[LINK] making windows secure: sandboxie and other goodies

Kim Holburn kim at holburn.net
Mon Aug 7 08:54:20 AEST 2006


Just how far do you have to go to make Windows secure?

Microsoft's recommended method of dealing with malware is  
periodically wipe the OS and application from your disk and load them  
anew.  You could install 4 or 5 of these free utilities instead.

Or of course the simplest option of all: don't use windows.

Sandboxie looks very interesting.

From:
http://www.techsupportalert.com/best_46_free_utilities.htm

> 4   Best Free Browser Protection Utility   Updated July 25, 2006
> There's a scumware  plague at the moment. All it takes is a visit  
> to a pushy web site or a "loaded" shareware install and next minute  
> your Internet Explorer homepage has been changed, your default  
> search setting altered, unwanted ads pop up on your screen and worse.
>
> If you use Windows 2000 or later my top recommendation for safe  
> browsing is a free program called Sandboxie [1] that creates a  
> special contained "sandbox" environment on your PC. While browsing  
> within the virtual sandbox provided by Sandboxie you are totally  
> corralled off from other parts of your PC. So any files you  
> download are isolated to the sandbox. Similarly, any programs that  
> are executed only do so within the sandbox and have no access to  
> your normal files, the Windows operating system or any other part  
> of your PC.
>
> Usage is remarkably simple. To start a sandboxed browsing session  
> you just click the Sandboxie icon from the Quick Launch tray and  
> this will launch your default browser in the sandbox. You can then  
> use it in the normal way to browse to sites or download files.
>
> If you downloaded a file it will install normally but again will be  
> corralled off from your real PC. Anything it writes to your hard  
> drive, any changes to the Windows Registry or changes to the  
> Windows startup will be held in a separate area within the sandbox.  
> Similarly, any new processes running in your computer memory will  
> be sandboxed.
>
> After you have finished browsing you can right click the Sandboxie  
> icon and delete all sandboxed files and processes and your PC will  
> be returned to the same state it was in before the browsing  
> session. If you want retain particular downloaded files you can  
> save them permanently before clearing the contents of the Sandbox.
>
> The advantage is clear: any spyware, trojans, keyloggers or other  
> malware products that infected your PC while browsing will be  
> eliminated.
>
> Sandboxie works fine with all browsers but requires Windows 2000  
> and later. It can cause problems on some PCs so backup before  
> installing.
>
> Users of earlier Windows versions may want to check out   
> SpywareBlaster [2.  It's is not a sandbox but rather is a program  
> that changes some settings in your computer to help prevent an  
> initial infection. It provides protection against thousands of  
> malevolent products that use ActiveX based exploits, block hostile  
> sites and discards unwanted cookies as well. SpywareBlaster is most  
> effective with Internet Explorer but can be used with Firefox as  
> well. though this may be overkill as Firefox doesn't need to be  
> protected against ActiveX exploits. Once it has changed your  
> setting SpywareBlaster doesn't really need to continuously run on  
> your PC other than to provide automatic updates. These can however  
> be initiated manually. SpywareBlaster is free but the update  
> service costs $9.95 annually.
>
> A companion program to SpywareBlaster is SpywareGuard [3] that  
> provides active protection. It is a monitor that checks programs  
> before they are run for malware behavior and also does some  
> signature checking as well. However of late SpywareGuard seems to  
> have been rather neglected with no new updates for more than a year  
> so I can only give it a qualified recommendation.
>
> An alternative to SpywareGuard is to use one of the free intrusion  
> prevention and detection utilities listed here. These provide  
> active protection against infection and work very effectively in  
> concert with the passive protection provided by SpywareBlaster.
>
> =>index
>
> [1] http://www.sandboxie.com  Free for personal use, Win2K and  
> later, 310KB
> [2] http://www.javacoolsoftware.com/spywareblaster.html  Freeware,  
> all Windows version, 2.5MB
> [3] http://www.javacoolsoftware.com/spywareguard.html  Freeware,   
> All Windows versions, 913KB


> 5  Best Free Firewall   Updated July 25, 2006

> [1] http://www.sunbelt-software.com/Kerio.cfm (7.3MB)
> [2] http://www.zonelabs.com/store/content/company/products/znalm/ 
> freeDownload.jsp  (9.0MB)
> [3] http://www.personalfirewall.trustix.com/ {14.1MB)
> [3] http://www.jetico.com/index.htm#/jpfirewall.htm[ (2.7MB)
> [5] http://www.netveda.com/consumer/safetynet.htm (6.3MB)



> 6   Best Free Trojan Scanner/Trojan Remover
> [1]  http://www.ewido.net/en/  (2.2MB)
> [2] http://www.anti-trojan-software-reviews.com/review-ewido.htm <=  
> review of Ewido


> 7   Best Free Rootkit Scanner/Remover  Updated June 11, 2006

> [1]  http://www.f-secure.com/blacklight/  (787KB)
> [2]  http://www.sysinternals.com/Utilities/RootkitRevealer.html  
> (210KB)
> [3] http://www.sysinternals.com/Forum/default.asp
> [4] http://www.xfocus.net/tools/200509/IceSword_en1.12.rar <= slow  
> Chinese site, 565KB
> [5] http://tinyurl.com/ckqsn <= Local download link for IceSword  
> (V1.12)
> [6]  http://rapidshare.de/files/21011497/IceSword1.18en.7z.html  
> (V1.18)
> [7] http://www.techsupportalert.com/rootkits.htm <= How to deal  
> with the threat of rootkits


> 8  Best Free Intrusion Prevention and Detection Utility for Home  
> Use   Updated June 22, 2006.

> [1] http://www.techsupportalert.com/intrusion-detection.htm
> [2] http://www.prevx.com/prevxhome.asp  Freeware, Win2K and later,  
> 7.5MB
> [3] http://www.download.com/Prevx-Home/3000-8022_4-10364927.html
> [4] http://www.winpatrol.com/download.html  Freeware, Win 98 and  
> later, 1.1MB


> 9  Best Free Anonymous Surfing Service

> [1] http://anon.inf.tu-dresden.de/index_en.html
> [2] http://tor.eff.org/






--
Kim Holburn
IT Network & Security Consultant
Ph: +61 2 61258620 M: +61 417820641  F: +61 2 6230 6121
mailto:kim at holburn.net  aim://kimholburn
skype://kholburn - PGP Public Key on request
Cacert Root Cert: http://www.cacert.org/cacert.crt
Aust. Spam Act: To stop receiving mail from me: reply and let me know.
Use ISO 8601 dates [YYYY-MM-DD] http://www.saqqara.demon.co.uk/ 
datefmt.htm

Democracy imposed from without is the severest form of tyranny.
                           -- Lloyd Biggle, Jr. Analog, Apr 1961






More information about the Link mailing list