Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Sandboxes against a simple API exploit
Message
<blockquote data-quote="cruelsister" data-source="post: 420155" data-attributes="member: 7463"><p>I just got home, logged on and I thought I was seeing things when noting the amount of views and replies. Didn't realize there were so many SB fans!</p><p></p><p>As a way of an explanation of what I did in the Video-</p><p></p><p>1). The setup of Sandboxie wasn't my primary focus; the susceptibility of the program to API exploits was. I also prefer very quick videos which by necessity preclude going into any depth (it may seem counter intuitive, but making a 2 minute Video takes a great deal longer than making a 20 minute one). I honestly had no idea it would be received as it was, so please accept my sincerest apologies for the lack of detail.</p><p></p><p>2). One of the primary complaints was that seperate sandboxes should be set up for different things. This is a valid point and will be addressed. </p><p></p><p>3). Another issue pointed out was that the malware could be easily stopped by a simple setting (namely by checking the Drop Rights box in Restrictions). This is also very valid as it would most definitely stop the Exploit from proceeding. The issue here, however, is that this would be a form of Reactive Protection- by this is meant that we know the file is malware, we know what it can do, so we set up a system that will stop the malicious activity from occurring. This may look good on a Video test but will it actually be useful in Real-World computer use?</p><p></p><p>In order to illustrate what I mean a second Video is most definitely needed. I have to beg for your patience for this one as a bit of coding on my part will be needed, and as I just got home a bit ago (and still have to brush my cat Ophelia) and need some sleep it will take a little time to produce, but most assuredly will be posted within 48 hours (hopefully sooner).</p><p></p><p>Finally thank you for your interest in that little Vid, And thanks even more for the comments (and not a single mean one in the Lot! I love this place!),</p><p></p><p>M</p></blockquote><p></p>
[QUOTE="cruelsister, post: 420155, member: 7463"] I just got home, logged on and I thought I was seeing things when noting the amount of views and replies. Didn't realize there were so many SB fans! As a way of an explanation of what I did in the Video- 1). The setup of Sandboxie wasn't my primary focus; the susceptibility of the program to API exploits was. I also prefer very quick videos which by necessity preclude going into any depth (it may seem counter intuitive, but making a 2 minute Video takes a great deal longer than making a 20 minute one). I honestly had no idea it would be received as it was, so please accept my sincerest apologies for the lack of detail. 2). One of the primary complaints was that seperate sandboxes should be set up for different things. This is a valid point and will be addressed. 3). Another issue pointed out was that the malware could be easily stopped by a simple setting (namely by checking the Drop Rights box in Restrictions). This is also very valid as it would most definitely stop the Exploit from proceeding. The issue here, however, is that this would be a form of Reactive Protection- by this is meant that we know the file is malware, we know what it can do, so we set up a system that will stop the malicious activity from occurring. This may look good on a Video test but will it actually be useful in Real-World computer use? In order to illustrate what I mean a second Video is most definitely needed. I have to beg for your patience for this one as a bit of coding on my part will be needed, and as I just got home a bit ago (and still have to brush my cat Ophelia) and need some sleep it will take a little time to produce, but most assuredly will be posted within 48 hours (hopefully sooner). Finally thank you for your interest in that little Vid, And thanks even more for the comments (and not a single mean one in the Lot! I love this place!), M [/QUOTE]
Insert quotes…
Verification
Post reply
Top