Tag Archives: isolated environment

BufferZone Pro 64 Bit Beta Released

Following the review of BufferZone Pro here earlier this year, a fair number of readers were disappointed to see that a 64 bit version of this free virtualization application from Trustware, was not yet available.

Well here’s some good news – those readers who have been waiting for a 64 bit version of  BufferZone Pro need wait no longer. Trustwareis opening the registration for the BufferZone Pro 4 beta version, which includes support for 64-bit Windows installations, on March 28,2011 (9:00 am PST).

To register for the beta program, or for more information, go here.

From “Free BufferZone Pro – Maybe The Best Surfing Virtualization Application At Any Price”, posted here February 22, 2011 –

Controlling malware intrusion, while surfing the Net, through the use of a ‘”virtual” environment rather than operating in a “real” environment, makes sense given the escalating level of cyber criminal activity on the Internet.

From the developer’s site:

BufferZone Pro keeps you surfing, downloading, e-banking, sharing, chatting, and e-mailing to your heart’s content – basically, using the Internet as it should be used. The Virtual Zone gives you total freedom, peace and security on the Web. With BufferZone Pro, you can do absolutely anything on the Internet threat free.

With BufferZone, all programs or files that enter your computer through downloading, browsing, or uploading with external media devices, are redirected to a Virtual Zone (C:\Virtual). And, since any intrusion attempt occurs within this virtual environment, there’s nothing in that summary that I can disagree with. BufferZone’s Virtual Zone does protect a PC from all forms of known, or unknown, attacks originating from the Internet, or external devices.

It does so in a non intrusive way, and after initial setup, requires a minimum of user intervention – perfect for the average user. Installation is hassle free – it’s just a matter of  following the on-screen instructions.

image

BufferZone sits in the Taskbar and can be fully controlled from there.

image

System Requirements: Windows XP, Vista, Win 7 (32-bit). 64 bit users now have access to BufferZone 4 Beta available here.

Note: 32 bit users can download stable version 3 here.

As with all beta, or release candidates, take sensible precautions prior to installation. This should include setting a new restore point.

Update: April 25, 2011 – Regular reader Charlie  reports the following:

“When I uninstall it or surf outside of it, I lose all my firefox bookmarks.  Installing returns the bookmarks.  Also, won’t let me keep Chrome bookmarks.I checked the support form, and others had the same problems.  No answers were provided, however.

If you have experienced these conditions, and you have developed a solution – please let us know.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

8 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Beta Software, Cyber Crime, Don't Get Hacked, downloads, Free Anti-malware Software, Freeware, Malware Protection, Online Safety, Software, Spyware - Adware Protection, System Security, Virtualization, Windows Tips and Tools

Free BufferZone Pro – Maybe The Best Surfing Virtualization Application At Any Price

Back in December, regular reader John W, pointed me to a free license giveaway for BufferZone, a virtualization application which creates an isolated environment called the Virtual Zone, while you surf the Internet.

Based on John’s recommendation, I wrote an informational only article, since I had not had an opportunity to test the application. I’ve spent some time in the interim testing this application, and there’s just one word to describe it – brilliant, exceptional, splendid, superb.

OK, that’s more than one word – but I’m more than just a little enthusiastic about this program. Best of all, this application is now free – as in FREE.

This is not 1985 when the only thing you had to worry about was the crud that might be on the floppy disks you exchanged with your friends. Today, your Browser is the conduit into your computer – that’s the route by which the majority of malware spreads, and intrusion attempts take place.

A case in point:

While surfing the Net, a user mistakenly accepts an invitation to install a scareware application but realizes, after the fact, that this is a scam. Operating in a “real” environment, the damage, unfortunately, would already have been done.

Operating in a “virtual” environment with BufferZone active, system changes attempted by this parasite would simply not occur.

So, controlling malware intrusion, while surfing the Net, through the use of a ‘”virtual” environment rather than operating in a “real” environment, makes sense given the escalating level of cyber criminal activity on the Internet.

From the developer’s site:

BufferZone Pro keeps you surfing, downloading, e-banking, sharing, chatting, and e-mailing to your heart’s content – basically, using the Internet as it should be used. The Virtual Zone gives you total freedom, peace and security on the Web. With BufferZone Pro, you can do absolutely anything on the Internet threat free.

With BufferZone, all programs or files that enter your computer through downloading, browsing, or uploading with external media devices, are redirected to a Virtual Zone (C:\Virtual). And, since any intrusion attempt occurs within this virtual environment, there’s nothing in that summary that I can disagree with. BufferZone’s Virtual Zone does protect a PC from all forms of known, or unknown, attacks originating from the Internet, or external devices.

It does so in a non intrusive way, and after initial setup, requires a minimum of user intervention – perfect for the average user. Installation is hassle free – it’s just a matter of  following the on-screen instructions.

image

BufferZone sits in the Taskbar and can be fully controlled from there.

image

Once the application is installed, and after a re-boot, you will be taken to the developer’s site (this is a one time occurrence), for a point by point introduction to Buffer Zone. The following screen captures (taken from the developer’s site), provide a clear explanation.

Clicking on any screen shot will expand it to the original.

image

image

image

image

image

image

image

In the last few months we’ve looked at operating system virtualization – Shadow Defender, Returnil Virtual System, Wondershare Time Freeze, and a number of other similar applications. As well as alternatives to OS virtualization – specific application virtualization running in a sandbox. For straight out ease of use while surfing the Internet though, BufferZone has become my favorite.

If you’re unsure as to whether you should operate in “virtual mode” while surfing the Net, then take this free security test at the developer’s site.

On my “unprotected” test machine, the following is the result of the simulated Trojan attack. The “stolen” files were on a non-system partition so the Trojan doesn’t restrict itself to just the (C:) drive.

image

Actually, I forgot to turn off ThreatFire, which picked up the attack in progress. This shows the benefit of a layered security approach.

System Requirements: Windows XP, Vista, Win 7 (32-bit).

Download at: the developer’s site (Trustware.com).

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

37 Comments

Filed under Anti-Malware Tools, cybercrime, Don't Get Hacked, downloads, Free Security Programs, Freeware, Interconnectivity, Internet Safety Tools, Online Banking, Online Safety, Safe Surfing, Software, System File Protection, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP