Software-update: Sandboxie Plus 5.69.3 / 1.14.3
Sandboxie is een programma waarmee het mogelijk is om Windows-programma's in een afgeschermde omgeving te draaien. Op die manier zijn wijzigingen die door de programma's of webbrowsers worden aangebracht, eenvoudig ongedaan te maken en is er bovendien geen risico dat belangrijke onderdelen van het besturingssysteem worden aangetast. Sandboxie kan worden gebruikt op Windows 7 of hoger en wordt als open source aangeboden. Het is verkrijgbaar in een classic- en een plus-uitvoering. Op deze pagina is te vinden welke extra's de plus-versie biedt. Daarnaast zijn enkele functies alleen beschikbaar voor mensen die het project financieel steunen. De changelog sinds versie 5.68.7 / 1.13.7 kan hieronder worden gevonden.
ChangedChanged Qt 5 version to Qt 5.15.14 with OpenSSL 3.3.1 #3994
Changed Qt 5 version to Qt 5.15.14 with OpenSSL 3.3.1 #3994FixedFixed Applications cannot be launched as admin in a sandbox with "UseCreateToken/SandboxieAllGroup" enabled when using an MSFT account #4022Fixed Firefox issue with Sbie 1.14.1 and 1.14.2 #4012Rolled back the driver verifier fix added in 1.14.1Fixed CustomChromiumFlags and --single-argument issue #4033Fixed Sandboxie programs do not terminate after closing programs that run as admin with UseCreateToken/SandboxieAllGroup enabled #4030
Fixed Applications cannot be launched as admin in a sandbox with "UseCreateToken/SandboxieAllGroup" enabled when using an MSFT account #4022Fixed Firefox issue with Sbie 1.14.1 and 1.14.2 #4012Rolled back the driver verifier fix added in 1.14.1Rolled back the driver verifier fix added in 1.14.1
Rolled back the driver verifier fix added in 1.14.1Fixed CustomChromiumFlags and --single-argument issue #4033Fixed Sandboxie programs do not terminate after closing programs that run as admin with UseCreateToken/SandboxieAllGroup enabled #4030AddedAdded SbieIni option to modify password-protected configs #3903Usage: set|append|insert|delete [/passwd:********]Note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command lineAdded checkbox for "PromptForInternetAccess" option to the New Box WizardAdded option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processesAdded option "HideSbieProcesses" to hide Sandboxie Work Process (SbieSvc, SandboxieRpcSs, etc.)Added option "HideFirmwareInfo"When it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\SOFTWARE\SandboxieHide\FalseFirmwareValueAdded template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMIAdded template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandboxAdded new option "AllowCoverTaskbar" for #3975Added RPC Port message filter mechanism to block unsafe RDP calls via the driver #3930Usage: "RpcPortFilter=Port,ID,Label" label is optionalAdded "Job Object" options page to colelct all job object related options
Added SbieIni option to modify password-protected configs #3903Usage: set|append|insert|delete [/passwd:********]Note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command lineUsage: set|append|insert|delete [/passwd:********]Note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command line
Usage: set|append|insert|delete [/passwd:********]Note: use /passwd without the password to have SbieIni prompot for the password on the console, this hides the password from view and from bing captured with the command lineAdded checkbox for "PromptForInternetAccess" option to the New Box WizardAdded option "HideNonSystemProcesses" to hide processes not in a sandbox from processes lists for sandboxed processesAdded option "HideSbieProcesses" to hide Sandboxie Work Process (SbieSvc, SandboxieRpcSs, etc.)Added option "HideFirmwareInfo"When it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\SOFTWARE\SandboxieHide\FalseFirmwareValueWhen it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\SOFTWARE\SandboxieHide\FalseFirmwareValue
When it is set, the programs that try getting fireware information will get false data from HKEY_CURRENT_USER\SOFTWARE\SandboxieHide\FalseFirmwareValueAdded template "BlockAccessWMI" to prevent sandboxed processes from accessing system information through WMIAdded template "BlockLocalConnect" to prevent sandboxed processes from sending network packs to localhost to breakout sandboxAdded new option "AllowCoverTaskbar" for #3975Added RPC Port message filter mechanism to block unsafe RDP calls via the driver #3930Usage: "RpcPortFilter=Port,ID,Label" label is optionalUsage: "RpcPortFilter=Port,ID,Label" label is optional
Usage: "RpcPortFilter=Port,ID,Label" label is optionalAdded "Job Object" options page to colelct all job object related optionsChangedExtend "Temp Template" to make it could delete local template section
Extend "Temp Template" to make it could delete local template sectionFixedFixed security issue with the newly introduced experimental "UseCreateToken=y" mechanismFixed issue with "UseCreateToken=y" when using a MSFT online accountFixed Export sandbox not containing hidden files #3980 (thanks L4cache)Fixed Chrome stopped printing #3926Sandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command lineNote: Less Privileged App Container (LPAC) don't work with sandboxie currentlyFixed Problem accessing a relative symlink with a target that starts with a dot #3981Fixed Can't open a sandbox's properties window via double-click in System Tray context window #3861Fixed Delay in launching forced programs after version 1.12.9 #3868This issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problemsFixed issue with Misc Options listImproved compatibility with steam running sandboxed
Fixed security issue with the newly introduced experimental "UseCreateToken=y" mechanismFixed issue with "UseCreateToken=y" when using a MSFT online accountFixed Export sandbox not containing hidden files #3980 (thanks L4cache)Fixed Chrome stopped printing #3926Sandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command lineNote: Less Privileged App Container (LPAC) don't work with sandboxie currentlySandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command lineNote: Less Privileged App Container (LPAC) don't work with sandboxie currently
Sandboxie will add CustomChromiumFlags=--disable-features=PrintCompositorLPAC to chrome based browsers command lineNote: Less Privileged App Container (LPAC) don't work with sandboxie currentlyFixed Problem accessing a relative symlink with a target that starts with a dot #3981Fixed Can't open a sandbox's properties window via double-click in System Tray context window #3861Fixed Delay in launching forced programs after version 1.12.9 #3868This issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problemsThis issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problems
This issue was introdiced in 1.13.0 and may have broadly affected other usecases and cause variosue problemsFixed issue with Misc Options listImproved compatibility with steam running sandboxedAddedAdded "Sandboxie\All Sandboxes" SID into token with SandboxieLogon #3191To use this feature "SandboxieAllGroup=y" must be enabledNote: this fundamentaly changes the mechanism Sbie uses for token creation, the new mechanism can be enabled separately with "UseCreateToken=y"Added "EditAdminOnly=y" can now be configured per boxAdded UI for CoverBoxedWindows in NewBoxWizardAdded UI option to start unsandboxed process but force child processes in SelectBoxWindowAdded option "AlertBeforeStart"When it is set, a prompt pops up before launching a new program into the sandbox using "Start.exe" and checks if the program that started "Start.exe" is a Sandboxie component itself, if it is not, a warning pops upAdded option for EditAdminOnly in SetupWizard
Added "Sandboxie\All Sandboxes" SID into token with SandboxieLogon #3191To use this feature "SandboxieAllGroup=y" must be enabledNote: this fundamentaly changes the mechanism Sbie uses for token creation, the new mechanism can be enabled separately with "UseCreateToken=y"To use this feature "SandboxieAllGroup=y" must be enabledNote: this fundamentaly changes the mechanism Sbie uses for token creation, the new mechanism can be enabled separately with "UseCreateToken=y"
To use this feature "SandboxieAllGroup=y" must be enabledNote: this fundamentaly changes the mechanism Sbie uses for token creation, the new mechanism can be enabled separately with "UseCreateToken=y"Added "EditAdminOnly=y" can now be configured per boxAdded UI for CoverBoxedWindows in NewBoxWizardAdded UI option to start unsandboxed process but force child processes in SelectBoxWindowAdded option "AlertBeforeStart"When it is set, a prompt pops up before launching a new program into the sandbox using "Start.exe" and checks if the program that started "Start.exe" is a Sandboxie component itself, if it is not, a warning pops upWhen it is set, a prompt pops up before launching a new program into the sandbox using "Start.exe" and checks if the program that started "Start.exe" is a Sandboxie component itself, if it is not, a warning pops up
When it is set, a prompt pops up before launching a new program into the sandbox using "Start.exe" and checks if the program that started "Start.exe" is a Sandboxie component itself, if it is not, a warning pops upAdded option for EditAdminOnly in SetupWizardChangedSplit the advanced new box wizard page in twoReorganized box options a bit
Split the advanced new box wizard page in twoReorganized box options a bitFixedFixed issue with proxy authentication settingFixed memory leak in sbiesvcFixed issue with inconsistent WFP option application #3900Fixed resource leak in buffer hashing functionFixed DLL name corruption when BlockInterferenceControl is enabled #3945Fixed issue with driver verifier
Fixed issue with proxy authentication settingFixed memory leak in sbiesvcFixed issue with inconsistent WFP option application #3900Fixed resource leak in buffer hashing functionFixed DLL name corruption when BlockInterferenceControl is enabled #3945Fixed issue with driver verifierAddedAdded option to limit the memory of sandboxed process and the number of process in single sandbox through job object (thanks Yeyixiao)Use "TotalMemoryLimit" (Number, limit whole sandbox, Byte) and "ProcessMemoryLimit" (Number, limit single process, Byte) to set memory limitUse "ProcessNumberLimit" (Number) to set process number limitAdded ability to modified sandboxed process logic speed (reduced fixed latency, modified single-player speed, etc.) (thanks Yeyixiao)Use "UseChangeSpeed=y" to open this feature, use "AddTickSpeed" / "AddSleepSpeed" / "AddTimerSpeed" / "LowTickSpeed" / "LowSleepSpeed" / "LowTimerSpeed" (Number) to setWhen set to "AddSleepSpeed=0", all sleep function calls will be skippedAdded /fcp /force_children commandline option to start.exe it allows to start a program unsandboxed but have all its children sandboxedAdded ability to fore sandboxed processes to use a pre defined socks 5 proxyAdded ability to intercept DNS queries so that they can be logged and/or redirectedAdded support for SOCKS5 proxy authentication based on RFC1928 (thanks Deezzir)Added Test Dialog UI for SOCKS5 proxy (thanks Deezzir)Added ability to automatically removes template references that begin with “Template_Temp_” in the sandbox
Added option to limit the memory of sandboxed process and the number of process in single sandbox through job object (thanks Yeyixiao)Use "TotalMemoryLimit" (Number, limit whole sandbox, Byte) and "ProcessMemoryLimit" (Number, limit single process, Byte) to set memory limitUse "ProcessNumberLimit" (Number) to set process number limitUse "TotalMemoryLimit" (Number, limit whole sandbox, Byte) and "ProcessMemoryLimit" (Number, limit single process, Byte) to set memory limitUse "ProcessNumberLimit" (Number) to set process number limit
Use "TotalMemoryLimit" (Number, limit whole sandbox, Byte) and "ProcessMemoryLimit" (Number, limit single process, Byte) to set memory limitUse "ProcessNumberLimit" (Number) to set process number limitAdded ability to modified sandboxed process logic speed (reduced fixed latency, modified single-player speed, etc.) (thanks Yeyixiao)Use "UseChangeSpeed=y" to open this feature, use "AddTickSpeed" / "AddSleepSpeed" / "AddTimerSpeed" / "LowTickSpeed" / "LowSleepSpeed" / "LowTimerSpeed" (Number) to setWhen set to "AddSleepSpeed=0", all sleep function calls will be skippedUse "UseChangeSpeed=y" to open this feature, use "AddTickSpeed" / "AddSleepSpeed" / "AddTimerSpeed" / "LowTickSpeed" / "LowSleepSpeed" / "LowTimerSpeed" (Number) to setWhen set to "AddSleepSpeed=0", all sleep function calls will be skipped
Use "UseChangeSpeed=y" to open this feature, use "AddTickSpeed" / "AddSleepSpeed" / "AddTimerSpeed" / "LowTickSpeed" / "LowSleepSpeed" / "LowTimerSpeed" (Number) to setWhen set to "AddSleepSpeed=0", all sleep function calls will be skippedAdded /fcp /force_children commandline option to start.exe it allows to start a program unsandboxed but have all its children sandboxedAdded ability to fore sandboxed processes to use a pre defined socks 5 proxyAdded ability to intercept DNS queries so that they can be logged and/or redirectedAdded support for SOCKS5 proxy authentication based on RFC1928 (thanks Deezzir)Added Test Dialog UI for SOCKS5 proxy (thanks Deezzir)Added ability to automatically removes template references that begin with “Template_Temp_” in the sandboxChangedValidated compatibility with windows build 26217 and updated dyn data
Validated compatibility with windows build 26217 and updated dyn dataFixedFixed an issue with an early batch of Large Supporter certificates
Fixed an issue with an early batch of Large Supporter certificates
Source:
Tweakers.net