Giter VIP home page Giter VIP logo

sandboxie's Introduction

Sandboxie Plus / Classic

Plus license Classic license GitHub Release GitHub Pre-Release GitHub Build Status GitHub Codespell Status

Join our Discord Server

System requirements Release notes Contribution guidelines Security policy Code of Conduct
Windows 7 or higher, 32-bit or 64-bit. CHANGELOG.md CONTRIBUTING.md SECURITY.md CODE_OF_CONDUCT.md

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local & mapped drives or the Windows registry. An isolated virtual environment allows controlled testing of untrusted programs and web surfing.

Sandboxie allows you to create virtually unlimited sandboxes and run them alone or simultaneously to isolate programs from the host and each other, while also allowing you to run as many programs simultaneously in a single box as you wish.

Note: This is a community fork that took place after the release of the Sandboxie source code and not the official continuation of the previous development (see the project history).

⏬ Download

Latest Release

πŸš€ Features

Sandboxie is available in two editions, Plus and Classic. They both share the same core components, this means they have the same level of security and compatibility. What's different is the availability of features in the user interface.

Sandboxie Plus has a modern Qt-based UI, which supports all new features that have been added since the project went open source:

  • Snapshot Manager - takes a copy of any box in order to be restored when needed
  • Maintenance mode - allows to uninstall/install/start/stop Sandboxie driver and service when needed
  • Portable mode - you can run the installer and choose to extract all files to a directory
  • Additional UI options to block access to Windows components like printer spooler and clipboard
  • More customization options for Start/Run and Internet access restrictions
  • Privacy mode sandboxes that protect user data from illegitimate access
  • Security enhanced sandboxes that restrict the availability of syscalls and endpoints
  • Global hotkeys to suspend or terminate all boxed processes
  • A network firewall per sandbox which supports Windows Filtering Platform (WFP)
  • The list of sandboxes can be searched with the shortcut key Ctrl+F
  • A search function for Global Settings and Sandbox Options
  • Ability to import/export sandboxes to and from 7z files
  • Integration of sandboxes into the Windows Start menu
  • A browser compatibility wizard to create templates for unsupported browsers
  • Vintage View mode to reproduce the graphical appearance of Sandboxie Control
  • A troubleshooting wizard to assist users with their problems
  • An Add-on manager to extend or add functionality via additional components
  • Protections of sandboxes against the host, including the prevention of taking screenshots
  • A trigger system to perform actions, when a sandbox goes through different stages, like initialization, box start, termination or file recovery
  • Make a process not sandboxed, but its child processes sandboxed

More features can be spotted by finding the sign = through the shortcut key Ctrl+F in the CHANGELOG.md file.

Sandboxie Classic has the old no longer developed MFC-based UI, hence it lacks native interface support for Plus features. Although some of the missing features can be configured manually in the Sandboxie.ini configuration file or even replaced with custom scripts, the Classic edition is not recommended for users who want to explore the latest security options.

πŸ“š Documentation

A GitHub copy of the Sandboxie documentation is currently maintained, although more volunteers are needed to keep it updated with the new changes. We recommend to check also the following labels in this repository:

future development | feature requests | documentation | build issues | incompatibilities | known issues | regressions | workaround | help wanted | more...

A partial archive of the old Sandboxie forum that was previously maintained by Invincea is still available. If you need to find something specific, it is possible to use the following search query: site:https://sandboxie-website-archive.github.io/www.sandboxie.com/old-forums/

πŸš€ Useful tools for Sandboxie

Sandboxie's functionality can be enhanced with specialized tools like the following:

  • LogApiDll - adds a verbose output to Sandboxie's trace log, listing invocations of relevant Windows API functions
  • SbieHide - attempts to hide the presence of SbieDll.dll from the application being sandboxed
  • SandboxToys2 - allows to monitor files and registry changes in a sandbox
  • Sbiextra - adds additional user mode restrictions to sandboxed processes

πŸ“Œ Project history

Timeline Maintainer
2004 - 2013 Ronen Tzur
2013 - 2017 Invincea Inc.
2017 - 2020 Sophos Group plc
Open-source code Tom Brown
2020 onwards David Xanatos (Roadmap)

πŸ“Œ Project support / sponsorship

Thank you Vector 35 for providing a Binary Ninja license to help with reverse engineering.
Binary Ninja is a multi-platform interactive disassembler, decompiler, and binary analysis tool for reverse engineers, malware analysts, vulnerability researchers, and software developers.

Thank you Icons8 for providing icons for the project.


🀝 Support the project

If you find Sandboxie useful, then feel free to contribute through our Contribution guidelines.

πŸ“‘ Helpful Contributors

  • DavidBerdik - Maintainer of Sandboxie Website Archive
  • Jackenmen - Maintainer of Chocolatey packages for Sandboxie (support)
  • vedantmgoyal2009 - Maintainer of Winget Releaser for Sandboxie (support)
  • blap - Maintainer of SandboxToys2 addon
  • diversenok - Security analysis & PoCs / Security fixes
  • TechLord - Team-IRA / Reversing
  • hg421 - Security analysis & PoCs / Code reviews
  • hx1997 - Security analysis & PoC
  • mpheath - Author of Plus installer / Code fixes / Collaborator
  • offhub - Documentation additions / Code fixes / Collaborator
  • isaak654 - Templates / Documentation / Code fixes / Collaborator
  • typpos - UI additions / Documentation / Code fixes
  • Yeyixiao - Feature additions
  • Deezzir - Feature additions
  • okrc - Code fixes
  • Sapour - Code fixes
  • lmou523 - Code fixes
  • sredna - Code fixes for Classic installer
  • weihongx9315 - Code fix
  • jorgectf - CodeQL workflow
  • stephtr - CI / Certification
  • yfdyh000 - Localization support for Plus installer
  • Dyras - Templates additions
  • cricri-pingouin - UI fixes
  • Valinwolf - UI / Icons
  • daveout - UI / Icons
  • NewKidOnTheBlock - Changelog fixes
  • Naeemh1 - Documentation additions
  • APMichael - Templates additions
  • 1mm0rt41PC - Documentation additions
  • Luro223 - Documentation additions
  • lwcorp - Documentation additions
  • wilders-soccerfan - Documentation additions
  • LumitoLuma - Qt5 patch and build script

🌏 Translators

  • yuhao2348732, 0x391F, nkh0472, yfdyh000, gexgd0419, Zerorigin, UnnamedOrange, DevSplash, Becods, okrc, 4rt3mi5, sepcnt - Simplified Chinese
  • TragicLifeHu, Hulen, xiongsp - Traditional Chinese
  • RockyTDR - Dutch
  • clexanis, Mmoi-Fr, hippalectryon-0, Monsieur Pissou - French (provided by email)
  • bastik-1001, APMichael - German
  • timinoun - Hungarian (provided by email)
  • isaak654, DerivativeOfLog7 - Italian
  • takahiro-itou - Japanese
  • VenusGirl - Korean
  • 7zip - Polish (provided separately)
  • JNylson - Portuguese and Brazilian Portuguese
  • lufog - Russian
  • LumitoLuma, sebadamus - Spanish
  • 1FF, Thatagata - Swedish (provided by email or pull request)
  • xorcan, fmbxnary, offhub - Turkish
  • SuperMaxusa, lufog - Ukrainian
  • GunGunGun - Vietnamese

All translators are encouraged to look at the Localization notes and tips before sending a translation.

sandboxie's People

Contributors

apmichael avatar bastik-1001 avatar cricri-pingouin avatar davidxanatos avatar dependabot[bot] avatar dyras avatar fmbxnary avatar github-actions[bot] avatar hulen avatar isaak654 avatar jnylson avatar love-code-yeyixiao avatar lufog avatar lumitoluma avatar mmoi-fr avatar mpheath avatar newkidontheblock avatar nkh0472 avatar offhub avatar okrc avatar rimacc2-ev avatar rockytdr avatar sebadamus avatar stephtr avatar tragiclifehu avatar typpos avatar venusgirl avatar yfdyh000 avatar yuhao2348732 avatar zerorigin avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

sandboxie's Issues

SBIE2101 OpenProcess

I'm trying out your release of Sandboxie, and keep running into the following error:

SBIE2101 Object name not found: , error OpenProcess (C0000022) access=001FFFFF initialized=1

This seems to happen when I invoke the sandboxed application's embedded Python interpreter.

I tried searching the old Sandboxie forums, but the only solution I saw talked about whitelisting IPC access. I'm not sure how safe that would be for an untrusted application.

Can you explain what is going on? Can this problem be fixed for the next release? Is the provided error message enough or do you need something more specific from me?

General Feedback

I generally use sandboxie as a container for specific apps that I want to make portable. It works like a charm but some feedback may help you make everything better. Since it became open source I'm very happy that wonderful people are trying to improve this program.

For better tracking of these, you can close this issue and make seperate for each of them.

  1. Spoof computer info (like username and basic stuff)
  2. Option to Act like stock windows: Apps launched in sandbox think it is a fresh install, hence they won't see any other thing on the computer.
  3. Support (unify) for customized user files location: When a stock user folder (my pictures/documents etc) moved outside of sandbox, gather writes onto that folder into "SANDBOX/user" instead of "SANDBOX/drive/d/customuserfolder/custom"
  4. Show active COM and IPC while adding COM/IPC access to Sandbox.
  5. Ability to check writes to registry made inside sandbox
  6. Rework file mitigation, this causes a lot of issues when using game setups etc.
  7. Make context menu better: Maybe make a tree under run sandboxed. Also run unsandboxed tweak must be added to the app ( there's a registry about it).
  8. Sandbox only user files' access: granting full access to everything but user files.
  9. Interface rework: this one is probably in the works.
  10. Steam Sandbox: for running two instances or another special use cases.
  11. Temp Sandbox: Every change is deleted when the app is closed.

I also would like to thank everyone who is contributing to this program.

666+

This is an old bug and hopefully very simple to fix

menu is broken(grayed out text) after right click on >666 sandboxes

666

This artifact

I often rely on him for reverse software
For example, what registry will a software change
What files will be written
I run it with sandboxie
Used to reverse software
Do differential registry
Even containers are created on windows, similar to flatpak, there will be no residue when deleting
If it can be combined with virtualization to achieve driver virtualization, then the real container.

Please clarify the situation of the different repos

Please clarify the situation of the different repos.

At first news like
https://www.heise.de/security/meldung/Windows-Sandboxing-Tool-Sandboxie-jetzt-Open-Source-4703926.html
mentioned the repo on https://github.com/sandboxie-dev, which was uploaded April, 9th, 2020. Which have also two binary releases published. The author is https://github.com/DavidXanatos
The repo was also linked on the sandboxie-website https://www.sandboxie.com/ .
Then the repo moved to
https://github.com/sandboxie-plus

Later the sandboxie-website liked to the repo at https://github.com/sandboxie , which was uploaded on April, 14th, 2020.
The author is https://github.com/SandboxieDev

What is now the main project repo? And why existing the other one?

[feature request] Outlook plugin?

A shot in the dark here, but others may be interested in developing/using something like this.

I think many people would find it useful for an outlook plugin which if possible would force any attachments to open in a sandbox. That way damage from any malicious attachments could be limited to a sandbox instead of the actual machine.

If such a feature exists elsewhere, I would be grateful for a pointer.

Sandboxie - Portable Mode (create Sandbox folder in the root folder instead of "C:\Sandbox"/drag drop support/Logging isn't working)

Hi,

I really liked the new sandboxie plus UI so far, just somehow I can't drag exe file to the main Sandboxie Plus UI to run the exe file like the old Sandboxie UI:

https://i.imgur.com/hIJ1GZd.png

I think drag and drop exe file is very good to have, so I hope you will consider adding this feature.

The logging feature seems to not working too, I couldn't find any log file in the root folder of Sandboxie:

https://i.imgur.com/vW7AWXH.png

And I would love to see a way to create Sandbox folder in the root folder to make the Portable Mode even "more portable". Currently Sandbox folder is created in C:\ (OS drive).

Thank you very much for all the improvements.

The Windows Installer Service could not be accessed #2

Anybody have any examples where the fix #1
works?

I'm seeing the same error. 1809 with Acrobat DC setup.

I never thought to make a list of installers where I got this error, going back a while, so I don't have anything more to test with.

sandboxie service craches after long usage

OS: Windows 8.1 x64 Home edition
happens when i try to open an image after a long usage session of sandboxie,
the sandboxie service crashed, and i need to restart the service to continue.
this is my 3rd or 4th time with this bug, 1ΒΊ time with this version of sandboxie.
Event viewer error:

- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
- <System>
  <Provider Name="Application Error" /> 
  <EventID Qualifiers="0">1000</EventID> 
  <Level>2</Level> 
  <Task>100</Task> 
  <Keywords>0x80000000000000</Keywords> 
  <TimeCreated SystemTime="2020-04-29T18:08:33.000000000Z" /> 
  <EventRecordID>19639</EventRecordID> 
  <Channel>Application</Channel> 
  <Computer>jotapc</Computer> 
  <Security /> 
  </System>
- <EventData>
  <Data>SbieSvc.exe</Data> 
  <Data>5.40.0.0</Data> 
  <Data>5e907966</Data> 
  <Data>ntdll.dll</Data> 
  <Data>6.3.9600.19629</Data> 
  <Data>5e2fdc0d</Data> 
  <Data>c0000374</Data> 
  <Data>00000000000f1cd0</Data> 
  <Data>438</Data> 
  <Data>01d61cb9f53fc898</Data> 
  <Data>C:\Program Files\Sandboxie\SbieSvc.exe</Data> 
  <Data>C:\Windows\SYSTEM32\ntdll.dll</Data> 
  <Data>6f90c1b5-8a44-11ea-827f-2c600c907251</Data> 
  <Data /> 
  <Data /> 
  </EventData>
  </Event>

sandboxie failing to start after updating to 5.41

just found out about the sandboxieplus project, and updated (it did technically override) from the freeware 5.33.3. it worked well until i restarted the laptop. reinstalling with and without restarting also faces crashes. ive also tried reinstalling the old version, which still works. all at their default settings, except changing the default drive to my ramdisk using imdisktoolkit.

now im getting 2 types of spam errors.
SBIE9234 Service startup error level 9153 status=C0000034 error=-1073741772
SBIE9234 Service startup error level 9153 status=C0000906 error=-1073739514

i have used various debloating win10 scripts found from github, but with version 5.33 it still works. what are some things i should send for debugging?

[Question] Fundraiser for developper certificate

Hello,

Since the sbie driver needs to be digitally signed, how about you add a "call to fund raising" to buy a code signing certificate ?
A sectigo 3 years valid certificate costs about 220$.

I pledge to fund a part of that price.
Are others willing to ?

@DavidXanatos Would that help ?

Build Issues

Dear Sir,

I hope everything is going great with your project.
I'm sorry to say that but when I downloaded your latest release and tried to build it on windows 10 it fails.

So is there a step by step build process or is it a must to build it on windows 7 with the given driver kit.

Thanks.

Cannot Start any Program in the Sandbox

I am a user of Sandboxie for a long time. The version 5.33.2 works normally on my computer. Today I compiled the 5.40 from source code. The building process is fine without any issue and I make the driver (SbieDrv.sys) signed.

The new version runs well and the SbieCtrl loads Sandboxie.ini in a normal way. But I cannot start any program in the sandbox! It seems that Start.exe will crash before it loads anything. I can see some WERFAULT.exe processes emerged when I try to start some program.

I am quite sure it is the problem in the code. Because when I substituted the compiled binary to the binary of version 5.33.2 without uninstalling/rebooting, everything is good again.

The problem exists in both the initial release of Sophos code and the version v5.40.1 in the github. I tried it on two different laptops with Windows 10 x64. The problem is the same. Is there anyone else have this strange problem?

Create a new GitHub organization for this repository

Greetings, @DavidXanatos

I think we can create a new GitHub organization for keeping Sandboxie's code and accumulating its further development. I see this repository starts gaining attention, so I was wondering if you want to do so. It will help to bring the community in one place and continue improving this product collaboratively on GitHub.

I would love to participate, and I hope we can find more people with sufficient skills and motivation to improve this program together. And making a GitHub organization seems like a reasonable first step.

UWP / Modern / Store Apps

What is the reason that Sandboxie isn't working with apps from the Microsoft Store?
Is it possible to improve Sandboxie so that it also works with Store apps?

SBIE1241 Cannot mount registry hive

Hi all,

I'm new to Sandboxie and trying to use it to sanbdbox an application in a terminal server, sorry if this is a dumb question...

I built the sandbox, configured it, tested and everything was fine until 2 users were logged in at the same time and tried to use the same sandboxed application, the second user gets the "SBIE1241 Cannot mount registry hive" error.

Does this mean that a sandbox can only be used by one user at a time? is there any workaround for this? will I need to duplicate the sandbox for every user to avoid this problem?

Thanks!

Can't install some applications utilizing the Nullsoft installer: The file does not have an app associated with it for performing this action.

I'm running Windows 10 LTSC (which is based on Windows 1809) with all updates installed: Microsoft Windows Version 1809 (OS Build 17763.973). I'm running SandBoxie 5.33.1 - the application says it's the latest available version - no updates found.

I cannot install some applications which use the Nullsoft installer.

Sandboxie is installed by default, nothing has been changed in its config.

Here's a sample application: https://www.hdtune.com/files/hdtune_255.exe

The errors are: The file does not have an app associated with it for performing this action. Please install an app or, if one is already installed, create an association in the Default Apps Settings page. Unable to execute file in the temporary directory. Setup aborted. Error 1223: The operation was canceled by the user.

error0

error1

The application can be installed directly without using SandBoxie. I'm a local administrator. UAC is off. I've verified that the installer unpacks a payload in the temporary location and it's a valid exe file though it doesn't have the usual extension (exe).

Here's the global settings section:

[GlobalSettings]

Template=WindowsRasMan
Template=WindowsLive
Template=OfficeLicensing

(Strangely I don't remember ever installing MS Office or Windows Live).

Edit: the issue affects Windows 10 built-in Administrator account only.

Program thinks host OS is XP when sandboxed

When running Turbo Tax inside of Sandboxie, it thinks the OS is Windows XP.

Because of that, it appears the SSL connection is downgraded, which means taxes cannot be submitted electronically since the receiving server refuses the connection saying it is insecure.

This is probably not Sandboxie's fault, but I wonder what could be triggering it.
Any suggestions what Sandboxie settings I could try to troubleshoot this?

To test this without submitting a tax return:
When saving a tax file while sandboxed, a message appears recommending a password due to XP being insecure. This message does not appear when the program is run outside of sandboxie.

[notissue] Return back a ripped functionality

Hope this will go into a Project' Task.

At the 3.x epoch there was a very useful functions used to inject dlls like AntiDel and some runtime monitoring. And BSA addon based on these features. Unfortunately these functions were trashed out and we're definitely need them back.

[Windows 10 v.2004] Key insertion/detection fail?

Hi DavidXanatos, after I update to Windows 10 20H1, I can only do English input. Any idea?
Thank you.

The right hand-side is sandboxie, non-sandboxie on the left.

InstantGif_2020 05 31-14 33_01

I can't find other log for sandboixe but only Resource Access Monitor. Hope it would help.
RAM.txt

- Sandboixe info
Version 5.40.1 (64 bit)

  • OS info
    Edition: Windows 10 Pro
    Version: 2004
    OS build: 19041.264
    Experience: Windows Feature Experience Pack 120.2202.130.0

I ran Firefox 76 in Sandoxie 5.28 and got entries in catroot2\dberr.txt

I know 5.28 is old, but any idea why this happens with Firefox 76?
Is it because Firefox is now doing their own sandboxing?

I did an sfc /scannow and all appears ok, I just get those dberr.txt entries when running Firefox 76 in the default box. Only the dberr.txt within the actual sandbox was affected.

Sandboxing command line applications

I use sandboxie for sandboxing command line applications in a non-interactive scripting environment, however the issue is that currently sandboxie doesn't produce any stdout or stderr when running command line applications, so this limits what can be achieved, and makes debugging difficult.

Would it be possible to have sandboxie's start command produce stdout and stderr from its child process?

If memory serves Windoes treats gui and cli programs separately, so maybe this would require a start-cli.exe variant for command line applications (I'm primarily a Linux developer and am using sandboxie to provide compatibility to Windows users).

It would also be useful if the sandbox configuration could be passed as command line arguments to start.exe so that Sandboxie could be run in a stateless configuration. Currently I'm creating and deleting a sandbox before and after each command, which is unnecessary and a little slow.

Recovering files to non-existant paths

When attempting to recover a file to a path which does not exist, the deepest folder of the path will not be created and the file will be renamed to this folder name instead.

Example:
Recover file.png to C:\a\b\

  1. If the folder C:\a\b\ exists, the file will be recovered as C:\a\b\file.png
  2. If the folder does not exist, the file will be recovered as C:\a\b (where b is a file with the file.png content)

Version 5.31.4 (64-bit) on Windows 10 Build 17763

[enhancement] Allow lenient sandboxing

I would like to request being able to configure a 'lenient' sandbox.

When a sandboxed process attempts to write on disk, the operation fails if the target does not have enough space or is readonly, even if the drive physically containing the sandbox has the necessary space. An alternative 'lenient' mode would allow writes to succeed in the sandbox even if the unsandboxed attempt would fail (the original files will still not be touched, which is the purpose of the sandbox). In this mode automatic file recovery should be disabled.

This would resemble UnionFS behavior and be useful e.g. to mount a compressed image with source code and compile to ramdisk (basically a poor-man's Docker that does not need virtualization support). It would allow to greatly lower the footprint of, say, Android Studio, reduce disk wear and tear and speed up compilation since non-RAID disk I/O is slower than CPU on-the-fly decompression (SSDs excepted).

sbie2013 can not load driver

[DefaultBox]
BlockDrivers=n

it is not work

This feature has been deprecated in SBIE version 4.+ and up. It is not longer supported.

"The Windows Installer Service could not be accessed."

It appears that the "Windows Installer Service could not be accessed" error is still present in this release.

image

The good news is that now, we can fix it ourselves! That is, we can fix it ourselves if we understand the code. I've been reading through the code trying to get a sense of how it works, but have admittedly made little to no progress. Do you have any idea how to fix this? Or at least some pointers as to where I should be looking?

Reproducing the issue is very simple: try to run an MSI installer inside a sandbox, and you will get this error.

For the 0.2/5.4.1 release, both 32-bit and 64-bit .exe's are detected as trojans

Windows Security detects :
SandboxieInstall64-v5.41.0.exe (with) Trojan:Win32/Ymacco.AA07
SandboxieInstall32-v5.41.0.exe (with) Trojan:Win32/WacatacC!ml

I'm new to Windows, so I don't know if this is because Sandboxie is seen as suspicious because all of its admin capabilities, or there's something bad going on here.

Features questions

I’ve been reading your roadmap of ideas and it’s really impressive, great ideas all over the place.

From reading them, I also have a couple of questions just to know if they are feasible:

  • about the portable sandboxes, would it be possible to compact (zip?) the sandboxes for easier migration? For example, like Thinstall/ThinApp does that generates a single executable (and afaik, deflates on scratch space when executed). This could also morivate a behavior similar to the distribution of Docker images in some sort of hub (like portableapps.com). I currently use sandboxie in combination with Python virtualenv to manage different environments and app versions and this sounds interesting
  • something, similar would be sandbox snapshotting, to easily revert to a prior version. A simple way could be by compacting the sandbox. The problem would be the data duplication, but I don’t know if an alternative is too complicated
  • lastly, about the networking, if not including the firewall functionality directly, did I understand correctly that your idea is to attach a virtual networking device to each sandbox? That would be very interesting

Longtime Bug: Firefox High CPU usage ucrtbase.dll!beginthreadx+0x100

This has been an ongoing buck for the last year or so, since 1809, still happens in windows x64 1909 and on different cpu/ram/mobo; to speed up the trigger, just open up 20-30 different unique tabs on RT.com rapidly, the bug should trigger and not go away. However, the program generally works fine for a while and will trigger no matter what page, no matter how little resources are loaded. This basically makes sandboxie mostly useless for me ATM.

Sandboxie 5 40 1 Bug

Enchancement for content auto deletion

Since Sandboxie appears to have code to detect when a sandbox has been created and how long it hasn't been 'cleaned' since Sandboxie issues this message:

Sandbox '%2' was created %3 days ago.

Please consider deleting the contents of your sandbox from time to time.

To configure automatic deletion, use the Sandbox Settings command from
the Sandbox menu in Sandboxie Control.

I thought that it would be a good enhancement to add a setting, which would allow one to set x days before the auto deletion function could clean up the contents of a sandbox. Right now it is only possible to set auto deletion to clean up the contents of a sandbox once it becomes unused.

I am not sure if that is feasible or even worse a bad idea.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.