Option Thêm tùy chọn - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. Tại đây, bạn có thể định cấu hình các tùy chọn nâng cao cho mỗi quy trình để cải thiện khả năng tương thích và / hoặc tùy chỉnh hành vi Sandbox. - + Option Tuỳ chọn - + Tracing Truy tìm @@ -8257,22 +8257,22 @@ Ghi chú: Cài đặt Buộc chương trình và Thư mục bắt buộc cho Sa Theo dõi cuộc gọi API (yêu cầu phải cài đặt LogAPI trong thư mục Sbie) - + Pipe Trace Pipe Trace - + Log all SetError's to Trace log (creates a lot of output) Ghi lại tất cả SetError' đến Nhật ký theo dõi (tạo ra nhiều đầu ra) - + Log Debug Output to the Trace Log Ghi đầu ra Gỡ lỗi vào Nhật ký theo dõi - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8295,113 +8295,113 @@ thay vì "*". Ntdll syscall Trace (tạo ra nhiều đầu ra) - + File Trace Theo dõi tệp - + Disable Resource Access Monitor Tắt tính năng giám sát quyền truy cập tài nguyên - + IPC Trace Theo dõi IPC - + GUI Trace Theo dõi giao diện người dùng - + Resource Access Monitor Giám sát truy cập tài nguyên - + Access Tracing Truy cập theo dõi - + COM Class Trace Theo dõi lớp COM - + Key Trace Theo dõi khoá - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. Để bù đắp cho sự bảo vệ đã mất, vui lòng tham khảo trang cài đặt Quyền thả trong nhóm cài đặt Hạn chế. - + Network Firewall Tường lửa mạng - + API call Trace (traces all SBIE hooks) - + Debug Gỡ lỗi - + WARNING, these options can disable core security guarantees and break sandbox security!!! CẢNH BÁO, các tùy chọn này có thể vô hiệu hóa các đảm bảo bảo mật cốt lõi và phá vỡ bảo mật Sandbox !!! - + These options are intended for debugging compatibility issues, please do not use them in production use. Các tùy chọn này nhằm gỡ lỗi các vấn đề tương thích, vui lòng không sử dụng chúng trong sản xuất. - + App Templates Mẫu ứng dụng - + Filter Categories Lọc danh mục - + Text Filter Bộ lọc văn bản - + Add Template Thêm mẫu - + This list contains a large amount of sandbox compatibility enhancing templates Danh sách này chứa một lượng lớn các mẫu nâng cao khả năng tương thích với Sandbox - + Category Loại - + Template Folders Thư mục Mẫu - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8410,8 +8410,8 @@ Please note that this values are currently user specific and saved globally for Xin lưu ý rằng các giá trị này hiện là dành riêng cho người dùng và được lưu trên toàn cầu cho tất cả các Sandbox. - - + + Value Giá trị @@ -8443,147 +8443,142 @@ Xin lưu ý rằng các giá trị này hiện là dành riêng cho người dù - + Other Options - + Port Blocking - + Block common SAMBA ports - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Block DNS, UDP port 53 - + On Box Terminate - + DNS Request Logging - + Syscall Trace (creates a lot of output) - + Templates Mẫu - + Open Template - + Accessibility Khả năng tiếp cận - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access Trình đọc màn hình: JAWS, NVDA, Window-Eyes, System Access - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. Các cài đặt sau cho phép sử dụng Sandboxie kết hợp với phần mềm trợ năng. Xin lưu ý rằng một số biện pháp bảo vệ Sandboxie nhất thiết bị mất khi các cài đặt này có hiệu lực. - + Edit ini Section Chỉnh sửa file .ini - + Edit ini Chỉnh sửa ini - + Cancel Hủy bỏ - + Save Lưu diff --git a/SandboxiePlus/SandMan/sandman_zh_CN.ts b/SandboxiePlus/SandMan/sandman_zh_CN.ts index ce862d57..238e1c38 100644 --- a/SandboxiePlus/SandMan/sandman_zh_CN.ts +++ b/SandboxiePlus/SandMan/sandman_zh_CN.ts @@ -2016,9 +2016,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 组: %1 @@ -2216,11 +2216,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs 所有程序 @@ -2255,7 +2255,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. 模板值不能被编辑 @@ -2370,82 +2370,82 @@ Please select a folder which contains this file. - + Any 任意 - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access 允许访问 - + Block using Windows Filtering Platform 阻止访问 - 使用 Windows 筛选平台 (WFP) - + Block by denying access to Network devices 阻止访问 - 通过禁止访问网络设备 - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow 允许 - + Block (WFP) 阻止 (WFP) - + Block (NDev) 阻止 (网络设备) - + A non empty program name is required. 程序名不得为空 - + Block 阻止 @@ -6999,7 +6999,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes 保护系统免受沙盒内进程的影响 @@ -7009,7 +7009,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an 提权限制 - + Block network files and folders, unless specifically opened. 拦截对网络文件和文件夹的访问,除非专门开放访问权限 @@ -7019,7 +7019,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an 使应用程序认为自己已被提权运行(允许安全地运行安装程序) - + Network restrictions 网络限制 @@ -7169,11 +7169,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name 名称 @@ -7203,15 +7203,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove 移除 @@ -7277,11 +7277,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates 显示模板 @@ -7316,7 +7316,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an 开放 Windows 凭据存储访问权限 (用户态) - + Prevent change to network and firewall parameters (user mode) 拦截对网络及防火墙参数的更改 (用户态) @@ -7423,9 +7423,9 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - + + + Program 程序 @@ -7465,47 +7465,47 @@ If you are a great patreaon supporter already, sandboxie can check online for an 添加 IPC 路径 - + File Recovery 文件恢复 - + Add Folder 添加文件夹 - + Ignore Extension 忽略扩展名 - + Ignore Folder 忽略文件夹 - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. 启用快速恢复提示,以便快速恢复创建的文件 - + You can exclude folders and file types (or file extensions) from Immediate Recovery. 可以在此处从快速恢复中排除特定目录和文件类型(扩展名) - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. 当快速恢复功能被调用时,检查沙盒内的下列文件夹 - + Advanced Options 高级选项 - + Miscellaneous 杂项 @@ -7526,13 +7526,13 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the sandbox integrity itself 沙盒完整性保护 - - + + Compatibility 兼容性 @@ -7542,7 +7542,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an 添加沙盒化进程到作业对象 (推荐) - + Force usage of custom dummy Manifest files (legacy behaviour) 强制使用自定义虚拟 Manifest 文件 (传统行为) @@ -7552,7 +7552,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an 仅允许特权进程访问“服务控制管理器” - + Emulate sandboxed window station for all processes 为所有进程模拟沙盒化的窗口状况 @@ -7563,47 +7563,47 @@ If you are a great patreaon supporter already, sandboxie can check online for an 开放 Windows 安全帐户管理器 (SAM) 的访问权限 - + Hide Processes 隐藏进程 - + Add Process 添加进程 - + Hide host processes from processes running in the sandbox. 对沙盒内运行的进程隐藏宿主的进程 - + Don't allow sandboxed processes to see processes running in other boxes 不允许沙盒内的进程查看其它沙盒里运行的进程 - + These commands are run UNBOXED after all processes in the sandbox have finished. 沙盒中的所有进程结束后,这些命令将在无沙盒的环境下运行。 - + Users 用户 - + Restrict Resource Access monitor to administrators only 仅允许管理员访问“资源访问监视器” - + Add User 添加用户 - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -7612,32 +7612,32 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to 注意:沙盒的必沙程序及文件夹设置不适用于不能运行沙盒的系统用户 - + Tracing 跟踪 - + API call Trace (traces all SBIE hooks) API 调用跟踪 (跟踪所有 SBIE 钩子) - + COM Class Trace COM 类跟踪 - + IPC Trace IPC 跟踪 - + Key Trace 键值跟踪 - + GUI Trace GUI 跟踪 @@ -7682,13 +7682,13 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to - + Move Up 上移 - + Move Down 下移 @@ -7718,33 +7718,33 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to 访问隔离 - + Image Protection 映像保护 - + Issue message 1305 when a program tries to load a sandboxed dll 当一个程序试图加载一个沙盒内部的动态链接库(.dll)文件时,提示问题代码 1305 - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox 阻止安装在宿主上的沙盒程序从沙盒内部加载DLL(动态链接库)文件 - + Dlls && Extensions Dll && 扩展 - + Description 说明 - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Sandboxie 的资源访问规则通常对位于沙盒内的二进制程序具有歧视性 @@ -7763,7 +7763,7 @@ This is done to prevent rogue processes inside the sandbox from creating a renam 使用主机映像保护,可以通过阻止在沙盒内运行的应用程序(安装在宿主上的)加载来自沙盒的动态链接库来防止此类现象 - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. 沙盒功能可以使用可选的.dll文件来获得增强,这些.dll文件可以在SbieDll.dll启动时加载到每个沙盒进程中。全局设置中的插件管理器提供了一些有用的扩展。安装后,就可以在这里为当前的沙盒启用。 @@ -7987,20 +7987,20 @@ To specify a process use '$:program.exe' as path. - + Action 动作 - + Port 端口 - - + + IP IP @@ -8010,7 +8010,7 @@ To specify a process use '$:program.exe' as path. 协议 - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. 警告:未在此驱动程序启用 Windows 筛选平台,因此以下规则只能在用户模式下生效,无法被强制执行!!!恶意程序可能会绕过这些规则的限制 @@ -8057,7 +8057,7 @@ The process match level has a higher priority than the specificity and describes 以系统进程启动沙盒服务 RpcSs (不推荐) - + Allow use of nested job objects (works on Windows 8 and later) Allow use of nested job objects (experimental, works on Windows 8 and later) 允许使用嵌套作业对象(job object) (仅适用于 Windows 8 及更高版本) @@ -8104,7 +8104,7 @@ The process match level has a higher priority than the specificity and describes 进程被拒绝访问非沙盒进程内存时,提示问题代码 2111 - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) 默认禁用 RpcMgmtSetComTimeout (或许可以解决兼容性问题) @@ -8133,56 +8133,56 @@ The process match level has a higher priority than the specificity and describes 以下选项可以在你未授予管理员权限时安全的使用 - + Triggers 触发器 - + Event 事件 - - - - + + + + Run Command 执行命令 - + Start Service 启动服务 - + These events are executed each time a box is started 这些事件当沙盒每次启动时都会被执行 - + On Box Start 沙盒启动阶段 - - + + These commands are run UNBOXED just before the box content is deleted 这些命令将在删除沙盒的内容之前,以非沙盒化的方式被执行 - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. 这些命令只在沙盒被初始化时执行,要使它们再次运行,必须删除沙盒内容 - + On Box Init 沙盒初始阶段 - + Here you can specify actions to be executed automatically on various box events. 在此处可以配置各种沙盒事件中自动执行特定的动作 @@ -8192,32 +8192,32 @@ The process match level has a higher priority than the specificity and describes API 调用跟踪 (需要安装 LogAPI 模块到沙盒目录) - + Log all SetError's to Trace log (creates a lot of output) 记录所有 SetError 到跟踪日志 (将产生大量输出) - + File Trace 文件跟踪 - + Pipe Trace 管道跟踪 - + Access Tracing 访问跟踪 - + Log Debug Output to the Trace Log 调试日志输出到跟踪日志 - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8240,73 +8240,73 @@ instead of "*". Ntdll 系统调用跟踪 (将产生大量输出) - + Disable Resource Access Monitor 禁用资源访问监控器 - + Resource Access Monitor 资源访问监控 - + Network Firewall 网络防火墙 - + Debug 调试 - + WARNING, these options can disable core security guarantees and break sandbox security!!! 警告,这些选项可使核心安全保障失效并且破坏沙盒安全! - + These options are intended for debugging compatibility issues, please do not use them in production use. 这些选项是为调试兼容性问题提供的,日常使用者勿碰。 - + App Templates 应用模板 - + Filter Categories 类别筛选 - + Text Filter 文本筛选 - + Add Template 添加模板 - + This list contains a large amount of sandbox compatibility enhancing templates 此列表含有大量的沙盒兼容性增强模板 - + Category 类别 - + Template Folders 目录模板 - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8315,23 +8315,23 @@ Please note that this values are currently user specific and saved globally for 请注意,这些值对当前用户的所有沙盒保存 - - + + Value - + Accessibility 无障碍功能 - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. 要弥补失去的保护,请参考“限制”设置组中的降低权限部分 - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access 屏幕阅读器:JAWS、NVDA、Window-Eyes、系统无障碍接口 @@ -8535,122 +8535,117 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行 配置那些进程可以访问桌面组件(例如窗口等) - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Other Options 其它选项 - + Port Blocking 阻止端口 - + Block common SAMBA ports 阻止常见 SAMBA 端口 - + Block DNS, UDP port 53 阻止 DNS、UDP 端口 53 - + Quick Recovery 快速恢复 - + Immediate Recovery 即时恢复 - + Various Options 其它杂项 - + Apply ElevateCreateProcess Workaround (legacy behaviour) 应用 ElevateCreateProcess 解决方案 (传统行为) - + Use desktop object workaround for all processes 对所有进程应用桌面对象解决方案 - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. 当短时间连续按下全局热键3次时,此异常将被忽略。 - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. 当调用“终止所有进程”时,排除终止此沙盒的进程。 @@ -8659,33 +8654,33 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行 此命令在沙盒中的所有进程终止后运行。 - + On Box Terminate 在沙盒所有进程终止时 - + This command will be run before the box content will be deleted 该命令将在删除沙盒内容之前运行 - + On File Recovery 文件恢复阶段 - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked 该命令将在文件恢复前运行,文件路径将作为最先被传递的参数,如果该命令的返回值不为 0,恢复动作将被终止 - + Run File Checker 运行文件检查 - + On Delete Content 内容删除阶段 @@ -8696,7 +8691,7 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行 - + Process 进程 @@ -8705,63 +8700,63 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行 阻止对位于该沙盒中的进程的读取访问 - + Add Option 添加选项 - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. 在此处可以配置各个进程的高级选项,以提高兼容性或自定义沙盒的某些行为 - + Option 选项 - + DNS Request Logging DNS 请求日志 - + Syscall Trace (creates a lot of output) 系统调用追踪(产生大量输出) - + Templates 模板 - + Open Template 打开模板 - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. 以下设置允许 Sandboxie 与辅助功能软件结合,请注意:当这些设置生效时,会使 Sandboxie 的部分保护措施失效 - + Edit ini Section 配置文本 - + Edit ini 编辑配置 - + Cancel 取消 - + Save 保存 diff --git a/SandboxiePlus/SandMan/sandman_zh_TW.ts b/SandboxiePlus/SandMan/sandman_zh_TW.ts index 8e40d03a..9619ad29 100644 --- a/SandboxiePlus/SandMan/sandman_zh_TW.ts +++ b/SandboxiePlus/SandMan/sandman_zh_TW.ts @@ -1719,11 +1719,11 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - - - + + + + + All Programs 所有程式 @@ -1734,9 +1734,9 @@ Note: The update check is often behind the latest GitHub release to ensure that - - - + + + Group: %1 群組: %1 @@ -1771,7 +1771,7 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Template values can not be edited. 範本值無法編輯。 @@ -2191,82 +2191,82 @@ Note: The update check is often behind the latest GitHub release to ensure that - + Any 任何 - + TCP TCP - + UDP UDP - + ICMP ICMP - + Allow access 允許存取 - + Block using Windows Filtering Platform 阻止存取 - 使用 Windows 篩選平台 (WFP) - + Block by denying access to Network devices 阻止存取 - 透過拒絕對區域網路裝置的存取 - + Please enter a domain to be filtered - + Please enter IP and Port. - + entry: IP or Port cannot be empty - - + + Allow 允許 - + Block (WFP) 阻止 (WFP) - + Block (NDev) 阻止 (區域網路裝置) - + A non empty program name is required. 程式名稱不得為空。 - + Block 阻止 @@ -6967,7 +6967,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Protect the system from sandboxed processes 保護系統免受來自沙箱化處理程序的存取 @@ -7104,12 +7104,12 @@ If you are a great patreaon supporter already, sandboxie can check online for an 列印限制 - + Network restrictions 區域網路限制 - + Block network files and folders, unless specifically opened. 阻止區域網路檔案和資料夾的存取,除非額外開啟。 @@ -7132,11 +7132,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Name 名稱 @@ -7166,15 +7166,15 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - - - - - + + + + + + + + + Remove 移除 @@ -7240,11 +7240,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an - - - - - + + + + + Show Templates 顯示範本 @@ -7319,7 +7319,7 @@ If you are a great patreaon supporter already, sandboxie can check online for an 開放 Windows 憑證儲存存取權限 (使用者模式) - + Prevent change to network and firewall parameters (user mode) 防止對區域網路及防火牆參數的變更 (使用者模式) @@ -7556,13 +7556,13 @@ If you are a great patreaon supporter already, sandboxie can check online for an - + Move Up 向上移 - + Move Down 向下移 @@ -7582,40 +7582,40 @@ If you are a great patreaon supporter already, sandboxie can check online for an 存取隔離 - + Image Protection 映像保護 - + Issue message 1305 when a program tries to load a sandboxed dll 當一個程式試圖載入一個沙箱內部的應用程式擴充 (DLL) 檔案時,提示錯誤代碼 1305 - + Prevent sandboxed programs installed on the host from loading DLLs from the sandbox Prevent sandboxes programs installed on host from loading dll's from the sandbox 防止主機上安裝的沙箱化程式從沙箱載入應用程式擴充 (DLL) 檔案 - + Dlls && Extensions Dll && 擴充功能 - + Description 說明 - + Sandboxie’s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ‘ClosedFilePath=! iexplore.exe,C:Users*’ will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the “Access policies” page. This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself. Sandboxie 的資源存取規則通常對位於沙箱內的二進位程式具有歧視性。OpenFilePath 和 OpenKeyPath 只對主機上的原生程式 (安裝在主機上的) 有效。為了定義沒有此類限制的規則,則必須使用 OpenPipePath 和 OpenConfPath。同樣的,透過否定來定義所有的 Closed(File|Key|Ipc)Path 指令例如:'ClosedFilePath=! iexplore.exe,C:Users*' 將限制沙箱內的程式存取相應資源。這兩種限制原則都可以透過「存取原則」頁面來停用。 這樣做是為了防止沙箱內的流氓處理程序建立自己的重新命名複本並存取受保護的資源。另一個漏洞載體是將一個動態連結程式庫注入到一個被授權處理程序中,以取得對被授權處理程序所允許存取的一切資源的存取權。使用主機映像保護,可以透過阻止在沙箱內執行的應用程式 (安裝在主機上的) 載入來自沙箱的動態連結程式庫來防止此類現象。 - + Sandboxie's functionality can be enhanced by using optional DLLs which can be loaded into each sandboxed process on start by the SbieDll.dll file, the add-on manager in the global settings offers a couple of useful extensions, once installed they can be enabled here for the current box. Sandboxies functionality can be enhanced using optional dll’s which can be loaded into each sandboxed process on start by the SbieDll.dll, the add-on manager in the global settings offers a couple useful extensions, once installed they can be enabled here for the current box. Sandboxie 的功能可以透過使用可選 DLL 加以增強,這些 DLL 可在啟動時透過 SbieDll.dll 檔案載入到每個沙箱執行緒中,全域設定中的附加元件管理員提供了一些實用擴充套件,安裝後可以在此處對目前沙箱啟用。 @@ -7824,9 +7824,9 @@ To specify a process use '$:program.exe' as path. - - - + + + Program 程式 @@ -7834,20 +7834,20 @@ To specify a process use '$:program.exe' as path. - + Action 動作 - + Port 連接埠 - - + + IP IP @@ -7857,7 +7857,7 @@ To specify a process use '$:program.exe' as path. 協定 - + CAUTION: Windows Filtering Platform is not enabled with the driver, therefore these rules will be applied only in user mode and can not be enforced!!! This means that malicious applications may bypass them. 警告: 未在驅動程式中啟動 Windows 篩選平台,因此以下規則只能在使用者模式下生效,無法被強制執行!!!惡意程式可能會繞過這些規則的限制。 @@ -7952,142 +7952,137 @@ To specify a process use '$:program.exe' as path. 將 Close...=!<program>,... 規則,套用到位於沙箱內的所有相關二進位檔。 - + DNS Filter - + Add Filter - + With the DNS filter individual domains can be blocked, on a per process basis. Leave the IP column empty to block or enter an ip to redirect. - + Domain - + Internet Proxy - + Add Proxy - + Test Proxy - + Auth - + Login - + Password - + Sandboxed programs can be forced to use a preset SOCKS5 proxy. - - Encrypt Passwords - - - - + Resolve hostnames via proxy - + Other Options 其他選項 - + Port Blocking 封鎖連接埠 - + Block common SAMBA ports 封鎖常見 SAMBA 連接埠 - + Block DNS, UDP port 53 封鎖 DNS UDP 連接埠 53 - + File Recovery 檔案復原 - + Quick Recovery 快速復原 - + Add Folder 加入資料夾 - + Immediate Recovery 即時復原 - + Ignore Extension 忽略副檔名 - + Ignore Folder 忽略資料夾 - + Enable Immediate Recovery prompt to be able to recover files as soon as they are created. 啟用快速復原提示,以便快速復原建立的檔案。 - + You can exclude folders and file types (or file extensions) from Immediate Recovery. 您可以從快速復原中排除特定目錄和檔案類型 (副檔名)。 - + When the Quick Recovery function is invoked, the following folders will be checked for sandboxed content. 當快速復原功能被執行時,下列資料夾將為沙箱化內容被檢查。 - + Advanced Options 進階選項 - + Miscellaneous 雜項 @@ -8108,7 +8103,7 @@ To specify a process use '$:program.exe' as path. - + Protect the sandbox integrity itself 保護沙箱本身的完整性 @@ -8129,7 +8124,7 @@ To specify a process use '$:program.exe' as path. 保護沙箱中的系統處理程序免受非特權處理程序的影響 - + Force usage of custom dummy Manifest files (legacy behaviour) 強制使用自訂虛擬 Manifest 檔案 (遺留行為) @@ -8181,8 +8176,8 @@ The process match level has a higher priority than the specificity and describes 僅允許已有特權的處理程序存取服務控制管理員 - - + + Compatibility 相容性 @@ -8192,7 +8187,7 @@ The process match level has a higher priority than the specificity and describes 加入沙箱化處理程序至作業物件 (推薦) - + Emulate sandboxed window station for all processes 為所有處理程序模擬沙箱化視窗站台 @@ -8226,7 +8221,7 @@ The process match level has a higher priority than the specificity and describes 允許讀取非沙箱處理程序的記憶體 (不推薦) - + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) 預設情況下停用 RpcMgmtSetComTimeout (這可能會解決相容性問題) @@ -8251,56 +8246,56 @@ The process match level has a higher priority than the specificity and describes 以下選項可以在您未授予管理員許可時安全的使用。 - + Triggers 觸發器 - + Event 事件 - - - - + + + + Run Command 執行命令 - + Start Service 啟動服務 - + These events are executed each time a box is started 這些事件當沙箱每次啟動時都會被執行 - + On Box Start 沙箱啟動階段 - - + + These commands are run UNBOXED just before the box content is deleted 這些命令將在刪除沙箱的內容之前,以非沙箱化的方式被執行 - + Allow use of nested job objects (works on Windows 8 and later) 允許使用嵌套作業物件 (job object) (適用於 Windows 8 及更高版本) - + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. 這些命令只在沙箱被初始化時執行。要使它們再次執行,必須刪除沙箱內容。 - + On Box Init 沙箱初始化階段 @@ -8309,27 +8304,27 @@ The process match level has a higher priority than the specificity and describes 此命令在沙箱中所有執行緒完成後執行。 - + On Box Terminate 沙箱終止階段 - + Here you can specify actions to be executed automatically on various box events. 在這裡,您可以設定各種沙箱事件中自動執行特定的動作。 - + Hide Processes 隱藏處理程序 - + Add Process 加入處理程序 - + Hide host processes from processes running in the sandbox. 面向沙箱內執行的處理程序隱藏的主機處理程序。 @@ -8344,63 +8339,63 @@ The process match level has a higher priority than the specificity and describes 限制 - + Various Options 差異性選項 - + Apply ElevateCreateProcess Workaround (legacy behaviour) 套用 ElevateCreateProcess 因應措施 (遺留行為) - + Use desktop object workaround for all processes 對所有處理程序使用桌面物件因應措施 - + When the global hotkey is pressed 3 times in short succession this exception will be ignored. 當全域性快速鍵在短時間連續按下 3 次時,此異常將被忽略。 - + Exclude this sandbox from being terminated when "Terminate All Processes" is invoked. 當呼叫「終止所有執行緒」時,排除此沙箱。 - + These commands are run UNBOXED after all processes in the sandbox have finished. 這些指令將在沙箱內全部執行緒完成後以「未沙箱化」狀態執行。 - + This command will be run before the box content will be deleted 該命令將在刪除沙箱內容之前執行 - + On File Recovery 檔案復原階段 - + This command will be run before a file is being recovered and the file path will be passed as the first argument. If this command returns anything other than 0, the recovery will be blocked This command will be run before a file is being recoverd and the file path will be passed as the first argument, if this command return something other than 0 the recovery will be blocked 該命令將在檔案復原前執行,檔案路徑將作為第一個參數被傳遞,如果該命令的返回值不是 0,則復原將被阻止 - + Run File Checker 執行檔案檢查程式 - + On Delete Content 內容刪除階段 - + Don't allow sandboxed processes to see processes running in other boxes 不允許沙箱內的處理程序檢視其他沙箱內執行的處理程序 @@ -8411,7 +8406,7 @@ The process match level has a higher priority than the specificity and describes - + Process 處理程序 @@ -8420,22 +8415,22 @@ The process match level has a higher priority than the specificity and describes 阻止對位於該沙箱中的處理程序的讀取 - + Users 使用者 - + Restrict Resource Access monitor to administrators only 僅允許管理員存取資源存取監控 - + Add User 加入使用者 - + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. @@ -8444,23 +8439,23 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to 注意: 沙箱的強制沙箱程式及資料夾設定不適用於不能使用沙箱的帳戶。 - + Add Option 加入選項 - + Here you can configure advanced per process options to improve compatibility and/or customize sandboxing behavior. Here you can configure advanced per process options to improve compatibility and/or customize sand boxing behavior. 在此處可以設定各個處理程序的進階選項,以提高相容性或自訂沙箱的某些行為。 - + Option 選項 - + Tracing 追蹤 @@ -8469,22 +8464,22 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to API 呼叫追蹤 (需要在沙箱資料夾中安裝 LogAPI) - + Pipe Trace Pipe 追蹤 - + Log all SetError's to Trace log (creates a lot of output) 記錄所有 SetError 至追蹤日誌 (產生大量輸出) - + Log Debug Output to the Trace Log 紀錄偵錯輸出至追蹤日誌 - + Log all access events as seen by the driver to the resource access log. This options set the event mask to "*" - All access events @@ -8507,113 +8502,113 @@ instead of "*". Ntdll 系統呼叫追蹤 (將產生大量輸出) - + File Trace 檔案追蹤 - + Disable Resource Access Monitor 停用資源存取監控 - + IPC Trace IPC 追蹤 - + GUI Trace GUI 追蹤 - + Resource Access Monitor 資源存取監控 - + Access Tracing 存取追蹤 - + COM Class Trace COM 類別追蹤 - + Key Trace 機碼追蹤 - + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. 為了彌補失去的保護,請參考「限制」設定組中的「廢棄許可」部分。 - + Network Firewall 區域網路防火牆 - + API call Trace (traces all SBIE hooks) API 呼叫追蹤 (追蹤全部 SBIE 勾點) - + Debug 偵錯 - + WARNING, these options can disable core security guarantees and break sandbox security!!! 警告,這些選項可使核心安全性保障失效並且破壞沙箱安全性! - + These options are intended for debugging compatibility issues, please do not use them in production use. 這些選項是為偵錯相容性問題設計的,請勿用於生產力用途。 - + App Templates 軟體範本 - + Filter Categories 篩選類別 - + Text Filter 篩選文字 - + Add Template 加入範本 - + This list contains a large amount of sandbox compatibility enhancing templates 此清單含有大量的相容性增強範本 - + Category 類別 - + Template Folders 範本資料夾 - + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. @@ -8622,63 +8617,63 @@ Please note that this values are currently user specific and saved globally for 請注意,這些值為目前使用者針對所有沙箱儲存。 - - + + Value - + DNS Request Logging DNS 請求日誌紀錄 - + Syscall Trace (creates a lot of output) Syscall 追蹤 (建立大量輸出) - + Templates 範本 - + Open Template 開啟範本 - + Accessibility 協助工具 - + Screen Readers: JAWS, NVDA, Window-Eyes, System Access 螢幕閱讀器: JAWS、NVDA、Window-Eyes、系統協助工具 - + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. 以下設定允許 Sandboxie 與協助工具軟體結合。請注意當這些設定生效時,必然會失去部分 Sandboxie 保護措施。 - + Edit ini Section 編輯 ini 區段 - + Edit ini 編輯 ini - + Cancel 取消 - + Save 儲存