Quote:
Originally Posted by Wittmann
Well chum, that is your useless opinion, which makes two of us who know nothing about anything according to your rant eh ? Your knowledge of what Sandboxie actually is and does amounts to a big fat zero. Hopefully some other posters will reply with a more rational view of computers. Your post is an irresponsible joke.
|
Actually, your post is an irresponsible joke. My knowledge of what Sandboxie does seems to be far greater than yours given that a) I am a qualified IT professional whose job involves securing the computer systems of large organisations and b) I broke it in ten minutes and c) Proved your claims false with a 5 minute Google search.
Quote:
|
Who the hell do you think you are throwing insulting remarks about that I know nothing about PC security, sounds like I know a sight more than you do. From your diatribe it does not seem as if you could half fill a postage stamp up with your self appreciated knowledge.
|
Clearly not.
You're making completely false and irresponsible statements that border on fraudulent claiming levels of protection that are impossible.
Quote:
Originally Posted by Wittmann
Try your blockbusting brilliance in devising a program which when sent to another sandboxed PC has the ability to independently exit the sandbox and reveal all those goodies you so proudly state to the world. Now it is your turn to talk more rubbish, because you cannot do it !
|
I already did. As have others:
http://www.bit-tech.net/news/bits/20...t-kernel-bug/1
Quote:
A privilege escalation vulnerability marked as Important to Critical by Microsoft, the vulnerability was discovered by researchers several months ago but only made public once the patch was released this week. Covering all versions of Windows, the flaw allows for all security measures against exploitation - from sandboxing and kernel segregation through to memory randomisation and user-access control - to be entirely bypassed by flipping just one single bit of the operating system.
After some work we managed to create a reliable exploit for all versions of Windows – dating back as of Windows XP to Windows 10 preview (With SMEP and protections turned on),'
Users of supported Windows releases are advised to update with the KB3036220 patch as soon as possible; those still on unsupported platforms like Windows XP will not receive the patch.
|