Just so everybody knows about running Windows with limited rights, albeit off topic:
Administrator accounts are not designed for casual use—everyone who uses your computer should be set up with a Limited User account that they can use for regular activities such as word processing or surfing the Web.
If you suffer an attack from malicious software, the attacker can gain access to your computer through the account that you’re using—limited accounts give the attacker limited access, and administrator accounts give the attacker administrator access.
You just got some malware (for whatever reason your layered security suite got trespassed just like any one can get) and it kicks in? Well if it wants to modifiy the registry as usual… No luck, he’s got no permission --in an admin account it would. Wanna modify files outside the Documents and Settings(Limited User’s Name) folder, perhaps to modify trusted programs and inject malicious code into them? No way Jose, still off limits.
If you opt for this it’s also a good idea to password-protect the admin account.
Of course this means that in order to perform tasks that need full access (registry cleaning, defragmenting, install non-self-contained software, etc.), you just right click on the program and shorcut and select “Run as…”. Also any shortcut’s properties can be edited so that Windows asks for different credentials when running it.
It’s a little annoyance but only a little one, and the idea that anything that managed to run would have full access to do as it pleases with my registry just gives me the creeps.
Plus as LM said some malware could find its way out of the sandbox even on its own --also because of a user's ovresight or a 0-day threat or whatever.
But Japo, virtually every app can b xploited, including sandbox and anti-watever. So for u, solution is FW+real-time scanner+HIPS. for me, its FW+sandbox+HIPS. both has 3 layers.
But as i see u and ganda made decisions, i wont bend. I feel perfect w sandbox and my laptop feel smooth w sandbox too.
I’m not aware of any current malware than can break out of the sandbox,however the program is basically code and any code can contain flaws.
If you’re looking for something as near to 100% security as possible,then a virtualization program such as Returnil would be the way.Since this creates a clone of your system drive in RAM,there isn’t even any theoretical way that malware could survive a reboot (at the moment!).
Of course the usual security apps such as Firewall and AV etc. are still necessary,since although no malware can remain on your system after rebooting,it can still get on there during a session,the same as if you’re using a ‘real’ system.You could have your personal or financial data stolen at any time.
Well as Melih would say,you can never be complacent when it comes to matters of pc security.These days malware is big business,an effective exploit can net the authors a great deal of money during the window of opportunity between releasing the malware and a defence being developed.
I have been using Sandboxie for two months and I really enjoy it. I mostly use it on my browser but I also use it when installing and testing new softwares. One of the best things about Sandboxie is the fact that if you don’t like the software, you can just clear out Sandboxie and the entire software will be deleted and won’t leave any leftover junk on your computer. If you do like the software, you can request sandboxie to save it into your computer.
hi everyone, this thread is colded for quite sometimes alr.
I came bak here to confess Im so ashamed of myself dat after using sandboxie for such a long time, until now I kno sandboxie is a highly-configuarable security app.
my 2 above-quoted statements abt sandboxie were totally wrong (sorry 4 da nice guy who writes sandboxie). heres why:
_u can specify which directory, besides some well-known directories given by sandboxie, to be notified in quick recovery function.
_paid version: unlimited forced and alerted apps (which u need to input the executable file name) besides well-known given ones.
_another useful function is set-top level folder which u specify da folder for all sandboxed content to live in. This is useful wen ur using app like returnil, deepfreeze… If u set top-level folder in D:\ while ur system drive is C:, content in sandboxes wont b rollbacked after reboot.
have trying out returnil for few days (Pandlock is a big fan of this), must say gr8!, xcept more configurable is better, but totally gr8 4 average user.
I think returnil and sandboxie r 2 must-have for those who wanna use comp year after year worry-free of system degrade and malware.
Virtualisation isn’t without difficulties,but it’s a developing area so hopefully these will be addressed over time.Any additional defence in the pc armoury can only be a good thing considering the huge amount of ever more intelligent malware out there in cyberland.