Sandboxie 4.14

Naviga SWZ: Home Page » News
News del 21 Ottobre 14 Autore: Gianplugged
Sandboxie 4.14
Sandboxie è un software il quale consente la creazione di ambienti operativi isolati (sandbox) in cui possono essere avviate o installate le applicazioni senza alcun tipo di modifica permanente all´unità locale.

Lo scopo di creare un ambiente virtuale isolato è quello di poter provare programmi non affidabili o di test e di navigare in Internet in completa sicurezza.

Note di rilascio:

These are the changes to Sandboxie since version 4.12:

There is a new EULA (license.txt)
Fixed Chrome 37/38 crash error C0000008 (invalid handle).
Fixed Chrome 38-64 hang (web page unresponsive).
Fixed Chrome hang when printing to PDF.
Browsers can now access Internet when using McAfee SaaS
Fixed Silverlight crash in Win 8.1 (
Fixed Excel crash when copying large amounts of data.
Sandboxie now has language support for Farsi (Persian).
The auto-update feature only checked the next update time (sandbox.ini setting SbieCtrl_NextUpdateCheck) 1 time when SbieCtrl.exe was started. If SbieCtrl.exe was kept running, it would never check the update time again.
Several large memory leaks (reported by Dr. Larry Pepper et al.) have been fixed.
ASLR is now enabled for SbieDll.dll 32 bit (64 bit will come later).
OpenIpcPath=BaseNamedObjectsFontCachePort is now in templates.ini as a default. Until now, this was a suggested work-around for some Chrome 37 problems.
NOTE: the default only applies to new installs. For existing installs, you need to go into Sandbox settings->Applications->Miscellaneous, and check the option "Allow direct access to Windows Font Cache"
Added hook for GetProcessImageFileName/NtQueryInformationProcess so it now returns the sandboxed path.
Improvements to the Dutch language text.
The SbieSvc startup time has been increased from 5 seconds to 15 seconds to eliminate the following sequence of startup errors:
SBIE2335 Initialization failed for process %2
SBIE2336 Error in GUI server: %2
SBIE2337 Failed to start program: %2
Malware DarkComet is using a quirk in Windows to put up a MessageBox that does not have the sandboxed yellow window border. This poses no security risk, but to prevent user concern, this has been fixed.
Special flag added to OpenWinClass to restore Buster Sandbox Analyzer (BSA) message logging. /IgnoreUIPI allows low integrity sandboxed processes to send WM_COPYDATA msgs to windows in higher integrity processes.
Example Sandboxie.ini entries (both lines required):
Fixed Sandboxed cmd.exe crash if window title > 256 chars. (
Fixed rare BSOD
Fixed kernel memory leak in SandboxieCrypto
The combined installer SandboxieInstall.exe now checks for the VC Redistributables DLLs Sandboxie requires. If they are not up to date (10.0.40219.325), the installer will download and install the VC Redist. from
If SandboxieInstall.exe tries to download the VC Redistributables and fails, there is now a retry option.

To clarify:
SandboxieInstall.exe does not contain MS VC DLLs. If they are not already installed or are not up to date, the installer will download the VC Redist. installer package and execute it.
SandboxieInstall32.exe & SandboxieInstall64.exe contain the DLLs Sandboxie requires. If they are not installed or are not up to date, the installer copies the ones required into system32. The VC Redist. installer is not downloaded or executed.
Inserisci un commento sul forum Commenta la News sul Forum


Categoria: Sicurezza

Licenza: Free

Dimensioni: 6.5 MB

OS: Windows

La Community di

La community con le risposte che cerchi ! Partecipa é gratis !
Iscrizione ForumIscriviti al Forum


Vuoi ricevere tutti gli aggiornamenti di SWZone direttamente via mail ?
Iscrizione NewsletterIscriviti alla Newsletter