JW The Computer Guy
Member
- Reaction score
- 0
- Location
- Canada
I install Web Of Trust on all the computers that I work on, to help prevent viruses, spyware, and to worn people of scams, do you do this aswell?
Whenever I see a customer who doesn't have a third party web browser installed I always recommend either Firefox or Opera (and soon, Chrome...once it leaves beta). With firefox I install Web of Trust and Adblock Plus. I never really used Opera- so I don't know what to addon for those few customers who pick it. (Tweak, care to give me some suggestions?)
Thanks for the links Tweak. Hope you're feeling better today.
[FONT=Verdana,Arial,Helvetica,Sans Serif,MS Sans Serif]Steve: Everybody who is interested in 64-bitness has been concerned about this. In the second case, Peter is using a 32-bit system, but he can foresee the day that he'll be migrating to a 64-bit platform, probably Vista. And so he's unhappy that he'll be unable to use Sandboxie there. And our first questioner says he's already on Vista 64 and can't use it at all. It causes a - first of all, we got a huge amount of our listeners who wrote in, said wait a minute, how can this be? How can it not work in 64 bits? And over in Sandboxie's own forums this is a real sore point.
[/FONT][FONT=Verdana,Arial,Helvetica,Sans Serif,MS Sans Serif]I've discussed it with Ronen. And he's not at all happy with Windows, or with Microsoft over this. But it is an absolute fact of what PatchGuard does. In order for Sandboxie to do its sandboxing, which is completely different from the way Windows operates, Windows has no inherent capability to, like, to create sort of this forked caching area, which as I described Sandboxie is the way it works, is when it opens a file or even a registry region where it wants to make some changes, those changes are caught and written instead into the so-called "sandbox," which is just a set of files sort of off to the side. And then any reads are intercepted and fed back from the sandbox. So the application sees that it's written, even though it's only written to a private copy, essentially. It creates like a little private fork off of the operating system where all the changes go. [/FONT][FONT=Verdana,Arial,Helvetica,Sans Serif,MS Sans Serif]
[/FONT]
[FONT=Verdana,Arial,Helvetica,Sans Serif,MS Sans Serif]To do this you absolutely, because there's no facility built into Windows to allow this, you have to intercept Windows, the API, the Application Programming Interface in the kernel and essentially filter, is the term, filter those things like file reading and writing, and registry key opening and reading and writing, and all the various things that applications might do to modify the system. You have to insert yourself down there and intercept those. Well, that is also, unfortunately, exactly what rootkits do, is hook the kernel in order to hide themselves. So exactly what PatchGuard is designed to prevent, and it does very effectively, is what Sandboxie needs to do in order to do its job. So there's a complete collision. [/FONT]
Thanks for the pointer to SafeSpace by Artificial Dynamics, Tweak. I did not know about it. After reading up on it, it appears to have the same functionality as Sandboxie, http://www.sandboxie.com/. Neither of them works with 64-bit Windows due to the Microsoft "PatchGuard" technology. You can read a little more about this in the transcript of the Security Now podcast #175.
-- PatrickB
I usually recommend Ice Weasel over Fire Fox because of the speed differences, Ice Weasel for those who do not know is based on Fire Fox after a lot of cleanup.