Sandboxie runs your programs in an isolated environment, which safely prevents them from making any permanent changes to any other programs and altering any data on your computer.

Isolated Sandbox benefits include:

  • Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.
  • Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don’t leak into Windows.
  • Secure E-mail: Viruses and other malicious software that might be hiding in your email can’t break out of the sandbox and can’t infect your real system.
  • Windows Stays Lean: Prevent wear-and-tear in Windows by installing software into an isolated sandbox.

sandboxie

The following updates and changes have been undertaken in this latest version of Sandboxie:

There is a new EULA (license.txt)
Fixed Chrome 37/38 crash error C0000008 (invalid handle).
Fixed Chrome 38-64 hang (web page unresponsive).
Fixed Chrome hang when printing to PDF.
Browsers can now access Internet when using McAfee SaaS
Fixed Silverlight crash in Win 8.1
Fixed Excel crash when copying large amounts of data.
Sandboxie now has language support for Farsi (Persian).
The auto-update feature only checked the next update time (sandbox.ini setting SbieCtrl_NextUpdateCheck) 1 time when SbieCtrl.exe was started. If SbieCtrl.exe was kept running, it would never check the update time again.
Several large memory leaks (reported by Dr. Larry Pepper et al.) have been fixed.
ASLR is now enabled for SbieDll.dll 32 bit (64 bit will come later).
OpenIpcPath=\BaseNamedObjects\FontCachePort is now in templates.ini as a default. Until now, this was a suggested work-around for some Chrome 37 problems. NOTE: the default only applies to new installs. For existing installs, you need to go into Sandbox settings->Applications->Miscellaneous, and check the option “Allow direct access to Windows Font Cache”
Added hook for GetProcessImageFileName/NtQueryInformationProcess so it now returns the sandboxed path.
Improvements to the Dutch language text.
The SbieSvc startup time has been increased from 5 seconds to 15 seconds to eliminate the following sequence of startup errors:
> SBIE2335 Initialization failed for process %2
> SBIE2336 Error in GUI server: %2
> SBIE2337 Failed to start program: %2

Malware DarkComet is using a quirk in Windows to put up a MessageBox that does not have the sandboxed yellow window border. This poses no security risk, but to prevent user concern, this has been fixed.
Special flag added to OpenWinClass to restore Buster Sandbox Analyzer (BSA) message logging. /IgnoreUIPI allows low integrity sandboxed processes to send WM_COPYDATA msgs to windows in higher integrity processes.
Example Sandboxie.ini entries (both lines required):
> OpenWinClass=TFormBSA
> OpenWinClass=TFormBSA/IgnoreUIPI
Fixed Sandboxed cmd.exe crash if window title > 256 chars.
Fixed rare BSOD
Fixed kernel memory leak in SandboxieCrypto
The combined installer SandboxieInstall.exe now checks for the VC Redistributables DLLs Sandboxie requires. If they are not up to date (10.0.40219.325), the installer will download and install the VC Redist. from sandboxie.com.

So if you are looking for a clean and simple way to run applications within a safe environment, what are you waiting for? You can download Sandboxie from FileHippo.com today.

[Image via Sandboxie.com]