Run the file in an online sandbox. Safe launch of programs. Sandboxie program. Advantages and disadvantages of the program

When working on a PC, we launch and download a lot of files: programs, books, articles. This causes malicious software and viruses to enter the system. Even on official resources you can come across such files. How to protect yourself from this. The Sandboxie sandbox will help. This good way get rid of advertising, toolbars, and malicious software. Let's take a closer look at how to download Sandboxie on a PC and work with it.

What it is

Sandboxie Sandbox is specialized software that creates an environment on the PC where the application cannot access the PC settings. If a virus enters a PC, it will not gain access to system files to change information in them. When leaving the sandbox, all files will be deleted.

Important" Use Sandboxie to launch suspicious applications.

What is it used for?

Creates a dedicated environment within the system. Changes related to the operation of the program occur only in a special isolated environment (sandbox). It is available if necessary. Run any application without fear of damaging the OS. For example, run your browser in a sandbox and browse websites without fear of becoming infected with a virus.

Sandboxie increases security when visiting sites, especially those with questionable content.

How to download

Sandboxie can be downloaded at: https://www.sandboxie.com/. Click the "Click here" link. The application is shareware, after thirty days of operation it will ask you to switch to a paid version of use. Despite this, most of the application's features will be available for free. Only the multi-isolation feature will be disabled. You can download Sandboxie for Windows 7 and older versions at: https://www.sandboxie.com/AllVersions.

To work on Windows 10, download the Sandboxie sandbox version no lower than v5.

Sandboxie for Windows 10

We launch the installation “exe” file by double-clicking on it with the left mouse button. The installation will begin. To download Sandboxie in Russian, select the appropriate item in the window that appears.
Installation is simple and will not cause any difficulties even for novice users. The application will become available from the “Start” - “Programs” menu. It will also be located in the system tray.
A shortcut will be added to the “Desktop”; clicking on it will open the default browser.

Settings

Second way

Right-click on the application shortcut, then “Run”.
The application will run in an isolated environment. When you hover your cursor, a colored frame will appear.

Let's look at a practical example

Recovery

During operation, files are saved in directories. They are not visible until you allow the application to move them. This is “Restoration”. How to set it up was discussed a little higher in the article. How to recover?

Immediate recovery

I recommend using this method since the function is called automatically while the files are being created. After saving, the “Immediate Recovery” window will appear.

Is there an analogue of Sandboxie? Alternatively, check out programs like Shadow User and Shadow Defender. But if you need software to control applications, then I don’t see the point of replacing it.

Conclusion

Use Sandboxie to run programs in an isolated environment without harm to the system, and to surf the Internet safely. Unlike normal program launch, the application consumes more system resources. Therefore, the download takes longer, but the security is worth it. The system will not contain hazardous components that could harm operation. Use Sandboxie to test and run questionable applications.

It is a mistake to believe that built-in protection operating system, an antivirus or firewall will completely protect against malware. However, the harm may not be as obvious as in the case of viruses: several applications can slow down Windows operation, lead to various kinds of anomalies. Over time, the consequences of uncontrolled processes on the part of the “amateur” software make themselves felt, and uninstallation, deleting registry keys and other cleaning methods no longer help.

In such situations, sandbox programs, which are the subject of this review, can play an excellent role. The operating principle of sandboxes is partly comparable to virtual machines(Oracle VM VirtualBox, etc., VMware Virtualization). Thanks to virtualization, all processes initiated by the program are executed in a sandbox - an isolated environment with strict control of system resources.

This method of code isolation is quite actively used in antivirus software (KIS 2013, avast!), in programs such as Google Chrome(Flash runs in the sandbox). However, one should not conclude that sandbox programs are a complete guarantee of security. This is just one of the effective additional means for protecting the OS ( file system, register) from external influences.

A review of the program for creating a virtual environment has already been published on the site. Today we will consider other applications, in a broader sense: these are not only desktop solutions, but also cloud services that improve not only security, but also anonymity, making it possible to run from removable media, from another computer.

Sandboxie

Developer Ronen Tzur compares the action of the Sandboxie program to an invisible layer applied on top of paper: you can put any inscriptions on it; When the protection is removed, the sheet will remain untouched.

There are 4 main ways to use sandboxes in Sandboxie:

  • Protected Internet surfing
  • Improved privacy
  • Secure email correspondence
  • Keeping the OS in its original state

The last point implies that in the sandbox you can install and run any client applications - browsers, IM messengers, games - without affecting the system. Sandboxie controls access to files, disk devices, registry keys, processes, drivers, ports, and other potentially unprotected sources.

First of all, SandboxIE is useful because it allows the user to flexibly configure sandboxes and privileges using the Sandboxie Control shell. Here, through the context and main menu, basic operations are available:

  • Starting and stopping programs under Sandboxie control
  • Viewing files inside the sandbox
  • Restoring necessary files from the sandbox
  • Deleting all work or selected files
  • Creating, deleting and configuring sandboxes

To run a program in a sandbox, simply drag the executable file into the Sandboxie Control window, into the sandbox created by default. There are other ways - for example, menu Windows Explorer or notification area. The program window running in the emulated environment will have a yellow frame and a hash mark (#) in the title bar.

If, when working with an isolated program, you need to save the results to disk, any desired source is specified - the files will be placed in the sandbox folder, while it will not be at the specified address, outside the sandbox. To “real” transfer files from the sandbox, you should use the recovery option. There are two types of them - fast or immediate, in both cases, before starting the program in the sandbox, you need to configure the folders for recovery (“Sandbox Settings - Recovery”).

More detailed access settings are located in the “Restrictions” and “Access to Resources” sections. They may be required if the application cannot run without certain privileges (certain system library, driver, etc.). In “Restrictions,” in relation to programs or groups, access to the Internet, hardware, IPC objects, and low-level access is configured. In “Access to resources” - the corresponding settings for files, directories, the registry and other system resources.

Also in the Sandboxie settings there is an important “Applications” section, where groups of programs are collected that have access to the specified resources. Initially, all elements of the list are deactivated; to apply changes for a specific application, you need to mark it in the list and click the “Add” button.

Thus, you can create sandboxes with different parameters. You are allowed to clone the configuration of an existing sandbox; to do this, when creating a new one, you need to select from the drop-down list the environment from which you want to transfer the settings.

Summary

Using the Sandboxie application, you can create virtual environments of any configuration, without restrictions for the user. Sandboxie provides a large number of settings for both individual applications and sandboxes.

[+] Flexible configuration of each sandbox
[+] Creating rules for a group of programs
[−] Distributions cannot be created
[−] Lack of setup wizard

Evalaze

It is symbolic that Evalaze originates from the Thinstall 2007 program, on this moment VMware company.

Evalaze is not as well known as Sandboxie among sandbox programs, but it has a number of interesting features, which sets it apart from a number of similar solutions. Thanks to virtualization, applications can be launched in a standalone environment from any computer, regardless of the availability of drivers, libraries, or newer versions of the application being launched. It does not require any pre-setting, nor additional configuration files or libraries or registry keys.

Evalaze does not require installation, one caveat: you will need Microsoft . NET Framework version 2.0 or higher. IN free version, as well as in the professional edition, a virtualization setup wizard and an unlimited number of virtual applications are available. You can download the trial version from the developers’ website only upon request (see developers’ email on the website).

The resulting configuration can be saved to a project. From start to finish, the process of setting up a virtual application takes longer than, say, Sandboxie, but it is more consistent and understandable.

Two should be noted additional features Evalaze, which will probably be of interest to software developers and testers: it works with a virtual file system and a virtual registry. These autonomous Evalaze environments can be edited at your discretion by adding files, directories, keys necessary for the functioning of a particular virtual program.

You can also configure associations out of the box in Evalaze: when launched, the virtual application will immediately create the necessary associations with files in the OS.

Summary

A program with which you can create stand-alone applications that are convenient to use in all sorts of situations, which generally facilitates migration, compatibility, and security. Alas, the free version is practically useless, it is only interesting for a very superficial study of Evalaze's functions.

[−] Low-functional trial version
[−] High price Pro versions
[+] There is a setup wizard
[+] Virtual file system and registry

Enigma Virtual Box

Enigma Virtual Box is designed to run applications in an isolated virtual environment. The list of supported formats includes dll, ocx (libraries), avi, mp3 (multimedia), txt, doc (documents), etc.

Enigma Virtual Box models the virtual environment around an application as follows. Before the application starts, the Virtual Box loader is triggered, which reads the information that is necessary for the program to work: libraries and other components - and provides them to the application instead of system ones. As a result, the program works autonomously in relation to the OS.

Configuring sandboxes Sandboxie or Evalaze, as a rule, takes about 5 minutes. At first glance, Virtual Box also does not require lengthy setup. In the documentation, the use of the program is actually contained in one sentence.

There are only 4 tabs - “Files”, “Registry”, “Containers” and, in fact, “Options”. You need to select the executable file, specify the location of the final result and start processing. But later it turns out that you need to create a virtual environment yourself. For this purpose, the three adjacent sections “Files”, “Registry” and “Containers” are intended, where the necessary data is manually added. Then you can click processing, run the output file and check the functionality of the program.

Summary

Thus, Enigma Virtual Box does not analyze the OS before and after installing the application, as is the case with Evalaze. The emphasis is shifted towards development - therefore, rather, Virtual Box is useful for testing, checking compatibility, and creating artificial conditions for running a program. Virtualization of unknown applications will cause difficulties, since the user will be forced to specify all the program connections independently.

[−] Lack of convenient settings
[+] The resources used by the program can be determined independently

Cameyo

Cameyo offers application virtualization in three areas: business, development and personal use. In the latter case, the sandbox can be used to save the OS in a “clean” state, store and run applications on removable media and in cloud services. In addition, several hundred already configured virtual applications are published on the cameyo.com portal, which also saves the user’s time.

The steps for creating a virtual application are similar to Enigma Virtual Box: first, a snapshot of the system is created before installation, then after it. Changes between these states are taken into account when creating the sandbox. However, unlike Virtual Box, Cameyo syncs with a remote server and publishes the application to cloud storage. Thanks to this, applications can be run on any computer with granted access to the account.

Through the Library, you can download popular system applications (Public Virtual Apps) for subsequent launch: archivers, browsers, players and even antiviruses. When starting, you are asked to select an executable file and indicate whether it is stable or not (which, apparently, is somehow taken into account by the Cameyo gallery moderators).

Another interesting possibility is creating a virtual application via . The installer can be downloaded from your computer or you can specify the file URL.

The conversion process is said to take from 10 to 20 minutes, but often the waiting time is several times less. Upon completion, a notification is sent by email with a link to the published package.

Email notification about distribution creation

With all the cloud conveniences, two things need to be noted: important points. First: each program is updated over time, and the library contains quite outdated copies. The second aspect: applications added by users may run counter to the license of a particular program. This must be understood and taken into account when creating custom distributions. And third, no one can guarantee that the virtual application posted in the gallery has not been modified by an attacker.

However, speaking of security, Cameyo has 4 modes of application operation:

  • Data mode: the program can save files in the Documents folder and on the Desktop
  • Isolated: The file system and registry are not writable
  • Full access: free access to the file system and registry
  • Customize this app: modification of the launch menu, selection of program storage location, etc.

Summary

A convenient cloud service that you can connect to on any computer, allowing you to quickly create portable applications. Setting up sandboxes is kept to a minimum, not everything is transparent with virus checking and security in general - however, in this situation, the advantages can compensate for the disadvantages.

[+] Network synchronization
[+] Access to custom applications
[+] Creating virtual applications online
[−] Lack of sandbox settings

Spoon.net

Spoon Tools is a set of tools for creating virtual applications. In addition to the professional environment, spoon.net deserves attention as a cloud service that integrates with the Desktop, allowing you to quickly create sandboxes.

To integrate with the Desktop, you need to register on the spoon.net server and install a special widget. After registration, the user has the opportunity to download virtual applications from the server through a convenient shell.

Four features brought by the widget:

  • Create sandboxes for files and applications
  • Cleaning up your desktop using shortcuts and quick launch menus
  • Safely test new applications, run legacy versions over new ones
  • Undoing changes made by the sandbox

Quick access to the spoon.net widget is possible through the combination Alt keys+Win. The shell includes a search bar and also a console. It searches for applications on the computer and on the web service.

Organization of the desktop is very convenient: you can drag and drop the necessary files onto the virtual desktop, which will be synchronized with spool.net. New sandboxes can be created in just two clicks.

Of course, in terms of setting up sandboxes, Spoon cannot compete with Sandboxie or Evalaze for the reason that they are simply not present in Spoon. You cannot set restrictions or convert a “regular” application into a virtual one. The Spoon Studio complex is designed for these purposes.

Summary

Spoon is the “cloudest” shell for working with virtual applications and, at the same time, the least customizable. This product will appeal to users who care not so much about security through virtualization, but rather about ease of use. necessary programs everywhere.

[+] Integration of the widget with the Desktop
[+] Quick creation of sandboxes
[−] Lack of settings to limit virtual programs

Pivot table

Program/serviceSandboxieEvalazeEnigma Virtual BoxCameyoSpoon.net
DeveloperSandboxie Holdings LLCDogel GmbHThe Enigma Protector Developers TeamCameyoSpoon.net
LicenseShareware (€13+)Freeware/Shareware (€69.95)FreewareFreewareFree (Basic account)
Adding applications to the sandbox+
Personalization (creating shortcuts, integration into menus)+ + + +
Setup Wizard+ + +
Creating new virtual applications+ + +
Online synchronization+ +
Setting Sandbox Privileges+ + + +
Analysis of changes when creating a sandbox+ + +

Some users sometimes have to deal with software of dubious origin, for example, for testing purposes. The best option in such cases would be to have a separate computer or virtual machine for this purpose, however, this is not always possible. But there is a solution - you just need to use a sandbox program, which includes Sandboxie.

The application allows you to run in a sandbox executable files(including program installers), work with a web browser and files, configure their behavior in certain cases.

Launching a web browser

The main reason why users are interested in such Sandboxy software is safe work in the Internet. The program under consideration allows us to achieve this goal.

Launching programs

The next scenario for using the sandbox environment is launching software.

Working with files

In the “sandbox” of the environment in question, you can also open a variety of files, for example, archives of dubious origin. The algorithm of actions is exactly the same as with programs (technically, the software first opens to view the target document), so the previous instructions are also suitable for opening files in the sandbox.

Environment management

The developers have also provided users with tools to manage the environment in which programs are launched and files are opened. They have an obvious name "Sandboxie Management".


Setting Sandboxie Options

The sandbox can be customized for more comfortable use.


Solutions to some problems

Unfortunately, sometimes problems arise when using the sandbox. Let's look at the most common ones and suggest options for eliminating them.

Error "SBIE2204 Cannot start sandboxed service RpcSs"
A similar problem is typical for versions of Sandboxie 5.0 and older that are installed on Windows 10. The reason is the incompatibility of the environment with the capabilities of this operating system, so the only solution is to install the latest program updates.

Error "SBIE2310 Name buffer has reached overflow"
This problem also concerns incompatibility, but this time with some specific program. Most often, the culprits are antiviruses with sandbox capabilities or similar software. The method for eliminating the error is also obvious - disable or uninstall the application that conflicts with Sandboxie.

Error "SBIE2211 Sandboxed service failed to start: *application or file name*"
This type of failure most often occurs in Windows users 7. The problem lies in the User Account Control system, which interferes with the operation or installation of a file that requires administrator rights to run. The solution is simple - in the sandbox selection window, when opening such software or document, check the option "Run as UAC Administrator".

Conclusion

This concludes our guide to using Sandboxie. Finally, we remind you that a sandbox environment is not a panacea for computer security, so if you have to deal with suspicious software, it is better to use a virtual machine.

If you are familiar with the functionality and features installed on your computer, then you probably know why you need such a wonderful tool as Sandbox. As a rule, this module is included in the most well-known antivirus programs, for example Avast.

Sandbox, or as they also say sandbox, is a software module that allows you to run any application in a strictly isolated environment.

The main task of Sandbox is to ensure maximum computer security when running potentially dangerous applications or visiting infected websites.

It must be said that this method is not without its drawbacks - for example, when the Avast sandbox module is running, some applications running in safe mode may not work correctly, and in some cases even cause the antivirus program to freeze.

In addition, this is not very convenient, especially when you need to quickly switch from one mode to another. For those who are not satisfied with this situation, we can recommend a simpler and faster solution - the utility Sandboxie- sandbox program.

This small, convenient program with a Russian-language interface allows you to create virtual areas in which you can run almost any application.

In this case, the results of all programs launched in Sandboxie will be saved in separate, specially designed folders, without affecting the operation of the operating system as a whole, thus protecting it from possible damage by viruses or configuration changes.

Sandboxie can also be used as a means of anonymously surfing the Internet in the sense that after closing the browser, there will be no traces of visiting sites left on the user’s computer.


Working in Sandboxie is quite simple. During installation, the utility may prompt you to configure compatibility with certain programs.

All other settings, except for the ability to integrate Sandboxie into the Explorer context menu, can be left unchanged.

By the way, in addition to global settings, it is also possible to change the parameters of the sandbox itself. Just like the general ones, it is recommended to leave these settings as default.

The sandbox program Sandboxie supports the creation of several separate sandboxes, and in each of them you can run multiple applications.

Programs running in the same sandbox can easily exchange data, but applications from different virtual areas will be isolated from each other, as well as from the operating system as a whole. By default, the utility uses one sandbox called " DefaultBox".

For example, let's open some application in Sandboxie, let's say an ordinary Notepad. Maybe, text editor and not best example for demonstration purposes, but it doesn't really matter at the moment.

Go to the menu " Sandbox» → « DefaultBox» → « Run in sandbox» → « ...any program" After this, a small rectangular window will open in which you can enter the name of the program, in our case it is notepad.exe, or browse by specifying the path to the application to open from the desktop. You can also launch it through the Start menu.

Interestingly, Sandboxie allows you to run even applications with different profiles that would normally not allow you to create copies in memory.

Please note that programs running in the sandbox have slightly modified working window headers, and also when you hover the mouse pointer over top part window, the entire border area will be highlighted in yellow. There is nothing scary about this, don’t be alarmed, this is how it should be.

So, let's copy and paste some piece of text into Notepad and try to save the file. Initially, Sandboxie will prompt you to save the document to the program's directory, but let's ignore this suggestion and save it to HDD D.

However, if you then want to view this file and go to drive D, it will not be there. More precisely, it will be hidden, and to restore it you should open it in the menu “ View" chapter " Files and folders", find in the drop-down list required file and select the required action in the context menu.

That's basically the whole job of this wonderful utility. Everything is very simple. A list of all applications running in Sandboxie can be viewed in the utility's working window.

Additional features of Sandboxie include setting up user accounts, automatically shutting down programs, determining the mode of anyone working in Windows applications, as well as some other options.

The Sandboxie utility is lightweight, consumes a minimum of system resources and does not interfere with the operation of other applications at all, collapsing into the system tray if necessary.

It is best to launch Sandboxie through the Start menu, since the desktop icon created during installation will not open the program itself, but the browser Internet Explorer.
In addition, a short video on how to download and install sandboxie:

You can endlessly look at the fire, water and activity of programs isolated in the sandbox. Thanks to virtualization, with one click you can send the results of this activity - often unsafe - into oblivion.

However, virtualization is also used for research purposes: for example, you wanted to control the impact of a freshly compiled program on the system or run two different versions applications simultaneously. Or create a standalone application that will leave no traces on the system. There are many options for using a sandbox. It is not the program that dictates its terms in the system, but you who show it the way and distribute resources.

If you are not satisfied with the slowness of the process, using the ThinApp Converter tool you can put virtualization on stream. Installers will be created based on the config you specify.

In general, the developers advise making all of these preparations under sterile conditions, on fresh OS, so that all the installation nuances are taken into account. For these purposes, you can use a virtual machine, but, of course, this will leave its mark on the speed of work. VMware ThinApp already loads system resources quite heavily, and not only in scanning mode. However, as they say, slowly but surely.

BufferZone

  • Website: www.trustware.com
  • Developer: Trustware
  • License: freeware

BufferZone controls Internet and software activity of applications using a virtual zone, closely approaching firewalls. In other words, it uses rule-governed virtualization. BufferZone easily works in conjunction with browsers, instant messengers, email and P2P clients.

At the time of writing, the developers warned about possible problems when working with Windows 8. The program can kill the system, after which it will have to be removed via safe mode. This is due to the BufferZone drivers, which come into serious conflict with the OS.

What falls under BufferZone's radar can be tracked in the main Summary section. You determine the number of limited applications yourself: the Programs to run inside BufferZone list is intended for this. It already includes potentially unsafe applications such as browsers and mail clients. A red border appears around the captured app window, giving you confidence to surf safely. If you want to run outside the zone - no problem, the control can be bypassed through the context menu.

In addition to the virtual zone, there is such a thing as a private zone. You can add sites where strict confidentiality is required. It should be noted right away that the function only works in retro versions of Internet Explorer. More modern browsers have built-in anonymity features.

The Policy section configures policies in relation to installers and updates, as well as programs launched from devices and network sources. Also see in Configurations additional options security policy (Advanced Policy). There are six levels of control, depending on which BufferZone’s attitude towards programs changes: without protection (1), automatic (2) and semi-automatic (3), notifications about the launch of all (4) and unsigned programs (5), maximum protection (6) .

As you can see, the value of BufferZone lies in total Internet control. If you need more flexible rules, then any firewall will help you. BufferZone also has it, but more for show: it allows you to block applications, network addresses and ports. From a practical point of view, it is not very convenient for actively accessing settings.

Evalaze

  • Website: www.evalaze.de/en/evalaze-oxide/
  • Developer: Dögel GmbH
  • License: freeware / commercial (2142 euros)

The main feature of Evalaze is the flexibility of virtualized applications: they can be launched from removable media or from a network environment. The program allows you to create completely autonomous distributions that operate in an emulated file system and registry environment.

The main feature of Evalaze is its convenient wizard, which is understandable without reading the manual. First, you make an OS image before installing the program, then you install it, do a test run, and configure it. Next, following the Evalaze wizard, you analyze the changes. Very similar to the principle of operation of uninstallers (for example, Soft Organizer).

Virtualized applications can operate in two modes: in the first case, write operations are redirected to the sandbox; in the second, the program can write and read files on the real system. Whether the program will delete traces of its activities or not is up to you; the Delete Old Sandbox Automatic option is at your service.

Many interesting features are available only in the commercial version of Evalaze. Among them are editing environmental elements (such as files and registry keys), importing projects, and setting reading mode. However, the license costs more than two thousand euros, which, I agree, slightly exceeds the psychological price barrier. The use of an online virtualization service is offered at a similarly prohibitive price. As a consolation, the developer's website has prepared virtual sample applications.

Cameyo

  • Website: www.cameyo.com
  • Developer: Cameyo
  • License: freeware

A quick look at Cameyo suggests that the functions are similar to Evalaze, and in three clicks you can create a distribution with a virtualized application. The packager takes a snapshot of the system, compares it with the changes after installing the software and creates an ecosystem for launch.

The most important difference from Evalaze is that the program is completely free and does not block any options. The settings are conveniently concentrated: switching the virtualization method with saving to disk or memory, selecting an isolation mode: saving documents to specified directories, prohibiting writing or full access. In addition to this, you can configure the virtual environment using the file and registry key editor. Each folder also has one of three isolation levels, which can be easily overridden.

You can specify the sandbox cleaning mode after exiting the standalone application: removing traces, without cleaning, and writing registry changes to a file. Integration with Explorer and the ability to link to specific file types in the system are also available, which is not available even in Cameyo’s paid counterparts.

However, the most interesting thing is not the local part of Cameyo, but the online packager and public virtual applications. It is enough to specify the URL or upload the MSI or EXE installer to the server, indicating the system bit depth, and you will receive a stand-alone package. From now on it is available under the roof of your cloud.

Summary

Sandboxie will optimal choice for sandbox experiments. The program is the most informative among the listed tools; it has a monitoring function. Wide range of settings and good capabilities for managing a group of applications.

Doesn't have any unique features, but very simple and trouble-free. An interesting fact: the article was written inside this “sandbox”, and due to an unfortunate mistake, all the changes went into the “shadow” (read: astral plane). If it weren't for Dropbox, a completely different text would have been published on this page - most likely by a different author.

Evalaze offers not an integrated approach to virtualization, but an individual one: you control the launch of a specific application by creating artificial living conditions for this. There are advantages and disadvantages here. However, given the stripped-down nature of the free version of Evalaze, its advantages will fade in your eyes.

Cameyo has a certain “cloud” flavor: the application can be downloaded from the website, uploaded to a flash drive or Dropbox - this is convenient in many cases. True, it brings to mind associations with fast food: you can’t vouch for the quality and compliance of the content with the description.

But if you prefer to cook according to a recipe, VMware ThinApp- your option. This is a solution for experts who care about every detail. A set of unique features is complemented by the capabilities of the console. You can convert applications from command line, using configs, scripts - in individual and batch mode.

BufferZone is a sandbox with a firewall function. This hybrid is far from perfect and the settings are up-to-date, but BufferZone can be used to control Internet activity and applications, protect against viruses and other threats.