Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make docs more clear #149

Draft
wants to merge 77 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
77 commits
Select commit Hold shift + click to select a range
eb8b0fd
Create sidebar.md
kokofixcomputers Jan 5, 2024
c74629e
Update BoxSnapshots.md
kokofixcomputers Jan 6, 2024
604cbe1
Update supporter-certificate.md
kokofixcomputers Jan 6, 2024
5a801f1
Update imdisk.md
kokofixcomputers Jan 6, 2024
dd8cfa5
Update BoxEncryption.md
kokofixcomputers Jan 6, 2024
4b8cb44
Update privacy-mode.md
kokofixcomputers Jan 6, 2024
6a02ff1
Update privacy-mode.md
kokofixcomputers Jan 6, 2024
87d010c
Update Box_PrivacyMode.png
kokofixcomputers Jan 6, 2024
8f793fc
Update Box_CompartmentMode.png
kokofixcomputers Jan 6, 2024
c7b8a44
Update sandboxedtitle.png
kokofixcomputers Jan 6, 2024
9277164
Add files via upload
kokofixcomputers Jan 6, 2024
b3c7d1b
Update AlertPrograms.png
kokofixcomputers Jan 6, 2024
cdd615c
Update AlertProcess.md
kokofixcomputers Jan 6, 2024
239dc00
Add files via upload
kokofixcomputers Jan 6, 2024
7152bdb
Update AppearanceSettings.md
kokofixcomputers Jan 6, 2024
69e9b13
Add files via upload
kokofixcomputers Jan 6, 2024
2e4f867
Add files via upload
kokofixcomputers Jan 6, 2024
bba96ea
Add files via upload
kokofixcomputers Jan 6, 2024
2a87586
Add files via upload
kokofixcomputers Jan 6, 2024
59f6bff
Add files via upload
kokofixcomputers Jan 6, 2024
3c307c1
Add files via upload
kokofixcomputers Jan 6, 2024
de66b56
Update AutoDelete.md
kokofixcomputers Jan 6, 2024
60f1265
Delete sandboxie_main_web directory
kokofixcomputers Jan 6, 2024
78f3c60
Update AdvancedTopics.md
kokofixcomputers Jan 6, 2024
4f024cd
Update OpenClsid.md
kokofixcomputers Jan 6, 2024
9ff4451
Update BoxRootFolder.md
kokofixcomputers Jan 6, 2024
9b8e56a
Update FileRootPath.md
kokofixcomputers Jan 6, 2024
09ab736
Update FileRootPath.md
kokofixcomputers Jan 6, 2024
a4c5299
Update ClosedClsid.md
kokofixcomputers Jan 6, 2024
870a254
Update AllPages.md
kokofixcomputers Jan 6, 2024
fa0d110
Update InjectDll.md
kokofixcomputers Jan 6, 2024
a802bcf
Update AlertProcess.md
kokofixcomputers Jan 6, 2024
d403f1e
Update Description.md
kokofixcomputers Jan 6, 2024
88e5294
Update FirefoxTips.md
kokofixcomputers Jan 6, 2024
2ad0dbb
Update NormalKeyPath.md
kokofixcomputers Jan 6, 2024
f9e7d57
Update NotifyInternetAccessDenied.md
kokofixcomputers Jan 6, 2024
463e06b
Update DetectingKeyLoggers.md
kokofixcomputers Jan 6, 2024
18f2d46
Update PortableSandbox.md
kokofixcomputers Jan 6, 2024
a3fed9a
Update PrivacyConcerns.md
kokofixcomputers Jan 6, 2024
a817fe1
Update ViewMenu.md
kokofixcomputers Jan 6, 2024
962f2c2
Update privacy-mode.md
kokofixcomputers Jan 6, 2024
e0cd54e
Update PlusContent/supporter-certificate.md
kokofixcomputers Jan 6, 2024
380ec47
Update Content/AutoDelete.md
kokofixcomputers Jan 6, 2024
5ae6004
Update PlusContent/BoxSnapshots.md
kokofixcomputers Jan 6, 2024
ecd4bd3
Update Content/AdvancedTopics.md
kokofixcomputers Jan 6, 2024
25aa075
Update PlusContent/imdisk.md
kokofixcomputers Jan 6, 2024
5270396
Update Content/OpenClsid.md
kokofixcomputers Jan 6, 2024
d4b1a0a
Update Content/BoxRootFolder.md
kokofixcomputers Jan 6, 2024
50c77e1
Update AutoRecover.md
kokofixcomputers Jan 6, 2024
a12827a
Update AutoExec.md
kokofixcomputers Jan 6, 2024
c7f844c
Update LingerProcess.md
kokofixcomputers Jan 6, 2024
61af0b5
Add files via upload
kokofixcomputers Jan 6, 2024
b084e86
Merge branch 'sandboxie-plus:main' into main
kokofixcomputers Jan 6, 2024
c232ce8
Add files via upload
kokofixcomputers Jan 6, 2024
62424a1
Update MessagesFromSandboxie.md
kokofixcomputers Jan 6, 2024
5ef11c1
Update MessagesFromSandboxie.md
kokofixcomputers Jan 6, 2024
cfe3fc4
Update DNSFilter.md
kokofixcomputers Jan 6, 2024
7d2797d
Update supporter-certificate.md
kokofixcomputers Jan 6, 2024
993a367
Update RuleSpecificity.md
kokofixcomputers Jan 6, 2024
e816c8d
Update ProxySupport.md
kokofixcomputers Jan 6, 2024
2086e6d
Update USBSandboxing.md
kokofixcomputers Jan 6, 2024
45c5856
Add files via upload
kokofixcomputers Jan 6, 2024
b60db10
Add files via upload
kokofixcomputers Jan 6, 2024
823b1f4
Add files via upload
kokofixcomputers Jan 6, 2024
f515eec
Update PlusContent/privacy-mode.md
kokofixcomputers Jan 6, 2024
1609446
Update Plus-Features.md
kokofixcomputers Jan 6, 2024
881a285
Update applying-supporter-certificate.md
kokofixcomputers Jan 6, 2024
0159a5f
Update StartCommandLine.md
kokofixcomputers Jan 6, 2024
bfffb28
Update WindowsXPMode.md
kokofixcomputers Jan 6, 2024
b15cd10
Update ForceProcess.md
kokofixcomputers Jan 6, 2024
0e7aba6
Update ForceDisableSeconds.md
kokofixcomputers Jan 7, 2024
40c3e47
Update HowitWorks.md
kokofixcomputers Jan 7, 2024
e1a0e43
Add files via upload
kokofixcomputers Jan 7, 2024
7ea1f4a
Update internetaccesssettings.png
kokofixcomputers Jan 7, 2024
44c4990
Add files via upload
kokofixcomputers Jan 7, 2024
a553808
Update Content/AlertProcess.md
kokofixcomputers Jan 22, 2024
f271952
Update Content/AlertProcess.md
kokofixcomputers Jan 22, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions Content/AdvancedTopics.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
# Advanced Topics

Some advanced topics:
kokofixcomputers marked this conversation as resolved.
Show resolved Hide resolved

[Sandbox Hierarchy](SandboxHierarchy.md) discusses how Sandboxie isolates programs.

[Privacy Concerns](PrivacyConcerns.md) for programs running under Sandboxie.
Expand Down
21 changes: 11 additions & 10 deletions Content/AlertProcess.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,19 @@
# Alert Process

_AlertProcess_ is a global setting in [Sandboxie Ini](SandboxieIni.md). It specifies names of programs that, if started outside the sandbox, will cause Sandboxie to issue message [SBIE1301](SBIE1301.md).
The _AlertProcess_ setting in [Sandboxie Ini](SandboxieIni.md) is a global configuration that specifies the names of programs triggering message [SBIE1301](SBIE1301.md) when started outside the sandbox.

Usage:
```
.
.
.
[GlobalSettings]
AlertProcess=iexplore.exe
AlertProcess=firefox.exe

To utilize this setting, add program names to the [GlobalSettings] section, as demonstrated:

```ini
[GlobalSettings]
AlertProcess=iexplore.exe
AlertProcess=firefox.exe
```

This example would trigger an alert if Internet Explorer or Firefox is initiated outside the sandbox.

### Additional References:

See also:
* [Program Settings](ProgramSettings.md).
* [Configure Menu > Alert Programs](ConfigureMenu.md#program-alerts).
2 changes: 1 addition & 1 deletion Content/AllPages.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# All Pages
# Table of Contents

### A

Expand Down
2 changes: 1 addition & 1 deletion Content/AppearanceSettings.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Appearance Settings

Sandboxie Control > Sandbox Settings > Appearance:
Sandbox > Sandbox Options > General Options > Box Options
Copy link
Collaborator

@isaak654 isaak654 Jan 6, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think this is a good idea, there would be consistency issues with other Sandboxie Control references and Classic users may be disoriented.

It would be better to create a distinction from old to new, for example:

Related Sandboxie Control setting: Sandboxie Control > Sandbox Settings > Appearance

Related Sandboxie Plus setting: Sandbox > Sandbox Options > General Options > Box Options

I would also suggest to restore the Sandboxie Control images you have removed in this PR*** in order to do this:

Sandboxie Classic:

image1

Sandboxie Plus:

image2

but only where you already have the ![](../Media/anyimage.png) tags.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

***More specifically, I think it makes sense to remove the Sandboxie Control images below only after discontinuing Sandboxie Classic, not before. But this decision can only be made by the Sandboxie maintainer.

Media/AlertPrograms.png
Media/AppearanceSettings.png
Media/ForcedProgramsSettings.png
Media/InternetAccessSettings.png
Media/MessagesFromSandboxie.png
Media/ViewMenu.png


![](../Media/AppearanceSettings.png)

Expand Down
19 changes: 8 additions & 11 deletions Content/AutoExec.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,25 +4,22 @@ _AutoExec_ is a sandbox setting in [Sandboxie Ini](SandboxieIni.md). It specifie

Examples:

```
.
.
.
[DefaultBox]
AutoExec=regedit /s c:\defaultbox.reg
AutoExec=cmd /c del /f "%windir%\system32\someExploitableDLL.dll"
```ini
[DefaultBox]
AutoExec=regedit /s c:\defaultbox.reg
AutoExec=cmd /c del /f "%windir%\system32\someExploitableDLL.dll"
```

The first example shows using _AutoExec_ to populate the sandboxed registry in some way. The second example shows using _AutoExec_ to delete an undesirable DLL file. In both cases the customization takes place only within the sandbox.
The first example shows using _AutoExec_ to populate the sandboxed registry in some way. The second example shows using _AutoExec_ to delete an undesirable DLL file. In both cases, the customization takes place only within the sandbox.

Multiple _AutoExec_ settings may be specified for a single sandbox. The commands listed are executed one by one. The commands (whether one or any number of them) are executed _once_ in the life-time of a particular sandbox. To get Sandboxie to execute these commands again, the sandbox must be deleted.
Multiple _AutoExec_ settings may be specified for a single sandbox. The commands listed are executed one by one. The commands (whether one or any number of them) are executed _once_ in the lifetime of a particular sandbox. To get Sandboxie to execute these commands again, the sandbox must be deleted.

This is true even if the command execution fails -- it will not be executed again, unless the sandbox is deleted.
This is true even if the command execution fails -- it will not be executed again unless the sandbox is deleted.

At this time, there is no corresponding [Sandboxie Control](SandboxieControl.md) configuration for this setting.

**Technical Details**

Each _AutoExec_ command, as it is executed by Sandboxie, is recorded in the registry of that sandbox, in the key _HKEY_CURRENT_USER\Software\SandboxieAutoExec_.

The command will not be executed if it was already recorded in the sandboxed registry. Thus, deleting the sandbox clears all recorded _AutoExec_ commands, so they are executed again the next time any sandboxed program starts in that sandbox. But it is also possible to get them to execute again, by manually deleting the command from that sandboxed registry key.
The command will not be executed if it was already recorded in the sandboxed registry. Thus, deleting the sandbox clears all recorded _AutoExec_ commands, so they are executed again the next time any sandboxed program starts in that sandbox. But it is also possible to get them to execute again by manually deleting the command from that sandboxed registry key.
11 changes: 4 additions & 7 deletions Content/AutoRecover.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,12 @@
# Auto Recover

_AutoRecover_ is a sandbox setting in [Sandboxie Ini](SandboxieIni.md). It is typically specified as _AutoRecover=y_, and enables the Immediate Recovery extension of [Quick Recovery](QuickRecovery.md).
_AutoRecover_ is a sandbox setting in [Sandboxie Ini](SandboxieIni.md). Typically specified as _AutoRecover=y_, it enables the Immediate Recovery extension of [Quick Recovery](QuickRecovery.md).

Usage:

```
.
.
.
[DefaultBox]
AutoRecover=y
```ini
[DefaultBox]
AutoRecover=y
```

Related [Sandboxie Control](SandboxieControl.md) setting: [Sandbox Settings > Recovery > Immediate Recovery](RecoverySettings.md#immediate-recovery)
2 changes: 1 addition & 1 deletion Content/BoxRootFolder.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Box Root Folder

**This setting is deprecated. Please use [FileRootPath](FileRootPath.md) instead.**
**This setting is deprecated and may be removed in the future. To prevent Sandboxie from breaking in the future, please use [FileRootPath](FileRootPath.md) instead.**

_BoxRootFolder_ is a global setting in [Sandboxie Ini](SandboxieIni.md). It specifies the folder containing all sandboxes. One sub-folder is created within the container folder for each sandbox in active use.

Expand Down
18 changes: 8 additions & 10 deletions Content/ClosedClsid.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,16 @@
# Closed Clsid

_ClosedClsid_ is a sandbox setting in [Sandboxie Ini](SandboxieIni.md) available since v0.5.3a / 5.45.2. It specifies the COM class identifiers for unsandboxed COM objects that should not be accessible by a sandboxed program.
The _ClosedClsid_ setting in [Sandboxie Ini](SandboxieIni.md) (available since v0.5.3a / 5.45.2) is employed to specify COM class identifiers for unsandboxed COM objects that should be restricted from access by sandboxed programs.

Usage:
```
.
.
.
[DefaultBox]
ClosedClsid={8BC3F05E-D86B-11D0-A075-00C04FB68820}
To utilize this setting, you can include it in the [DefaultBox] section, as shown below:

```ini
[DefaultBox]
ClosedClsid={8BC3F05E-D86B-11D0-A075-00C04FB68820}
```

This example makes the _Windows Management and Instrumentation_ not accessible to sandboxed programs.
In this example, the _Windows Management and Instrumentation_ is designated as not accessible to sandboxed programs.

Related Sandboxie Plus setting:
Additionally, it is related to the Sandboxie Plus setting found under:

Sandbox Options > Resource Access > COM
27 changes: 12 additions & 15 deletions Content/Description.md
Original file line number Diff line number Diff line change
@@ -1,20 +1,17 @@
# Description

_Description_ is a sandbox settings in [Sandboxie Ini](SandboxieIni.md). It specifies free text, which can explain, for example, the purpose of the sandbox.
The _Description_ setting in [Sandboxie Ini](SandboxieIni.md) allows you to provide explanatory text about the purpose of a specific sandbox. This information is displayed in a balloon pop-up within the _Run Sandboxed_ sandbox selection dialog box.

```
.
.
.
[DefaultBox]
Description=Example<BR>text.
.
.
.
[PrivateBox]
Description=Access denied to sensitive file locations
ClosedFilePath=%Personal%
ClosedFilePath=D:\MyDocs
To set the description, include it in the sandbox section, such as [DefaultBox] or [PrivateBox], and add the desired free text. You can use the `<BR>` sequence for line breaks, as illustrated below:

```ini
[DefaultBox]
Description=Example<BR>text.

[PrivateBox]
Description=Access denied to sensitive file locations
ClosedFilePath=%Personal%
ClosedFilePath=D:\MyDocs
```

The `<BR>` sequence in the text is used to indicate a line break. The free text is displayed in a balloon pop-up in the _Run Sandboxed_ sandbox selection dialog box.
In this example, the text "Example text" will be displayed for the [DefaultBox] sandbox, and for the [PrivateBox] sandbox, it informs about access denial to specific file locations with the associated closed file paths.
90 changes: 24 additions & 66 deletions Content/DetectingKeyLoggers.md
Original file line number Diff line number Diff line change
@@ -1,94 +1,52 @@
# Detecting Key Loggers

Go to [Help Topics](HelpTopics.md), [Usage Tips](UsageTips.md).
For more detailed information, please refer to [Help Topics](HelpTopics.md) and [Usage Tips](UsageTips.md).

* * *
---

### Overview
## Overview

It is very difficult to reliably detect all classes of key-loggers. This section first explains why this is so, and concludes by offering a possible defense against them.

First, a distinction must be made between several classes of key-loggers:

* external key-loggers
* rootkit key-loggers
* windows hook key-loggers
* windows message key-loggers
* scripted key-loggers
Detecting all classes of key-loggers poses a significant challenge. This section categorizes key-loggers into various classes and explores potential defenses against them.

### External Key-Loggers

External (or hardware) key-loggers are devices that connect to your computer in some way. Two examples are a small device plugged between the keyboard and the computer, or a device that snoops on radio signals transmitted by a wireless keyboard.

The common principle of key-loggers in this class is that they are _external_ to the Windows system on which they are spying. Software running within Windows cannot detect, remove or protect against external key-loggers.

The other classes of key-loggers described here are software key-loggers which do operate within Windows.
External (hardware) key-loggers, such as devices connected to the computer, are beyond the reach of software running within Windows. Sandboxie cannot detect or protect against these devices.

### Rootkit Key-Loggers

Rootkit key-loggers record keystrokes at the lowest software level, typically by positioning themselves as a second keyboard hardware driver (a _filter_ driver, in Windows terminology).

Once installed, this class of key-loggers may provide the best logging facilities, and may be difficult to get rid of. But to be installed in the first place, this key-logger needs the explicit help of the operating system, and so is easily blocked by Sandboxie.

~~If such a key-logger attempts to install, Sandboxie should report an informational message [SBIE2103](SBIE2103.md), unless the [BlockDrivers](BlockDrivers.md) setting (see also [Sandbox Settings > Restrictions > Low-Level Access](RestrictionsSettings.md#low-level-access--removed)) was explicitly used to disable this protection.~~
Rootkit key-loggers operate at a low software level, often as secondary keyboard hardware drivers. Sandboxie effectively blocks their installation, as they require explicit help from the operating system.

### Windows Hook Key-Loggers

These key-loggers don't masquerade as hardware drivers, but they still have to ask the operating system to load them (or _hook them_) into every program executing on the desktop.

It is not uncommon for applications to install such hooks as part of normal operation, and blocking all of them would prevent some programs from running successfully inside the sandbox.

~~**Removed From Sandboxie - Block Hooks Command**~~

~~The approach Sandboxie takes is to honor the hook request partially, by applying the hook only to applications in the same sandbox as the requesting application.~~

~~The [BlockWinHooks](BlockWinHooks.md) setting (see also [Sandbox Settings > Restrictions > Low-Level Access](RestrictionsSettings.md#low-level-access--removed)) may be used to explicitly disable this protection.~~
These key-loggers request the operating system to load or "hook" them into every program executing on the desktop. Sandboxie partially honors these requests, applying the hook only to applications in the same sandbox.

### Windows Message Key-Loggers

This class of key-loggers doesn't need any assistance from the operating system, and can only reliably record activity within one program. However, from the point of view of a supervisory program like Sandboxie, they don't do anything suspicious, and so cannot be stopped.

In order for a program running on the desktop to actually process the keyboard input, the operating system sends that program a message describing the input. The message key-logger, which is likely running in the same process space as the program being logged, can snoop on these messages in a variety of ways, which don't raise suspicion.

Typically this key-logger will be a secret Web browser plugin (or a secret component of a plugin), so it can easily record keyboard activity related to the Web browser.
Operating within the same process space as the logged program, these key-loggers intercept keyboard input messages sent by the operating system to the program. Detecting them is challenging for a supervisory program like Sandboxie.

### Scripted Key-Loggers

This class of key-loggers target and compromise the Web site you will be visiting. This is in contrast to the three other forms of key-loggers discussed here, which target and compromise your own computer.

The JavaScript and VBScript languages offer facilities for a Web page to react to keystrokes. Legitimate uses of these facilities enable the creation of sophisticated Web pages. For example, consider how Google and Yahoo! searches react to the keys you type in order to suggest a possible search string.

Exploiting security weaknesses in a Web site, a spy embeds a scripted key-logger into one of the pages in the site. These key-logger are practically indistinguishable from other scripts on the same site, and can use the same script facilities to react to your keystrokes, record them or transmit them to a third-party site.

### Defending Against Key-Logger

Sandboxie is not designed to detect or disable key-loggers, but it is designed to make sure that sandboxed software stays in the sandbox, that such software can't integrate into Windows, and that it can be completely discarded when you delete the sandbox.

This means that if you take care to carry out all untrusted activity in the sandbox, you can always delete the sandbox to undo the effects of that activity, and restore your computer to a trusted state.

The first step is to make sure your system is not infected by malicious key-loggers, prior to using Sandboxie. A system scan by an anti-virus or anti-malware tool should help here.

Then carry out all untrusted activity -- such as browsing the Web, reading email, and testing unknown programs -- only in the restricted area of the sandbox. This doesn't mean you won't be infected by key-loggers, but it does mean you can get rid of them:

* You can make sure you stop all of them, by telling Sandboxie to stop all activity in all sandboxes.
* See also the **Terminate All Programs** command in the [File Menu](FileMenu.md#terminate-all-programs) and the [Tray Icon Menu](TrayIconMenu.md#terminate-all-programs).
* Once stopped, you can discard the traces of their program code, by deleting the contents of the sandbox.
* See also [Delete Sandbox](DeleteSandbox.md).

Once discarded, they can no longer record your keyboard activity, and you are safe to browse to trusted sites and enter your passwords.
Scripted key-loggers target and compromise websites, reacting to keystrokes using languages like JavaScript or VBScript. They are challenging to distinguish from legitimate scripts on the site.

Note that if you don't like to regularly delete your sandbox, you can set aside one sandbox for trusted browsing, and delete just that sandbox before carrying out the trusted activity. But it is still important to first stop all sandboxed activity in all sandboxes, for maximum protection.
## Defending Against Key-Loggers

* * *
Sandboxie is not designed to detect or disable key-loggers but ensures sandboxed software stays within the sandbox. By confining untrusted activities to the sandbox, users can delete the sandbox to undo any potential effects and restore their system to a trusted state.

Another protection measure against a key-logger is to configure Sandboxie to deny access to the Internet for anything other than your Web browser, in an attempt to prevent the key-logger from sending out the recorded information. See the setting for "the only program that can access the Internet" in [Program Settings](ProgramSettings.md#internet).
1. **Pre-Sandboxie Steps:**
- Scan your system with an anti-virus or anti-malware tool to ensure it's not infected by key-loggers.

Note two caveats:
2. **Sandboxed Activity:**
- Perform untrusted activities (e.g., browsing, email, testing unknown programs) only in the sandbox.

* The Internet access feature is neither a replacement for a proper firewall, nor was it designed as a mechanism to counter or hinder key-loggers.
3. **Termination and Deletion:**
- Stop all sandboxed activity using the **Terminate All Programs** command.
- Delete the sandbox to discard traces of key-loggers' program code.

* Some key-loggers could possibly circumvent the Internet access restriction by hijacking the Web browser to be used as a vehicle through which to send out the recorded information.
4. **Internet Access Restriction:**
- Configure Sandboxie to deny internet access for anything other than your web browser. This aims to prevent key-loggers from sending out recorded information.

* * *
**Important Notes:**
- Internet access restriction is not a replacement for a firewall and was not designed as a primary defense against key-loggers.
- Some key-loggers may attempt to bypass internet access restrictions by exploiting the web browser to transmit recorded information.

Go to [Help Topics](HelpTopics.md), [Usage Tips](UsageTips.md).
For additional details, refer to [Help Topics](HelpTopics.md) and [Usage Tips](UsageTips.md).
39 changes: 16 additions & 23 deletions Content/FileRootPath.md
Original file line number Diff line number Diff line change
@@ -1,34 +1,27 @@
# File Root Path

_FileRootPath_ is a sandbox setting in [Sandboxie Ini](SandboxieIni.md). It specifies the root folder for a particular sandbox.
The _FileRootPath_ setting in [Sandboxie Ini](SandboxieIni.md) is crucial for defining the root folder in your system for a specific sandbox. This setting can be specified globally or within a sandbox section, providing flexibility.

As with all sandbox settings, it may also be specified in the global section, and in that case will apply for all sandboxes where the setting is not also specified in the sandbox section.
To configure this setting, you can use the following example:

See [Sandbox Hierarchy](SandboxHierarchy.md) for more information.

Usage:

```
.
.
.
[DefaultBox]
FileRootPath=C:\Sandbox\MySandbox
```ini
[DefaultBox]
FileRootPath=C:\Sandbox\MySandbox
```

The following substitution variables may be useful in this path.
Additionally, you can employ substitution variables in the path for dynamic configurations:

* [Shell Folders](ShellFolders.md) variables such as %Personal% which expands to the user's Documents folder
* The variable %SBIEHOME% which expands to the root of the Sandboxie installation
* The variable %SANDBOX% which expands to the name of the sandbox
* The variable %USER% which expands to the user name
* The variable %SID% which expands to the user security ID (SID)
* The variable %SESSION% which expands to the Terminal Services session number
- `%Personal%`: User's Documents folder
- `%SBIEHOME%`: Root of the Sandboxie installation
- `%SANDBOX%`: Name of the sandbox
- `%USER%`: User name
- `%SID%`: User security ID (SID)
- `%SESSION%`: Terminal Services session number

If _FileRootPath_ is not specified, its default value is constructed using the _deprecated_ [BoxRootFolder](BoxRootFolder.md) setting, thus:
If _FileRootPath_ is not specified, the default value is generated using the _deprecated_ [BoxRootFolder](BoxRootFolder.md) setting:

* `BoxRootFolder\Sandbox\%SANDBOX%`
- `BoxRootFolder\Sandbox\%SANDBOX%`

If _BoxRootFolder_ is also not specified, then the default setting is:
If _BoxRootFolder_ is also absent, the fallback is:

* `C:\Sandbox\%USER%\%SANDBOX%`
- `C:\Sandbox\%USER%\%SANDBOX%`
Loading