Run programs in a sandbox to prevent malware from making permanent changes to your PC.
Sandboxie allows you to run your browser, or any other program, so that all changes that result from the usage are kept in a sandbox environment, which can then be deleted later.
When you browse the Web, changes occur to your computer system. Some harmless, like recording the addresses of Web sites you have visited, so the browser can help you complete a Web address that you type in. Some more harmful, like the unsolicited installation of malware. When you use Sandboxie to protect your browsing session, it catches all these changes just as the browser is about to apply them into your computer system. Sandboxie does record these changes on behalf of the browser, but it records them in a special isolated folder, called the sandbox. Thus, with Sandboxie, you can browse the Web securely while still keeping all your browser"s functionality for active and dynamic content, such as Javascript and ActiveX. All undesired side effects, including the removal of malware, can be easily undone.
Sandboxie 4.18 changelog:
A security hole with the Windows print spooler has been plugged. An application could use the print spooler to write an arbitrary file outside the sandbox. If Sandboxie detects that the print spooler is attempting to write a file outside the sandbox at the request of a sandboxed application, it will issue "SBIE1319 Blocked spooler print to file".
NOTE: Some printer drivers write temporary files to their own work area, even when not printing to file. In these cases, you will get SBIE1319 even when printing normally (not to file). The print may still print successfully. In this situation, you can safely ignore SBIE1319, hide the error message, or open the folder as described below.
There are 3 ways to allow the print spooler to print to file:
- If you trust the process that is printing, you can double-click the SBIE1320 (that follows SBIE1319) to allow the print spooler to write files outside the sandbox for that particular process.
- The spooler can write files outside the sandbox according to OpenFilePath settings. This enables you to permanently open the folders a particular printer driver uses to store its work files.
- You can manually add the setting AllowSpoolerPrintToFile=y to sandboxie.ini. This is not recommended as it leaves your sandbox open to a print spooler exploit.
- Any error msgs generated when auto-deleting a sandbox will now be shown to the user.
- Fixed Chrome SBIE2205 Service not implemented: Win32Init.5 (00000005)
- Added Hitman Pro Alert to templates.ini
- Changed hook for ChangeDisplaySettingsEx() to allow CDS_RESET. A user reported that a game (fifa15) is trying to use this and failing resulting in incorrect display colors.
- Distributed File System (DFS) mapped drives are now supported (viewtopic.php?f=11&t=18825&p=100656)
- VMWare HGFS (Host Guest File System) mapped drives are now supported.
- A BSOD bugcheck reported by a user when using bittorrent has been removed (this was a rare situation). SbieDrv was detecting corrupted memory when no corruption had occurred.
- Fixed a rare bug in clipboard handling that could crash SbieSvc.
- WebEx running under Chrome would sometimes hang.
- Recent Windows update in Win 8-64 causes Skype (and possibly other apps) to issue error SBIE2335 Initialization failed for process Skype.exe 33 / 0?
Download: Sandboxie 4.18 | 6.7 MB (Shareware)
View: Sandboxie Website