Hello. In the old, very first version of the program, there was such a function as a “sandbox”. Later, this name was changed to “restriction of rights”. I can’t judge how effective this function was in Spyshelter, but as a user who has been using the program of the same name (Sandboxie) for a long time (before the developer changed there), I can say that this function is very useful.
He is best known for this feature of the Comodo Internet Security antivirus, it seems at the bottom it is called a “container” or something like that. I did not use this antivirus, but I watched a lot of tests of this product, and in many ways it was only thanks to the sandbox (container) that Komodo protected the system.
The question is: will such a function be returned to the Spyshelter again (perhaps in some kind of redesigned, modified form) or will there no longer be such a function at all? It would be nice if Spyshelter offered to run all unknown/little-known programs, as well as programs without a digital signature or with a digital signature of an unknown/little-known publisher in a limited environment - in a sandbox, or with strict rights restrictions.
In this case, malware that has a digital signature (except for those that were signed with a hacked digital signature of a well-known trusted publisher) will have less chance (or no chance at all) to harm the system, decorate information, etc.
Thanks for your feedback, and thanks for bringing up this idea. Now Microsoft has a free built-in “Windows Sandbox” that’s good, plus there are other free open source sandbox tools. Also, I’ve noticed these things use major resources, so we don’t plan to try to compete with them.
However, the idea of limiting what apps can do is an important part of SpyShelter. One item we’re working on is preventing processes from launching other processes. We plan to add more and more controls on applications over time, so if you could call this a “sandbox” then yes, we’re working on many more app controls for the Rules tab.
Such a small program as OSArmor has progressed very well in this direction. It contains many different rules that can be disabled and enabled (3 modes of operation), there is a mode for creating your own additional rules (exceptions) in addition to those that the program offers. Look, maybe something (some individual rules) from the set of rules laid down in this program can be adopted in the Spyshelter. It is always useful to get acquainted with the experience of others.
We will take a look, thanks for your feedback.
FYI: Windows Sandbox is resident in Pro and Enterprise only. There are ways to install it on Home systems if one trusts the online instructions.
I’ve been using the Protected Files feature in the File Integrity Control Protection. A sandbox of sorts.
I stash my KeePassXC kdbx files in there, the app has no trouble opening them.
Good catch. I thought it was built in to all Windows versions.