diff --git a/CHANGELOG.md b/CHANGELOG.md index 91ebfe82..f04fe65b 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -9,13 +9,14 @@ This project adheres to [Semantic Versioning](http://semver.org/). - added SbieIni option to modify password-protected configs [#3903](https://github.com/sandboxie-plus/Sandboxie/issues/3903) - usage: set|append|insert|delete [/passwd:********]
- note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line -- added checkbox for PromptForInternetAccess option to the New Box Wizard -- Add option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes. -- Add option "HideSbieProcesses" to hide Sandboxie Work Process(SbieSvc,SandboxieRpcSs,etc.). -- When "HideFirmwareInfo" is set,the programs which try getting fireware info will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue -- Add template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI. -- Add template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to loaclhost to breakout sandbox. -- Add new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975) +- added checkbox for "PromptForInternetAccess" option to the New Box Wizard +- added option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processes. +- added option "HideSbieProcesses" to hide Sandboxie Work Process(SbieSvc,SandboxieRpcSs,etc.). +- added option "HideFirmwareInfo" + - when it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\\SOFTWARE\\SandboxieHide\\FalseFirmwareValue +- added template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMI. +- added template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandbox. +- added new option "AllowCoverTaskbar" for [#3975](https://github.com/sandboxie-plus/Sandboxie/issues/3975) - added RPC Port message filter mechanism to block unsafe RDP calls via the driver [#3930](https://github.com/sandboxie-plus/Sandboxie/issues/3930) - Usage: "RpcPortFilter=Port,ID,Label" label is optional - added "Job Object" Options page to colelct all job object related options @@ -24,7 +25,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - Extend "Temp Template" to make it could delete local template section. ### Fixed -- fixed security issue with the newly introduced experimental "UseCreateToken=y" machanism +- fixed security issue with the newly introduced experimental "UseCreateToken=y" mechanism - fixed issue with "UseCreateToken=y" when using a MSFT online account - fixed Export sandbox not containing hidden files [#3980](https://github.com/sandboxie-plus/Sandboxie/issues/3980) (thanks L4cache) - fixed Chrome stopped printing [#3926](https://github.com/sandboxie-plus/Sandboxie/issues/3926) @@ -35,7 +36,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - fixed Delay in launching forced programs after version 1.12.9 [#3868](https://github.com/sandboxie-plus/Sandboxie/issues/3868) - this issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems - fixed issue with Misc Options list -- improved compatybility with steam running sandboxed +- improved compatibility with steam running sandboxed @@ -54,7 +55,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - added option for EditAdminOnly in SetupWizard ### Changed -- splited the advanced new box wizard page in two +- split the advanced new box wizard page in two - reorganized box options a bit ### Fixed diff --git a/Sandboxie/core/svc/EpMapperServer.cpp b/Sandboxie/core/svc/EpMapperServer.cpp index 744800c3..51968025 100644 --- a/Sandboxie/core/svc/EpMapperServer.cpp +++ b/Sandboxie/core/svc/EpMapperServer.cpp @@ -226,7 +226,7 @@ MSG_HEADER *EpMapperServer::EpmapperGetPortNameHandler(MSG_HEADER *msg) // So, since here we only open non critical ports, we will use PID 0 to open them globally // instead of only for the one process. Todo: make it per sandbox instead // - // Note: Filter is only support for globaly open ports, i.e. when process_id == 0 + // Note: Filter is only support for globally open ports, i.e. when process_id == 0 // Todo: Add per process ALPC message filter // diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui index 72cf70e5..e56ac0bf 100644 --- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui +++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui @@ -4715,7 +4715,7 @@ This is done to prevent rogue processes inside the sandbox from creating a renam - Prevent sandboxed processes from accessing system deatils through WMI + Prevent sandboxed processes from accessing system details through WMI @@ -4756,7 +4756,7 @@ This is done to prevent rogue processes inside the sandbox from creating a renam - Some programs read system deatils through WMI(A Windows built-in database) instead of normal ways. For example,"tasklist.exe" could get full processes list even if "HideOtherBoxes" is opened through accessing WMI. Enable this option to stop these heavior. + Some programs retrieve system details via WMI (Windows Management Instrumentation), a built-in Windows database, rather than using conventional methods. For instance, 'tasklist.exe' can access a complete list of processes even if 'HideOtherBoxes' is enabled. Enable this option to prevent such behavior. true