DESKTOP

Run Software In A Protective Sandbox

1/11/2013 9:04:39 AM

Protect your Windows installation from dubious software. We show you how to test downloads in a protective sandbox

If you never used the internet there would be little need for security software but life without the web would be unthinkable. The internet can be extremely useful for a wide range of activities, from social networking with friends to collaborating on work projects with colleagues.

Viruses, Trojans, spyware and other malware can find their way on to your PC through various mechanisms. They can be automatically downloaded when you visit a dodgy site, or you might be tricked into running them via an email attachment or on the back of a legitimate program.

It’s important to install and keep up to date both an antivirus and an anti-spyware program, but these alone are not infallible. You can boost your PC’s defences with a sandbox. In the same way that children might play in a physical sandbox out of harm’s way, you can set up a virtual sandbox as a safe place in which to browse the web and run software.

You might think you know what’s safe and what’s not, but it’s easy to get caught out. And if less tech-savvy members of the family are also using the PC, a sandbox can be a useful safeguard.

Any software running within a sandbox is unable to access your Windows installation. It won’t be able to change settings, mess with files, attack your web browser or play out any other of its malicious intentions.

A sandbox makes the web a much safer place, whether you’re using it to conduct web chats, for online banking or, as we outline here, testing software. Having tested your download in the sandbox, you’ll know whether it’s safe to install It on your hard drive. You can also open email attachments in safety.

Several free sandbox utilities are available, such as BufferZone Pro and Sandboxie. In the following tutorial we’ll show you how to use BufferZone Pro. You can download and run software, open email attachments, browse the web, chat and more in a safe zone. You can even access USB devices.

Setup a sandbox

Step 1

Step 1

Head to trustware.com and download BufferZone Pro. Open your PC’s Downloads folder and double-click BufferZoneProFree.msi to install the software. Click through the pop-ups, then restart Windows.

Step 2

Step 2

BufferZone Pro starts up with Windows; enter your name and email to activate it. To configure certain sites to always run in the sandbox, click ‘None (click to add)’ under ‘Protect your privacy’. Click the + button and enter the URLs of shopping and banking sites.

Step 3

Step 3

It’s also possible to hide folders on your PC while you’re browsing the web. BufferZone hides My Documents and the Outlook Mailbox by default; to add more, click the + button and type in the path to the folder you wish to hide.

Step 4

Step 4

Click Finish and BufferZone will open a web browser. You can now browse the web and download software. We downloaded Notepad++ 6.2, but any site or software will do. Open the Downloads folder and notice that the setup file has a .virtual file extension.

Step 5

Step 5

Double-click the setup file to install your program. It will look like any other software installation, but notice the BufferZone messages in the bottom-right corner. BufferZone is protecting the computer during the installation.

Step 6

Step 6

Although the program appears to be installed and running, it is locked inside BufferZone and can’t access Windows or your local hard drive. To install the program on your hard drive, right-click the setup file and choose ‘Open outside BufferZone’.

Step 7

Step 7

lf you decide not to keep the program you installed, right-click the BufferZone icon and select Open. Click Empty BufferZone at the bottom and tick all the options. This clears every file and every change the program has made.

Step 8

Step 8

Sliders let you adjust BufferZone’s leniency when it comes to battening down the PC’s hatches. Select the Policy tab on the left side of the window, then choose something between Maximum and No protection for such things as external devices.

Step 9

Step 9

Select the Configuration tab, then choose the Settings tab. Here you can password-protect BufferZone, perhaps to prevent a child from changing anything. On the Mise tab, you can schedule automatic clearing of downloaded files.

Other  
 
Most View
Microsoft Content Management Server Development : A Date-Time Picker Placeholder Control (part 1)
Custom: Installation Nation (Part 2)
Managing Windows 8 native applications (part 2) - Disabling and controlling access to the Windows Store app , Managing access to hardware and installed applications
Programming .NET Components : Remoting - Leasing and Sponsorship (part 1) - Lease Properties, Configuring a Lease, Renewing a Lease
Nokia Lumia 920 - Windows Phone 8 And Magic Camera (Part 2)
Sony Vaio Duo 13 - Major Improvement For The Windows 8 Slider (Part 3)
The Criteria Of Choosing A Travel Camera
Windows 8 Hybrids, Tablets And Laptops (Part 7) : Acer Aspire S7, Sony VAIO T13
Expert Computing Advice – January 2013 (Part 2)
Managing Windows Server 2012 (part 3) - Working with the administration tools - Using command-line utilities
Top 10
Sharepoint 2013 : Farm Management - Disable a Timer Job,Start a Timer Job, Set the Schedule for a Timer Job
Sharepoint 2013 : Farm Management - Display Available Timer Jobs on the Farm, Get a Specific Timer Job, Enable a Timer Job
Sharepoint 2013 : Farm Management - Review Workflow Configuration Settings,Modify Workflow Configuration Settings
Sharepoint 2013 : Farm Management - Review SharePoint Designer Settings, Configure SharePoint Designer Settings
Sharepoint 2013 : Farm Management - Remove a Managed Path, Merge Log Files, End the Current Log File
SQL Server 2012 : Policy Based Management - Evaluating Policies
SQL Server 2012 : Defining Policies (part 3) - Creating Policies
SQL Server 2012 : Defining Policies (part 2) - Conditions
SQL Server 2012 : Defining Policies (part 1) - Management Facets
Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 4) - Preventing Internal Servers from Being Filtered