windous沙盒如何添加Win7

windous沙盒如何添加Win7,第1张

添加方法如下:

1、打开360安全卫士,点击右下角的【更多】;

2、点击【隔离沙盒】,如果您的工具栏里面找不到隔离沙盒,可以在右上角搜索添加;

3、点击【高级设置】,将【右键文件在沙盒中运行】打开;

4、对着你需要用沙盒打开的文件右键,点击【在360隔离沙盒中运行】即可。

是可以使用的

答:1)支持:XP x86/Vista x86/Win7 x86/ Win7 x64系统

2)不支持:XP/Vista x64,Win2003,Win2008等其他系统。

兄弟,不要听一楼的胡扯 他就是答非所问

沙盘是无法支持64位系统的,原因官方说的已经很明白

Driver Signing

With Windows Vista x64, Microsoft has introduced mandatory code signing for drivers. Since Sandboxie relies on a driver component to ensure software isolation, it cannot be loaded into Windows Vista x64 without compromising the integrity of the system.

Acquiring the code signature is not in itself an insurmountable task. However, the next reason will show why this is pointless at this time.

Kernel Patch Protection (PatchGuard)

In 64-bit editions of the Windows platform, Microsoft has extended the core of the operating system, the kernel, in such a way that it routinely performs self-checks to detect any tampering. This enhancement is officially called Kernel Patch Protection and commonly referred to as PatchGuard.

The software isolation provided by Sandboxie is not supported by the Windows kernel, so Sandboxie must make some changes to the kernel to implement the isolation features. This is detected by PatchGuard as tampering, and so the system crashes soon after Sandboxie is installed.

PatchGuard APIs

New "PatchGuard APIs" introduced with Windows Vista Service Pack 1 are not an adequate replacement for the lost flexibility in kernel programming. These APIs do not allow Sandboxie to guarantee isolation on 64-bit Windows Vista.

Sandboxie needs to be able to monitor requests issued by a program in the sandbox to communicate with a program or service outside the sandbox, and discard these requests where they are inappropriate. Please see the section below for some examples that show how this relates to Sandboxie.

Windows, 32-bit or 64-bit, offers no official Windows kernel interfaces to monitor such accesses. However, on 32-bit Windows, Sandboxie can dynamically inject itself (in memory, not on disk) into the Windows kernel, and get a foothold in the procedure that connects one program to another. In 64-bit Windows, this injection is considered malicious and causes PatchGuard to crash the system. And yet, there are no official interfaces to supplement the lost flexibility in kernel programming.

Thus in 64-bit Windows, Sandboxie can only "recommend" a program to not go out of the sandbox, but cannot mandate this. A malicious program could easily circumvent Sandboxie by simply ignoring these recommendations. Rather than release a 64-bit version of Sandboxie that can only offer a false sense of security, I have decided to cancel support for 64-bit editions of Sandboxie.

Summary: The 32-bit edition of Sandboxie can both provide and guarantee software isolation. A 64-bit edition can provide, but cannot guarantee, the same isolation. For this reason, a 64-bit edition of Sandboxie is not offered at all.

以上是官方的说明,当然沙盘可以在64位win7的兼容32位xp虚拟机下运行~

如果英语还可以的话 应该很容易看懂~

祝你好运


欢迎分享,转载请注明来源:内存溢出

原文地址: https://outofmemory.cn/tougao/6883060.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2023-03-29
下一篇 2023-03-29

发表评论

登录后才能评论

评论列表(0条)

保存