Not sure if this is too new to consider a compatibility Template, but I was checking out the recent beta of
ExploitShield Browser Edition after seeing questions in
its Wilders thread about operation with Sandboxie, and wanted to share my findings.

Not sure if it
works without configuration, and the ExploitShield GUI just doesn't show it, but here's what it needs:
OpenIpcPath=$:ExploitShield.exe
OpenIpcPath=*\BaseNamedObjects*\ZVL_IPC_CHANNEL*
Then the GUI shows it's protecting so I'm just assuming it is. I'll have to post there and see if that's the case, or if another "channel" may still be blocked.
I'll keep an eye on it and update here if the settings change as it moves toward official release.

Seems like an interesting product, instead of, or in addition to, EMET.
XP Home-as-Pro SP3 (Admin) w/
continued updates (Embedded/POSReady 2009)
> Permissions + "2-level" SRP, latest Sandboxie (Pro/registered), EMET 4, no anti-
anything (ever)
Did I make tzuk crazed... in his last days?
