Referring to the GIF, Sandboxie also isolates the data blocks themselves on the hard drive as shown by the yellow box in the GIF, right?
To my knowledge it doesn't do anything below the filesystem level as it only uses a simple rmdir command by default
to remove the box directory. I believe that gif is more of an illustration on how easy it is
to remove everything in the box.
Moving file into a sandbox's folder directly only modifies the file's record in the NTFS's MFT while the data blocks on the hard disk are left untouched outside of the sandbox's data cluster on the HDD.
As you would have
to move it using an un-sandboxed application, this would be handled normally as if sandboxie was not even there.
Moving a file out of a sandbox's folder directly only modifies the file's record in the NTFS's MFT while the data blocks on the hard disk are left untouched inside the sandbox's data cluster on the HDD. Copying and pasting a file into a sandbox's folder directly would write a new block inside the sandbox's data cluster on the HDD.
Once again no as you'd have
to use one of a few options in order
to do this. First there is the recovery options within sandboxie that copies the file outside
to the real location. Then there are OpenFilePath and OpenPipePath options that can be added in a box which allow a program
to write
to the actual locations outside of the box. Then there is a manual method of using an unsandboxed app
to do the copy which is outside of sandboxies control.
Copying and pasting a file out of a sandbox's folder directly would write a new block outside of the sandbox's data cluster on the HDD.
Yes but only in the same sense as normal file creation.
I was more curious whether Sandboxie's driver intelligently detects the raw manipulation of its sandboxed files and folders, and thereafter isolate everything within the sandboxed region on the drive by moving the entire block inside instead of just modifying the NTFS file table.
I don't know all the internal stuff it does do but my take on it is that it exerts control only on the applications running inside of sandboxie where it then detects and redirects file access attempts. No intelligent detection of changes
to the filesystem that exist outside of a sandboxed app or monitoring (not counting launch attempts from the
sandbox location).
It's not setting aside X MBs for a virtual container in one block. It's guarding sandboxed applications so that changes they make are kept within the box
folder instead of making actual changes on the system.