Sandboxie - free the explorer in you
We IT guys are a little bit like little children who need to take their toys apart to understand how they work.
We need to test software, mess with it, play it around and then move to another program and do the same, again and again.
Learning by doing is the only way to us.
But the same concept applies to everybody.
How
many times have you installed a program and afterwards you found out
it doesn't do what it promised or, yet worse, it's nothing but malware?
Sadly
installing and uninstalling numerous programs is bad for any computer,
regardless of the operating system, but it's particularly inadvisable
for a Windows PC, because of the messy way Windows handles files (for more details about this topic, view my previous post How to maintain and speed up your computer - an out of the box guide (computer surge blues), part 2).
What
if I told you that there's a way to test programs and applications in a
secure area without actually installing them to your physical system?
Today I want to talk you about a handy program called Sandboxie that allows you to play with programs the same way you did with your toys.
Basic concepts
Sandboxie is based on an IT security concept called sandbox.
In layman's terms, a sandbox implementation allows to run a program in a
separate environment so that it doesn't impact your physical operating
system.
Sandboxie sets up a virtual Windows system within the actual operating system, which runs alongside but independently of it and it comes in handy to test applications, but you can also use it for a safer browsing experience.
In
fact, today's malware can infect a system not only through user interaction (such as opening an email attachment or
installing a program) but also by simply browsing the Internet.
Malicious websites (and sometimes legit websites as well, if they get
taken over by hackers) can run harmful scripts and ActiveX that can
compromise your computer without the need for you to install anything.
If this happens while using a "sandboxed" browser, you can simply delete
all the files in your sandbox (i.e. the secure area configured by the
program) and you're good to go.
Your system will remain
untouched as if nothing had occurred, because nothing actually happened
to the physical OS. You have simply "simulated" to browse the Internet.
Program features
The installation is pretty straightforward. After completing it, there'll be a new rhombus-shaped icon in the taskbar, called Sandboxie Control, allowing you to handle all the program options.
Sandboxie
is a shareware program, but it can be used after the trial expiration
date with no need for the user to purchase a license (you only have to
wait for 30 seconds before being allowed to open the program). The free
version works pretty good for most needs and I've used it for years with
my full satisfaction, but certain functionalities are fully available
only in the premium version.
The current version now also supports 64-bit applications and has fixed several bugs.
How to run a program in sandboxed mode
You can do it in two different ways:
- First method: Right-click the icon of the program you want launched and select Run Sandboxed (fig. 1). At this point you'll be shown the familiar User Access Control (UAC) window prompting you for the installation of the requested program under Sandboxie; you want to click Yes to allow the installation (fig. 2). In the next window, click OK to launch the setup (fig. 3). If you flag Run as UAC Administrator, you can run the program with administrative privileges (it's the same as right-clicking the program icon of a program physically installed on the system and selecting Run As Administrator). Now you'll perform the actual "sandboxed" installation (fig. 4).
Fig. 1 (Click to enlarge) |
Fig. 2 |
Fig. 3 |
Fig. 4 |
- Second method: right-click Sandboxie Control and select Run Any Program (fig. 2). At this point you can browse your computer to find the program you want to run (Fig. 5) or you can select Run Windows Explorer to access the file from Windows Explorer in sandboxed mode. Either way, you can open a file, install or run a program following the same steps described before.
Fig. 5 |
These customizations must be used very carefully to avoid compromising your security, instead of enforcing it.
Fig. 6 |
Fig. 7 |
Immediate Recovery monitors select folders and file extensions and suggests to move them out of the sandbox as soon as they get saved in a program being run sandboxed (fig. 7). This is a very handy functionality but can be very insecure (for the reasons explained above) and can be disabled by the user.
While you're using the sandbox the program icon will change, displaying red dots inside the yellow rhombus to mean data is being transferred (fig. 8).
Fig. 8 |
Sandboxie is an excellent solution to safely test applications and I warmly recommend it to improve the security level of Windows-based systems.
If correctly implemented, it prevents common infections sources, such as opening email attachments or executable files, and significantly increases security for Internet connections.
It's very reliable, and in fact I use it inside my Windows VM (so I use a virtualization app alongside another virtualization tool) and it still runs smoothly.
The only caveat is, in my opinion, the excessive customization possibilities for an average user, which can essentially undermine the security level you want to ensure.
In a corporate environment, these options should be disabled for standard users and reserved to the system administrator group.
Comments
Post a Comment