Sandboxie Plus (open source fork of Sandboxie)
Information 
Quote:New Update Minor improvements

Download: https://github.com/sandboxie-plus/Sandbo...ag/v1.14.9

Added
  • added alternative default sandbox paths to the box wizard:
    • \??\%SystemDrive%\Sandbox\%USER%\%SANDBOX%
    • \??\%SystemDrive%\Sandbox\%SANDBOX%
    • \??\%SystemDrive%\Users\%USER%\Sandbox\%SANDBOX%
  • added Sandbox Import dialog

Changed
  • sandbox root selection in global settings is now a combo box

Fixed
  • fixed Exported encrypted archive files cannot be unpacked by Sandboxie #4229
Reply
Quote:Release v1.14.10 / 5.69.10

 
[1.14.10 / 5.69.10] - 2024-10-03Added
  • added Ability to import encrypted archive files directly #4255
Changed
  • when the sbiesvc.exe worker crashes it now can automatically be restarted.
Fixed
  • fixed issue with sandbox path entry combo boxes
  • fixed Proxy for GetRawInputDeviceInfoW() causes a buffer overflow #4267 (thanks marti4d)

Download https://github.com/sandboxie-plus/Sandboxie/releases
[-] The following 2 users say Thank You to Kool for this post:
  • harlan4096, jasonX
Reply
Quote:Release v1.15.0 / 5.70.0
 
This build of Sandboxie Plus version 1.15.0 introduces several impactful enhancements, focusing on user-specific operations and security improvements. A notable addition is the new user proxy mechanism, which enables user-specific operations, as well as support for Encrypting File System (EFS) through the user proxy. By adding the configuration 'EnableEFS=y' to the sandbox, users can now leverage EFS within the sandbox environment. Furthermore, a breakout document feature has been implemented, allowing users to specify certain file paths and extensions that can escape the sandbox. However, users are warned to avoid paths terminated with wildcards as they may open up security vulnerabilities, enabling the execution of malicious scripts outside of the sandbox.
In terms of security, a new mechanism has been added to restrict access to box folders, allowing only the user who created the folder to access it by setting 'LockBoxToUser=y'. Additionally, users now have the option to retain the original Access Control Lists (ACLs) on sandboxed files or modify them, providing more flexibility in access management, this may introduce compatibility issues though. Another new feature is the 'OpenWPADEndpoint=y' option, which allows to open system proxy configuration access. On the technical side, improvements have been made to the startup processes for SandboxieCrypto and Sandboxed RPCSS, as well as refinements to the user interface controls.
These updates mark a significant step forward in both the security and functionality of Sandboxie Plus.

Download : Sandboxie-Plus-x64-v1.15.0.exe

Download : Sandboxie-Plus-x86-v1.15.0.exe

Release channel : https://github.com/sandboxie-plus/Sandboxie/releases
[-] The following 2 users say Thank You to Kool for this post:
  • harlan4096, jasonX
Reply
Quote:Release v1.15.1 / 5.70.1

 
Release NotesThis build fixes a couple issues with 1.15.0 and updates compatibility to the latest windows insider build.

 
Fixed
  • fixed Sandboxie crypto fails to start in red boxes
  • fixed issue with breakout process when using explorer.exe
Changed
  • validated compatibility with Windows build 27729 and updated DynData
  • updated Templates.ini to grant access to the Multimedia Class Scheduler Service #4312
  • updated Inno Setup to version 6.3.3 #4020

Release Channel

Download
[-] The following 1 user says Thank You to Kool for this post:
  • harlan4096
Reply
Quote:Release v1.15.2 / 5.70.2

 
Added
  • added "NetworkAdapterMAC=0,AA-BB-CC-DD-EE-FF" to set MAC address for each box (thanks Yeyixiao)
  • added "DiskSerialNumber=DeviceName,1234-ABCD" to set Disk Serial Number for indivdal box (thanks Yeyixiao)
  • added the ability to hide certificates in editbox in Global Setting (idea by Yeyixiao)
  • added Opening a program in several sandboxes at once #4231
  • added "Description" field inside the sandbox settings #4243
  • added "NotifyMsiInstaller=y" enabled by default to display message SBIE2194 when an MSI installer is run in a box without the recommended exemptions #4330
    • SBIE2194: MSI installer requires 'MsiInstallerExemptions=y' option to be set in the ini to be able to work correctly, however this option weakens the isolation.
  • added option to hide installed programs #4139
  • added Hide Tray Icon #4075
  • added improved trace logging filtering #4338
  • added EventLog monitoring for SbieMessages #4113
    • add 'LogMessageEvents=y' to the global settings to log all sbie events to the system event log
Fixed
  • fixed Sign the .tmp file that gets dropped when installing or updating Sandboxie Plus #2643 #4343
  • fixed issue with DLL unloading
  • fixed Files Resource Access - Browse for Folder - allows access to excluded folders #4007
  • fixed "ForceDisableAdminOnly" is weird #4233
  • fixed deadlock on no op condition when renaming file or folder #4304
  • fixed Could not move file or folder #4329
  • "Run Sandboxed" from the quick-previewer should have only one option #4339
  • Sandboxie causing Firefox Nightly crashes #4183
Changed
  • validated compatibility with Windows build 27749 and updated DynData
  • when running via drag and drop now the apps parent folder is used as working dir #4073

Release channel

Download
[-] The following 1 user says Thank You to Kool for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
UltraSearch 4.6.0.1091
UltraSearch 4.6.0....harlan4096 — 10:38
Brave 1.73.91
Release Channel 1....harlan4096 — 10:11
AdGuard Browser Extension 5.0.169 (MV3)
AdGuard Browser Ex...harlan4096 — 10:10
uBOLite_2024.11.20.858
uBOLite_2024.11.20...harlan4096 — 10:09
CrystalDiskInfo 9.5.0 [2024/11/20]
9.5.0 ​ Added D...harlan4096 — 10:08

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (56)Stefanos

[-]
Online Staff
There are no staff members currently online.

>