Sync SBIE Plus language files (lupdate)

This commit is contained in:
github-actions[bot] 2024-07-26 17:16:09 +00:00
parent 03951c62d3
commit f90e9ad02f
19 changed files with 445 additions and 347 deletions

View File

@ -3373,9 +3373,8 @@ Anders als der Vorschaukanal, enthält es keine ungetesteten, möglicherweise fe
<translation type="vanished">Sie haben einen falschen Boxnamen eingegeben! Es wurde nichts geändert.</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation>Vorgang durch Benutzer abgebrochen.</translation>
<translation type="vanished">Vorgang durch Benutzer abgebrochen.</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
@ -3390,6 +3389,7 @@ Anders als der Vorschaukanal, enthält es keine ungetesteten, möglicherweise fe
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5047,8 +5047,8 @@ This file is part of Sandboxie and all change done to it will be reverted next t
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Diese Sandbox ist deaktiviert oder auf andere Gruppen/Benutzer beschränkt. Möchten Sie die Sandbox bearbeiten?</translation>
</message>
<message>
@ -7638,9 +7638,11 @@ an Stelle von &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Sandboxies Ressourcenzugriffsregeln benachteiligen häufiger Programme in der Sandbox. OpenFilePath und OpenKeyPath funktionieren nur für Programme, die sich auf dem Host befinden. Um eine Regel ohne diese Beschränkungen zu definieren, müssen OpenPipePath oder OpenConfPath verwendet werden. Ebenso werden alle Closed(File|Key|Ipc)Path Anweisungen, welche durch eine Negation definiert werden, z.B. ClosedFilePath=! iexplore.exe,C:Users*, immer für Programmdateien (Binaries), die sich innerhalb einer Sandbox befinden, geschlossen sein. Beide Beschränkungen lassen sich auf der Zugriffsrichtlinien-Seite ausschalten.
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Sandboxies Ressourcenzugriffsregeln benachteiligen häufiger Programme in der Sandbox. OpenFilePath und OpenKeyPath funktionieren nur für Programme, die sich auf dem Host befinden. Um eine Regel ohne diese Beschränkungen zu definieren, müssen OpenPipePath oder OpenConfPath verwendet werden. Ebenso werden alle Closed(File|Key|Ipc)Path Anweisungen, welche durch eine Negation definiert werden, z.B. ClosedFilePath=! iexplore.exe,C:Users*, immer für Programmdateien (Binaries), die sich innerhalb einer Sandbox befinden, geschlossen sein. Beide Beschränkungen lassen sich auf der Zugriffsrichtlinien-Seite ausschalten.
Dies wird gemacht um bösartige Prozesse in einer Sandbox daran zu hindern, eine umbenannte Kopie von sich selbst zu erstellen, um so auf geschützte Ressourcen zuzugreifen. Ein anderes Einfallstor ist die Injektion einer Programmbibliothek in einen befugten Prozess um Zugang zu allem zu erhalten, auf das dieser Prozess Zugriff hat. Mit der Verwendung des Abbildschutzes (Host Image Protection), kann dies verhindert werden, durch die Blockierung des Ladens von Programmbibliotheken innerhalb der Sandbox in Programme (installiert auf dem Hostrechner) die in einer Sandbox laufen.</translation>
</message>
<message>
@ -8068,8 +8070,9 @@ Der Prozessübereinstimmungslevel hat eine höhere Priorität als die Genauigkei
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Sicherheitsisolation durch die Verwendung eines stark eingeschränkten Prozesstokens ist Sandboxies hauptsächliches Mittel um Sandboxrestriktionen zu erzwingen. Falls dies deaktiviert ist, wird die Box im Applikationsunterteilungsmodus betrieben und bietet somit nicht länger verlässliche Sicherheit, sondern nur einfache Applikationsunterteilung.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Sicherheitsisolation durch die Verwendung eines stark eingeschränkten Prozesstokens ist Sandboxies hauptsächliches Mittel um Sandboxrestriktionen zu erzwingen. Falls dies deaktiviert ist, wird die Box im Applikationsunterteilungsmodus betrieben und bietet somit nicht länger verlässliche Sicherheit, sondern nur einfache Applikationsunterteilung.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1357"/>
@ -8218,8 +8221,9 @@ Bitte beachten Sie, dass diese Werte aktuell nutzerspezifisch sind und global f
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation>Wenn &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Boxverschlüsselung&lt;/a&gt; eingeschaltet ist, wird der Boxquellenordner, inklusive des Registryhives auf einem verschlüsselten Diskabbild, durch die Verwendung von &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS Implementierung, gespeichert.</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">Wenn &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Boxverschlüsselung&lt;/a&gt; eingeschaltet ist, wird der Boxquellenordner, inklusive des Registryhives auf einem verschlüsselten Diskabbild, durch die Verwendung von &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS Implementierung, gespeichert.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="348"/>
@ -8464,18 +8468,21 @@ Bitte beachten Sie, dass diese Werte aktuell nutzerspezifisch sind und global f
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<translation>Verstecke Firmwareinformationen</translation>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished">Verstecke Firmwareinformationen</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<translation>Einige Programme lesen Systemdetails über WMI (eine in Windows eingebaute Datenbank) aus, anstatt auf normalen Wegen. Zum Beispiel könnte &quot;tasklist.exe&quot; eine vollständige Prozessliste erhalten, selbst wenn &quot;HideOtherBoxes&quot; durch Zugriff auf WMI geöffnet wird. Aktivieren Sie diese Option, um dieses Verhalten zu beenden.</translation>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished">Einige Programme lesen Systemdetails über WMI (eine in Windows eingebaute Datenbank) aus, anstatt auf normalen Wegen. Zum Beispiel könnte &quot;tasklist.exe&quot; eine vollständige Prozessliste erhalten, selbst wenn &quot;HideOtherBoxes&quot; durch Zugriff auf WMI geöffnet wird. Aktivieren Sie diese Option, um dieses Verhalten zu beenden.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<translation>Hindere sandgeboxte Prozesse daran, über WMI auf Systemdetails zuzugreifen (siehe Tooltip für mehr Infos)</translation>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished">Hindere sandgeboxte Prozesse daran, über WMI auf Systemdetails zuzugreifen (siehe Tooltip für mehr Infos)</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4840"/>
@ -8494,8 +8501,9 @@ Bitte beachten Sie, dass diese Werte aktuell nutzerspezifisch sind und global f
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<translation>Speichere die aktuellen Firmwaretabellen in HKCU\System\SbieCustom</translation>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished">Speichere die aktuellen Firmwaretabellen in HKCU\System\SbieCustom</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4915"/>
@ -9482,8 +9490,9 @@ Bitte beachten Sie, dass diese Werte aktuell nutzerspezifisch sind und global f
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<translation>Füge &apos;Setze Erzwinge in Sandbox&apos; zum Kontextmenü hinzu</translation>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished">Füge &apos;Setze Erzwinge in Sandbox&apos; zum Kontextmenü hinzu</translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="650"/>

View File

@ -3872,11 +3872,6 @@ Please check if there is an update for sandboxie.</oldsource>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -3890,6 +3885,7 @@ Please check if there is an update for sandboxie.</oldsource>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5184,8 +5180,8 @@ This file is part of Sandboxie and all changed done to it will be reverted next
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished"></translation>
</message>
</context>
@ -7174,7 +7170,8 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -7355,8 +7352,10 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8020,8 +8019,9 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation></translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8254,18 +8254,20 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8285,7 +8287,8 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9394,7 +9397,8 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3197,6 +3197,7 @@ A diferencia del canal previo, no incluye cambios sin probar, potencialmente rom
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -3775,11 +3776,6 @@ A diferencia del canal previo, no incluye cambios sin probar, potencialmente rom
<source>You typed a wrong box name! Nothing was changed.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="2014"/>
<source>USB sandbox not found; creating: %1</source>
@ -5771,8 +5767,8 @@ NO seleccionará: %2</translation>
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Esta sandbox esta deshabilitada, ¿desea habilitarla?</translation>
</message>
</context>
@ -8224,8 +8220,9 @@ El proceso de nivel de coincidencia tiene mayor prioridad que la especificidad y
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>El aislamiento de seguridad a travez del uso de procesos fuertemente restringidos es el principal significado de Sandboxie de reforzar restricciones, cuando esto esta deshabilitado la caja es operada en modo de compartimiento de aplicación, ej. no provee seguridad confiable, simplemente solo compartimentación de aplicacion.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">El aislamiento de seguridad a travez del uso de procesos fuertemente restringidos es el principal significado de Sandboxie de reforzar restricciones, cuando esto esta deshabilitado la caja es operada en modo de compartimiento de aplicación, ej. no provee seguridad confiable, simplemente solo compartimentación de aplicacion.</translation>
</message>
<message>
<source>Disable Security Isolation (experimental)</source>
@ -8440,9 +8437,11 @@ en cambio de &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Las reglas de acceso a recursos de Sandboxie a menudo discriminan contra los binarios de programas ubicados dentro de la sandbox. OpenFilePath y OpenKeyPath funcionan solo para binarios de aplicaciones ubicadas de manera nativa en el ordenador. Para definir una regla sin esta restricción, se debe usar OpenPipePath o OpenConfPath. De igual manera, todas las directivas Closed(File|Key|Ipc)Path que se definen por negación, por ejemplo, &apos;ClosedFilePath=! iexplore.exe,C:Users*&apos; siempre estarán cerradas para binarios ubicados dentro de una sandbox. Ambas políticas de restricción pueden ser desactivadas en la página de &quot;Políticas de acceso&quot;.
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Las reglas de acceso a recursos de Sandboxie a menudo discriminan contra los binarios de programas ubicados dentro de la sandbox. OpenFilePath y OpenKeyPath funcionan solo para binarios de aplicaciones ubicadas de manera nativa en el ordenador. Para definir una regla sin esta restricción, se debe usar OpenPipePath o OpenConfPath. De igual manera, todas las directivas Closed(File|Key|Ipc)Path que se definen por negación, por ejemplo, &apos;ClosedFilePath=! iexplore.exe,C:Users*&apos; siempre estarán cerradas para binarios ubicados dentro de una sandbox. Ambas políticas de restricción pueden ser desactivadas en la página de &quot;Políticas de acceso&quot;.
Esto se hace para evitar que procesos maliciosos dentro de la sandbox creen una copia renombrada de mismos y accedan a recursos protegidos. Otro vector de explotación es la inyección de una biblioteca en un proceso autorizado para obtener acceso a todo lo que se le permite acceder. Utilizando la Protección de Imagen del Host, esto puede prevenirse bloqueando a las aplicaciones (instaladas en el host) que se ejecuten dentro de una sandbox y que carguen bibliotecas desde la propia sandbox.</translation>
</message>
<message>
@ -8776,8 +8775,9 @@ Para especificar un proceso, utiliza &apos;$:program.exe&apos; como ruta.</trans
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation>Cuando se activa la &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Encriptación de Caja&lt;/a&gt;, la carpeta raíz de la caja, incluido su registro, se almacena en una imagen de disco cifrada, utilizando la implementación AES-XTS de &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&lt;/a&gt;.</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">Cuando se activa la &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Encriptación de Caja&lt;/a&gt;, la carpeta raíz de la caja, incluido su registro, se almacena en una imagen de disco cifrada, utilizando la implementación AES-XTS de &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&lt;/a&gt;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="445"/>
@ -9145,7 +9145,8 @@ Para especificar un proceso, utiliza &apos;$:program.exe&apos; como ruta.</trans
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9405,18 +9406,20 @@ Por favor note que estos valores son especificos para usuario y guardados global
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9929,7 +9932,8 @@ Por favor note que estos valores son especificos para usuario y guardados global
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3239,6 +3239,7 @@ Contrairement au canal des Aperçus, cela n&apos;inclut pas les modifications no
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -3935,9 +3936,8 @@ Ce fichier fait partie de Sandboxie et toute modification faite sur lui sera ann
<translation type="vanished">Vous avez saisi un mauvais nom de bac ! Rien n&apos;a é modifié.</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation>L&apos;utilisateur a annulé cette opération.</translation>
<translation type="vanished">L&apos;utilisateur a annulé cette opération.</translation>
</message>
<message>
<location filename="SandMan.cpp" line="2014"/>
@ -5867,8 +5867,8 @@ Remarque : La recherche de mise à jour est souvent en retard par rapport à la
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Ce bac est désactivé ou restreint à un groupe/utilisateur ; voulez-vous le modifier ?</translation>
</message>
</context>
@ -8217,8 +8217,9 @@ Si des processus directeurs sont définis, tous les autres sont traités comme d
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation>Lorsque le &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;chiffrement de bac&lt;/a&gt; est activé, le dossier racine du bac (y compris sa ruche du registre) est stocké dans une image disque chiffrée en utilisant l&apos;implémentation AES-XTS de &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&lt;/a&gt;.</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">Lorsque le &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;chiffrement de bac&lt;/a&gt; est activé, le dossier racine du bac (y compris sa ruche du registre) est stocké dans une image disque chiffrée en utilisant l&apos;implémentation AES-XTS de &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&lt;/a&gt;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="445"/>
@ -8732,8 +8733,9 @@ Le niveau de correspondance du processus a une priorité plus élevée que la sp
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>L&apos;isolation de sécurité par l&apos;utilisation d&apos;un jeton de processus fortement restreint est le principal moyen utilisé par Sandboxie pour appliquer les restrictions du bac. Lorsque cette fonction est désactivée, le bac fonctionne en mode conteneur d&apos;applications, c&apos;est-à-dire qu&apos;il ne fournit plus de sécurité fiable, mais seulement une simple compartimentation des applications.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">L&apos;isolation de sécurité par l&apos;utilisation d&apos;un jeton de processus fortement restreint est le principal moyen utilisé par Sandboxie pour appliquer les restrictions du bac. Lorsque cette fonction est désactivée, le bac fonctionne en mode conteneur d&apos;applications, c&apos;est-à-dire qu&apos;il ne fournit plus de sécurité fiable, mais seulement une simple compartimentation des applications.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -9383,9 +9385,11 @@ Veuillez noter que ces valeurs sont actuellement spécifiques à l&apos;utilisat
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Les règles d&apos;accès aux ressources de Sandboxie discriminent souvent les binaires des programmes situés dans le bac. OpenFilePath et OpenKeyPath fonctionnent uniquement pour les binaires des applications situées nativement sur l&apos;hôte. Afin de définir une règle sans cette restriction, OpenPipePath et OpenConfPath doivent être utilisés. De même, toutes les directives Closed(File|Key|Ipc)Path qui sont définies par une négation (par exemple « ClosedFilePath=! iexplore.exe,C:Users* ») seront toujours fermées aux binaires situés dans un bac. Les deux politiques de restriction peuvent être désactivées sur la page « Politiques d&apos;accès ».
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Les règles d&apos;accès aux ressources de Sandboxie discriminent souvent les binaires des programmes situés dans le bac. OpenFilePath et OpenKeyPath fonctionnent uniquement pour les binaires des applications situées nativement sur l&apos;hôte. Afin de définir une règle sans cette restriction, OpenPipePath et OpenConfPath doivent être utilisés. De même, toutes les directives Closed(File|Key|Ipc)Path qui sont définies par une négation (par exemple « ClosedFilePath=! iexplore.exe,C:Users* ») seront toujours fermées aux binaires situés dans un bac. Les deux politiques de restriction peuvent être désactivées sur la page « Politiques d&apos;accès ».
Ceci est fait pour empêcher les processus malveillants à l&apos;intérieur du bac de créer une copie renommée d&apos;eux-mêmes et d&apos;accéder aux ressources protégées. Un autre vecteur d&apos;exploit est l&apos;injection d&apos;une bibliothèque dans un processus autorisé afin d&apos;accéder à tout ce qu&apos;il est autorisé d&apos;accéder. En utilisant la Protection d&apos;Image de l&apos;Hôte, cela peut être empêché en bloquant les applications (installées sur l&apos;hôte) lancées dans un bac de charger des bibliothèques depuis le bac lui-même.</translation>
</message>
<message>
@ -9551,19 +9555,21 @@ Ceci est fait pour empêcher les processus malveillants à l&apos;intérieur du
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<translation>Masquer les informations du microgiciel</translation>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished">Masquer les informations du microgiciel</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished">Certains programmes lisent les détails du système en se servant de WMI (une base de données incluse avec Windows) au lieu d&apos;utiliser des méthodes normales. Par exemple, « tasklist.exe » peut ainsi obtenir la liste complète des processus même si « Masquer les propres processus de Sandboxie de la liste des tâches » est activé. Utilisez cette option pour empêcher ce comportement.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<translation>Empêcher les processus d&apos;un bac d&apos;accéder aux détails du système en se servant de WMI (voir la bulle d&apos;aide pour plus d&apos;information)</translation>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished">Empêcher les processus d&apos;un bac d&apos;accéder aux détails du système en se servant de WMI (voir la bulle d&apos;aide pour plus d&apos;information)</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4840"/>
@ -9582,8 +9588,9 @@ Ceci est fait pour empêcher les processus malveillants à l&apos;intérieur du
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<translation>Copier la table du microgiciel actuel dans « HKCU\System\SbieCustom »</translation>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished">Copier la table du microgiciel actuel dans « HKCU\System\SbieCustom »</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4915"/>
@ -10292,8 +10299,9 @@ Ceci est fait pour empêcher les processus malveillants à l&apos;intérieur du
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<translation>Ajouter « Toujours forcer dans un bac à sable » au menu contextuel</translation>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished">Ajouter « Toujours forcer dans un bac à sable » au menu contextuel</translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="650"/>

View File

@ -3426,6 +3426,7 @@ This box &lt;a href=&quot;sbie://docs/privacy-mode&quot;&gt;prevents access to a
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -4030,11 +4031,6 @@ Nem választás: %2</translation>
<source>You typed a wrong box name! Nothing was changed.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1872"/>
<source>No Force Process</source>
@ -5400,8 +5396,8 @@ Ez a fájl a Sandboxie része, és minden rajta végzett módosítás vissza les
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Ez a homokozó le van tiltva. Bekapcsolja?</translation>
</message>
</context>
@ -7366,7 +7362,8 @@ If you are a great patreaon supporter already, sandboxie can check online for an
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -7782,8 +7779,10 @@ If you are a great patreaon supporter already, sandboxie can check online for an
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8345,8 +8344,9 @@ A folyamategyezési szint magasabb prioritású, mint a specifikusság, és leí
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Az erősen korlátozott folyamatjogkivonat használatával történő biztonsági elkülönítés a Sandboxie elsődleges eszköze a sandbox korlátozások érvényesítésére. Ha ez ki van kapcsolva, a homokozó alkalmazásrekesz módban működik, vagyis többé nem nyújt megbízható biztonságot, csak egyszerű alkalmazás-területekre bontás.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Az erősen korlátozott folyamatjogkivonat használatával történő biztonsági elkülönítés a Sandboxie elsődleges eszköze a sandbox korlátozások érvényesítésére. Ha ez ki van kapcsolva, a homokozó alkalmazásrekesz módban működik, vagyis többé nem nyújt megbízható biztonságot, csak egyszerű alkalmazás-területekre bontás.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8684,18 +8684,20 @@ A naplózást az ini használatával testreszabhatja, ha megadja:
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8715,7 +8717,8 @@ A naplózást az ini használatával testreszabhatja, ha megadja:
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9306,7 +9309,8 @@ Felhívjuk figyelmét, hogy ezek az értékek jelenleg felhasználóspecifikusak
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3743,11 +3743,6 @@ Effettuare la pulizia?</translation>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -3761,6 +3756,7 @@ Effettuare la pulizia?</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5456,8 +5452,8 @@ Questo file fa parte di Sandboxie e tutte le modifiche apportate ad esso saranno
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Quest&apos;area virtuale è disattivata, vuoi attivarla?</translation>
</message>
</context>
@ -7419,7 +7415,8 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -7960,9 +7957,11 @@ Se si è già un Great Supporter su Patreon, Sandboxie può verificare la presen
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Le regole di accesso alle risorse di Sandboxie spesso discriminano i programmi eseguibili all&apos;interno dell&apos;area virtuale. OpenFilePath e OpenKeyPath funzionano solo per gli eseguibili delle applicazioni situati sull&apos;host in modo nativo. Per definire una regola senza questa restrizione, è necessario utilizzare OpenPipePath o OpenConfPath. Allo stesso modo, tutte le regole Closed(File|Key|Ipc)Path che sono definite per negazione, ad esempio ClosedFilePath=!iexplore.exe,C:\Users* saranno sempre chiuse per gli eseguibili situati all&apos;interno dell&apos;area virtuale. Entrambi i criteri di restrizione possono essere disattivati dalla pagina Criteri di accesso.
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Le regole di accesso alle risorse di Sandboxie spesso discriminano i programmi eseguibili all&apos;interno dell&apos;area virtuale. OpenFilePath e OpenKeyPath funzionano solo per gli eseguibili delle applicazioni situati sull&apos;host in modo nativo. Per definire una regola senza questa restrizione, è necessario utilizzare OpenPipePath o OpenConfPath. Allo stesso modo, tutte le regole Closed(File|Key|Ipc)Path che sono definite per negazione, ad esempio ClosedFilePath=!iexplore.exe,C:\Users* saranno sempre chiuse per gli eseguibili situati all&apos;interno dell&apos;area virtuale. Entrambi i criteri di restrizione possono essere disattivati dalla pagina Criteri di accesso.
In questo modo si impedisce che i processi dannosi all&apos;interno dell&apos;area virtuale creino una copia rinominata di se stessi e accedano alle risorse protette. Un altro vettore di exploit è l&apos;iniezione di una libreria DLL in un processo autorizzato per ottenere l&apos;accesso a tutto ciò a cui è consentito accedere. Utilizzando la protezione dell&apos;immagine host, questo può essere evitato impedendo alle applicazioni (installate sull&apos;host) in esecuzione nell&apos;area virtuale di caricare le librerie DLL dalla stessa area virtuale.</translation>
</message>
<message>
@ -8425,8 +8424,9 @@ Il livello di corrispondenza del processo ha una priorità più alta della speci
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>L&apos;isolamento di sicurezza che consiste nell&apos;uso di un token di processo fortemente limitato è il metodo principale di Sandboxie di applicare restrizioni all&apos;area virtuale. Quando questa opzione è disattivata, l&apos;area virtuale viene gestita dalla modalità di compartimento delle applicazioni, in cui viene fornito un semplice compartimento delle applicazioni senza le normali misure di sicurezza.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">L&apos;isolamento di sicurezza che consiste nell&apos;uso di un token di processo fortemente limitato è il metodo principale di Sandboxie di applicare restrizioni all&apos;area virtuale. Quando questa opzione è disattivata, l&apos;area virtuale viene gestita dalla modalità di compartimento delle applicazioni, in cui viene fornito un semplice compartimento delle applicazioni senza le normali misure di sicurezza.</translation>
</message>
<message>
<source>Disable Security Isolation (experimental)</source>
@ -8894,18 +8894,20 @@ I seguenti valori sono specifici per l&apos;utente e salvati a livello globale p
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8925,7 +8927,8 @@ I seguenti valori sono specifici per l&apos;utente e salvati a livello globale p
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9970,7 +9973,8 @@ in modo diverso a seconda dell&apos;interfaccia di visualizzazione.</translation
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3417,11 +3417,6 @@ Do you want to do the clean up?</source>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -3435,6 +3430,7 @@ Do you want to do the clean up?</source>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5118,8 +5114,8 @@ This file is part of Sandboxie and all change done to it will be reverted next t
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished"></translation>
</message>
</context>
@ -6702,7 +6698,8 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -7142,7 +7139,8 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8019,8 +8017,10 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8186,18 +8186,20 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8217,7 +8219,8 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8820,7 +8823,8 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -4238,9 +4238,8 @@ No will choose: %2</source>
<translation type="vanished"> ! .</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation> .</translation>
<translation type="vanished"> .</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
@ -4255,6 +4254,7 @@ No will choose: %2</source>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5633,8 +5633,8 @@ This file is part of Sandboxie and all changed done to it will be reverted next
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished"> / . ?</translation>
</message>
</context>
@ -8210,8 +8210,9 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation> Sandboxie의 , (, ).</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished"> Sandboxie의 , (, ).</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8442,9 +8443,11 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation> . OpenFilePath OpenKeyPath는 . OpenPipePath OpenConfPath를 . (||Ipc) ClosedFilePath=! iexplore.exe,C:Users*&apos; . &quot; &quot; .
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished"> . OpenFilePath OpenKeyPath는 . OpenPipePath OpenConfPath를 . (||Ipc) ClosedFilePath=! iexplore.exe,C:Users*&apos; . &quot; &quot; .
. . ( ) .</translation>
</message>
<message>
@ -8530,8 +8533,9 @@ This is done to prevent rogue processes inside the sandbox from creating a renam
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation>&lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;박스 암호화&lt;/a&gt;가 활성화되면 Disk Cryptor의 AES-XTS 구현을 사용하여 레지스트리 하이브를 포함한 박스의 루트 폴더가 암호화된 디스크 이미지에 저장됩니다.</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">&lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;박스 암호화&lt;/a&gt;가 활성화되면 Disk Cryptor의 AES-XTS 구현을 사용하여 레지스트리 하이브를 포함한 박스의 루트 폴더가 암호화된 디스크 이미지에 저장됩니다.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="445"/>
@ -9030,19 +9034,21 @@ instead of &quot;*&quot;.</source>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<translation> </translation>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"> </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"> WMI (Windows ) . , WMI에 &quot;HideOtherBoxes&quot; &quot;tasklist.exe&quot; . .</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<translation> WMI를 ( )</translation>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"> WMI를 ( )</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4840"/>
@ -9061,8 +9067,9 @@ instead of &quot;*&quot;.</source>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<translation> HKCU\System\SbieCustom에 </translation>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"> HKCU\System\SbieCustom에 </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4915"/>
@ -10076,8 +10083,9 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<translation> &apos; &apos; </translation>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"> &apos; &apos; </translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="650"/>

View File

@ -4103,11 +4103,6 @@ Nee zal %2 kiezen</translation>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -4121,6 +4116,7 @@ Nee zal %2 kiezen</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5515,8 +5511,8 @@ This file is part of Sandboxie and all changed done to it will be reverted next
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Deze sandbox is uitgeschakeld. Wilt u hem inschakelen?</translation>
</message>
</context>
@ -7619,7 +7615,8 @@ Als leidende processen gedefinieerd zijn, worden alle andere als achterblijvende
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -7800,8 +7797,10 @@ Als leidende processen gedefinieerd zijn, worden alle andere als achterblijvende
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8384,8 +8383,9 @@ Het proces-overeenstemmingsniveau heeft een hogere prioriteit dan de specificite
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Beveiligingsisolatie door het gebruik van een zwaar beperkt procestoken is de primaire manier van Sandboxie om sandboxbeperkingen af te dwingen. Wanneer dit uitgeschakeld is, werkt de box in de toepassingscompartimentenmodus, d.w.z. hij biedt niet langer betrouwbare beveiliging, alleen eenvoudige toepassingscompartimentering.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Beveiligingsisolatie door het gebruik van een zwaar beperkt procestoken is de primaire manier van Sandboxie om sandboxbeperkingen af te dwingen. Wanneer dit uitgeschakeld is, werkt de box in de toepassingscompartimentenmodus, d.w.z. hij biedt niet langer betrouwbare beveiliging, alleen eenvoudige toepassingscompartimentering.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8695,18 +8695,20 @@ in plaats van &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8726,7 +8728,8 @@ in plaats van &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9499,7 +9502,8 @@ Merk op dat deze waarden momenteel gebruikersspecifiek zijn en globaal worden op
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3930,11 +3930,6 @@ Do you want to do the clean up?</source>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -3948,6 +3943,7 @@ Do you want to do the clean up?</source>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5730,8 +5726,8 @@ Uwaga: Sprawdzanie aktualizacji często pomija najnowsze wydania GitHub, aby zap
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Ta piaskownica jest wyłączona, czy chcesz teraz włączyć?</translation>
</message>
</context>
@ -8055,7 +8051,8 @@ Jeśli zdefiniowane są procesy wiodące, wszystkie inne są traktowane jako pro
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8409,9 +8406,11 @@ zamiast &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Zasady dostępu do zasobów Sandboxa często dyskryminują binarki programów znajdujących się wewnątrz piaskownicy. OpenFilePath i OpenKeyPath działają tylko dla binarek aplikacji znajdujących się natywnie na hoście. Aby zdefiniować regułę bez tego ograniczenia, należy użyć OpenPipePath lub OpenConfPath. Podobnie, wszystkie dyrektywy Closed(File|Key|Ipc)Path, które zdefiniowane przez negację np. &apos;ClosedFilePath=! iexplore.exe,C:Users*&apos; będą zawsze zamknięte dla binariów znajdujących się wewnątrz sandboxa. Obie polityki ograniczeń mogą być wyłączone na stronie &quot;Zasady dostępu&quot;.
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Zasady dostępu do zasobów Sandboxa często dyskryminują binarki programów znajdujących się wewnątrz piaskownicy. OpenFilePath i OpenKeyPath działają tylko dla binarek aplikacji znajdujących się natywnie na hoście. Aby zdefiniować regułę bez tego ograniczenia, należy użyć OpenPipePath lub OpenConfPath. Podobnie, wszystkie dyrektywy Closed(File|Key|Ipc)Path, które zdefiniowane przez negację np. &apos;ClosedFilePath=! iexplore.exe,C:Users*&apos; będą zawsze zamknięte dla binariów znajdujących się wewnątrz sandboxa. Obie polityki ograniczeń mogą być wyłączone na stronie &quot;Zasady dostępu&quot;.
Ma to zapobiec tworzeniu przez nieuczciwe procesy wewnątrz piaskownicy kopii o zmienionej nazwie i uzyskiwaniu dostępu do chronionych zasobów. Innym wektorem exploitów jest wstrzyknięcie biblioteki do autoryzowanego procesu w celu uzyskania dostępu do wszystkiego, do czego ma dostęp. Dzięki Host Image Protection można temu zapobiec, blokując aplikacjom (zainstalowanym na hoście) działającym wewnątrz piaskownicy możliwość ładowania bibliotek z samej piaskownicy.</translation>
</message>
<message>
@ -8485,8 +8484,9 @@ Ma to zapobiec tworzeniu przez nieuczciwe procesy wewnątrz piaskownicy kopii o
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation>Gdy włączone jest &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Szyfrowanie boksu&lt;/a&gt;, folder główny boksu, w tym gałąź rejestru, jest przechowywany w zaszyfrowanym obrazie dysku przy użyciu &lt;a href=&quot;https:/ /diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; Implementacja AES-XTS.</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">Gdy włączone jest &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Szyfrowanie boksu&lt;/a&gt;, folder główny boksu, w tym gałąź rejestru, jest przechowywany w zaszyfrowanym obrazie dysku przy użyciu &lt;a href=&quot;https:/ /diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; Implementacja AES-XTS.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="445"/>
@ -9002,8 +9002,9 @@ Poziom dopasowania do procesu ma wyższy priorytet niż specyfika i opisuje spos
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Izolacja bezpieczeństwa poprzez użycie silnie ograniczonego tokena procesu jest podstawowym sposobem Sandboxie wymuszania ograniczeń piaskownicy, gdy Izolacja jest wyłączona to boks działa w trybie komory aplikacji, tj. nie zapewnia już niezawodnego bezpieczeństwa, tylko prosty podział aplikacji na komory.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Izolacja bezpieczeństwa poprzez użycie silnie ograniczonego tokena procesu jest podstawowym sposobem Sandboxie wymuszania ograniczeń piaskownicy, gdy Izolacja jest wyłączona to boks działa w trybie komory aplikacji, tj. nie zapewnia już niezawodnego bezpieczeństwa, tylko prosty podział aplikacji na komory.</translation>
</message>
<message>
<source>Disable Security Isolation (experimental)</source>
@ -9345,18 +9346,20 @@ Należy pamiętać, że te wartości są obecnie specyficzne dla użytkownika i
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -10495,7 +10498,8 @@ W przeciwieństwie do kanału podglądu nie zawiera niesprawdzonych, potencjalni
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3861,9 +3861,8 @@ Erro: %1</translation>
<translation type="obsolete">Você digitou um nome de caixa errado! Nada foi alterado.</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished">Os usuários cancelaram essa operação.</translation>
<translation type="obsolete">Os usuários cancelaram essa operação.</translation>
</message>
<message>
<location filename="SandMan.cpp" line="3032"/>
@ -4306,6 +4305,7 @@ Não vou escolher: %2</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5763,8 +5763,8 @@ Não vou escolher: %2</translation>
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Essa caixa está desativada, deseja ativá-la?</translation>
</message>
</context>
@ -8175,8 +8175,10 @@ Se os processos líderes forem definidos, todos os outros serão tratados como p
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">As regras de acesso a recursos do sandboxie geralmente discriminam os binários do programa localizados dentro do sandbox. OpenFilePath e OpenKeyPath funcionam apenas para binários de aplicativos localizados no host nativamente. Para definir uma regra sem essa restrição, deve-se usar OpenPipePath ou OpenConfPath. Da mesma forma, todas as diretivas Closed(File|Key|Ipc)Path que são definidas por negação, por exemplo &apos;ClosedFilePath =! iexplore.exe,C:Users* será sempre fechado para binários localizados dentro de uma caixa. Ambas as políticas de restrição podem ser desativadas na página Políticas de Acesso.
Isso é feito para evitar que processos invasores dentro do sandbox criem uma cópia renomeada de si mesmos e acessem recursos protegidos. Outro vetor de exploração é a injeção de uma biblioteca em um processo autorizado para obter acesso a tudo o que é permitido acessar.Usando a proteção de imagem do host, isso pode ser evitado bloqueando os aplicativos (instalados no host) executados dentro de uma caixa de carregar bibliotecas do próprio sandbox.</translation>
</message>
@ -8208,7 +8210,8 @@ Isso é feito para evitar que processos invasores dentro do sandbox criem uma c
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">Quando a &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Criptografia da caixa&lt;/a&gt; está ativada, a pasta raiz da caixa, incluindo sua seção de registro, é armazenada em uma imagem de disco criptografada, usando &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</translation>
</message>
<message>
@ -8716,8 +8719,9 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Isolamento de segurança através do uso de um token de processo fortemente restrito é o principal meio do Sandboxie impor restrições de caixa de areia, quando está desativado a caixa é operada no modo compartimento de aplicativos, ou seja, não está mais fornecendo segurança confiável, apenas compartimentação simples de aplicativo.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Isolamento de segurança através do uso de um token de processo fortemente restrito é o principal meio do Sandboxie impor restrições de caixa de areia, quando está desativado a caixa é operada no modo compartimento de aplicativos, ou seja, não está mais fornecendo segurança confiável, apenas compartimentação simples de aplicativo.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -9093,18 +9097,20 @@ ao invés de &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9124,7 +9130,8 @@ ao invés de &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9896,7 +9903,8 @@ Por favor, note que esse valores são atualmente para o usuário específico e s
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3830,11 +3830,6 @@ Error: %1</source>
<source>You typed a wrong box name! Nothing was changed.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="3032"/>
<source>&lt;br /&gt;you need to be on the Great Patreon level or higher to unlock this feature.</source>
@ -4281,6 +4276,7 @@ Não vou definir: %2</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5736,8 +5732,8 @@ Não vou definir: %2</translation>
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Esta caixa está desativada, deseja ativá-la?</translation>
</message>
</context>
@ -8138,8 +8134,10 @@ Se os processos líderes forem definidos, todos os outros serão tratados como p
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">As regras de acesso a recursos do sandboxie geralmente discriminam os binários do programa localizados dentro do sandbox. OpenFilePath e OpenKeyPath funcionam apenas para binários de aplicativos localizados no host nativamente. Para definir uma regra sem essa restrição, deve-se utilizar OpenPipePath ou OpenConfPath. Da mesma forma, todas as diretivas Closed(File|Key|Ipc)Path que são definidas por negação, por exemplo &apos;ClosedFilePath =! iexplore.exe,C:Users* será sempre fechado para binários localizados dentro de uma caixa. Ambas as políticas de restrição podem ser desativadas na página Políticas de Acesso.
Isso é feito para evitar que processos invasores dentro do sandbox criem uma cópia renomeada de si mesmos e acessem recursos protegidos. Outro vetor de exploração é a injeção de uma biblioteca em um processo autorizado para obter acesso a tudo o que é permitido acessar.Usando a proteção de imagem do host, isso pode ser evitado bloqueando os aplicativos (instalados no host) executados dentro de uma caixa de carregar bibliotecas do próprio sandbox.</translation>
</message>
@ -8171,7 +8169,8 @@ Isso é feito para evitar que processos invasores dentro do sandbox criem uma c
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8688,8 +8687,9 @@ O nível de correspondência do processo tem uma prioridade maior do que a espec
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Isolamento de segurança através do uso de um token de processo fortemente restrito é o principal meio da Sandboxie de impor restrições de caixa de areia, quando esta é desativada a caixa é operada no modo compartimento de aplicativos, ou seja, não está mais fornecendo segurança confiável, apenas compartimentação simples da aplicação.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Isolamento de segurança através do uso de um token de processo fortemente restrito é o principal meio da Sandboxie de impor restrições de caixa de areia, quando esta é desativada a caixa é operada no modo compartimento de aplicativos, ou seja, não está mais fornecendo segurança confiável, apenas compartimentação simples da aplicação.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -9052,18 +9052,20 @@ ao invés de &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9083,7 +9085,8 @@ ao invés de &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9841,7 +9844,8 @@ Por favor, note que este valores são atualmente para o utilizador específico e
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3834,11 +3834,6 @@ No will choose: %2</source>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -3852,6 +3847,7 @@ No will choose: %2</source>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5175,8 +5171,8 @@ This file is part of Sandboxie and all change done to it will be reverted next t
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Эта песочница отключена, вы хотите ее включить?</translation>
</message>
</context>
@ -7061,8 +7057,9 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation>Когда &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;шифрование песочницы&lt;/a&gt; включено, ее корневая папка, включая куст реестра, сохраняется в зашифрованном образе диска с использованием &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; реализация AES-XTS.</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">Когда &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;шифрование песочницы&lt;/a&gt; включено, ее корневая папка, включая куст реестра, сохраняется в зашифрованном образе диска с использованием &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; реализация AES-XTS.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="445"/>
@ -7313,9 +7310,11 @@ If you are a Great Supporter on Patreon already, Sandboxie can check online for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Правила доступа к ресурсам Sandboxie часто дискриминируют двоичные файлы программ, расположенные внутри песочницы. OpenFilePath и OpenKeyPath работают только для двоичных файлов приложений, изначально расположенных на хосте. Чтобы определить правило без этого ограничения, необходимо использовать OpenPipePath или OpenConfPath. Аналогично, все директивы Closed(File|Key|Ipc)Path, которые определены отрицанием, например. ClosedFilePath=! iexplore.exe,C:Users* всегда будет закрыт для двоичных файлов, находящихся внутри песочницы. Обе политики ограничения можно отключить на странице &quot;Политики доступа&quot;.
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Правила доступа к ресурсам Sandboxie часто дискриминируют двоичные файлы программ, расположенные внутри песочницы. OpenFilePath и OpenKeyPath работают только для двоичных файлов приложений, изначально расположенных на хосте. Чтобы определить правило без этого ограничения, необходимо использовать OpenPipePath или OpenConfPath. Аналогично, все директивы Closed(File|Key|Ipc)Path, которые определены отрицанием, например. ClosedFilePath=! iexplore.exe,C:Users* всегда будет закрыт для двоичных файлов, находящихся внутри песочницы. Обе политики ограничения можно отключить на странице &quot;Политики доступа&quot;.
Это делается для того, чтобы мошеннические процессы внутри песочницы не создавали переименованные копии самих себя и не получали доступ к защищенным ресурсам. Другой вектор эксплойта внедрение библиотеки в авторизованный процесс, чтобы получить доступ ко всему, к чему ему разрешен доступ. С помощью Host Image Protection это можно предотвратить, заблокировав приложения (установленные на хосте), работающие внутри песочницы, от загрузки библиотек из самой песочницы.</translation>
</message>
<message>
@ -7945,8 +7944,9 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Изоляция безопасности за счет использования сильно ограниченного токена процесса - это основное средство Sandboxie для принудительного применения ограничений песочницы, когда она отключена, песочница работает в режиме контейнера для приложения, то есть она больше не обеспечивает надежную безопасность, а только простое разделение приложений.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Изоляция безопасности за счет использования сильно ограниченного токена процесса - это основное средство Sandboxie для принудительного применения ограничений песочницы, когда она отключена, песочница работает в режиме контейнера для приложения, то есть она больше не обеспечивает надежную безопасность, а только простое разделение приложений.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8445,18 +8445,20 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8476,7 +8478,8 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9404,7 +9407,8 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -4265,11 +4265,6 @@ Nej väljer: %2</translation>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -4283,6 +4278,7 @@ Nej väljer: %2</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5777,8 +5773,8 @@ Notera: Uppdateringskollen är ofta bakom senaste GitHub-utgivningen för att s
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Denna sandlåda är inaktiverad, vill du aktivera den?</translation>
</message>
<message>
@ -7508,8 +7504,9 @@ Om du redan är en Great Supporter on Patreon, kan Sandboxie söka på nätet f
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation>När &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;lådkryptering&lt;/a&gt; är aktiverat är lådans root-mapp, inklusive dess registerdatafil, lagrad i en krypterad diskavbild, användandes &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementering.</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">När &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;lådkryptering&lt;/a&gt; är aktiverat är lådans root-mapp, inklusive dess registerdatafil, lagrad i en krypterad diskavbild, användandes &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementering.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="445"/>
@ -8306,9 +8303,11 @@ Om ledarprocesser är definierade, behandlas alla andra som kvardröjande progra
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Sandboxie:s resurstillgångsregler särskiljer ofta emot programbinärer lokaliserade inuti sandlådan. OpenFilePath och OpenKeyPath fungerar bara för app-binärer lokaliserade värden ursprungligen. För att kunna definiera en regel utan denna begränsning, måste OpenPipePath eller OpenConPath användas. Likaså, alla stängda(File|Key|Ipc)sökvägsdirektiv vilka är definierade via negation e.x. ClosedFilePath=!iexplore.exe,CUsers* kommer alltid vara stängda för binärer lokaliserade inuti en sandlåda. Båda begränsningspolicyerna kan inaktiveras sidan Tillgångspolicy.
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Sandboxie:s resurstillgångsregler särskiljer ofta emot programbinärer lokaliserade inuti sandlådan. OpenFilePath och OpenKeyPath fungerar bara för app-binärer lokaliserade värden ursprungligen. För att kunna definiera en regel utan denna begränsning, måste OpenPipePath eller OpenConPath användas. Likaså, alla stängda(File|Key|Ipc)sökvägsdirektiv vilka är definierade via negation e.x. ClosedFilePath=!iexplore.exe,CUsers* kommer alltid vara stängda för binärer lokaliserade inuti en sandlåda. Båda begränsningspolicyerna kan inaktiveras sidan Tillgångspolicy.
Detta görs för att förhindra Rogue-processer inuti sandlådan från att skapa en namnändrad kopia av sig själva och tillgå skyddade resurser. En annan exploateringsvektor är injicerandet av ett bibliotek in i en auktoriserad process för att tillgång till allting det ges tillgång till. Användande av Host Image Protection, kan detta förhindras genom att blockera applikationer (installerade värden) körandes inuti en sandlåda från att ladda bibliotek från sandlådan självt.</translation>
</message>
<message>
@ -8800,8 +8799,9 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Säkerhetsisolering genom användande av tungt begränsade processtecken är Sandboxies primära medel för att tvinga sandlådebegränsningar, när det är inaktiverat opereras lådan i applikationavdelningsläget, d.v.s den tillhandahåller inte längre tillförlitlig säkerhet, bara enkel uppdelning.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Säkerhetsisolering genom användande av tungt begränsade processtecken är Sandboxies primära medel för att tvinga sandlådebegränsningar, när det är inaktiverat opereras lådan i applikationavdelningsläget, d.v.s den tillhandahåller inte längre tillförlitlig säkerhet, bara enkel uppdelning.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="873"/>
@ -8954,18 +8954,20 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8990,7 +8992,8 @@ Processmatchningsnivån har en högre prioritet än säregenheten och beskriver
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -10358,7 +10361,8 @@ istället för &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -3319,6 +3319,7 @@ Unlike the preview channel, it does not include untested, potentially breaking,
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation>Kullanıcı bu işlemi iptal etti.</translation>
</message>
@ -3333,11 +3334,6 @@ Unlike the preview channel, it does not include untested, potentially breaking,
<source>You typed a wrong box name! Nothing was changed.</source>
<translation>Yanlış alan adı yazdınız! Hiçbir şey eklenmedi.</translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="2014"/>
<source>USB sandbox not found; creating: %1</source>
@ -4801,8 +4797,8 @@ Lütfen Sandboxie için bir güncelleme olup olmadığını kontrol edin.</trans
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Bu alan devre dışı veya bir grup/kullanıcı ile sınırlandırılmış, etkinleştirmek istiyor musunuz?</translation>
</message>
<message>
@ -7354,8 +7350,9 @@ Not: Bir korumalı alana ilişkin Zorunlu Programlar ve Zorunlu Klasörler ayarl
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation>&lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Alan Şifreleme&lt;/a&gt; etkinleştirildiğinde, kayıt defteri kovanı da dahil olmak üzere alanın kök klasörü, &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;un&lt;/a&gt; AES-XTS uygulaması kullanılarak şifrelenmiş bir disk görüntüsünde depolanır.</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished">&lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Alan Şifreleme&lt;/a&gt; etkinleştirildiğinde, kayıt defteri kovanı da dahil olmak üzere alanın kök klasörü, &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;un&lt;/a&gt; AES-XTS uygulaması kullanılarak şifrelenmiş bir disk görüntüsünde depolanır.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="348"/>
@ -7571,9 +7568,11 @@ Not: Bir korumalı alana ilişkin Zorunlu Programlar ve Zorunlu Klasörler ayarl
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Sandboxie&apos;nin kaynak erişim kuralları, genellikle korumalı alan içinde bulunan program ikili dosyalarına göre ayrım yapar. OpenFilePath ve OpenKeyPath yalnızca ana sistemde yerel olarak bulunan uygulama ikili dosyaları için çalışır.
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Sandboxie&apos;nin kaynak erişim kuralları, genellikle korumalı alan içinde bulunan program ikili dosyalarına göre ayrım yapar. OpenFilePath ve OpenKeyPath yalnızca ana sistemde yerel olarak bulunan uygulama ikili dosyaları için çalışır.
Bu kısıtlama olmaksızın bir kural tanımlamak için OpenPipePath veya OpenConfPath kullanılmalıdır. Aynı şekilde, olumsuzlama ile tanımlanan tüm Closed(File|Key|Ipc)Path yönergeleri, örn. &apos;ClosedFilePath=! iexplore.exe,C:Users*&apos;, korumalı alan içinde bulunan ikili dosyalar için her zaman kapalı olacaktır. Her iki kısıtlama ilkesi de &quot;Erişim İlkeleri&quot; sayfasından devre dışı bırakılabilir.
Bu, korumalı alan içindeki haydut işlemlerin kendilerinin yeniden adlandırılmış bir kopyasını oluşturmasını ve korunan kaynaklara erişmesini önlemek için yapılır. Başka bir istismar vektörü de bir kütüphanenin yetkili bir işleme yerleşerek ona izin verilen her şeye erişim hakkı elde etmesidir. Ana Sistem Görüntü Koruması kullanılarak, bir korumalı alanda çalışan uygulamaların (ana sistemde yüklü) korumalı alanda bulunan kütüphaneleri yüklemesi engellenerek bu durum önlenebilir.</translation>
</message>
@ -8027,18 +8026,21 @@ Bir işlemi belirtmek için yol olarak &apos;$:program.exe&apos; kullanın.</tra
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<translation>Ürün Yazılımı Bilgilerini Gizle</translation>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished">Ürün Yazılımı Bilgilerini Gizle</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<translation>Bazı programlar, geleneksel yöntemleri kullanmak yerine, yerleşik bir Windows veritabanı olan WMI (Windows Yönetim Araçları) aracılığıyla sistem ayrıntılarını alır. Örneğin, &amp;apos;tasklist.exe&amp;apos;, &amp;apos;HideOtherBoxes&amp;apos; etkin olsa bile işlemlerin tam listesine erişebilir. Bu tür davranışları önlemek için bu seçeneği etkinleştirin.</translation>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished">Bazı programlar, geleneksel yöntemleri kullanmak yerine, yerleşik bir Windows veritabanı olan WMI (Windows Yönetim Araçları) aracılığıyla sistem ayrıntılarını alır. Örneğin, &amp;apos;tasklist.exe&amp;apos;, &amp;apos;HideOtherBoxes&amp;apos; etkin olsa bile işlemlerin tam listesine erişebilir. Bu tür davranışları önlemek için bu seçeneği etkinleştirin.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<translation>Korumalı alandaki işlemlerin WMI aracılığıyla sistem ayrıntılarına erişmesini önle (daha fazla bilgi için ipucuna bakın)</translation>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished">Korumalı alandaki işlemlerin WMI aracılığıyla sistem ayrıntılarına erişmesini önle (daha fazla bilgi için ipucuna bakın)</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4840"/>
@ -8057,8 +8059,9 @@ Bir işlemi belirtmek için yol olarak &apos;$:program.exe&apos; kullanın.</tra
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<translation>Mevcut Ürün Yazılımı Tablolarını HKCU\System\SbieCustom anahtarına döker</translation>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished">Mevcut Ürün Yazılımı Tablolarını HKCU\System\SbieCustom anahtarına döker</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4915"/>
@ -8410,8 +8413,9 @@ Lütfen bu değerlerin kullanıcıya özel olduğunu ve tüm alanlar için globa
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Güvenlik Yalıtımı, Sandboxie&apos;nin çok kısıtlı işlem belirteci kullanımı yoluyla korumalı alan kısıtlamalarını uygulamasının birincil yoludur. Bu devre dışı bırakılırsa, alan, uygulama bölmesi modunda çalıştırılır, yani artık sağlıklı bir güvenlik sağlayamaz ve yalnızca basit uygulama bölümlemesi sağlar.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Güvenlik Yalıtımı, Sandboxie&apos;nin çok kısıtlı işlem belirteci kullanımı yoluyla korumalı alan kısıtlamalarını uygulamasının birincil yoludur. Bu devre dışı bırakılırsa, alan, uygulama bölmesi modunda çalıştırılır, yani artık sağlıklı bir güvenlik sağlayamaz ve yalnızca basit uygulama bölümlemesi sağlar.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1357"/>
@ -9419,8 +9423,9 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<translation>Bağlam menüsüne Korumalı Alanda Zorlamaya Ayarla&apos; seçeneği ekle</translation>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished">Bağlam menüsüne Korumalı Alanda Zorlamaya Ayarla&apos; seçeneği ekle</translation>
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="650"/>

View File

@ -4099,11 +4099,6 @@ Note: The update check is often behind the latest GitHub release to ensure that
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -4117,6 +4112,7 @@ Note: The update check is often behind the latest GitHub release to ensure that
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5479,8 +5475,8 @@ This file is part of Sandboxie and all changed done to it will be reverted next
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Ця пісочниця вимкнена, ви хочете її увімкнути?</translation>
</message>
</context>
@ -7588,7 +7584,8 @@ If leader processes are defined, all others are treated as lingering processes.<
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -7769,8 +7766,10 @@ If leader processes are defined, all others are treated as lingering processes.<
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8361,8 +8360,9 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Ізоляція безпеки використовує дуже обмежений системний токен, програма Sandboxie використовує це для обмежень пісочниці, коли вона використовує режим для додатків, тобто має лише розділення додатків.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Ізоляція безпеки використовує дуже обмежений системний токен, програма Sandboxie використовує це для обмежень пісочниці, коли вона використовує режим для додатків, тобто має лише розділення додатків.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8672,18 +8672,20 @@ instead of &quot;*&quot;.</source>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8703,7 +8705,8 @@ instead of &quot;*&quot;.</source>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9463,7 +9466,8 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -4061,11 +4061,6 @@ Please check if there is an update for sandboxie.</oldsource>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -4079,6 +4074,7 @@ Please check if there is an update for sandboxie.</oldsource>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5389,8 +5385,8 @@ This file is part of Sandboxie and all changed done to it will be reverted next
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">Sandbox này bị hiệu hóa, bạn muốn bật không?</translation>
</message>
</context>
@ -7522,7 +7518,8 @@ If you are a great patreaon supporter already, sandboxie can check online for an
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -7714,8 +7711,10 @@ If you are a great patreaon supporter already, sandboxie can check online for an
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8216,8 +8215,9 @@ Mức độ đối sánh tiến trình có mức độ ưu tiên cao hơn mức
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>Cách ly bảo mật thông qua việc sử dụng thông báo quy trình bị hạn chế nhiều phương tiện chính của Sandboxie đ thực thi các hạn chế Sandbox, khi điều này bị hiệu hóa, Sandbox sẽ đưc vận hành chế đ ngăn ng dụng, tức không còn cung cấp bảo mật đáng tin cậy nữa, chỉ phân chia ng dụng đơn giản.</translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">Cách ly bảo mật thông qua việc sử dụng thông báo quy trình bị hạn chế nhiều phương tiện chính của Sandboxie đ thực thi các hạn chế Sandbox, khi điều này bị hiệu hóa, Sandbox sẽ đưc vận hành chế đ ngăn ng dụng, tức không còn cung cấp bảo mật đáng tin cậy nữa, chỉ phân chia ng dụng đơn giản.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8570,18 +8570,20 @@ thay vì &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8601,7 +8603,8 @@ thay vì &quot;*&quot;.</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9314,7 +9317,8 @@ Xin lưu ý rằng các giá trị này hiện là dành riêng cho người dù
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -4371,9 +4371,8 @@ This file is part of Sandboxie and all changed done to it will be reverted next
<translation type="vanished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation></translation>
<translation type="vanished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
@ -4388,6 +4387,7 @@ This file is part of Sandboxie and all changed done to it will be reverted next
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5563,8 +5563,8 @@ Error: %1</source>
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">/</translation>
</message>
</context>
@ -8082,9 +8082,11 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Sandboxie 访
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Sandboxie 访
OpenFilePath OpenKeyPath 宿宿
使 OpenPipePath OpenConfPath
@ -8435,8 +8437,9 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>使 Sandboxie </translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">使 Sandboxie </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8717,8 +8720,9 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation> &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;沙盒加密&lt;/a&gt; 为沙盒根目录启用时,包括虚拟注册表在内,沙盒内容将会被存储在加密的磁盘映像中, 使用 &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS 实现。</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"> &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;沙盒加密&lt;/a&gt; 为沙盒根目录启用时,包括虚拟注册表在内,沙盒内容将会被存储在加密的磁盘映像中, 使用 &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS 实现。</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="348"/>
@ -9071,19 +9075,21 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<translation></translation>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished">WMIWindows内置数据库使访WMI打开HideOtherBoxstasklist.exe</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<translation>WMI访问系统细节信息</translation>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished">WMI访问系统细节信息</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4840"/>
@ -9102,8 +9108,9 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<translation>HKCU\System\SbieCustom</translation>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished">HKCU\System\SbieCustom</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4915"/>
@ -10173,7 +10180,8 @@ Sandboxie 提供了针对这些情况的处理选项,可以在此页面进行
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -4205,11 +4205,6 @@ No will choose: %2</source>
<source>Sandboxie-Plus Warning</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1683"/>
<source>Users canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="SandMan.cpp" line="1658"/>
<source>The value is not an existing directory or executable.</source>
@ -4223,6 +4218,7 @@ No will choose: %2</source>
</message>
<message>
<location filename="SandMan.cpp" line="1667"/>
<location filename="SandMan.cpp" line="1683"/>
<source>User canceled this operation.</source>
<translation type="unfinished"></translation>
</message>
@ -5533,8 +5529,8 @@ This file is part of Sandboxie and all changed done to it will be reverted next
</message>
<message>
<location filename="Views/SbieView.cpp" line="1789"/>
<source>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to edit it?</oldsource>
<source>This sandbox is currently disabled or restricted to specific groups or users. Would you like to allow access for everyone?</source>
<oldsource>This sandbox is disabled or restricted to a group/user, do you want to allow box for everybody ?</oldsource>
<translation type="unfinished">/使</translation>
</message>
</context>
@ -7533,8 +7529,9 @@ If you are a great patreaon supporter already, sandboxie can check online for an
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="432"/>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<translation> &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;沙箱加密&lt;/a&gt; 後,沙箱的根目錄 (包括其登錄組態) 將使用 &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor 的&lt;/a&gt; AES-XTS 實作方案。</translation>
<source>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the box&apos;s root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</source>
<oldsource>When &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;Box Encryption&lt;/a&gt; is enabled the boxs root folder, including its registry hive, is stored in an encrypted disk image, using &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor&apos;s&lt;/a&gt; AES-XTS implementation.</oldsource>
<translation type="unfinished"> &lt;a href=&quot;sbie://docs/boxencryption&quot;&gt;沙箱加密&lt;/a&gt; 後,沙箱的根目錄 (包括其登錄組態) 將使用 &lt;a href=&quot;https://diskcryptor.org&quot;&gt;Disk Cryptor 的&lt;/a&gt; AES-XTS 實作方案。</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="445"/>
@ -7846,9 +7843,11 @@ If you are a great patreaon supporter already, sandboxie can check online for an
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4296"/>
<source>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
<source>Sandboxie&apos;s resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. &apos;ClosedFilePath=!iexplore.exe,C:Users*&apos; will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the &quot;Access policies&quot; page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</source>
<translation>Sandboxie OpenFilePath OpenKeyPath () 使 OpenPipePath OpenConfPath Closed(File|Key|Ipc)Path &apos;ClosedFilePath=! iexplore.exe,C:Users*&apos;
<oldsource>Sandboxies resource access rules often discriminate against program binaries located inside the sandbox. OpenFilePath and OpenKeyPath work only for application binaries located on the host natively. In order to define a rule without this restriction, OpenPipePath or OpenConfPath must be used. Likewise, all Closed(File|Key|Ipc)Path directives which are defined by negation e.g. ClosedFilePath=! iexplore.exe,C:Users* will be always closed for binaries located inside a sandbox. Both restriction policies can be disabled on the Access policies page.
This is done to prevent rogue processes inside the sandbox from creating a renamed copy of themselves and accessing protected resources. Another exploit vector is the injection of a library into an authorized process to get access to everything it is allowed to access. Using Host Image Protection, this can be prevented by blocking applications (installed on the host) running inside a sandbox from loading libraries from the sandbox itself.</oldsource>
<translation type="unfinished">Sandboxie OpenFilePath OpenKeyPath () 使 OpenPipePath OpenConfPath Closed(File|Key|Ipc)Path &apos;ClosedFilePath=! iexplore.exe,C:Users*&apos;
使 () </translation>
</message>
<message>
@ -8498,8 +8497,9 @@ The process match level has a higher priority than the specificity and describes
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1377"/>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</source>
<translation>使 Sandboxie </translation>
<source>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it&apos;s no longer providing reliable security, just simple application compartmentalization.</source>
<oldsource>Security Isolation through the usage of a heavily restricted process token is Sandboxie&apos;s primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. its no longer providing reliable security, just simple application compartmentalization.</oldsource>
<translation type="unfinished">使 Sandboxie </translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="887"/>
@ -8863,18 +8863,20 @@ instead of &quot;*&quot;.</source>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4769"/>
<source>Hide Firmware Informations</source>
<source>Hide Firmware Information</source>
<oldsource>Hide Firmware Informations</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4799"/>
<source>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these heavior.</oldsource>
<source>Some programs read system details through WMI (a Windows built-in database) instead of normal ways. For example, &quot;tasklist.exe&quot; could get full processes list through accessing WMI, even if &quot;HideOtherBoxes&quot; is used. Enable this option to stop this behaviour.</source>
<oldsource>Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,&quot;tasklist.exe&quot; could get full processes list even if &quot;HideOtherBoxes&quot; is opened through accessing WMI. Enable this option to stop these behaviour.</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4802"/>
<source>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</source>
<source>Prevent sandboxed processes from accessing system details through WMI (see tooltip for more info)</source>
<oldsource>Prevent sandboxed processes from accessing system deatils through WMI (see tooltip for more Info)</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -8894,7 +8896,8 @@ instead of &quot;*&quot;.</source>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="4912"/>
<source>Dump the current Firmare Tables to HKCU\System\SbieCustom</source>
<source>Dump the current Firmware Tables to HKCU\System\SbieCustom</source>
<oldsource>Dump the current Firmare Tables to HKCU\System\SbieCustom</oldsource>
<translation type="unfinished"></translation>
</message>
<message>
@ -9500,7 +9503,8 @@ Please note that this values are currently user specific and saved globally for
</message>
<message>
<location filename="Forms/SettingsWindow.ui" line="643"/>
<source>Add Set Force in Sandbox&apos; to the context menu</source>
<source>Add &apos;Set Force in Sandbox&apos; to the context menu</source>
<oldsource>Add Set Force in Sandbox&apos; to the context menu</oldsource>
<translation type="unfinished"></translation>
</message>
<message>