Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'sandboxie'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. This build introduces a couple of quality of life improvements [hide][Hidden Content]]
  2. Changelog Added boxes set to auto-delete are now marked with a small red recycle symbol added Vietnamese language on Plus UI #2438 Fixed fixed issue with box options #2400 fixed issue with Smart App Control #2341 fixed issue with snapshots when using privacy boxes #2427 fixed issue with m_pColorslider change not applied #2433 (thanks okrc) fixed issue with switching snapshots when the file panel is open fixed issue with file panel when an empty box is selected #2419 fixed issue with menu icon not being disabled #2406 fixed compatibility issue with Microsoft Edge #2312 fixed UsePrivacyMode=y compatibility with Windows 7 #2423 fixed minor issue during Sandboxie Plus uninstall #2421 fixed BSOD issue when driver initialization fails (introduced in 1.5.1) #2431 fixed fake paths being listed even if true paths do not exist #2403 fixed issue with Firefox 106.x requesting write access to plugin executables #2391 #2411 [hide][Hidden Content]]
  3. Changelog Added added SBIE2227 warning when a sandbox is located on a volume without 8.3 name support added template for Tencent QQ #2367 Fixed fixed issues when renaming a sandbox with a custom path #2368 properly fixed the Firefox 106 issue 46e9979 fixed issue with alternative UI modes #2380 fixed command line corruption with breakout processes #2377 fixed issues with Privacy Enhanced box types #2342 fixed issue with boxed object directory initialization #2342 Sandboxie no longer leaves behind permanent directory objects FIXED SECURITY ISSUE ID-21 AlpcConnectPortEx was not filtered by the driver #2396 fixed issues with program control options #2395 [hide][Hidden Content]]
  4. Changelog Added Added support for Windows on ARM64 #1321 #645 -- Ported SbieDrv for ARM64 -- Ported low level injection mechanism for ARM64/ARM64EC -- Ported syscall hooks for ARM64/ARM64EC -- Ported SbieDll.dll to ARM64/ARM64EC -- Note: ARM32 on ARM64 is not implemented and will terminate with message SBIE2338 -- Note: When Sandboxie is running, it disables the use of CHPE binaries for x86 processes globally, this is required for the forced processes functionality. This behaviour can be disabled by adding the global option "DisableCHPE=n" to the Sandboxie.ini, then x86 processes started outside the sandbox, instead of being forced, will be terminated with message SBIE2338 fixed fixed issue with Win32 hooks in x86 applications Avoid window overlap when editing templates #2339 (thanks okrc) Fixed the wrong write of OpenWinClass setting UI #2347 (thanks okrc) Fixed issue about Local Template #2338 (thanks okrc) fixed Edge WebView compatybility issue #2350 added provisional workaround for firefox 106 content process sandbox issue Fixed bug with Rename Sandbox 2358 (thanks okrc) Changed reworked API compatibility check Break out process is now available for all users [hide][Hidden Content]]
  5. Changelog [1.4.1 / 5.59.1] - 2022-10-05 Added addes dark title bar support for Windows 11 #2299 Changed In sbie 5.28 and later WinInetCache is open, this breks IE's source view, hence it can now be disabled with 'CloseWinInetCache=y' Fixed fixed WarnProcess and WarnFolder not working with certain configurations [1.4.0 / 5.59.0] - 2022-09-30 Added added integrated run from start menu #1836 added start menu enumeration #1570 added UI for breakout processes #1904 added option to customize double-click action per sandbox added new advanced tab in the advanced tab allowing to configure specific processes and other advanced options added "SeparateUserFolders=y" and "SandboxieLogon=y" to the sandbox options dialog added icons to option section labels Changed prepared for Qt 6.3.1 restructured the general settings page restructured the sandbox options page, added a new tab and moved some of the advanced options there Fixed fixed menu bar issue in Plus UI #2280 (thanks okrc) [hide][Hidden Content]]
  6. Changelog Added Added NoRenameWinClass to the Plus UI Added Windows.UI.* to the list of hardcoded well-known classes to resolve issues with WinUI apps #2109 Changed NoRenameWinClass now supports wildcards Fixed fixed issue with default box not being detected on start #2195 fixed move sandbox menu issue #2225 (thanks okrc) fixed issues with stale data in Sandboxie-Plus.ini #2234 (thanks okrc) fixed autostart issue #2219 fixed firewall UI issue, all programs entries were missing *, prefix #2247 fixed BlockPorts template with a missing *, prefix 4420ba4 fixed issues with various Electron apps #2217 #2235 #2201 #2166 -- now the default behaviour is UseElectronWorkaround=n Removed removed obsolete VPNTunnel template [hide][Hidden Content]]
  7. ChangeLog [1.1.3 / 5.56.3] - 2022-06-20 Added added group first sorting #1922 Changed updated Classic UI Swedish translation (thanks pb1) restored Plus UI Turkish translation #1419 (thanks fmbxnary) Fixed fixed issue with recovery window on delete #1948 fixed double-click issue on path column #1951 "AllowBoxedJobs=n" is back to the default behaviour as issues were reported #1954 fixed issue with internet block #1955 fixed grouping issue in the Plus UI #1950 fixed issue with CredentialUIBroker.exe on win 11 with win32k hooks #1839 fixed issue with delete V2 #1939 [hide][Hidden Content]]
  8. ChangeLog Added added auto update download and silent install option to sandman.exe #917 trace monitor mode can now also save to file #1851 trace log now shows ipc object type information added support for windows 11 context menus Fixed fixed sandman crash issue #1846 fixed issue with windows server 2022 build 20348 fixed translation switching issues #1852 [hide][Hidden Content]]
  9. ChangeLog Added added "FuncSkipHook=FunctionName" option to selectively disable individual function hooks Changed improved support certificate entry box changing language no longer requires a restart on Plus UI fixed issue with high CPU load when using SbieCtrl to change settings Fixed fixed issue when running Firefox/Chromium browsers compiled with MinGW toolchain #538 fixed issues with folder recovery on Plus UI #1840 #1380 [hide][Hidden Content]]
  10. ChangeLog Fixed fixed issue with video playback in firefox introduced in the previouse build #1831 fixed BSOD issue with driver #1811 fixed issue with editing start restriction entries fixed issue with netwirk options tab #1825 fixed portable mode issue when runnign sandman as admin #1764 [hide][Hidden Content]]
  11. Release v1.0.19 / 5.55.19 ChangeLog Added added drag and drop support for groups #1775 added del key support to the box view for all entry types #1779 added warning when trying to run explorer.exe in a box with OpenCOM #1716 Fixed fixed crash issue in the sandman ui #1772 fixed issue some installers when EnableObjectFiltering is enabled #1795 fixed to allow NtCreateSymbolicLinkObject to be used safely in the sandbox added workaround for a vivaldi hooking issue 1783 -- Note: its a very provisional fix hence it can be disabled with UseVivaldiWorkaround=n fixed registry issue with snapshots #1782 fixed issue with box grouping #1778 #1777 #1776 fixed more issue with box grouping #1698 #1697 fixed issues with snadshot ui #1696 #1695 fixed issue with recovery dialog focus #1374 [hide][Hidden Content]]
  12. ChangeLog [1.0.18 / 5.55.18] - 2022-04-13 Added added minor browsers to BlockSoftwareUpdaters template (by APMichael) #1784 Changed Failed memory read attempts to unboxed processes will no longer cause message 2111 by default -- Note: the message can be enabled in the settings if desired with "NotifyProcessAccessDenied=y" reordered BlockSoftwareUpdaters template (by APMichael) #1785 Fixed fixed pipe impersonation in compartment mode fixed issue with box clean-up introduced in a recent build fixed missing trace log cleanup command #1773 fixed unpin did not work #1694 [hide][Hidden Content]]
  13. ChangeLog [1.0.17 / 5.55.17] - 2022-04-02 Added added checkbox for easy read access to memory of unsandboxed processes (old Sbie behaviour, not recommended) Changed improved OpenProcess/OpenThread logging Fixed fixed crash issue with the new monitor mode fixed issue with resource access entry parsing [hide][Hidden Content]]
  14. ChangeLog Added added notification window to warn that the default update checker is often behind the newest release on GitHub, to ensure that only bug-free builds are offered as updates #1682 added main browsers to BlockSoftwareUpdaters template (by Dyras) #1630 added a warning when sandboxie-plus.ini is not writable #1681 added cleanup for critical sections (by chunyou128) #1686 Changed improved command line handling for breakout processes #1655 disabled SBIE2193 notification (by isaak654) #1690 improved error message 6004 #1719 Fixed fixed dark mode issue with the new tray list fixed now showing a warning when sandboxie-plus.ini is not writable #1681 fixed issue with software compatibility checkbox (thanks MitchCapper) #1678 fixed issue with events on box close not always being executed #1658 fixed memory leaks in key_merge.c fixed issue enumerating registry keys in privacy mode fixed setting issue introduced in 1.0.13 #1684 fixed crash issue when parsing firewall port options FIXED SECURITY ISSUE: in certain usage cases a sandboxed process could obtain a handle on a unsandboxed thread with write privileges #1714 [Hidden Content]
  15. This build fixed a security issue. If you have issues with an update installation, just uninstall the previous version keeping the sandboxie.ini and reinstall the new build. You can support the project through donations, any help will be greatly appreciated. ChangeLog Fixed FIXED SECURITY ISSUE: Hard link creation was not properly filtered (thanks Diversenok) fixed issue with checking the certificate entry. [hide][Hidden Content]]
  16. ChangeLog Added added optional tray notification when a box content gets auto deleted added FreeDownloadManager template added warnign when opening unsandboxed regedit #1606 added languages files that were missing in official Qt 5.15.2 (by DevSplash) #1605 Changed the asynchroniouse box operations introduced in the last build are due to a pupular request now disabled by default moved sys tray options from general to shell integration tab removed "AlwaysUseWin32kHooks", now these win32 hooks are always enabled -- note: you can use "UseWin32kHooks=program.exe,n" to disable them for sellected programs updated Listary template to v6 (by isaak654) #1610 Fixed fixed compatybility issue with SECUROM #1597 fixed modality issue #1615 [hide][Hidden Content]]
  17. ChangeLog Added added option to show only boxes in tray with runnign processes #1186 -- additional option show only pinned bixes, in box options a bix can be set to be always shown in theay list (Pinned) added options menu command to reset the GUI #1589 added 'Run Un-Sandboxed' context menu option added new trigger "OnBoxDelete" that allows to specify a command that is run UNBOXED just before the box content gets deleted -- note: this can be used as a replacemetn to the DeleteCommand #591 sellected box operations (deletion) no longer show the progress dialog 1061 -- instead a box with a running operation show a blinking hour glass icon, the context menu can be used to cancel the operation Changed HideHostProcess=program.exe can now be used to hide sandboxie services #1336 updater blocking is now done using a template called BlockSoftwareUpdaters enchanced "StartProgram=..." making "StartCommand=..." obsolete -- for same functionality as "StartCommand=..." use "StartProgram=%SbieHome%\Start.exe ..." merged "Auto Start" General tab with the "Auto Exec" Advanced tab into a universal"Triggers" Advanced tab Fixed fixed a couple issues with the new breakout process feature and improved security (thanks Diversenok) fixed issues with re opening already open windows #1584 fixed issue with desktop access #1588 fixed issue handling commandline invokation #1133 fixed ui issue with main window state when switching always on top attribute #1169 fixed issue with box context menu in tray list 1106 fixed issue with "AutoExec=..." fixed issues canceling box deletion operations didn't working 1061 fixed issue with DPI scalling and color picker dialog #803 Removed removed UseRpcMgmtSetComTimeout=AppXDeploymentClient.dll,y used for free download manager as it broke other things -- when using free download manager ad the line manually to your sandboxie.ini [hide][Hidden Content]]
  18. ChangeLog Added SandMan now causes all boxed processes to update their path settings in real time when access options were modified added new maintenance menu option "Uninstall All" to quickly remove all components when running in portable mode added version number to the title bar of Sandboxie Classic added option to return not to a snapshot but to an empty box state while keeping all snapshots Sandboxie-Plus.ini can now be placed in C:\ProgramData\Sandboxie-Plus\ folder and takes precedence (for business use) added support for AF_UNIX on Windows to resolve issues with OpenJDK17 and later #1009 #1520 #1521 Changed reworked breakout mechanism to be service based and not allowing the parent process to access the broken out child process enabled creation of directory junctions for sandboxed processes #1375 restored back AutoRecover=y on box creation #1554 improved snapshot support #1220 renamed "Disable Forced Programs" command to "Pause Forced Programs Rules" (Plus only) Fixed fixed BreakoutProcess not working with EnableObjectFiltering=y FIXED SECURITY ISSUE: when starting COMSRV unboxed, the returned process handle had full access fixed issue with progress dialog #1562 fixed issue with handling directory junctions in Sandboxie #1396 fixed a handle leak in File_NtCloseImpl fixed border issues on maximized windows introduced in the last build #1561 fixed a couple of index overruns (thanks 7eRoM) #1571 fixed issues with sysnative directory #1403 fixed issue with starting SandMan when running sandboxed from context menu #1579 fixed dark mode flash issue with main window creation #1231 fixed issues with snapshot error handling #350 fixed issues with the always on top option (Plus only) [hide][Hidden Content]]
  19. ChangeLog Added added Portuguese of Portugal on Plus UI (by JNylson, isaak654, mpheath) #1497 added "BreakoutProcess=program.exe", with this option selected applications can be started unboxed from within a box #1500 -- the program image must be located outside the sandbox for this to work -- if another sandbox has "ForceProcess=program.exe" configured, it will capture the process -- use case: set up a box with a Web browser forced, when another box opens a website, this will happen in the dedicated browser box -- Note: "BreakoutFolder=some\path" is also available added silent uninstall switch /remove /S for Classic installer (by sredna) #1532 Changed The filename "sandman_pt" was changed to "sandman_pt_BR" (Brazilian Portuguese) #1497 The filename "sandman_ua" was changed to "sandman_uk" (Ukrainian) #1527 -- Note: Translators are encouraged to follow the Localization notes and tips before creating a new pull request updated Firefox update blocker (discovered by isaak654) #1545 Fixed fixed issue with opening all file access OpenFilePath=* #971 fixed issue with opening network shares #1529 fixed possible upgrade issue with Classic installer (by isaak654) 130c43a fixed minor issues with Classic installer (by sredna) #1533 fixed issue with Ldr_FixImagePath_2 #1507 when using "Run Sandboxed" with SandMan UI and the UI is off, it wil stay off. fixed issue with Util_GetProcessPidByName that should resolve the driver sometimes failing to start at boot #1451 SandMan will now run in background like SbieCtrl when starting a boxed process post506 fixed taskbar not showing with persistent box border in full screen post474 fixed box border not spanning across multiple monitors #1512 fixed issues with border when using DPI scaling #1506 fixed DPI issues with Qt #1368 fixed issue with bright flashing on window creation when in dark mode #1231 fixed issues with the PortableRootDir setting #1509 fixed issue with the settings window crashing when the driver was not connected fixed DPI issues with Finder Tool #912 fixed another issue with reused process IDs #1547 fixed issue introduced in 1.0.6 related to SeAccessCheckByType #1548 [hide][Hidden Content]]
  20. ChangeLog [1.0.7 / 5.55.7] - 2022-01-06 Added added experimental option "CreateToken=y" to create a new token instead of repurposing an existing one added option "DisableRTBlacklist=y" allowing to disable the hardcoded runtime class blacklist added new template "DeviceSecurity" to lock down access to device drivers on the system -- Note: This template requires RuleSpecificity being available to work properly added option to set a custom ini editor in the Plus UI #1475 added option "LingerLeniency=n" to solve issue #997 Changed reworked syscall invocation code in the driver -- Win32k hooking is now compatible with HVCI #1483 Fixed fixed memory leak in driver (conf_user.c) fixed issue with file renaming in open paths introduced in 1.0.6 fixed issue causing Chromium browsers not closing properly #1496 fixed issue with start.exe #1517 #1516 fixed SandMan issue with reused process IDs fixed KmdUtil sometimes not properly terminating the driver #1493 Removed removed OpenToken as it is only a shorthand for UnrestrictedToken=y and UnfilteredToken=y set together [hide][Hidden Content]]
  21. This build fixed various issues with the previous build and adds some new functionality If you have issues with an update installation, just uninstall the previous version keeping the sandboxie.ini and reinstall the new build. You can support the project through donations, any help will be greatly appreciated. ChangeLog Added replaced "Open with" with a Sandboxie dialog to work on Windows 10 #1138 added ability to run Win32 store apps in App Compartment mode (on Windows 11 requires COM to be open) -- Note: this does not mean UWP store apps, just regular win32 apps packaged to be deployed via the store added new debug options "UnstrippedToken=y" and "KeepUserGroup=y" added double click to recover files and folders in recovery window #1466 added Ukrainian language on Plus UI (by SuperMaxusa) #1488 Changed "UseSbieWndStation=y" is now the default behaviour #1442 disabled Win32k hooking when HVCI is enabled due to an incompatibility (BSOD) #1483 Fixed fixed box initialization issue in Privacy mode #1469 fixed issue with shortcuts creation introduced in a recent build #1471 fixed various issues in Privacy Enhanced boxes and rule specificity fixed issue with SeAccessCheckByType and alike fixed issues with Win32k hooking on 32 bit Windows #1479 Removed removed obsolete SkyNet rootkit detection from 32 bit build [hide][Hidden Content]]
  22. ChangeLog [1.0.5 / 5.55.5] - 2021-12-25 Added sandbox top level exception handler to create crash dumps -- it can be enabled per process or globally using "EnableMiniDump=process.exe,y" or "EnableMiniDump=y" respectively -- the dump flags can be set as hex with "MiniDumpFlags=0xAABBCCDD" -- a preselected flag set for a verbose dump can be set with "MiniDumpFlags=Extended" -- Note: created dump files are located at: C:\Sandbox\%SANDBOX% added template support for Osiris and Slimjet browsers (by Dyras) #1454 Changed improved SbieDll initialization a bit doubled size of Name_Buffer_Depth #1342 improved text filter in the templates view #1456 Fixed fixed issue with forced process display #1447 fixed crash issue with GetClassName #1448 fixed minor UI issue #1382 fixed UI language preset issue #1348 fixed grouping issues in SandMan UI #1358 fixed issue with EnableWin32kHooks #1458 Installers re-released with the following fix: fixed regression when launching Office apps #1468 [Hidden Content]
  23. This build introduced a new major feature, system call hooking for win32k syscalls, it is used only for a hand full of calls currently, and is currently not working for 32 bit applications running on a 64 bit host, that limitation is being worked on. This feature resolves the Hardware Acceleration issues with Chromium based browsers, it can be enabled like this: Changelog Added added mechanism to hook Win32 system calls on windows 10 and later, this should resolve the issue with Chromium HW acceleration -- Note: this mechanism does not, yet, work for 32 bit applications running under WoW64 -- to enable it, add "EnableWin32kHooks=y" to the global ini section, this feature is highly experimental (!) -- the hooks will be automatically applied to Chromium GPU processes -- to force Win32k hooks for all processes in a selected box add "AlwaysUseWin32kHooks=program.exe,y" #1261 #1395 Fixed fixed bug in GetVersionExW making "OverrideOsBuild=..." not working #605 #1426 fixed issue with some UTF-8 characters when used in the ini file fixed isolation issue with Virtual Network Editor #1102 [hide][Hidden Content]]
  24. Version 1.0.0 is here and brings a lot of new major features, hence its a pre release, test it and expect new bugs as well, at least in the new features. I expect the final being 1.1.0 or so The first major feature is Privacy Mode, here most of the PC is set to be treated like a Write[File/Key]Path meaning the sandbox locations are writable but the unsandboxed locations are not readable. The Hard disk appears empty except for C:\Windows and C:\Program Files and the registry only allows reading of the machine but not user root keys. This way sandboxed processes can work but can not access private user data. To make this mode useful an other feature has been implemented called “Rule Specificity” it can be enabled independently but is always enabled in Privacy enhanced boxes. It allows to specify rules to override other rules, this is not based on specifying an order or priority, but instead by measuring how specific a rule is and always attributing the highest priority to the most specific rule. Here the specificity is measures by the path length that matches the rule, except the last wildcard. So for example the built in privacy rules plus a custom one OpenFilePath=%AppData%\Mozilla\Firefox\Profiles* NormalFilePath=C:\Program Files* NormalFilePath=C:\Windows* WriteFilePath=C:* Here the rules are ordered by their specificity. Also there is a new type Normal[File/Key/Ipc]Path which defines a default sandbox behavior for a path. The next major feature is "App Compartment" mode "NoSecurityIsolation=y", this is a new mode of operation which disables the token based security isolation, which brings the security down to the level of other sand boxing solutions, but by doing so greatly improves compatibility. For all use cases where the goal is only compartmentalization, running multiple instances, etc, but not hard core security this mode is preferable as it should avoid many typical sandboxie issues caused by processes running with a heavily restricted token. In this mode file system and registry accesses are still being filtered to enforce the access rules, this filtering can be disabled with "NoSecurityFiltering=y" To ensure this “unsecure” mode is at least as secure as the sandboxing offered by other sandboxing products, a new object access filter was added that can be enabled with "EnableObjectFiltering=y" in the global settings. Added added Privacy enhanced mode, sandboxes with "UsePrivacyMode=y" will not allow read access to locations containing user data -- all locations except generic Windows system paths will need to be opened explicitly for read and/or write access -- using "NormalFilePath=...", "NormalKeyPath=...", "NormalIpcPath=..." allows to open locations to be readable and sandboxed added new "App Compartment" mode of operation, it's enabled by adding "NoSecurityIsolation=y" to the box configuration -- in this mode, security is traded in for compatibility, it should not be used for untrusted applications -- note: in this mode, file and registry filtering are still in place, hence processes run without administrative privileges -- it is reasonably safe, all filtering can be disabled with "NoSecurityFiltering=y" added experimental use of ObRegisterCallbacks to filter object creation and duplication -- this filtering is independent from the regular SbieDrv's syscall-based filtering, hence it also applies to App Compartments -- with it enabled, an application running in a compartment will not be able to manipulate processes running outside the sandbox -- Note: this feature improves the security of unisolated App Compartment boxes -- to enable this feature, set "EnableObjectFiltering=y" in the global section and reload the driver -- when globally activated, the filtering can be disabled for individual boxes with "DisableObjectFilter=y" added "DontOpenForBoxed=n", this option disables the discrimination of boxed processes for open file and open key directives -- this behaviour does not really improve security anyways, but may be annoying, also app compartments always disable this added setting to entirely open access to the COM infrastructure Changed reworked the resource access path matching mechanism to optionally apply more specific rules over less specific ones -- for example "OpenFilePath=C:\User\Me\AppData\Firefox takes precedence over "WriteFilePath=C:\User\Me" -- to enable this new behaviour, add "UseRuleSpecificity=y" to your Sandboxie.ini, this behaviour is always enabled in Privacy enhanced mode -- added "NormalFilePath=..." to restore default Sandboxie behaviour on a given path -- added "OpenConfPath=...", which similarly to "OpenPipePath=..." is a "OpenKeyPath=..." variant which applies to executables located in the sandbox removed option to copy a box during creation, instead the box context menu offers a duplication option reworked the box creation dialog to offer new box types Fixed fixed SBIE1401 notification during Sandboxie Plus uninstall (by mpheath) 68fa37d fixed memory leak in driver handling FLT_FILE_NAME_INFORMATION (by Therzok) #1371 [hide][Hidden Content]]
  25. This build fixes many bugs. If you have issues with an update installation, just uninstall the previous version keeping the sandboxie.ini and reinstall the new build. You can support the project through donations, any help will be greatly appreciated. Changelog Added added checkbox if the user wants SandMan.exe to be started after installation #1318 added template for Windows 10 virtual desktop manager #1326 Changed "OpenClsid=..." is no longer restricted to CLSCTX_LOCAL_SERVER execution contexts only -- this allows to run objects with the CLSCTX_INPROC_SERVER flag in the COM helper service in the trace view, now multiple types can be selected at once a few Plus UI entries were made translatable (by gexgd0419) #1320 changed default "terminate all boxed processes" key to Shift+Pause (by isaak654) #1337 Fixed fixed ini writing issue with SbieCtrl and the new ini handling mechanism #1331 fixed issue with trace log filtering fixed space issue about German language on Plus installer (by mpheath) #1333 restored Waterfox phishing template entries with a proper fix (by APMichael) #1334 [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.