wg..te..2o..ip..dj..ea..wh..ab..s2..lu..rn..sw..w3..pn..ci..mw..1l..nc..kp..fa..gh..0b..s7..yx..uw..sr..an..jg..cj..c2..qt..nq..am..ez..z8..uq..yr..ad..so..eq..zn..a2..z9..nf..za..cl..t8..rw..ee..lg..dw..jf..y0..fp..vy..7u..ya..ze..7u..em..jy..dv..j1..sa..fn..oo..77..x3..xn..sv..z4..2h..f4..rr..en..eg..ub..uv..wf..sx..vn..ja..nw..ip..mt..rr..dr..dm..lc..fu..sk..bc..yo..xe..ya..nf..9x..2u..rb..kd..sg..qs..4v..pc..jm..k9..ct..sl..ny..bm..ua..vh..xz..qj..zd..uz..xe..v4..j8..fs..9i..jy..li..ba..wd..ni..k9..2i..dn..3j..j5..ef..py..y6..03..ah..rb..ml..1a..w0..cx..41..av..na..zl..ls..kr..ft..zi..kh..cp..4o..hh..cx..h8..mp..xn..xn..wt..3h..i2..uz..j0..r7..f2..zz..sh..5j..jt..bm..ic..dq..fg..wq..g5..5n..mg..rm..7h..jv..vp..ns..wd..lp..ka..a4..gq..ge..bq..fu..py..cq..ys..dx..ph..dx..cy..kl..xw..pj..hk..zk..lw..gl..mh..vb..e9..ry..yk..bd..na..nu..e8..cs..4o..jm..io..yc..mv..xp..gi..sm..3b..ov..te..oj..kg..yv..lx..sd..s2..mb..dm..on..q5..ai..hb..ig..lq..gx..eq..xc..y9..qe..yl..kc..9e..2g..nm..6e..nn..ze..1p..qa..wy..id..fh..u3..o3..x4..je..2x..yq..t4..zj..mp..9b..se..6r..dc..dx..an..h8..im..sf..kj..5v..mh..ho..uv..8q..jb..xc..zb..gg..cc..j9..cw..ic..zl..r0..qq..2o..jk..sm..wa..cl..mm..wc..hl..rs..pv..z1..vv..t1..bk..ga..h8..an..nt..fw..fv..ml..ch..9v..p9..bb..gc..4i..bm..jb..oc..lp..t7..5b..bk..vy..ta..3r..vs..o2..vy..9k..gw..qy..6l..mv..wa..87..yh..dk..3w..an..na..jq..ot..r8..pf..8b..to..t1..wj..ux..x0..vj..jf..8y..rd..y8..zm..4f..uc..yp..iv..pj..wt..dn..td..lr..0q..qg..pr..d0..xl..gy..28..uq..r8..vb..zg..0o..ue..ip..9h..b1..a0..3n..il..0s..ih..bs..hu..f6..ji..oi..dr..uh..wa..hp..on..nb..xw..uh..a0..qi..ck..ie..ws..xi..pz..ts..w3..u4..bd..hf..p5..hh..9x..je..mu..pn..kw..iw..0m..qp..hl..ns..jt..zb..6i..xj..wi..e1..om..yd..n3..8c..qr..m8..39..sm..8y..ta..5u..cg..l3..ch..65..gx..sa..nv..qi..0x..w7..4u..wq..0p..6y..bc..a4..t8..f6..e7..kb..44..s1..bh..cg..xh..hl..p5..s3..ja..ci..pk..e1..ad..gf..bi..iw..ac..d2..op..in..ic..yk..2g..2r..oi..h3..qm..b3..lj..hp..eg..k1..ku..vd..ay..h9..6o..lw..6w..ds..x1..pf..rb..ny..8l..hw..rm..uo..r6..po..wi..xe..er..6r..6z..ix..ji..9e..x8..io..ya..ms..kc..fa..zj..qu..zz..yj..xe..y1..t0..by..5h..pl..ch..3o..ua..2x..5j..hg..yr..la..as..xu..ze..83..sh..vu..5c..9y..yv..vu..zj..pl..ym..ki..5a..q6..ri..es..4x..wl..fj..jd..4w..ke..d1..lg..ej..jq..dh..h3..kp..fy..lr..hs..v5..le..qx..wn..ga..ne..ab..xu..yh..ga..1v..an..le..2k..yp..74..2x..ch..6k..sb..am..kk..5v..d7..mw..ms..bn..un..fz..w9..o4..h3..ls..4b..tp..ik..b2..sr..kl..au..8p..hj..x9..dd..my..9v..qt..6m..av..f8..jm..mi..0z..53..y8..i1..lq..gw..2s..bd..fc..mn..pl..md..cy..xp..md..jh..fh..cf..ny..9c..v7..4a..2q..m4..yc..vk..ru..h9..xg..vk..pv..0u..hp..ey..9z..ou..ad..of..eq..dp..sh..sy..ca..ug..rk..ns..ji..eb..9o..mi..ra..oz..ly..m3..ll..z1..hw..ft..wv..in..nb..pj..aq..yp..ur..9v..bq..qo..nj..st..kc..pa..el..sj..wc..mk..w6..hk..nd..l9..kq..bq..yp..u1..z1..v3..xe..pu..46..mg..sg..nq..fq..th..ry..e7..pc..kq..9h..sm..ha..on..zn..aw..ym..qd..ln..9t..p7..ak..ci..hy..pc..sh..vn..za..oe..s9..nn..20..lj..zy..qe..md..qs..ho..qy..k5..a7..f6..j4..js..bx..n9..3a..1s..3x..me..m9..6l..y6..rh..pc..hc..e4..s0..wr..j3..as..52..v1..k6..de..96..qv..x1..px..4i..x7..eh..ij..ti..zh..5e..km..ou..xw..el..9z..tz..u9..zl..cb..wj..ub..py..uh..kk..pm..wy..xp..ym..ja..vw..jj..yk..9r..8x..ts..n6..m3..ss..ql..v4..8o..9k..vu..xs..93..lu..cy..cl..ku..ys..cw..jq..xp..lx..iz..fq..y6..ld..s0..et..oi..n2..kj..yx..c5..bk..76..tz..nl..0f..r8..sr..tm..3d..xf..4l..sq..jz..8d..yw..wl..hi..rh..fs..n2..hc..eq..ys..ju..nc..hh..ch..ff..q6..4f..gm..vb..vc..mg..pe..m0..mv..ci..6a..g3..dr..pg..dn..yb..qj..tc..ct..so..yj..4d..ia..mk..ay..pt..fi..og..js..rj..ci..eq..ht..x2..cw..97..8w..ss..4y..pq..on..6r..nb..nh..px..mw..ax..fv..op..3b..16..g6..xn..dl..rc..kg..j6..ey..yu..yu..vf..k0..fg..zf..5i..5s..ks..h5..np..74..l6..as..6o..tx..kx..ds..dd..li..zo..io..al..i7..tj..ts..jm..ca..yv..6n..k1..lz..rm..fc..9t..5r..ot..8p..gv..cj..mm..uy..du..t1..eh..ky..as..qu..gq..pg..ad..ad..zt..vv..f5..59..3m..k8..ra..1f..mv..yk..rn..nu..1 ToolKit Item: Sandboxie by Guest Author Bo Elam – Win10.Guru
Go to ...

RSS Feed

ToolKit Item: Sandboxie by Guest Author Bo Elam


[Note from Ed Tittel: This post about Sandboxie comes from guest author Bo Elam, whom Kari and I met on TenForums, where he is something of a regular visitor, and a passionate advocate for Sandboxie. Who better to write this Toolkit Item?]

I’ll start this article on Sandboxie with a few words on how I became a Sandboxie user. Before I started using Sandboxie, I used to get malware infections once or twice a year, and simply accepted those infections. I thought, “If I am going to use the internet, I am going to get infected and there’s nothing I can do about it.” The effect of using Sandboxie has been huge on the quality of my computing experience. After I became a Sandboxie user, infections went away completely. I haven’t had an infection since the day I became a Sandboxie user.

So, how did I become a Sandboxie user? One day late in 2008 during a browsing session, I was hit by malware (a rootkit). Till that day, whenever I got infected, I always had somebody clean up the infection. But this time I decided to do it myself. That was a breaking point. I took the approach of cleaning the infection as a challenge, and had fun doing it. During cleanup, I learned a lot about security and came to realize that there were better technologies available to protect our computers than anti viruses/scanners. One of those technologies was sandboxing. Later, while searching for protection against rootkits, my travels led me directly to Sandboxie. I knew nothing about sandboxes. Sandboxie doesn’t allow drivers or services to be installed in the sandbox. That attracted me. So, I decided to try Sandboxie, and 10 years later, I am still using it.

What is Sandboxie?

Sandboxie is a sandbox program for Windows: an applications sandbox is a runtime environment wherein programs run in an isolated space. You can run all kind of programs under Sandboxie . You can run your browsers, email clients, PDF Readers, video players, etc. Personally, I run every program I run on a daily basis inside Sandboxie. Most files I download, they run sandboxed every time they run during their lifetime in my computer. When you run programs under Sandboxie’s supervision, the interaction between programs running in the sandbox (isolated space) and the system outside the sandbox is seamless. So, there is no reason not to do it. Below is a picture of Sandboxie control (The Sandboxie User interface). Each name depicted in Sandboxie control represents a separate sandbox with its own settings. By looking at the names, you can tell the programs I am currently running sandboxed on a regular basis, or the purpose for using a particular sandbox. For example, the one called USB, is where files that run out of USB drives run sandboxed whenever a flash drive is plugged in.

The interaction between programs running in the sandboxed environment with the system outside the sandbox works so well, it’s possible to use programs as you normally use them when not running under Sandboxie’s protection even though your computer is protected. So, in the end, users that run their programs and files in the sandbox, achieve a very high level of security for their computers without losing usability or convenience. I am a Sandboxie user to the max. In my case, basically, the only time I am not using Sandboxie is when the computer is idle or I am doing updates.

To be more specific, Sandboxie in a sandbox program designed for running most of the programs that you use regularly, or programs that connect to the internet. But there are other uses for Sandboxie. For example, we can use it for testing programs. If you would like to test a new browser or video player, you can run the installer in a sandbox, and test the program. In the picture below (left side), after right clicking the installer, I get the option to “Run sandboxed” the installer. Clicking that option, opens up the Sandboxie Menu (Right side), in that menu we have the option to choose the sandbox where we want the installer to run.


If you like, you can keep an installation around for a while, or you can delete the sandbox after testing a program. Right now, I have IrfanView installed in a sandbox. There are several ways that a program installed sandboxed can be run. You can even create a sandboxed shortcut to make things easier to run nstalled programs sandboxed but this is how I run them myself. Look at the 3 pictures below, in the first one, after right clicking the Sandboxie icon by the clock and hovering the browser over the name of the sandbox where I installed IrfanView, I get the menu to the left, and select “Run from Start menu”. That’s the sandboxed Start menu (picture 2). I look for IrfanView in the Menu and click it, after doing so, it opens in the sandbox I created and set up specifically as a dedicated sandbox for IrfanView (picture 3).

1 2

3

Probably, the most important function in Sandboxie is Delete contents of the sandbox. When you delete contents, everything you did in a session gets deleted, all changes that took place in the session get deleted, except what you choose to save outside the sandbox. You can set sandboxes to delete automatically when you close a sandboxed program (that’s what I do in my browser sandboxes) or you can save contents (a sandbox where you installed a program that you want to keep for a while is a good example) and delete later, when you decide to do so. Below, you can see the options in Sandbox settings for Delete contents.

I also use Sandboxie for testing changes in my system. After testing, if all looks good in the sandbox, I ll do the change on the real system. Everyone who uses Sandboxie sometimes innovates and comes up with new ideas on how to use the program.

How does it work?

Programs running in Sandboxie’s isolated space (the sandbox) are prevented from making permanent changes outside the sandbox, to the file system, the registry or other programs. When a program running in the sandbox wants to make a change (good or bad), Sandboxie captures that change and before it takes place, Sandboxie makes a copy of the file and redirects it to the sandbox folder. The sandboxed program thinks the change is done for real in the real system but it is not. It is done only to the copy. That’s how Sandboxie protects a computer from unwanted changes.

The Sandbox folder in C Drive.

The Sandbox at work. For example, when I download something, like an installer, the sandboxed program (Firefox in this case) thinks the download went to user\current\BoVideos\C1 but actually the download was redirected to C:\Sandbox\Bo\DefaultBox\user\current\BoVideos\C1. Look at the picture below. The same thing would happen if you get hit by malware. Then the infection, and any changes caused by the malware get redirected to the sandbox. The malware thinks it infected the system but it has not. The infection was captured by Sandboxie and will be gone when we delete the sandbox. Your files system and registry remain intact.

Via Sandboxie control you can track the changes sandboxed programs make. Some users like to use this option when they test installing a program in a sandbox, to see what files programs create or files they modify.


Sandboxie comes in both free and paid versions. Both versions have same degree of security. The difference in the two versions is that with the paid version, sandboxing files and programs becomes automatic. You don’t have to think about sandboxing a file, you just click it and it runs sandboxed automatically. When you buy a license and register your copy of Sandboxie, the Forced folders and Forced programs features are unlocked. The Forced programs feature allow the user to set programs to run automatic every time they run. Via Forced programs, you set your browsers, PDF readers, or any program to run sandboxed automatically. For example, if you set your PDF reader to run sandboxed, whenever you click on a PDF, it will run sandboxed. By using the Forced folder feature, you can set folders, such as, your Download folder or USB drives to be sandboxed. If you set your Download folder as a Forced folder, every file that runs out of that folder, will run sandboxed when executed. If you set your USB drives to run sandboxed, when a flash drive is plugged in, the USB folder opens up using a sandboxed version of File explorer. If anything runs, it will run sandboxed, under Sandboxie’s supervision.

Some sandbox programs sandbox files or program when it detects or flags a file or program as malicious or is unknown to the sandbox program. Sandboxie works differently. Sandboxie treats every file the same way, it doesn’t detect anything. We, the users, choose what to sandbox, not Sandboxie. My formula for success with Sandboxie is simple, I sandbox all files and programs that run in my computer every time they run. There are exceptions but they are rare and that’s basically how I use Sandboxie.

Another characteristic of Sandboxie that makes it a unique program is that you can use as many sandboxes as you need. Most sandboxing program have only one sandbox. Everything that runs, runs together. To maximize isolation, Sandboxie allows the user to create separate sandboxes for different programs. By running programs in their own sandbox, we isolate programs not only from the system but from other programs as well. Dedicating sandboxes for different programs allows the user to set each sandbox according to the dedicated/primary program. In the example pictured below, you can see Firefox running in one sandbox and Libre Office in another. Using separate sandboxes for those programs allows me to set each sandbox according to the dedicated program. For example, in my Libre office sandbox, no program is allowed access to the internet. That’s security. Whenever I run an office file, nothing in that file can connect to the internet. I achieve this high level of security because I am using a separate sandbox for Libre. If all programs ran together in one big sandbox, Libre would run sandboxed but it would have access to the internet.

There are many settings in Sandboxie, some are global but most can be applied to individual sandboxes. Some have to do with security, restrictions. While other settings have to do with usability and convenience. There are many, Sandbox settings help the user tailor each sandbox according to the program you are going to run in it. My goal every time I create a sandbox is to achieve a balance between usability and security. So, I tighten up security as much as possible without losing usability.

I am going to use Firefox to portray some of the settings. In Internet access restrictions, I only allow firefox.exe to connect to the internet. That means that no other program that runs in my Firefox sandbox will have access to the internet.

In Start/Run access restrictions, I only allow firefox.exe, and Foxit (my PDF Reader) exes to run. If anything other than these programs attempt to run in my Firefox sandbox, they will be blocked.

For better usability and convenience, in Sandbox settings for Firefox, I allow Firefox to have Direct access to bookmarks outside the sandbox. This makes it possible to recover/save bookmarks from the sandboxed environment. But, if you like, you can allow Firefox to have access to anything in the Firefox Profile folder, or even the entire Profile folder.

Sandbox settings are something that most sandbox programs lack. Sandboxie has quite a few, they allow users to lighten or tighten the sandbox as much as we want. You decide how loose you want the sandbox or how tight you want it. Personally, like I said earlier, I try to strike a balance between usability and security when I create sandboxes. That’s what you do with Sandbox settings.

By default, nothing gets out of the sandbox. Not even bookmarks or downloads. Most sandboxing programs don’t allow the user to save anything out of the sandbox. Hopefully, you guys and gals reading this article, realize that with Sandboxie we can leave things as they come by default (nothing gets out). But for convenience and usability, we can set things up to save bookmarks and downloads. If this was not possible, more than likely I would have never become a Sandboxie user. I want a high level of security but don’t want to give up usability. Thankfully, I can have both (usability and security) with Sandboxie.

How can Sandboxie help Windows users?

In one short paragraph, Sandboxie helps Windows users keep their systems intact. By using Sandboxie, Windows users prevent programs that run in the sandbox from causing unwanted permanent changes to their operating system, registry and other programs. Any changes, caused by good programs or malicious programs will be gone when we delete the contents of the sandbox. And nothing gets out of the sandbox unless we allow it. End of story.

Author: Bo Elam

9 Responses “ToolKit Item: Sandboxie by Guest Author Bo Elam”

  1. March 5, 2019 at 22:36

    Thank you, Bo. I learned much. ~ Alan

    • Bo Elam
      March 7, 2019 at 15:42

      You are welcome, Alan.

      Bo

  2. TheLightofTruth
    March 6, 2019 at 12:18

    With every other Adobe, browser or Windows update, something in Sandboxie is broken and Invincea has to play the multi-month long catch-up fix game. This fact, along with Bo’s fanaticism over at Wilders and elsewhere, have done more to harm Sandboxie than anything else. The general perception is that Sandboxie is a high-hassle software. And no one – save a single person – is going to focus solely upon adapting their system so that Sandboxie will work reliably. A typical user is going to expect – and rightly so – that Sandboxie be compatible with their system and softs out of the box and on an ongoing basis. Any breakage because of any update is unacceptable.

    • Bo Elam
      March 7, 2019 at 15:41

      I know who you are, and you know I know who you are. Leave the hate for Sandboxie (and myself) at Wilders. Dont bring it here, please.

      Sandboxie is a restrictive software. I am sorry that some of the software that’s important to you is not compatible with Sandboxie, and there’s nothing that can be done about. Holes would have to be open in SBIE for your favorite software to work in the sandbox. Sandboxie wont do that. If Sandboxie was important to you, you would accommodate to SBIE, work with SBIE, but you feel, doing it is like giving up. Face it, Sandboxie is not for you. Quit the hate and move on.

      What can I say, I never have problems with SBIE. I never had any big issue in XP, W7 or now in W10. Am I lucky? No, its not luck, I don’t have issues because I understand SBIE, and try using software that’s compatible with SBIE.

      Bo

  3. William Barrett
    March 7, 2019 at 17:21

    Sandboxie is my every day program, it works just fine for what I need and for my clients that use it.
    I have had not problem with getting help with Sandboxie and been able to determine the cause of a Sandboxie error and solve the problem myself.
    This program has save quite a few of my clients form malware and in one case Ransomware.

  4. TheLightofTruth
    March 8, 2019 at 05:17

    I don’t know who you think I am, but I’m not a member of Wilders. However, I do read posts on Wilders.

    There is no hate, just the truth. The facts are the facts. And the undeniable fact of the matter is that Sandboxie routinely breaks things after software or OS updates. It has an atrocious compatibility record.

    You’re right. I don’t want to accommodate Sandboxie. I use a default deny configuration that is far more restrictive than Sandboxie could ever be. Sandboxie requires exclusions and policy modifications that weaken system security.

    You have an absolute intolerance of any form of criticism of Sandboxie. You won’t even acknowledge the most moderate, entirely legitimate criticism. Furthermore, your constant need to always defend Sandboxie with your Bo Elam-centric view is obnoxious.

    • Bo Elam
      March 8, 2019 at 18:45

      By looking at your nick, I knew who you were. You always use names that have to do with light, illumination, illuminated, enlightened one, that’s you. The nick you took here, “TheLightofTruth”, fits you perfectly. You took it from the book In the light of truth, the author saw himself, as you think of yourself, as sort of a messiah whose role on earth is to shed light on the rest of us mortals.

      But anyway, you saying, “Any breakage because of any update is unacceptable.” shows how unreasonable you are regarding Sandboxie. The truth is that any update by any software could trigger a compatibility issue between the updated software and another software. A simple daily anti virus virus signatures update could produce a compatibility issue between the AV and a browser. But since your agenda is to attack SBIE, you really don’t care about how things really are and work.

      Regarding myself and Sandboxie, I am going to tell you something. And after I finish writing what I am writing now, I wont reply again to you. In the early years when I stated using Sandboxie, in private conversations with Tzuk (the original developer of SBIE), he told me over and over that he liked what I wrote about Sandboxie, and thanked me. He continuously did it, that gave me the confidence and encouraged me to keep writing about Sandboxie, and to continue doing t as I always had. His words assured me that what I was writing was beneficial for SBIE. What I write comes from my personal experience using Sandboxie.

      Later, after Tzuk left, the new developers, have also in our private conversations thanked me for my contribution to Sandboxie. So, you, telling me that I “done more to harm Sandboxie than anything else” don’t mean anything when the developers (new and old) tell its otherwise.

      Good bye

      Bo

  5. Mac
    April 6, 2019 at 21:43

    Hey a month later but ….

    I’ve been using SB since around 2006 or 7 and haven’t had an infection or anything similar since. Now there have been some times when a new version of SB or FF have had some compatibility problems but they get resolved fairly quickly. No issues since the re-build of FF. Extensive posts on respective forums are your friend, in the rare case you have issues.

    Meanwhile, I’ve been trying to find what browsers are compatible w/SB and this intro article also does not spell that out. I believe FF and Opera are, but not Edge or Chrome. Love to find out so it’s back to surfing for me today.

    Well, my 2c. I won’t even consider surfing w/o SB.

    • Bo Elam
      April 12, 2019 at 00:49

      Hi Mac, of the browsers you mentioned, only Edge is not compatible with Sandboxie. Firefox. Opera, and Chrome work well with Sandboxie. Internet Explorer does as well.

      In some systems, for Chrome to work fluently in the sandbox, its better not to enable Drop rights in Sandbox settings. Because of the way Chrome works, using Drop rights sometimes generates too many Sandboxie messages, and that can be annoying. So, if you run Chrome sandboxed and you constantly get SandboxieBITS messages, disable Drop rights. Basically, the key for running Chrome successfully under Sandboxie is not to over restrict the sandbox.

      Bo

Leave a Reply