LOGO

Isolate & Test Unsafe Applications: A PC Guide

May 2, 2011
Isolate & Test Unsafe Applications: A PC Guide

Protecting Your System with Application Isolation

For those who frequently explore new software, computers can quickly accumulate digital clutter and potential risks. Utilizing portable applications is a proactive step towards system safety. These applications are designed not to alter the Windows Registry or store settings locally, minimizing potential harm.

However, the availability of portable versions isn't universal. When a desired application lacks a portable option, testing it within an isolated environment becomes the next best course of action.

Why Isolation is Crucial

Even with robust antivirus software, a cautious approach to software testing is invaluable. It's easy to underestimate the risks associated with unfamiliar programs.

Proactive isolation offers long-term benefits. The consequences of a viral infection – from data loss to hardware failure – can be significantly more costly than the effort required for isolation.

How to Isolate Applications

Let's explore methods for safeguarding your computer by isolating applications that may pose a security risk.

Consider the potential damage before running any new or unverified software. Taking preventative measures can save considerable time and expense in the future.

By employing isolation techniques, you can confidently experiment with new applications without compromising the integrity of your primary system.

Utilizing Isolated Sandboxes for Program Execution

Previously, we conducted a detailed examination of Sandboxie, a program designed exclusively for Windows operating systems. It functions by establishing virtual layers where applications can operate as normal, performing read and write operations without causing permanent alterations to your hard drive.

Essentially, Sandboxie executes your applications within isolated environments, known as sandboxes. This allows for the secure testing of new or unfamiliar programs that may potentially pose risks.

isolate-test-unsafe-applications-pc-1.jpg

Following the installation of Sandboxie and its associated system-level drivers, a yellow icon will appear in the system tray. An online tutorial will also be offered, accessible through a web browser, which itself can be run within a sandboxed environment or not.

Beyond enabling sandboxed web browsing, Sandboxie supports running sandboxed email clients, programs launched from the Start menu, executable files, or even applications accessed through Windows Explorer.

isolate-test-unsafe-applications-pc-2.jpg

Sandboxie proves particularly valuable when the safety of a program is uncertain, yet curiosity drives you to test it. By isolating the program from the rest of your system, you can safely install and evaluate it.

Should the program prove undesirable or problematic, it can be easily removed by either closing the running processes within the sandbox or deleting the sandbox itself.

isolate-test-unsafe-applications-pc-3.jpg

Even with numerous programs running within a single sandbox, the entire session can be cleared with a single click.

Further applications of Sandboxie include loading programs needed only infrequently, such as ImgBurn or uTorrent. It also facilitates running multiple instances of a program, like a second instance of Firefox for accessing a secondary Google Account.

This method provides a secure way to utilize programs, ensuring full functionality without limitations or compatibility issues. In practice, distinguishing a sandboxed application from a regular one is difficult, with the title bar being the primary indicator.

isolate-test-unsafe-applications-pc-4.jpg

Sandboxie is available for personal use without charge, although the free version restricts operation to a single concurrent sandbox. While Sandboxie is well-known, alternative applications offer similar sandboxed environments.

These include Evalaze, GeSWaLL, BufferZone Pro, iCore Virtual Accounts, and the previously available Altiris Software Virtualization Solution (SVS), for which obtaining a personal license is currently not possible.

Reverting System Modifications Following Program Installation

Returnil System Safe Free is a Windows utility designed to restore your computer to its prior system configuration after a restart. The software can be downloaded from its official source.

Returnil functions by creating a system image, effectively establishing a virtualized environment. This virtual environment is then loaded instead of your primary operating system upon subsequent reboots after Returnil’s installation.

How Returnil Provides System Protection

This process enables the execution or installation of potentially risky programs without compromising the integrity of your core system. Any changes made within the virtual environment are discarded, and the system reverts to its original state with each restart.

While installed programs within the virtual environment are removed upon reboot, important documents and files can be preserved by saving them to an external storage device, such as a flash drive.

Benefits and Limitations

Returnil represents a straightforward method for testing potentially unsafe applications, requiring only a system restart to initiate the rollback process.

However, a limitation exists regarding programs that necessitate a reboot during their installation. These installations will be undone immediately, as the system will revert to its initial, unmodified condition before the installation can complete.

Utilize Windows Applications Directly Within Your Browser – No Installation Required

For users seeking to avoid the installation of additional software for application isolation, Spoon presents a compelling solution. This platform employs innovative virtualization technology to stream desktop applications directly to your Windows computer.

Previously, we’ve provided a comprehensive overview of Spoon’s capabilities. It allows execution of compatible Windows desktop applications solely through your web browser and a small, downloadable plugin.

Supported Applications

The range of supported applications is extensive. It encompasses widely-used web browsers such as Google Chrome and Firefox, alongside productivity suites and even games.

The application selection primarily focuses on commonly utilized Windows programs, ensuring a user experience virtually indistinguishable from native execution.

Alternative Virtualization Methods

We’ve also explored other approaches to application virtualization, including Cameyo, VMLite VirtualApps Studio, and Enigma Virtual Box. These are all free programs designed to facilitate the creation of portable applications from existing installations.

Furthermore, consider our previously documented methods for generating a portable version of Skype, and the possibility of constructing a custom portable operating system using Slax.

Consider Your Workflow

Do you frequently download and test numerous applications on your main computer? If so, have you experimented with any of these virtualization tools?

Image Credit: Returnil, Everaldo Coelho

#unsafe applications#isolate applications#test applications#PC security#malware#vulnerabilities