Program Compatibility Templates [non-security programs]
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
Program Compatibility Templates [non-security programs]
This is where we will collate templates for 3rd party programs, etc. be used with SBIE to enable certain compatibility with programs running under the authority of SBIE...
If you have templates, please feel free to add them in this thread. I will search the forum and add ones I find as well. I'll edit the title as needed to ensure consistency if needed. Thanks!
Also, templates that are baked into SBIE already, many are showing their age and have not been updated and are stale. So, if anyone has edits to them that you'd like to post, please do that. We'll also review those submissions to possibly be included in future SBIE releases.
The use of any such templates in this thread (or otherwise in this forum) will be at the discretion of the end user and shall not guarantee any level of support and the end user shall hold harmless the creator of said template as well as Sandboxie Holdings (Invincea, inc.) with that understanding. You also accept the knowledge that using such templates may open up security hole(s) within Sandboxie and may expose the user to unknown threats while online and/or cause SBIE not function correctly.
Syrinx has been designated as my defacto copy editor
If you have templates, please feel free to add them in this thread. I will search the forum and add ones I find as well. I'll edit the title as needed to ensure consistency if needed. Thanks!
Also, templates that are baked into SBIE already, many are showing their age and have not been updated and are stale. So, if anyone has edits to them that you'd like to post, please do that. We'll also review those submissions to possibly be included in future SBIE releases.
The use of any such templates in this thread (or otherwise in this forum) will be at the discretion of the end user and shall not guarantee any level of support and the end user shall hold harmless the creator of said template as well as Sandboxie Holdings (Invincea, inc.) with that understanding. You also accept the knowledge that using such templates may open up security hole(s) within Sandboxie and may expose the user to unknown threats while online and/or cause SBIE not function correctly.
Syrinx has been designated as my defacto copy editor
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
MailBird settings
Courtesy of @Guest10
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: mailbird.exe
"Add" button: Navigate to and select the folder where Mailbird saves its emails.
OK your way out.
Additional:
I also will sometimes save a copy of an email as an individual .eml file.
If you want to save an .eml file out of the sandbox, using something like File > Save As > File, then add:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: mailbird.exe
"Edit/Add" button: *.eml
OK your way out.
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: mailbird.exe
"Add" button: Navigate to and select the folder where Mailbird saves its emails.
OK your way out.
Additional:
I also will sometimes save a copy of an email as an individual .eml file.
If you want to save an .eml file out of the sandbox, using something like File > Save As > File, then add:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: mailbird.exe
"Edit/Add" button: *.eml
OK your way out.
Direct Folders
This one is a template I recently worked on for Direct Folders, it seems to do the trick for the most part but I wasn't able to reproduce or solve (sorry Rasheed187) an issue the original poster had with it and another program so I'm not sure it should even be considered for the templates.ini but it could still be useful for others who want to use the software along with sandboxie.
This template won't allow a user to run DirectFolders sandboxed but should allow it to operate normally with sandboxed apps (for the most part). DirectFolders itself will NOT install/run inside a sandbox even using this template.
This template won't allow a user to run DirectFolders sandboxed but should allow it to operate normally with sandboxed apps (for the most part). DirectFolders itself will NOT install/run inside a sandbox even using this template.
Code: Select all
[Template_DirectFolders]
Tmpl.Title=Direct Folders
Tmpl.Class=Misc
Tmpl.Scan=s
Tmpl.ScanFile=%APPDATA%\Direct Folders
OpenWinClass=$:df.exe
OpenWinClass=#
Goo.gl/p8qFCf
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
Cyberfox 32/64
Courtesy of @Guest10
Here are some traditional type Sandboxie templates, adapted for use with sandboxed Cyberfox 36 on 64-bit Windows.
They are written as Local Templates, so after you add them to Sandboxie's configuration file you will not find them listed at Sandbox Settings > Applications > Web Browser
They will be listed at Sandbox Settings > Applications > Local
The exclusions use a wild card character (*) in place of the path to each file or folder, so they should work regardless of the actual location of the profile files. As long as the portable version of Cyberfox uses "cyberfox.exe" (as shown in Sandboxie Control's window <- not checked), they should also work with the portable version.
In addition to the traditional templates, I have also included an alternative template that uses a whitelist approach. One template contains the exclusions for all of the Cyberfox files that you always want to be saved out of the sandbox. If you use the whitelist template, you don't need any of the other templates - unless you also want to use the Force template (assuming that you have a registered version of Sandboxie).
If you use the traditional templates instead of the whitelist template, be sure to use the "Phishing" template. It's primarily needed to keep the "safebrowsing" anti-phishing files updated while running sandboxed. These files are not saved in the profile folder in a normal install of Cyberfox, although they might be saved there in a portable install. The Phishing template will allow the anti-phishing files to be kept updated, wherever they are stored.
Copy the text in this post to your Clipboard, and save it to a Notepad document, so you can Copy and Paste from it while off line.
----
For a sandbox that you will use with Cyberfox:
(A) Open Sandboxie Control's window and right-click the sandbox name, then click...
Sandbox Settings > Applications > Local
1) Click the "Create New" button and Paste one template at a time into the window.
2) Then, click OK in the "Create New" window.
3) Repeat steps 1 and 2 until you have entered all of the local templates that you want to use.
(B) After the templates have been added, click on one of them and then click the "Add" button.
Repeat, selecting templates and clicking the Add button, until all of the templates have been applied for that sandbox [+].
Then, click OK to close the "Sandbox Settings" window.
At this point, if you have templates that you haven't applied, you will asked if you want to remove the unused templates. Answering "No" will keep those templates in the configuration file.
If you have another sandbox that will also use the template(s), you can repeat step (B) for that sandbox at:
(Right-click the sandbox name) > Sandbox Settings > Applications > Local
Only one sandbox should "Force" Cyberfox. If multiple force settings exist, the first one that is found will be the one that's used. Also, running multiple instances of Cyberfox, with each of them trying to use the same profile files, is best avoided.
------
Traditional type templates follow...
[Template_Local_Cyberfox_Force]
Tmpl.Title=Force Cyberfox to run in this sandbox (Registered version only)
Tmpl.Class=Local
Tmpl.Comment=As an alternative to this template: Sandbox Settings > Program Start > Forced Programs
ForceProcess=cyberfox.exe
[Template_Local_Cyberfox_Bookmarks_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox bookmark and history database
Tmpl.Class=Local
Tmpl.Comment=To delete the browsing history, use Cyberfox's own "Options" settings
Tmpl.Comment=Deleting browsing history will keep "session management" from working
Tmpl.Comment=Deleting browsing history will delete "thumbnails"
OpenFilePath=cyberfox.exe,*\bookmark*
OpenFilePath=cyberfox.exe,*\places*
[Template_Local_Cyberfox_Cookies_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox cookies
Tmpl.Class=Local
OpenFilePath=cyberfox.exe,*\cookies*
[Template_Local_Cyberfox_Passwords_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox passwords
Tmpl.Class=Local
Tmpl.Comment=Applies to Firefox derivatives, version 32 and later
Tmpl.Comment=Previous to version 32: signons.sqlite was used instead of logins.json
OpenFilePath=cyberfox.exe,*\logins.json
OpenFilePath=cyberfox.exe,*\key3.db
[Template_Local_Cyberfox_Phishing_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox phishing database and blocklist files
Tmpl.Class=Local
Tmpl.Comment=On a normal install, the "safebrowsing" folder is beneath AppData\Local
OpenFilePath=cyberfox.exe,*\cert8.db
OpenFilePath=cyberfox.exe,*\blocklist.xml
OpenFilePath=cyberfox.exe,*\safebrowsing\*
[Template_Local_Cyberfox_Session_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox session management
Tmpl.Class=Local
Tmpl.Comment=This won't work if you delete browsing history
OpenFilePath=cyberfox.exe,*\sessionstore.js
OpenFilePath=cyberfox.exe,*\sessionstore-backups\*
[Template_Local_Cyberfox_Thumbnails_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox thumbnails folder
Tmpl.Class=Local
Tmpl.Comment=If you delete browsing history, thumbnails will be deleted
Tmpl.Comment=The "thumbnails" folder is beneath AppData\Local, not AppData\Roaming
OpenFilePath=cyberfox.exe,*\thumbnails\*
[Template_Local_Cyberfox_Settings_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox preferences
Tmpl.Class=Local
Tmpl.Comment=The exclusions for "search" and "xulstore" allow changes to the search engine setting
OpenFilePath=cyberfox.exe,*\prefs.js
OpenFilePath=cyberfox.exe,*\search*
OpenFilePath=cyberfox.exe,*\xulstore.json
If you've picked the templates that you want from the above, then you don't need the following one.
If you use this one, read the template comments.
[Template_Local_Cyberfox_Profile_DirectAccess]
Tmpl.Title=Allow direct access to entire Cyberfox profile folder
Tmpl.Class=Local
Tmpl.Comment=This template only works if the Cyberfox profile is in its default folder beneath AppData\Roaming
Tmpl.Comment=You also need to use the Phishing template, if you use this one
Tmpl.Comment=If you want to save thumbnails, you also need the Thumbnails template
OpenFilePath=cyberfox.exe,%AppData%\8pecxstudios\Cyberfox\Profiles\*\
------
An alternative approach:
You could use just one "whitelist" template. All of the files/folders that you want to save out of the sandbox are listed in one template. You would only use this one template, unless you also wanted to use the Forcing template. This is the same approach that I use for 2 of my Firefox profiles, both of which make use of the same whitelist template.
[Template_Local_Cyberfox_Whitelist]
Tmpl.Title=My Cyberfox whitelisted files and folders
Tmpl.Class=Local
OpenFilePath=cyberfox.exe,*\bookmark*
OpenFilePath=cyberfox.exe,*\places*
OpenFilePath=cyberfox.exe,*\cookies*
OpenFilePath=cyberfox.exe,*\logins.json
OpenFilePath=cyberfox.exe,*\key3.db
OpenFilePath=cyberfox.exe,*\cert8.db
OpenFilePath=cyberfox.exe,*\blocklist.xml
OpenFilePath=cyberfox.exe,*\safebrowsing\*
OpenFilePath=cyberfox.exe,*\sessionstore.js
OpenFilePath=cyberfox.exe,*\sessionstore-backups\*
OpenFilePath=cyberfox.exe,*\thumbnails\*
OpenFilePath=cyberfox.exe,*\prefs.js
OpenFilePath=cyberfox.exe,*\search*
OpenFilePath=cyberfox.exe,*\xulstore.json
Here are a few exclusions for files and extensions that I use for Firefox, that also seem to apply with Cyberfox, and the OpenFilePath=... settings could be added to the list, above.
Listed, in order:
The Cyberfox personal (spelling) dictionary file;
"Adblock Plus" and "Element Hiding Helper For AdBlock Plus" extensions;
"Paste Email Plus" extension
OpenFilePath=cyberfox.exe,*\persdict.dat
OpenFilePath=cyberfox.exe,*\adblockplus\*
OpenFilePath=cyberfox.exe,*\pasteemailplus.json
Here are some traditional type Sandboxie templates, adapted for use with sandboxed Cyberfox 36 on 64-bit Windows.
They are written as Local Templates, so after you add them to Sandboxie's configuration file you will not find them listed at Sandbox Settings > Applications > Web Browser
They will be listed at Sandbox Settings > Applications > Local
The exclusions use a wild card character (*) in place of the path to each file or folder, so they should work regardless of the actual location of the profile files. As long as the portable version of Cyberfox uses "cyberfox.exe" (as shown in Sandboxie Control's window <- not checked), they should also work with the portable version.
In addition to the traditional templates, I have also included an alternative template that uses a whitelist approach. One template contains the exclusions for all of the Cyberfox files that you always want to be saved out of the sandbox. If you use the whitelist template, you don't need any of the other templates - unless you also want to use the Force template (assuming that you have a registered version of Sandboxie).
If you use the traditional templates instead of the whitelist template, be sure to use the "Phishing" template. It's primarily needed to keep the "safebrowsing" anti-phishing files updated while running sandboxed. These files are not saved in the profile folder in a normal install of Cyberfox, although they might be saved there in a portable install. The Phishing template will allow the anti-phishing files to be kept updated, wherever they are stored.
Copy the text in this post to your Clipboard, and save it to a Notepad document, so you can Copy and Paste from it while off line.
----
For a sandbox that you will use with Cyberfox:
(A) Open Sandboxie Control's window and right-click the sandbox name, then click...
Sandbox Settings > Applications > Local
1) Click the "Create New" button and Paste one template at a time into the window.
2) Then, click OK in the "Create New" window.
3) Repeat steps 1 and 2 until you have entered all of the local templates that you want to use.
(B) After the templates have been added, click on one of them and then click the "Add" button.
Repeat, selecting templates and clicking the Add button, until all of the templates have been applied for that sandbox [+].
Then, click OK to close the "Sandbox Settings" window.
At this point, if you have templates that you haven't applied, you will asked if you want to remove the unused templates. Answering "No" will keep those templates in the configuration file.
If you have another sandbox that will also use the template(s), you can repeat step (B) for that sandbox at:
(Right-click the sandbox name) > Sandbox Settings > Applications > Local
Only one sandbox should "Force" Cyberfox. If multiple force settings exist, the first one that is found will be the one that's used. Also, running multiple instances of Cyberfox, with each of them trying to use the same profile files, is best avoided.
------
Traditional type templates follow...
[Template_Local_Cyberfox_Force]
Tmpl.Title=Force Cyberfox to run in this sandbox (Registered version only)
Tmpl.Class=Local
Tmpl.Comment=As an alternative to this template: Sandbox Settings > Program Start > Forced Programs
ForceProcess=cyberfox.exe
[Template_Local_Cyberfox_Bookmarks_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox bookmark and history database
Tmpl.Class=Local
Tmpl.Comment=To delete the browsing history, use Cyberfox's own "Options" settings
Tmpl.Comment=Deleting browsing history will keep "session management" from working
Tmpl.Comment=Deleting browsing history will delete "thumbnails"
OpenFilePath=cyberfox.exe,*\bookmark*
OpenFilePath=cyberfox.exe,*\places*
[Template_Local_Cyberfox_Cookies_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox cookies
Tmpl.Class=Local
OpenFilePath=cyberfox.exe,*\cookies*
[Template_Local_Cyberfox_Passwords_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox passwords
Tmpl.Class=Local
Tmpl.Comment=Applies to Firefox derivatives, version 32 and later
Tmpl.Comment=Previous to version 32: signons.sqlite was used instead of logins.json
OpenFilePath=cyberfox.exe,*\logins.json
OpenFilePath=cyberfox.exe,*\key3.db
[Template_Local_Cyberfox_Phishing_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox phishing database and blocklist files
Tmpl.Class=Local
Tmpl.Comment=On a normal install, the "safebrowsing" folder is beneath AppData\Local
OpenFilePath=cyberfox.exe,*\cert8.db
OpenFilePath=cyberfox.exe,*\blocklist.xml
OpenFilePath=cyberfox.exe,*\safebrowsing\*
[Template_Local_Cyberfox_Session_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox session management
Tmpl.Class=Local
Tmpl.Comment=This won't work if you delete browsing history
OpenFilePath=cyberfox.exe,*\sessionstore.js
OpenFilePath=cyberfox.exe,*\sessionstore-backups\*
[Template_Local_Cyberfox_Thumbnails_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox thumbnails folder
Tmpl.Class=Local
Tmpl.Comment=If you delete browsing history, thumbnails will be deleted
Tmpl.Comment=The "thumbnails" folder is beneath AppData\Local, not AppData\Roaming
OpenFilePath=cyberfox.exe,*\thumbnails\*
[Template_Local_Cyberfox_Settings_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox preferences
Tmpl.Class=Local
Tmpl.Comment=The exclusions for "search" and "xulstore" allow changes to the search engine setting
OpenFilePath=cyberfox.exe,*\prefs.js
OpenFilePath=cyberfox.exe,*\search*
OpenFilePath=cyberfox.exe,*\xulstore.json
If you've picked the templates that you want from the above, then you don't need the following one.
If you use this one, read the template comments.
[Template_Local_Cyberfox_Profile_DirectAccess]
Tmpl.Title=Allow direct access to entire Cyberfox profile folder
Tmpl.Class=Local
Tmpl.Comment=This template only works if the Cyberfox profile is in its default folder beneath AppData\Roaming
Tmpl.Comment=You also need to use the Phishing template, if you use this one
Tmpl.Comment=If you want to save thumbnails, you also need the Thumbnails template
OpenFilePath=cyberfox.exe,%AppData%\8pecxstudios\Cyberfox\Profiles\*\
------
An alternative approach:
You could use just one "whitelist" template. All of the files/folders that you want to save out of the sandbox are listed in one template. You would only use this one template, unless you also wanted to use the Forcing template. This is the same approach that I use for 2 of my Firefox profiles, both of which make use of the same whitelist template.
[Template_Local_Cyberfox_Whitelist]
Tmpl.Title=My Cyberfox whitelisted files and folders
Tmpl.Class=Local
OpenFilePath=cyberfox.exe,*\bookmark*
OpenFilePath=cyberfox.exe,*\places*
OpenFilePath=cyberfox.exe,*\cookies*
OpenFilePath=cyberfox.exe,*\logins.json
OpenFilePath=cyberfox.exe,*\key3.db
OpenFilePath=cyberfox.exe,*\cert8.db
OpenFilePath=cyberfox.exe,*\blocklist.xml
OpenFilePath=cyberfox.exe,*\safebrowsing\*
OpenFilePath=cyberfox.exe,*\sessionstore.js
OpenFilePath=cyberfox.exe,*\sessionstore-backups\*
OpenFilePath=cyberfox.exe,*\thumbnails\*
OpenFilePath=cyberfox.exe,*\prefs.js
OpenFilePath=cyberfox.exe,*\search*
OpenFilePath=cyberfox.exe,*\xulstore.json
Here are a few exclusions for files and extensions that I use for Firefox, that also seem to apply with Cyberfox, and the OpenFilePath=... settings could be added to the list, above.
Listed, in order:
The Cyberfox personal (spelling) dictionary file;
"Adblock Plus" and "Element Hiding Helper For AdBlock Plus" extensions;
"Paste Email Plus" extension
OpenFilePath=cyberfox.exe,*\persdict.dat
OpenFilePath=cyberfox.exe,*\adblockplus\*
OpenFilePath=cyberfox.exe,*\pasteemailplus.json
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
New Delete Command for Eraser v6.2.0.2962
Courtesy of @Guest10
New Delete Command for Eraser v6.2.0.2962 and Sandboxie
Tested with Sandboxie v4.16 and v4.17 on 64-bit Win 8.1
Edit Also works with Eraser v6.2.0.2963 and 6.2.0.2967, but does NOT work for me with 6.2.0.2969. On 6.2.0.2969 it leaves behind the renamed sandbox folder "__Delete_xxxxx_xxxxxxxx" /Edit
Copy all of the text from this post to your Clipboard, and then Paste it into a Notepad document, so that you will have it available when you are off-line.
Edit: I should mention that the command lines assume that the "Eraser.exe" program file is located at "C:\Program Files\Eraser\Eraser.exe". If that's not correct for your computer, then the path inside of the following command lines must be corrected. /Edit
Choose from these two eraser methods...
Command line for 3 Pass deletion - DOD /E method (This is the usual method used by Sandboxie):
Command line for 1 Pass deletion with PseudoRandom Data (A quicker method that I use, and all that's really needed):
Decide which of the above erase methods you will use (1 Pass or 3 Pass), and have the Notepad document open so you can Copy to the Clipboard.
For each sandbox where you use Eraser v6.2 for secure deletion:
(Right-click the sandbox name) > Sandbox Settings > Delete > Delete Command
In the "Delete Command" box, use the arrow keys or your mouse to select everything in the box, and then delete it by pressing the <Delete> key on your keyboard.
Text in that box extends beyond what you can see, so make sure that it has all been deleted.
Paste the new command line of your choice from above into the Delete Command box, and Click OK to close the Sandbox Settings window.
Repeat for the next sandbox.
NOTES:
If you have multiple sandboxes that use Eraser v6.2, you could use:
Sandboxie Control window > Configure > Edit Configuration
Scroll down to each "DeleteCommand=..." line and replace the line with the new DeleteCommand=..." line of your choice:
Either the 3 Pass method that's usually used by Sandboxie:
DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=ecbf4998-0b4f-445c-9a06-23627659e419 dir="%SANDBOX%"
Or the 1 Pass method:
DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=bf8ba267-231a-4085-9bf9-204de65a6641 dir="%SANDBOX%"
Edit Here's an example using methodName:
DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /methodName=Pseudorandom data dir="%SANDBOX%"
/Edit
------
Justification for only using 1 Pass deletion -
At the bottom of Peter Gutmann's paper on Secure Deletion Methods:
https://www.cs.auckland.ac.nz/~pgut001/ ... l#Epilogue
Why Eraser still sets 35-Pass Gutmann method as the default setting when installing Eraser is a mystery to me.
------
Eraser Help usage screen follows:
End of post
New Delete Command for Eraser v6.2.0.2962 and Sandboxie
Tested with Sandboxie v4.16 and v4.17 on 64-bit Win 8.1
Edit Also works with Eraser v6.2.0.2963 and 6.2.0.2967, but does NOT work for me with 6.2.0.2969. On 6.2.0.2969 it leaves behind the renamed sandbox folder "__Delete_xxxxx_xxxxxxxx" /Edit
Copy all of the text from this post to your Clipboard, and then Paste it into a Notepad document, so that you will have it available when you are off-line.
Edit: I should mention that the command lines assume that the "Eraser.exe" program file is located at "C:\Program Files\Eraser\Eraser.exe". If that's not correct for your computer, then the path inside of the following command lines must be corrected. /Edit
Choose from these two eraser methods...
Command line for 3 Pass deletion - DOD /E method (This is the usual method used by Sandboxie):
Code: Select all
"C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=ecbf4998-0b4f-445c-9a06-23627659e419 dir="%SANDBOX%"
Code: Select all
"C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=bf8ba267-231a-4085-9bf9-204de65a6641 dir="%SANDBOX%"
For each sandbox where you use Eraser v6.2 for secure deletion:
(Right-click the sandbox name) > Sandbox Settings > Delete > Delete Command
In the "Delete Command" box, use the arrow keys or your mouse to select everything in the box, and then delete it by pressing the <Delete> key on your keyboard.
Text in that box extends beyond what you can see, so make sure that it has all been deleted.
Paste the new command line of your choice from above into the Delete Command box, and Click OK to close the Sandbox Settings window.
Repeat for the next sandbox.
NOTES:
If you have multiple sandboxes that use Eraser v6.2, you could use:
Sandboxie Control window > Configure > Edit Configuration
Scroll down to each "DeleteCommand=..." line and replace the line with the new DeleteCommand=..." line of your choice:
Either the 3 Pass method that's usually used by Sandboxie:
DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=ecbf4998-0b4f-445c-9a06-23627659e419 dir="%SANDBOX%"
Or the 1 Pass method:
DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=bf8ba267-231a-4085-9bf9-204de65a6641 dir="%SANDBOX%"
Edit Here's an example using methodName:
DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /methodName=Pseudorandom data dir="%SANDBOX%"
/Edit
------
Justification for only using 1 Pass deletion -
At the bottom of Peter Gutmann's paper on Secure Deletion Methods:
https://www.cs.auckland.ac.nz/~pgut001/ ... l#Epilogue
Why Eraser still sets 35-Pass Gutmann method as the default setting when installing Eraser is a mystery to me.
------
Eraser Help usage screen follows:
Code: Select all
Eraser 6.2.0.2962
(c) 2008-2015 The Eraser Project
Eraser is Open-Source Software: see http://eraser.heidi.ie/ for details.
usage: Eraser <action> <arguments>
where action is
help Show this help message.
erase Erases items specified on the command line. This is equivalent to addtask, with the schedule set to "now".
addtask Adds a task to the current task list.
importtasklist Imports an Eraser Task list to the current user's Task List.
global parameters:
/quiet Do not create a Console window to display progress.
parameters for help:
eraser help No parameters to set.
parameters for erase and addtask:
eraser erase [/method=(<methodGUID>|<methodName>)] <target> [target [...]]
eraser addtask [/method=(<methodGUID>|<methodName>)] [/schedule=(now|manually|restart)] <target> [target [...]]
/method The Erasure method to use.
methodGUID and methodName can be any GUID/Name from the following list:
Erasure Method GUID
---------------------------------------------------------------------------
U Gutmann 1407fc4e-feff-4375-b4fb-d7efbb7e9922
U US DoD 5220.22-M (8-306./E, C & E) d1583631-702e-4dbf-a0e9-c35dba481702
U RCMP TSSIT OPS-II f335cc40-5de5-4733-90b1-6957b4a45688
U Schneier 7 pass b1bfab4a-31d3-43a5-914c-e9892c78afd8
U German VSITR 607632b2-651b-4935-883a-bdaa74febb54
U US DoD 5220.22-M (8-306./E) ecbf4998-0b4f-445c-9a06-23627659e419
U British HMG IS5 (Enhanced) 45671da4-9401-46e4-9c0d-89b94e89c8b5
U US Air Force 5020 7bf5b185-8ea5-4e12-83f1-f6c2efb3d2c2
U US Army AR380-19 0fe620ea-8055-4861-b5bb-bd8bdc3fd4ac
U Russian GOST P50739-95 92681583-f484-415f-a66c-cc210222edc5
U British HMG IS5 (Baseline) 9acdbd78-0406-4116-87e5-263e5e3b2e0d
U Pseudorandom Data bf8ba267-231a-4085-9bf9-204de65a6641
First/last 16KB Erasure 0c2e07bf-0207-49a3-ade8-46f9e1499c01
Only erasure methods labelled "U" can be used to erase unused disk space.
/schedule The schedule the task will follow. The value must be one of:
now The task will be queued for immediate execution.
manually The task will be created but not queued for execution.
restart The task will be queued for execution when the computer is next restarted.
This parameter is only valid for use with "addtask".
target is one or more of:
file Erases the specified file
argument: file=<path>
dir Erases files and folders in the directory
arguments: dir=<directory>[,-excludeMask][,+includeMask][,deleteIfEmpty[=true|false]]
excludeMask A wildcard expression for files and folders to exclude.
includeMask A wildcard expression for files and folders to include.
The include mask is applied before the exclude mask.
deleteIfEmpty Deletes the folder at the end of the erasure if it is
empty. If this parameter is not specified, it defaults to true.
recyclebin Erases files and folders in the recycle bin
unused Erases unused space in the volume.
arguments: unused=<drive>[,clusterTips[=(true|false)]]
clusterTips If specified, the drive's files will have their cluster tips erased.
This parameter accepts a Boolean value (true/false) as an argument;
if none is specified true is assumed.
move Securely moves a file/directory to a new location
arguments: move=<source>|<destination>
drive Erases partitions, volumes or drives
arguments:
drive=\Device\Harddisk<index>
drive=\\.\PhysicalDrive<index>
drive=\\?\Volume<guid>
parameters for importtasklist:
eraser importtasklist <file>[...]
file A list of one or more files to import.
All arguments are case sensitive.
Response files can be used for very long command lines (generally, anything
involving more than 32,000 characters.) Response files are used by prepending
"@" to the path to the file, and passing it into the command line. The
contents of the response files' will be substituted at the same position into
the command line.
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
IE 11 web credentials
From Curt:
IE 11 has changed the way they store web credentials.
If you want to have them saved outside the sandbox, you can open
.
But be aware that when you do this, and you clear them inside the sandbox, you will be clearing them outside the sandbox (in the host) as well. And anything running in the sandbox will have access to all your web credentials.
IE 11 has changed the way they store web credentials.
If you want to have them saved outside the sandbox, you can open
Code: Select all
IPC path \RPC Control\Vault
But be aware that when you do this, and you clear them inside the sandbox, you will be clearing them outside the sandbox (in the host) as well. And anything running in the sandbox will have access to all your web credentials.
-
- Posts: 28
- Joined: Thu Oct 21, 2010 8:06 am
- Contact:
Opera 35
Is it possible for the team, to integrate Opera35 in the templates.ini?
Code: Select all
[TemplateSettings]
Tmpl.OperaStable=%AppData%\Opera Software\*
#
# Opera Stable
#
[Template_OperaStable_Force]
Tmpl.Title=#4323,Opera Stable
Tmpl.Class=WebBrowser
ForceProcess=opera.exe
[Template_OperaStable_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Bookmarks*
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Thumbnails*
[Template_OperaStable_History_DirectAccess]
Tmpl.Title=#4336,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Bookmarks*
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Thumbnails*
OpenFilePath=opera.exe,%Tmpl.OperaStable%\*History*
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Current *
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Last *
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Visited Links*
[Template_OperaStable_Cookies_DirectAccess]
Tmpl.Title=#4328,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Cookies*
[Template_OperaStable_Passwords_DirectAccess]
Tmpl.Title=#4331,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Login Data*
[Template_OperaStable_Preferences_DirectAccess]
Tmpl.Title=#4339,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Preferences*
[Template_OperaStable_Profile_DirectAccess]
Tmpl.Title=#4338,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\*
[Template_OperaStable_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
Chrome & uBlock Origin
courtesy of @Dun
Code: Select all
OpenFilePath=firefox.exe,%appdata%\Mozilla\Firefox\Profiles\[profile name]\extension-data\
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
Chrome, uBlock. Auto update uBlock
Per this thread http://forums.sandboxie.com/phpBB3/view ... ck#p119412 Thanks to @cj716
Code: Select all
OpenFilePath=chrome.exe,%Local AppData%\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm\
OpenFilePath=chrome.exe,%Local AppData%\Google\Chrome\User Data\Default\Local Extension Settings\cjpalhdlnbpafiamejdnhcphjbkeiagm
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
Google Hangouts [Web Version] [Chrome qWave]
When using the website hangouts.google.com
hangouts.google.com
Add code:
Make sure that you grant Chrome access to your mic/device when it asks for it.
hangouts.google.com
Add code:
Code: Select all
OpenPipePath=\Device\QWAVEdrv
-
- Sandboxie Support
- Posts: 3523
- Joined: Thu Jun 18, 2015 3:00 pm
- Location: DC Metro Area
- Contact:
"New" Opera [v36 and above]
Direct access to bookmarks and thumbnails [@rpljhun]
Use this to create a template in SBIE.
Code: Select all
[Template_New_Opera_Bookmarks_Thumbnails_DirectAccess]
Tmpl.Title=#4356,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%AppData%\Opera Software\*\Bookmarks*
OpenFilePath=opera.exe,%AppData%\Opera Software\*\Thumbnails*
Re: Program Compatibility Templates [non-security programs]
Recent versions of AdBlock Plus no longer save data to the browser's profile folder in "adblockplus\patterns.ini"
Recent versions will delete the "patterns.ini" file when they are installed.
If you no longer have a "patterns.ini" file in that folder, you need to define a new Direct Access setting.
Data is now saved to...
(For Firefox):
%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js
(For Cyberfox):
%AppData%\8pecxstudios\Cyberfox\Profiles\xxxxxxx.default\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js
For the above, add the appropriate OpenFilePath setting to the settings for your sandbox...
(For Firefox):
(For Cyberfox):
The "Element Hiding Helper For AdBlock Plus" will also save it's data there, if you have it installed.
Recent versions will delete the "patterns.ini" file when they are installed.
If you no longer have a "patterns.ini" file in that folder, you need to define a new Direct Access setting.
Data is now saved to...
(For Firefox):
%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js
(For Cyberfox):
%AppData%\8pecxstudios\Cyberfox\Profiles\xxxxxxx.default\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js
For the above, add the appropriate OpenFilePath setting to the settings for your sandbox...
(For Firefox):
Code: Select all
OpenFilePath=firefox.exe,%AppData%\*\Profiles\*\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js
Code: Select all
OpenFilePath=cyberfox.exe,%AppData%\*\Profiles\*\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Re: Program Compatibility Templates [non-security programs]
Hi Guest10. I did notice this change a few days ago. What I also had noticed is that Firefox freezes during the first few minutes after opening the browser. In my case it happened every time I opened the browser. Yesterday I switched adblocker to UBO, and all is well.
Today I learned that the issue is a known bug, supposedly fixed in version 2.91. I retested 2.91 today in a new Firefox profile and still experience the problem. I ll keep using UBO.
https://issues.adblockplus.org/ticket/5298
Bo
Re: Program Compatibility Templates [non-security programs]
No problem here with 2.91, using 64-bit Cyberfox.
The add-on Ghostery keeps it's data in the same profile folder:
%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\browser-extension-data
only a different sub-folder:
Code: Select all
%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\browser-extension-data\firefox@ghostery.com\storage.js
Code: Select all
OpenFilePath=firefox.exe,%AppData%\*\Profiles\*\browser-extension-data\firefox@ghostery\storage.js
Code: Select all
OpenFilePath=cyberfox.exe,%AppData%\*\Profiles\*\browser-extension-data\firefox@ghostery\storage.js
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
Re: Program Compatibility Templates [non-security programs]
Updated templates for Firefox:
I hope you will add them to the Templates.ini. And please check my other post: viewtopic.php?f=4&t=24698#p129424. Thanks!
Code: Select all
[Template_Firefox_Bookmarks_DirectAccess]
Tmpl.Title=#4336,Firefox
Tmpl.Class=WebBrowser
OpenFilePath=firefox.exe,%Tmpl.Firefox%\bookmark*
OpenFilePath=firefox.exe,%Tmpl.Firefox%\favicons*
OpenFilePath=firefox.exe,%Tmpl.Firefox%\places*
Code: Select all
[Template_Firefox_Phishing_DirectAccess]
Tmpl.Title=#4337,Firefox/Waterfox/Pale Moon
Tmpl.Class=WebBrowser
ProcessGroup=<FirefoxPrograms>,firefox.exe,waterfox.exe,palemoon.exe
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\blocklist*
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\cert8.db
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\safebrowsing*
Who is online
Users browsing this forum: No registered users and 1 guest