Category Archives: Virtualization

Sandboxie! – Think INSIDE The Box!

imageWouldn’t it be terrific if, following a mistake which led to malware making its way on to your computer, you could wave a magic wand, utter the words – “get thee gone” – and, quick as you like – no more malware infection?

Luckily, you can do just that. You don’t have to be a mage or a magician – you don’t have to deliver a magic enchantment – but, you do need to be running a sandbox based isolation application.

And that, brings me to Sandboxie (last updated December 16, 2012) – the King of isolation applications in Geek territory. Rather than geek you into the land of nod – today’s review is what I like to refer to as a “soft review”.

Simply put, Sandboxie, when active, creates a virtual environment (of a sort), on a computer by redirecting all system and application changes, to an unused location on a Hard Drive. These changes can be permanently saved to disk or, completely discarded.

A case in point for isolating web surfing:

While surfing the Net, an inexperienced user mistakenly accepts an invitation to install a scareware application but realizes, after the fact, that this is a scam. Operating in a “real” environment, the damage, unfortunately, would already have been done.

Operating in an isolated environment with Sandboxie active; the system changes made by this parasite could be completely discarded – since the attack occurred in a – “I’m not really here” environment .

An obvious part of reviewing an application is, providing a technical breakdown of just how an application gets the job done – or, in some cases how/why an application doesn’t quite get it done.

It’s not often that I get caught between the proverbial “rock and a hard place” in terms of illustrating an application’s aptitude in getting the task accomplished. In this case however, Ronen Tzur, Sandboxie’s developer, has taken the expression – a picture is worth a thousand words – and definitely run with it.

From the site: Introducing Sandboxie

Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.

The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk (no sandbox) shows changes by a program running normally.

The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.

Fast facts:

Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.

Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don’t leak into Windows.

Secure E-mail: Viruses and other malicious software that might be hiding in your email can’t break out of the sandbox and can’t infect your real system.

Windows Stays Lean: Prevent wear-and-tear in Windows by installing software into an isolated sandbox.

The developer has provided a clear and concise Getting Started tutorial – which includes:

How to to use Sandboxie to run your applications.

How the changes are trapped in the sandbox.

How to recover important files and documents out of the sandbox.

How to delete the sandbox.

System requirements: Windows XP, Vista, Win 7 (32 and 64 bit), Win 8 (32 and 64 bit).

Available languages: English, Albanian, Arabic, Chinese (Simplified and Traditional), Czech, Danish, Estonian, Finnish, French, German, Greek, Hebrew, Indonesian, Italian, Japanese, Korean, Macedonian, Polish, Portuguese (Brazil and Portugal), Russian, Spanish, Swedish, Turkish, and Ukrainian.

Download at: Sandboxie

A Caveat: You may run with Sandboxie free of charge – but, once past the initial 30 days, you will be reminded that a lifetime licensed version is available for € 29 (approximately $38 USD at today’s conversion rate).

10 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Don't Get Hacked, downloads, Malware Protection, Virtualization

Trap Malware With Toolwiz TimeFreeze

Toolwiz CareBack in April, I reviewed and highly recommended, a suite of freeware utility applications – Toolwiz Care. Having tested the application extensively, at the end of the day, it was no great leap in logic to say –  “This application is feature packed, and includes a wide range of tools that an average computer user should find powerful, efficient, and effective.”

One of the components included in this super suite is Time Freeze (recently released by the developer’s as a stand alone application) – a “one click simple” virtual system which, when active, virtualizes the operating system. In other words, a copy of the operating system is generated, and it’s within this “copy” – or sandbox, if you like – that all activity takes place. Keep in mind – the operating system is virtualized, only when Time Freeze is active.

So, why bother running in a virtualized environment, you might wonder? The answer is pretty simple – in most circumstances, there’s no real benefit. In fact, running virtualized may create a slight time lag in system response. There are, of course, particular circumstances in which running a virtual machine offers major  advantages – but, those circumstances (since I’ve covered this aspect numerous times in the past), are outside the scope of this review.

Instead, I’ll focus on the security aspect of running in virtual mode with Time Freeze when connected to the Internet. And, there can be significant security benefits.

Let’s assume, for example, that while surfing the Internet you fall victim to a drive-by download (more common than you might realize), while visiting an infected web site. Running in “real” mode would mean that you now have a significant problem on your hands. You can, if you like, believe that your AV application will protect you from the consequences – but, don’t count on it.

The same scenario, while running in virtual mode, will have an entirely different outcome. Since, in virtual mode – it’s a copy of the operating system which is facing the Internet – all system and application changes are restricted to the virtual environment. In other words – it’s the copy which has been infected. Simply rebooting the system does away with the copy, and with it – the infection.

Toolwiz Time Freeze, of all the virtual solutions I’ve reviewed over the past few years, has to be the simplest. It’s easy to use, non intrusive, and after initial setup, requires a minimum of user intervention – perfect for the average user.

Installation was hassle free – it was just a matter of  following the on-screen instructions.

Since the application place a small toolbar (shown below), on the Desktop – launching the application is a snap.

image

A quick click on the toolbar and, a click on “Start TimeFreeze”…………

image

image

… and, you’re in business.

image

image

Backing out of the application is equally as easy. At which time, you will have the option of saving any changes made to the system – or not. Not saving changes will require a reboot.

image

Fast facts:

Start up system protection. Prevents malicious threats being made and doing harm to your computer. It puts the actual system under protection and creates a virtual environment for system partition.

Simply reboot to restore your system to the previous state.

Don’t reboot to accept all the changes. It will take several minutes to save the changes to your real system.

Folder Protection – Help you to prohibit the changing of files by others.

Helps you to prohibit accessing the protected folders by others.

Protects your files from being infected by viruses or stolen by trojans.

Very easy switch between virtual & real system.

To enter virtual system, no need to reboot computer. To return to real system, just exit System Protection.

System requirements: Windows XP, Vista, Win 7, Win 8(32 bit and 64 bit)

Download at: Major Geeks

FAQ for Toolwiz Time Freeze

A word of caution: There are no perfect solutions – this application will not protect you against rootkits. Developing safe surfing habits remains your best protection against malware infection.

A further word of caution: Although I’ve had no difficult with this application, there have been reports of system crashes caused by Toolwiz Time Freeze. It’s always good practice to occasionally create a Restore Point – just in case.

This just in: Jim Hillier over at Daves Computer Tips reports the following:

Hey Bill –

I was using Time Freeze pretty regularly to test software for review purposes. I actually stopped using Time Freeze because of persistent issues. Occasionally, after the reboot process, a random service would be stopped. It was no big deal, just go into Services and re-start whichever service had been affected. Then finally, after a reboot, the OS would not load at all. I tried everything to get the OS to boot but no go. I can only assume that this time an essential system service had been stopped. I ended up having to restore a recent image.

So, you may be better off avoiding this application.

10 Comments

Filed under 64 Bit Software, downloads, Freeware, Software, System Utilities, Virtualization

Paragon Virtualization Manager 12 Compact for FREE! – Save $29.95 On This 3 Day Giveaway

Virtualization is all the rage. With good reason – this very cool technology, if used correctly, has the power to control malware intrusion through the use of a ‘”virtual” environment, rather than operating in a “real” environment.

But, running in a virtual environment, provides an opportunity to do so much more than simply building a buffer between you and the bad guys. Program files, data files, and application directory structures can all be stored on a Virtual Disk Drive.

So, what can you do with Virtualization Manager 12 Compact? As it turns out – quite a lot. To avoid any confusion – this application is a “Virtualization Manager”. You must have virtualization software such as, Oracle VirtualBox 4, Microsoft Virtual PC, VMware Workstation, VMware Fusion, already installed.

Usage Scenarios – From the site:

Scenario 1: Use different operating systems on one computer.

Virtualization allows parallel use of several incompatible operating systems on one computer. You can run Windows, Linux, Mac OS X inside of virtual machine on one host machine.

Scenario 2: Continue using your old PC’s applications – enjoy your favorite applications in a virtual environment on your new computer.

When it’s time to upgrade to a new PC and operating system, you may find that some of your favorite applications haven’t been updated yet to work with it. Using Virtualization Manager 12 Compact, you can make a virtual clone of your old system before migrating to a new computer. Take advantage of an up-to-date powerful computer while still having access to favorite applications from the old computer.

If your old computer is corrupted but you have a backup image of your old system made with Paragon software – you can virtualize it using Virtualization Manager installed on your new PC.

Scenario 3: Safely evaluate new software.

New software can be unintentionally harmful to your computer. You can easily avoid negative system conflicts by creating a virtual clone of your current physical system using Virtualization Manager 12 Compact.

Try new software in a safe environment and decide whether it works and is exactly what you need before making it a permanent addition to your collection.  If changes made on a virtual machine were successful you can just migrate your updated system from virtual environment to your PC.

Scenario 4: Make a system bootable on different virtual environment.

Virtualization Manager makes your system bootable when migrating to new hardware by automatically injecting the required drivers in your operating system. If you unsuccessfully virtualized your system with a 3rd party tool and it became unbootable, the problem can be resolved with Virtualization Manager.

I have not tested this application extensively (just heard about this free offer this morning) – but, I have installed it and taken it for a quick run. Based on my initial impression I’ll give it high marks for ease of setup, and ease of use. The bottom line – a reasonably solid virtualization manager.

Here’s a quick run through:

In the following example I’ve chosen to create a virtual disk.

image

Clicking on this choice opens the “Create Virtual Disk Wizard” as shown below.

image

I’ve set the initial size at 5 GB using Microsoft Virtual PC. You can download Microsoft Virtual PC – here.

image

Done! How hard was that?

image

System requirements: Windows 7 (32/64-bit), Vista (32/64-bit), XP Professional (32/64-bit), XP Home.

Supported Virtual Machines: Oracle VirtualBox 4, Microsoft Virtual PC, VMware Workstation, VMware Fusion.

This giveaway offer expires April 20th, 8 am (GMT-4).

How to get Paragon Virtualization Manager: Go to the Paragon Facebook page – click the like button – follow the instructions.

Here’s a sample of the process.

image

Special thanks to regular reader Delenn13 for the heads up on this free offer.

6 Comments

Filed under Giveaways, Hard Drive Cloning, Hard Drive Imaging, Software, Virtualization

Give Malware The Old Heave Ho! – Trap It With Sandboxie!

imageWouldn’t it be terrific if, following a mistake which led to malware making its way on to your computer, you could wave a magic wand, utter the words – “get thee gone” – and, quick as you like – no more malware infection?

Luckily, you can do just that. You don’t have to be a magician – you don’t have to deliver a magic enchantment – but, you do need to be running a sandbox based isolation application.

And that, brings me to Sandboxie – the King of isolation applications in Geek territory. Rather than geek you into the land of nod – today’s review is what I like to refer to as a “soft review”.

Simply put, Sandboxie, when active, creates a virtual environment (of a sort), on a computer by redirecting all system and application changes, to an unused location on a Hard Drive. These changes can be permanently saved to disk or, completely discarded.

A case in point for isolating web surfing:

While surfing the Net, an inexperienced user mistakenly accepts an invitation to install a scareware application but realizes, after the fact, that this is a scam. Operating in a “real” environment, the damage, unfortunately, would already have been done.

Operating in an isolated environment with Sandboxie active; the system changes made by this parasite could be completely discarded – since the attack occurred in a – “I’m not really here” environment .

An obvious part of reviewing an application is, providing a technical breakdown of just how an application gets the job done – or, in some cases how/why an application doesn’t quite get it done.

It’s not often that I get caught between the proverbial “rock and a hard place” in terms of illustrating an applications aptitude in getting the task accomplished. In this case however, Ronen Tzur, Sandboxie’s developer, has taken the expression – a picture is worth a thousand words – and definitely run with it. Well done Ronen!

From the site: Introducing Sandboxie

Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.

The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk (no sandbox) shows changes by a program running normally.

The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.

Fast facts:

Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.

Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don’t leak into Windows.

Secure E-mail: Viruses and other malicious software that might be hiding in your email can’t break out of the sandbox and can’t infect your real system.

Windows Stays Lean: Prevent wear-and-tear in Windows by installing software into an isolated sandbox.

The developer has provided a clear and concise Getting Started tutorial – which includes:

How to to use Sandboxie to run your applications

How the changes are trapped in the sandbox

How to recover important files and documents out of the sandbox

How to delete the sandbox

System requirements: Windows XP, Vista, Win 7 (32 and 64 bit).

Available languages: English, Albanian, Arabic, Chinese (Simplified and Traditional), Czech, Danish, Estonian, Finnish, French, German, Greek, Hebrew, Indonesian, Italian, Japanese, Korean, Macedonian, Polish, Portuguese (Brasil and Portugal), Russian, Spanish, Swedish, Turkish, and Ukrainian.

Download at: Sandboxie

A Caveat: You may run with Sandboxie free of charge – but, once past the initial 30 days, you will be reminded that a lifetime licensed version is available for € 29 ($38 USD at today’s conversion rate).

My good buddy from Portugal, José – a super geek – is of the opinion that Sandboxie is in a class of its own. I couldn’t agree more José.

16 Comments

Filed under Anti-Malware Tools, Cyber Criminals, Don't Get Hacked, downloads, Malware Protection, Virtualization

Free Linux Live USB Creator – Run Or Boot Linux From A Flash Drive

imageIf you’re looking for a painless way to run Linux without having installed any one of 200+ distributions to your Hard Drive, or without having to boot from a Live CD, then open source Linux Live USB Creator could be the perfect tool. In a very simple process, Linux Live USB Creator will install any one of a huge range of Linux distributions to a USB drive.

After installing your chosen Linux distribution, either from an existing ISO on your HD, or exercising the option to download an ISO through Linux Live USB Creator, you will have several available options.

Option 1 –  Run LinuxLive USB directly within Windows in a virtual environment.

Option 2 – Boot directly from the LinuxLive USB key.

The following screen captures illustrate how a previously complex process has been streamlined, so that a competent average user should be able to breeze through the installation. For this review, I installed PCLinux from an ISO, previously stored on my HD, to an 8 GB Flash Drive.

Launching Linux Live USB Creator will take you to a colorful, “follow the bouncing ball” simple interface.

image

In less than 5 minutes the process is complete and I’m off to the races!

image

Well, sort of. In fact, immediately upon installation completion, you will be taken to the developer’s site for a quick heads-up on using Linux Live USB Creator.

image

As per the developer’s instructions, using Windows Explorer, I navigated to the newly installed VirtualBox folder on the USB drive, clicked on Virtualize_This_Key.exe, and sat back as PCLinux launched inside Windows in VirtualBox.

image

Now, how cool is that! No fuss, no muss, no knowledge of running a virtual system required.

image

As stated earlier, you have a huge selection of Linux distros to choose from. For this review I choose PCLinux since I had it hanging around on my HD – one of those “I’ll get to it when I can” downloads.

image

Fast facts:

Free and Open-source – LinuxLive USB Creator is a completely free and open-source software for Windows only. It has been built with simplicity in mind and it can be used by anyone.

No reboot needed – Are you sick of having to reboot your PC to try Linux? No need with LinuxLive USB Creator. It has a built-in virtualization feature that lets you run your Linux within Windows just out of the box!

Supports many Linux distributions – Ubuntu, Fedora, Debian, OpenSUSE, Mint, Slax, CentOS, ArchLinux, Gentoo, PCLinuxOS, Sabayon, BackTrack, Puppy Linux …

Persistence – Having a Live USB key is better than just using a Live CD because you can even save your data and install software. This feature is called persistence (available only on selected Linux).

SmartClean & SmartDownload – SmartClean uninstalls properly any previous Live USB installations and SmartDownload lets you download any supported Linux in 2 clicks automatically selecting the best mirror to download from. SmartClean also lets you clean your USB key in 1 click.

Intelligent processing – LiLi works with many Linux, even if they are not officially supported.

Hidden installation – LiLi hides the Linux installation, your USB key stays clean.

File integrity – tells you if your ISO is corrupted.

Keeps your data on your USB device.

Intelligent formatting – can format disks bigger than 32 GB.

Auto-update – automatic updates when new Linux distributions are available.

System requirements: Windows 7, Vista, XP

Download at: Linux Live USB

User’s Guide – This tutorial will show you how to create a Linux Live USB very easily.

Tested on Windows 8 (developer).

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

11 Comments

Filed under downloads, Freeware, Geek Software and Tools, Linux, Live CDs, Open Source, Operating Systems, Portable Applications, Software, USB, Virtualization, Windows 8, Windows Tips and Tools

Returnil System Safe 2011 Free –Virtualization With Added Antimalware Protection

System virtualization is a very cool technology which, if used correctly, has the power to control malware intrusion through the use of a ‘”virtual” environment, rather than operating in a “real” environment.

Running virtualized while surfing the Internet makes sense, and since it does, we’ve reviewed a number of these applications in the last year or two, including -Shadow Defender, Returnil Virtual System (a previous version of the application currently being reviewed), Sandboxie, GeSWall, Wondershare Time Freeze, Free BufferZone Pro, and more – including virtualized Browser add-ons.

A quick overview of Returnil System Safe 2011 Free:

Returnil System Safe clones your computer’s System Partition and boots the PC into a controlled virtual environment, rather than native Windows. Since the OS operates virtually, the “real” OS cannot be compromised by malware, malicious software, etc. Should the virtual OS become compromised, a simple restart will return the machine to its original state.

Returnil System Safe 2011 Free is compatible with both 32 bit and 64 bit Windows systems. As a value added bonus, Returnil System Safe 2011 Free incorporates an Anti-malware and Anti-spyware component.

Installation is uncomplicated and should run error free. All of the following screen captures can be expanded to the original size, by clicking on the graphic.

Pay particular attention to the registration screen. Should you choose not to register the application, certain product features will not be available past 30 days.

image

If you plan on continuing to run the application past the 30 day mark, it seems sensible to register. Registration will be confirmed as per the following screen shot.

image

Setting the Virus Guard real-time protection is simple and straightforward.

image

You will have the option of automatically starting the application on Windows startup but, I caution against this. Once the application is running, any changes (including downloads, for example, cannot be saved). You will, of course, be guided by your own needs.

The following screen capture explains this restriction.

image

Instead of an autostart, launch the application manually as needed – surfing the Web, for example.

image

Fast facts:

  Overall Product

  • New an improved interface
  • Clear protection status of your system
  • Manage main features from one screen

Virus Guard (Anti-malware and Anti-spyware)

  • Real-time protection – define your own shield sensitivity
  • Quick Scan – light on resources and effective
  • Full Scan – thorough scan of pre-defined areas on your computer
  • Scan is dynamically adjustable to user workload (less resource intensive)

Virtual Mode

  • Protect your system – Virtualize it!
  • Virtual Mode Always On or just in current session
  • Ability to save files via File Manager (paid version only)
  • Powerful anti-execute protection

System Restore (System Rollback)

  • Repair infections with ease
  • Restore your system to a previously known/clean state
  • Recover individual infected files
  • Do not ever worry about losing your data

System Requirements: Windows XP, Vista, Server 2003, Server 2008,  Windows 7 (all – 32 and 64-bit).

Supported Languages: English, German, Japanese, Korean, Chinese (Simplified), Russian, Portuguese (Brazil), Dutch, Polish, Bulgarian, Finnish.

Download at: Download.com

Overall assessment:

Compared to previous free versions of Returnil, this version suffers from a major lack of functionality – with the focus primarily directed towards a user upgrade. There’s nothing intrinsically wrong with that of course – that’s marketing. But, this market driven position ignores the fact that free competitive products offer more substantial features and benefits.

If you’re looking for a free virtualization application that offers a reasonably complete solution, then you should consider Free BufferZone Pro. You can read a full review here – Free BufferZone Pro – Maybe The Best Surfing Virtualization Application At Any Price

Update: July 1, 2011

Mike Wood, from Returnil, has clarified a number of issues in the response which follows:

Thanks for the review and write up. All feedback is welcomed and yours has been taken into account for future versions. Some feedback on a couple of things in the article:

1. “… this version suffers from a major lack of functionality “: In the older RVS 2010 versions, the Virus Guard was limited to Quick Scans only. We changed this in the 3.2x versions to include Full System scans in RSS Free. We also provide updates via the Cloud feature that are based on the unknown/malicious file and behavior data collection and server side analysis in our own engine/AI tech. RSS Free does have some limitations as far as premium features are concerned, but that is actually only for the System Restore and File Manager/Access Real disk features. The latter centers around being able to save content to the real System partition while in Virtual Mode and the former is centered on the additional tools we provide to the native Windows Shadow Copy service used for the SR feature.

Those using the Free version can still save content and data to disk; the key is in where that data is stored. In the free version you can still save content to non-system disks/partitions and also have access to the Virtual Disk which can be used as a convenience for those with single partition rigs (only a C:\ drive for example).

The features in the System Restore in the paid versions includes automatic antimalware scanning of restore points and backups prior to implementation as well as the ability to recover files from the previous machine state following a restore. Another feature of the SR is that it can monitor all forms of backups and will list them in the Full Restore option when activated so they can be scanned for malicious content as described above.

2. The discussion of layered security approaches: RSS Pro was designed from the outset to be a vertical layered security approach in a single application where each component part works to not only provide its core functionality, but also to cover the weaknesses in the other component parts. As the free version does have some feature limitations, it is more appropriately placed as a team player in a larger layered strategy that the user is implementing with an ability to cover System level virtualization (as opposed to BZ’s application layer approach), complimentary antimalware, and anti-execute so you can reduce the overall number of other security applications you need to make said strategy work.

The paid version takes this a step further and allows the user to have a layered strategy in a one-stop package that can reduce the need for additional programs in the mix other than a good firewall solution.

With Kind regards,

Mike

Returnil Support

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Antivirus Applications, Don't Get Hacked, downloads, Freeware, Malware Protection, Safe Surfing, Software, System File Protection, Virtualization, Windows Tips and Tools

BufferZone Pro 64 Bit Beta Released

Following the review of BufferZone Pro here earlier this year, a fair number of readers were disappointed to see that a 64 bit version of this free virtualization application from Trustware, was not yet available.

Well here’s some good news – those readers who have been waiting for a 64 bit version of  BufferZone Pro need wait no longer. Trustwareis opening the registration for the BufferZone Pro 4 beta version, which includes support for 64-bit Windows installations, on March 28,2011 (9:00 am PST).

To register for the beta program, or for more information, go here.

From “Free BufferZone Pro – Maybe The Best Surfing Virtualization Application At Any Price”, posted here February 22, 2011 –

Controlling malware intrusion, while surfing the Net, through the use of a ‘”virtual” environment rather than operating in a “real” environment, makes sense given the escalating level of cyber criminal activity on the Internet.

From the developer’s site:

BufferZone Pro keeps you surfing, downloading, e-banking, sharing, chatting, and e-mailing to your heart’s content – basically, using the Internet as it should be used. The Virtual Zone gives you total freedom, peace and security on the Web. With BufferZone Pro, you can do absolutely anything on the Internet threat free.

With BufferZone, all programs or files that enter your computer through downloading, browsing, or uploading with external media devices, are redirected to a Virtual Zone (C:\Virtual). And, since any intrusion attempt occurs within this virtual environment, there’s nothing in that summary that I can disagree with. BufferZone’s Virtual Zone does protect a PC from all forms of known, or unknown, attacks originating from the Internet, or external devices.

It does so in a non intrusive way, and after initial setup, requires a minimum of user intervention – perfect for the average user. Installation is hassle free – it’s just a matter of  following the on-screen instructions.

image

BufferZone sits in the Taskbar and can be fully controlled from there.

image

System Requirements: Windows XP, Vista, Win 7 (32-bit). 64 bit users now have access to BufferZone 4 Beta available here.

Note: 32 bit users can download stable version 3 here.

As with all beta, or release candidates, take sensible precautions prior to installation. This should include setting a new restore point.

Update: April 25, 2011 – Regular reader Charlie  reports the following:

“When I uninstall it or surf outside of it, I lose all my firefox bookmarks.  Installing returns the bookmarks.  Also, won’t let me keep Chrome bookmarks.I checked the support form, and others had the same problems.  No answers were provided, however.

If you have experienced these conditions, and you have developed a solution – please let us know.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

8 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Beta Software, Cyber Crime, Don't Get Hacked, downloads, Free Anti-malware Software, Freeware, Malware Protection, Online Safety, Software, Spyware - Adware Protection, System Security, Virtualization, Windows Tips and Tools

A Recipe for Success: Six Ingredients for Maximizing Windows XP Mode Performance

Guest writer Tibor Schiemann, Co-Founder and Managing Partner of software developer TuneUp, (the TuneUp Utilities 2011 folks), walks you through Windows 7 XP Mode – what you’ll need, and how to maximize performance while running Windows XP virtualized.

imagePart of Windows 7, Windows XP Mode (also known as “Virtual Windows”) is designed to make the transition from Windows XP as smooth as possible. It runs a full copy of the former Microsoft operating system in the background, so that Windows 7 users can install and run applications that are not compatible with Microsoft’s latest operating system. However, there are some performance issues users can run into when using Windows XP Mode.

Prepping for Virtual Windows on Your PC

To run older applications under Windows XP Mode, you’ll first need Windows 7 Professional, Enterprise or Ultimate; it doesn’t matter if it’s the 32-bit or 64-bit architecture.

Then, in terms of hardware, I recommend using at least a Core 2 Duo 2 GHz processor and having 2 GB (or more) of main memory and 20 GB of free hard disk space for Windows XP Mode. Simulating Windows XP takes up a lot of resources because you are basically running two operating systems at the same time—your Windows 7 and the virtualized XP.

One bit of advice though—it is best to go with a processor that has a hardware virtualization feature, which allows Windows XP Mode to run nearly as fast as the true operating system. Without hardware virtualization, you will likely notice slower performance when working with older programs. To find out if your PC already supports this feature, download the Microsoft Hardware-Assisted Virtualization Detection Tool.

Before getting started, you’ll need a few additional downloads. These include one for Windows XP Mode itself and another for the software for simulating Windows XP inside your Windows 7 system. For users without hardware virtualization on their PCs, an update is also required.

Fine-Tuning Windows XP Mode’s Performance

In its default setting, Windows XP Mode is not tuned for optimum performance, and not all of the important features are necessarily enabled. There are many resource-draining elements because these are needed for the “real” operating system but not for the virtualized one. Here are the six most essential steps for maximizing Windows XP Mode’s performance and functionality.

  1. Share an Internet connection. Running your older Windows XP application might require a working Internet connection. To see if Windows XP Mode is connected, launch Internet Explorer. If the browser’s default website does not appear, click on “Tools” in the Windows XP Mode window and then “Settings”. Go to “Networking” and select your network adapter rather than the default setting. Hit “OK”, wait and try it again.
  1. Use Windows Update to install the latest software settings. Once your virtual computer is connected to the Internet, download the latest updates by clicking on “Start” and going to “All Programs/Windows Update.” Install all of the pre-requisite updates, and once you’re finished, select all of the “High Priority” updates using the “Custom” view. Then, go to the optional software category and install the updates that are necessary for Windows XP Mode machine.
  1. Disable sounds. To do this, go to “Start” and then “Control Panel”, and click on “Sounds, Speech and Audio Devices”. Hit “Change the sound scheme”, select “No sounds”, and then click on “No” and on “OK”.
  1. Use Turbo Mode. This TuneUp Utilities feature is perfectly suited to a virtual environment. With one click, it disables many Windows XP Mode features that aren’t necessary and only consume memory as well as processor resources, such as automatic defragmentation, maintenance tasks and synchronization features. This stuff is important for actual Windows XP PCs but not for running older programs.
  1. Install your old programs. Insert the CD or DVD with your Windows XP program, go to “My Computer” and install it like normal. If it’s a program you downloaded, you’ll need to access the hard disk drive on your “real” computer. To do this, go to “My Computer” and look at the “Other” category. These physical drives are easily accessible for sharing files between your “real” PC and “Virtual Windows”. (Note: In some cases, running a setup installer from one of these shared drives might end up in an error message. If you encounter this, copy the file from your Windows 7 PC to the Windows XP Mode desktop and run it from there.)
  1. Run your old programs. Finished installing all of the legacy applications? Log off from Windows XP Mode and hit the “X” to close the virtual machine. All of the programs you installed will be available in your Windows 7 start menu. Moving forward, as soon as you launch one of these Windows XP Mode applications, “Virtual Windows” will run in the background—but the actual program feature will, in fact, appear as a regular program window under Windows 7.

With these Windows XP Mode tweaks, you’ll be able to squeeze as much performance and functionality as possible out of your virtualized machine.

For more background information on Windows XP Mode, a step-by-step guide on setting it up and common “Virtual Windows” FAQs, visit the TuneUp Blog about Windows.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

3 Comments

Filed under 64 Bit Software, Geek Software and Tools, Operating Systems, TuneUp Utilities, Virtualization, Windows 7, Windows Tips and Tools, Windows XP

Dell KACE Free Virtual Disk Utility

imageDell KACE is currently offering a free Virtual Disk Utility for creating, mounting and dismounting Virtual Disks on Windows, MacOSX and other kinds of computers.

Dell KACE uses a rather neat analogy when defining a Virtual Disk Drive – “A Virtual Disk might be compared and contrasted with a USB “thumb” drive. Both are removable media containing directories and files that can be added to a system when needed, updated locally and removed when no longer needed”. For example, I often use Virtual Disks in testing.

Program files, data files, and application directory structures can all be stored on a Virtual Disk Drive and with KACE’s Virtual Disk Utility, you will have the opportunity to both  encrypt, and password protect, the Virtual Drives which you have created. Keep in mind this application creates Virtual Disks – not Virtual Machines

Following installation, the screen shots which follow, illustrate just how easy it is to set up a Virtual Disk with KACE’s Virtual Disk Utility.

I should point out that in normal operation, you would launch the Virtual Disk Utility by selecting the application from the Windows Start Menu; then simply follow the same series of choices. (There are additional methods for Virtual Disk creation, discussed later in this review).

image

As I mentioned earlier, Virtual Disks you create can be encrypted so as to restrict mounting a Virtual Drive to only those users who can provide the correct password.

image

As the following screen capture illustrates, you will have a wide range of choices in picking a drive letter.

image

When finished, an Explorer window will open to show the initial contents of the new Virtual Disk and MyComputer windows will display the mounted drive. You can drag-n-drop files as you normally would, to the new Virtual Disk, launch applications, and open additional Explorer windows via MyComputer while the drive is mounted.

image

Through the Properties tab you can adjust the characteristics of the Virtual Drive.

image

Optionally, you can quickly set up a Virtual Drive (or, more than one Virtual Drive), by selecting a folder on any drive, and then create the drive from within Windows Explorer context menu.

image

Additionally, you can “dismount” a Virtual Drive from within the Windows Explorer context menu.

In this review, I’ve managed to cover only some of the features of this application. To read a more in-depth overview please read an Introduction to Virtual Disk, on the developer’s site.

System Requirements: Windows 7, Vista, XP, or Mac OS 10.5 or later (Windows 64 bit native installation available).

Download at: KACE (Registration is required).

Note: Additionally, the application will install the open source Dokan library which contains a user mode DLL (dokan.dll) and a kernel mode file system driver (dokan.sys). Dokan is used to mount Virtual Disks and make them accessible as normal drives with Explorer visibility and Command Prompt access.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under 64 Bit Software, Business Applications, downloads, Encryption, Freeware, Mac OS X, Open Source, Software, Utilities, Virtualization, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Run ISO Files With Free Virtual CloneDrive

image Virtual CloneDrive is a small freeware application that allows you to mount image files, from a hard drive, as a virtual CD or DVD drive, just as if you had inserted the application into a physical CD/DVD drive.

To explain briefly: a disk image is a computer file containing the complete contents and structure of a data storage medium or device, such as a hard drive, CD or DVD. As such, a disk image contains all the information necessary to replicate the structure and contents layout, as well as the actual contents, of a storage device.

Generally, operating systems, particularly Linux and its many derivatives are available for download on the Internet packaged as an image file, e.g. an .ISO file, or as a .BIN/.CUE file. As well, larger applications can often be packaged for download in this way – Windows 7 RC was a good example.

Since I download and test operating systems and large applications frequently, over the course of the last year I could have easily burned up to 50+ CD’s or DVD’s just to use, or install, the software for testing. But, by having Virtual CloneDrive installed on my test system, I saved time and resources.

Once Virtual CloneDrive is installed on your system it will be assigned a drive letter, and will appear as a drive in Windows Explorer. The following screen capture shows Virtual CloneDrive as drive BD – ROM Drive (G:), on my system.

image

To mount an image file navigate to the file (in Windows Explorer), select the file and then and right-click. When the context menu pops up, simply navigate to Mount (Virtual CloneDrive). In this example Drive G:

image

image

Alternatively, you may select “Mount”, from the Tray icon. and follow the process.

An added benefit for those with a larger hard drive is, you now have the option of converting your CDs and DVDs into files that run directly from your hard drive. Simply click on a desktop icon to launch a virtual optical drive.

You can share virtual CDs, photo CDs, and disc-based applications over a network, with access rates up to 200 times faster than physical CDs; boosting the performance of photo CDs, and disc-based applications.

Fast facts:

Supports all common image formats including ISO, BIN, CCD

Supports up to 8 virtual drives at one time

Easy to use – just double-click an image file to mount as a drive

Virtual CloneDrive is freeware

System Requirements: Windows 98, Windows ME, Windows 2000, Windows XP, Windows Vista or Windows 7 (32 or 64 bit).

Download at: Download.com

A caveat: I have found, in the time I’ve been using this application, that while most CD/DVD image files can be executed using Virtual CloneDrive, I have run into the occasional image that cannot be executed with this application.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under 64 Bit Software, CD/DVD Cloning, CD/DVD Tools, downloads, Freeware, Geek Software and Tools, Software, Utilities, Virtualization, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP