There is a well-known maxim repeated in security circles: ‘There is an unlimited number of security vulnerabilities for a given security device, system, or program, most of which will never be discovered.’ Roger G. Johnston. Indeed, the more applications are analysed, the more experts appear to find vulnerabilities in it. Because of this, it is useful to consider your browser – the main program used to access web content – as an open door to all types of attacks or an access point for a lot of malicious programs. This is where the idea of testing out critical applications in a ‘sandbox’ came from. This is so they cause no damage to the rest of the system. A simple way of doing this is to use a free program called ‘Sandboxie’. This utility can be downloaded from http://www.sandboxie.com. After thirty days, the free version displays a window advertising the paid version. The utility is not a typical shareware program, but rather a free version, which can be used for private purposes after this period.
Sandboxie will run any programs you want in a protected space known as a ‘sandbox’. The software is thus sandboxed. This sandbox is physically a buffer directory on the hard disk, in which all the entries made by the ‘sandboxed’ software are saved. After using the software, it will be easy to virtually rake through the sandbox and remove all the changes produced in the buffer directory. No changes will be made to the disk outside this buffer directory. By default, Sandboxie creates a sandbox called ‘DefaultBox’. Other sandboxes can be configured, but we will not go into detail about that here. After installation, it will load up in the memory automatically at machine start-up. To use it, just right-click on the Systray icon, choose the sandbox (‘DefaultBox’) and click ‘Run web browser’. The system’s default browser will open (Firefox, in this example) and the ‘#’ symbols will surround the application title to show it is properly ‘sandboxed’.
You can visit any pages you want to, and any changes to the system made by the ‘sandboxed’ software will only be applied to the sandbox and therefore the buffer directory. The Sandboxie icon surrounded by little red dots shows that the software is being used in a sandbox.
Once you have finished using the browser, select the ‘Delete content’ option to delete all changes made by the browser, even those which may have been caused by malicious code seeking to exploit vulnerabilities. Please note that your browsing history and all other traces left by the browser will also be deleted.
A window will then ask you to save any files downloaded before deleting the data.
Once you have clicked on ‘Delete Sandbox’, your system will return to its initial state, from before launching the browser. This operation can be repeated as many times as necessary.