*==========
* Missing Messages in Text-Macedonian-1071.txt
*==========

1222;pop;err;02
SBIE1222 Error with security token:  %2
.

1231;pop;err;01
SBIE1231 Initialization failed for process %3 %2
.

1305;pop;inf;02
SBIE1305 Blocked sandboxed image from being loaded - %2
.

1307;pop;inf;02
SBIE1307 Program cannot access the Internet due to restrictions - %2
.

1308;pop;inf;02
SBIE1308 Program cannot start due to restrictions - %2
.

1312;pop;inf;01
SBIE1312 Blocked request to start a 16-bit DOS program in the sandbox
.

1313;pop;inf;01
SBIE1313 Blocked direct disk access by process '%2'
.

1314;pop;inf;01
SBIE1314 Blocked request to alter network/firewall settings by process '%2'
.

1316;pop;inf;01
SBIE1316 Blocked request to generate device event in the sandbox
.

1317;pop;inf;02
SBIE1317 Blocked '%2' from trying to access sandbox file root '%3'
.

1318;pop;inf;02
SBIE1318 Blocked '%2' from trying to access sandboxed process '%3'
.

1319;pop;inf;01
SBIE1319 Blocked spooler print to file, %2 %3
.

1320;pop;wrn;01
SBIE1320 To allow print spooler to write outside the sandbox for this process, please double-click on this message line
.

1399;pop;inf;01
%0
.

2111;pop;inf;01
SBIE2111 Process is not accessible: %3, call %2
.

2112;pop;inf;01
SBIE2112 Object is not accessible: %3, call %2
.

2113;pop;inf;01
SBIE2113 File is too large to copy into sandbox, creating empty file - %2
.

2114;pop;inf;01
SBIE2114 File is too large to copy into sandbox, denying access - %2
.

2115;pop;inf;01
SBIE2115 File is too large to copy into sandbox, opening in read only - %2
.

2180;pop;inf;01
SBIE2180 LowLevel.dll error %2
.

2181;pop;inf;01
SBIE2181 LowLevel.dll detour failed to load SbieDll.dll into target process.
.

2194;pop;inf;01
SBIE2194 MSI installer requires %2 option to be set in the ini, what however weakens the isolation.
.

2195;pop;inf;01
SBIE2195 To run Explorer.exe sandboxed, the access for COM infrastructure must not be Open.
.

2196;pop;inf;01
SBIE2196 To run the MSI Installer sandboxed, the access for COM infrastructure must not be Open.
.

2198;pop;inf;01
%0
.

2220;pop;wrn;01
SBIE2220 To permit use of Administrator privileges, please double-click on this message line
.

2221;pop;wrn;01
SBIE2221 To add the program to Internet Access Restrictions, please double-click on this message line
.

2222;pop;wrn;01
SBIE2222 To add the program to Start/Run Access Restrictions, please double-click on this message line
.

2223;pop;wrn;01
SBIE2223 To increase the file size limit for copying files, please double-click on this message line
.

2224;pop;wrn;01
SBIE2224 Sandboxed program has crashed: %2
.

2225;pop;wrn;01
SBIE2225 An attempt was made to access an EFS file: %2
.

2226;pop;wrn;01
SBIE2226 Process failed to start due to missing elevation, to resolve add "ApplyElevateCreateProcessFix=y" to the ini section for this box %2
.

2227;pop;wrn;01
SBIE2227 '%2' is located on a volume which does not support 8.3 naming. This can cause issues with older applications and installers.
.

2230;pop;wrn;01
SBIE2230 Failed to mount root for %2
.

2231;pop;wrn;01
SBIE2231 Junction Target mismatch %2
.

2232;pop;wrn;01
SBIE2232 The ImDisk Driver is not loaded
.

2233;pop;wrn;01
SBIE2233 Cannot control the ImDisk Driver: %2
.

2234;pop;wrn;01
SBIE2234 No free Drive letter found for temporary mount
.

2235;pop;wrn;01
SBIE2235 Error undefining temporary drive letter: "%2"
.

2236;pop;wrn;01
SBIE2236 %2 could not be invoked (perhaps it is not installed?)
.

2237;pop;wrn;01
SBIE2237 Failed to unmount root %2
.

2238;pop;wrn;01
SBIE2238 Ram Disk size is not configured, or to small, set RamDiskSizeKb=1048576 (1GB in Kilobytes) in the [GlobalSettings] ini section.
.

2239;pop;wrn;01
SBIE2239 The root folder of sandbox %2 must be empty in order to mount a volume to it.
.

2240;pop;wrn;01
SBIE2240 Timeout when trying to mount ImDisk volume %2
.

2241;pop;wrn;01
SBIE2241 Box image file %2 could not be opened
.

2242;pop;wrn;01
SBIE2242 Failed to mount box image, The specified cipher is not supported
.

2243;pop;wrn;01
SBIE2243 Failed to mount box image, Wrong password
.

2244;pop;wrn;01
SBIE2244 Failed to mount box image, Password required
.

2246;pop;wrn;01
SBIE2246 Failed to mount box image, ImBox error %2
.

2302;pop;err;01
SBIE2302 Process image configuration conflict: %2
.

2325;pop;err;01
SBIE2325 Debug:  %2
.

2335;pop;err;01
SBIE2335 Initialization failed for process %2
.

2336;pop;err;01
SBIE2336 Error in GUI server:  %2
.

2337;pop;err;01
SBIE2337 Failed to start program:  %2
.

2338;pop;err;01
SBIE2338 Encountered unsupported architecture in process:  %2
.

9234;evt;err;01
SBIE9234 Service startup error %2
.

3005;txt;01
Cu&t
.

3107;txt;01
Type the name of a program or path to open the following file in the current sandbox:
.

3114;txt;01
Programs
.

3243;txt;01
Note:  The program will continue to execute under the supervision
of Sandboxie, even after Administrator privileges have been granted.
.

3315;txt;01
Deleting Sandbox contents
.

3316;txt;01
Do you want to abort the operation?
.

3317;txt;01
Preparing to delete: %2
.

3318;txt;01
Deleting: %2
.

3360;txt;01
Select &All
.

3425;txt;01
Recovery &Log
.

3426;txt;01
&Always on Top
.

3434;txt;01
Reveal Hidden Sandbox
.

3435;txt;01
Set Layout and Groups
.

3504;txt;01
&Support Sandboxie with Donations
.

3505;txt;01
Contribute to Sandboxie
.

3506;txt;01
Get Supporter Certificate
.

3507;txt;01
Apply Supporter Certificate
.

3453;txt;02
Getting Started &Tutorial
.

3457;txt;01
&Sandboxie Forum (Web)
.

3459;txt;01
Allow direct access to qWave driver (Google Hangouts)
.

3460;txt;01
Function hooking customizations
.

3467;txt;01
Upgrade to Sandboxie-Plus
.

3468;txt;01
Sandboxie-Plus Migration Guide
.

3469;txt;01
What's new in Sandboxie-Plus
.

3484;txt;01
Resource Access
.

3495;txt;01
Create Desktop Shortcut
.

3635;txt;01
downloading new version
.

3669;txt;01
Copy settings from existing sandbox:
.

4665;txt;01
Error:  Duplicate sandbox name entered.  The name is already used by a hidden sandbox.  Use the "Reveal Hidden Sandbox" command from the Sandbox menu.
.

4491;txt;01
Open %2 in sandbox %3
.

3734;txt;01
Right-click the list of folders for more options
.

3735;txt;02
Replace all files without additional prompts
.

3736;txt;01
&Recover && Explore
.

3737;txt;01
&Recover && Run
.

3981;txt;01
&Open folder in Windows Explorer outside the sandbox
.

3982;txt;01
Remove this folder from the list
.

3983;txt;01
Remove all folders from the list
.

3986;txt;01
Recovery Log
.

3987;txt;01
The following files were recently recovered and moved out of sandboxes.
.

3819;txt;01
Display the border only when the mouse cursor is in the window title
.

3909;txt;01
The File Migration setting limits the maximum size of a file that can be copied into the sandbox.

The setting is currently set to %3 kilobytes in sandbox '%2'.

Click OK to adjust this size limit to %4 kilobytes.

You can also change this limit by opening the Sandbox Settings window, and expanding the File Migration settings page.
.

3920;txt;01
Internet Access Restrictions are enabled in sandbox '%2', and prevent this program from accessing the Internet.

Click OK to add program '%3' to Internet Access Restrictions in sandbox '%2'.

To manage Internet Access Restrictions, open the Sandbox Settings window, and expand the Restrictions settings group.
.

3930;txt;01
Start/Run Access Restrictions are enabled in sandbox '%2', and prevent this program from starting and running.

Click OK to add program '%3' to Start/Run Access Restrictions in sandbox '%2'.

To manage Start/Run Access Restrictions, open the Sandbox Settings window, and expand the Restrictions settings group.
.

3949;txt;01
The Drop Rights setting is enabled in sandbox '%2', and prevents use of Administrator privileges.

Click OK to disable the Drop Rights setting in sandbox '%2', and permit use of Administrator privileges in the sandbox.

You can always change the Drop Rights setting by opening the Sandbox Settings window, and expanding the Restrictions settings group.
.

3955;txt;01
Network Files
.

3956;txt;01
Network files and folders are normally visible to sandboxed applications.
.

3957;txt;01
If you wish to block sandboxed applications from accessing files and folders on your network, you can enable this setting. Individual files and folders can be opened for sandboxed applications by adding them under Resource Access -> File Access.
.

3958;txt;01
Block network files and folders unless specifically opened.
.

4111;txt;01
Resource Access::File Access::Write-Only Access
.

4112;txt;01
Write-Only File Access (WriteFilePath)
.

4113;txt;01
The following folders will appear empty to programs running in this sandbox, but the programs may create new files within these folders in the sandbox.
.

4121;txt;01
Resource Access::Registry Access::Write-Only Access
.

4122;txt;01
Write-Only Registry Access (WriteKeyPath)
.

4123;txt;01
The following registry keys will appear empty to programs running in this sandbox, but the programs may write new data within these registry keys in the sandbox.
.

4104;txt;01
Resource Access::Network Access
.

4105;txt;01
Network Access (Firewall)
.

4294;txt;01
Permit programs to update jump lists in the Windows 7 taskbar
.

4295;txt;01
Default exclusions File Migration presets
.

4296;txt;01
Default RPC Port Bindings
.

4297;txt;01
Open Bluetooth RPC port
.

4298;txt;01
Open Smart Card RPC port
.

4299;txt;01
Open Simple Service Discovery Protocol (SSDP, UPnP) RPC port
.

4300;txt;01
Open additional RPC Port Bindings
.

4306;txt;01
Open RPC Port Bindings for UAC
.

4307;txt;01
Block common telemetry processes
.

4308;txt;01
Filter access to \Devices\
.

4451;txt;01
Sandboxie has detected the following conflicting software
applications in your system.  These applications might
interfere with the correct operation of Sandboxie.

%2

Please review the Known Conflicts page on the Sandboxie
web site for more information and solutions.

Would you like to open the Known Conflicts web page now?
.

4452;txt;01
&Known Conflicts
.

4324;txt;02
Allow direct access to %2 sync data
.

4340;txt;01
Allow direct access to %2 session management
.

4341;txt;01
Allow direct access to %2 notes
.

4342;txt;01
Enable %2 compatibility workaround
.

4393;txt;01
Media Players
.

4394;txt;01
The following exclusions allow Media players running in this sandbox to access files outside the sandbox.
.

4395;txt;01
Allow %2 direct access to the Photo folder for easier screen capture.
.

4396;txt;01
Torrent Clients
.

4397;txt;01
The following exclusions allow Torrent clients running in this sandbox to access files outside the sandbox.
.

4398;txt;01
Allow %2 direct access to the Music folder for easier music library management.
.

5101;txt;01
User Accounts
.

5102;txt;01
Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts.  If the list is empty, the sandbox can be used by all user accounts.
.

5103;txt;01
Note:  Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox.
.

5107;txt;01
Your user account has now been restricted from using this sandbox, and
the sandbox will be removed from display in the main window.

To make the sandbox visible and usable, use the "Reveal Hidden Sandbox"
command from the Sandbox menu.
.

5122;txt;01
Your user account is excluded from using any of the sandboxes listed below.
.

5123;txt;01
The following user accounts are permitted to use the selected sandbox at this time.
.

5124;txt;01
Click the OK button to add your user account '%2' to the sandbox and have the sandbox appear in the main window.
.

5142;txt;01
Arrange sandboxes into groups and customize the order in which they are listed.  Use the right-click context menu to manage entries in the layout tree below.
.

5143;txt;01
(Top)
.

5145;txt;01
&Restore Default Layout
.

5146;txt;01
Insert &Group
.

5147;txt;01
&Rename
.

5148;txt;01
&Delete
.

5151;txt;01
&Move
.

5152;txt;01
Move &Up
.

5153;txt;01
Move &Down
.

5154;txt;01
Move &To
.

6001;txt;01
The classic Sandboxie UI (SbieCtrl.exe) has very limited
resource monitoring and event tracing capabilities.

For optimal troubleshooting it is highly advisable 
to install the new UI, Sandboxie-Plus (SandMan.exe),
which provides excellent tracing and monitoring capabilities.

Do you want to download Sandboxie-Plus now?
.

6002;txt;01
Visit <a ID="whats_new">sandboxie-plus.com</a> to learn about the new functionality of Sandboxie-Plus,
or directly click <a ID="upgrade">here</a> to download the latest Sandboxie-Plus installer.
.

6003;txt;01
The legacy UI of Sandboxie classic does not implement support for the network firewall functionality.

You can though configure the feature supported by the core components using the ini file, rules are structured like following:
NetworkAccess=iexplorer.exe,Allow; Port=80,443; Address=192.168.0.1-192.168.100.255; Protocol=TCP

If you prefer to use a UI to control these options, please upgrade to Sandboxie-Plus, which has full UI support for all new features.
.

6004;pop;err;01
The configuration %3 of box %2 requires a supporter certificate. Processes in this box will be terminated after 5 minutes. For prolonged use, please consider supporting this project.
.

6005;txt;01
Note: Without administrative privileges installers will fail to start in the sandbox. Sandboxie-Plus offers an option to make many installers succeed without those privileges. You can enable this option also in the classic build manually, by adding "FakeAdminRights=y" to the ini section for this box.
.

6006;txt;01
The legacy UI of Sandboxie classic implements only support for a couple of restriction options.

Additional options like "ClosePrintSpooler=y", "OpenClipboard=n", "BlockNetParam=n" and much more can be set in the ini section for this box.
The modern UI (SandMan.exe) also offers more customization options for Start/Run and Internet access restrictions.

If you would prefer to use a UI to control these options, please upgrade to Sandboxie-Plus, which has full UI support for all new features.
.

6007;txt;01
Sandboxie Plus offers enhanced privacy protection by switching the old behavior from a black-list mode, i.e., allowing read access to the entire drive, except blocked by Closed Path or Write Path, to a white-list mode where sandboxed programs are only allowed to read generic system locations and read access to most user data must be first explicitly granted.

The legacy UI of Sandboxie classic does not implement support for this mode of operation. Although it can be configured using the ini file, it is recommended to use the modern Sandboxie-Plus UI (SandMan.exe) if you want to use privacy enhanced boxes.
.

6008;pop;err;01
The configuration %3 of box %2 requires a supporter certificate and can not be used without it.
.

6009;pop;err;01
The configuration %3 of box %2 requires an advanced supporter certificate.
.

6010;txt;01
You have installed Sandboxie more than %2 days ago.

So, you think David and the contributors are doing a great job?

Why don't you show it by supporting the project and getting a Supporter Certificate?

Sandboxie without a valid supporter certificate will now pause for a few seconds, to give you time to contemplate the possibility of supporting the project.
.

6011;txt;01
Wait
.

6012;txt;01
Continue
.

6013;txt;01
Quit
.

6014;txt;01
Get Certificate
.

7850;txt;01
Getting Started Tutorial - Sandboxie
.

7851;txt;01
Getting Started with Sandboxie
.

7852;txt;01
Welcome to Sandboxie!

Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.

This tutorial briefly explains the basic principles of using Sandboxie.
.

7853;txt;01
Note:  This tutorial is designed for use with the default sandbox, DefaultBox.
.

7854;txt;01
How Sandboxie Works (Illustration)
.

7855;txt;01
Start your Internet Web browser under Sandboxie
.

7856;txt;01
Please find the shortcut on your desktop and double-click it to run your web browser in the default sandbox, DefaultBox.
.

7857;txt;01
Click here to hide this window and show the desktop
.

7858;txt;01
Your browser is now running inside the sandbox
.

7859;txt;01
Programs in the sandbox can modify only the contents of the sandbox.

When you save or download files, they go into the sandbox.  If you save a file to your Desktop, Documents or Downloads folders, Sandboxie offers to move the file out of the sandbox.

Try it now:  Download a file in your browser to your desktop folder (in the sandbox), and recover the file to your real desktop.
.

7860;txt;01
Delete the contents of your sandbox
.

7861;txt;01
You can think of the sandbox as a piece of transparent paper placed between the program and your computer.  Deleting the contents of the sandbox is like discarding a used piece of paper and replacing it with a clean one.
.

7862;txt;01
Try it now:  Delete the contents of your DefaultBox sandbox.  Please find the yellow Sandboxie icon in the highlighted corner of your screen, and click:
.

7863;txt;01
Right-click on the yellow Sandboxie icon,

then select DefaultBox, and invoke Delete Contents.
.

7864;txt;01
Ready to go!
.

7865;txt;01
Thank you for taking the time to go through this tutorial.  You can visit the Sandboxie web site for more tutorials and tips.

The default settings in Sandboxie provide full protection, but you may wish to review the sandbox configuration commands in the Sandbox menu in the Sandboxie Control program window.
.

7988;txt;01
Your Supporter Certificate is valid, Thank You :-)
.

7989;txt;01
The Supporter Certificate has expired :'(
.

7990;txt;01
Please copy the entire Supporter Certificate into the clipboard and press OK.
.

7991;txt;01
Failed to save certificate to file.
.

7992;txt;01
The certificate is not valid.
.

7993;txt;01
The certificate is valid and has been successfully applied.
.

8106;txt;02
The following programs must be closed before the installation can continue.
Click OK to close these programs and continue.  Click Cancel to abort the installation.
.

*==========
* Extraneous Messages in Text-Macedonian-1071.txt
*==========

1109;evt;err;01
SBIE1109 1202;pop;err;01
SBIE1202 1214;pop;err;01
SBIE1214 1215;pop;err;01
SBIE1215 1216;pop;err;01
SBIE1216 1222;pop;err;01
SBIE1222 1223;pop;err;01
SBIE1223 1224;pop;err;01
SBIE1224 1302;pop;inf;01
SBIE1302 1303;pop;inf;01
SBIE1303 1304;pop;inf;01
SBIE1304 1307;pop;inf;01
SBIE1307 1308;pop;inf;01
SBIE1308 1310;pop;inf;01
SBIE1310 1311;pop;inf;01
SBIE1311 1407;evt;pop;err;01
SBIE1407 2315;pop;err;01
SBIE2315 2333;pop;err;01
SBIE2333 2334;pop;err;01
SBIE2334 9201;evt;err;01
SBIE9201 9202;evt;err;01
SBIE9202 9203;evt;err;01
SBIE9203 9204;evt;err;01
SBIE9204 9205;evt;err;01
SBIE9205 9206;evt;err;01
SBIE9206 9207;evt;err;01
SBIE9207 9208;evt;err;01
SBIE9208 9251;evt;err;01
SBIE9251 9252;evt;err;01
SBIE9252 9253;evt;err;01
SBIE9253 3211;txt;01
3231;txt;01
3232;txt;01
3233;txt;01
3234;txt;01
3235;txt;01
3236;txt;01
3237;txt;01
3238;txt;01
3239;txt;01
3240;txt;01
3321;txt;01
- 3322;txt;01
3503;txt;01
3453;txt;01
3455;txt;01
&3488;txt;01
&3542;txt;01
3543;txt;01
3604;txt;01
3605;txt;01

Sandboxie 3606;txt;01
3607;txt;01
&3771;txt;01
(3774;txt;02
3962;txt;01
3963;txt;01
3964;txt;01
3965;txt;01
3932;txt;01
3933;txt;01
3934;txt;01
3935;txt;01
3936;txt;01
3937;txt;01
3938;txt;01
3952;txt;01
3953;txt;01
3946;txt;01
3947;txt;01
7901;txt;01
Sandboxie 7902;txt;01
7903;txt;01
7921;txt;01
Sandboxie 7922;txt;01
Sandboxie 7923;txt;01
7924;txt;01
7925;txt;01
7926;txt;01
7927;txt;01
7931;txt;01
7932;txt;01
7933;txt;01
7934;txt;01
7935;txt;01
7936;txt;01
7937;txt;01
&7941;txt;01
7942;txt;01
7943;txt;01
7944;txt;01
&7945;txt;01
7946;txt;01
7951;txt;01
7952;txt;01
7961;txt;01
7962;txt;01
7971;txt;01
7972;txt;01
7973;txt;01
7974;txt;01
7975;txt;01
7976;txt;01
7977;txt;01
7982;txt;01
7983;txt;01
7984;txt;01
7985;txt;01
7986;txt;01
7987;txt;01
8106;txt;01
8107;txt;01


