App Review Comodo, Sandboxie, and Shade vs an Exploit

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,150




Those who watched the Video will have seen that for Comodo and Sandboxie although the RCE was able to run, it was contained and flushed. Shade on the other hand totally suppressed it.

This is an important point when considering how to use these products; a compromised webpage attempting to open Calc is in essence the same as a legitimate website serving up a PDF file to be opened in-browser by a PDF reader. Comodo and SBIE will allow the PDF to be opened (still isolating everything) while Shade will suppress the process.

Depending on what browser you use similar potential issues with Flash when using Shade may occur, but this would be dependent on your browser (Chrome and Firefox now have Flash incorporated within themselves, so no issue here) and how a particular page renders the Flash material (no problems at all with Youtube).

Obviously those already using SBIE or Comodo (both providing a more elegant browsing experience while also being very secure) have no need for Shade. However those who do not yet use any sandboxing product and want to remain very secure online may want to consider Shade. But the level of application suppression Shade has really doesn’t make it very useful outside of Sanboxing browsers.
 

Moose

Level 22
Jun 14, 2011
2,271
Salutations,Friends!

Another great information security software video. Really appreicate the time you put making and sharing these video's!;)
 
Last edited:
  • Like
Reactions: porkpiehat

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top