Program Compatibility Templates [non-security programs]

Utilities designed for use with Sandboxie
Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

Program Compatibility Templates [non-security programs]

Post by Craig@Invincea » Sun Jan 03, 2016 9:55 pm

This is where we will collate templates for 3rd party programs, etc. be used with SBIE to enable certain compatibility with programs running under the authority of SBIE...

If you have templates, please feel free to add them in this thread. I will search the forum and add ones I find as well. I'll edit the title as needed to ensure consistency if needed. Thanks!

Also, templates that are baked into SBIE already, many are showing their age and have not been updated and are stale. So, if anyone has edits to them that you'd like to post, please do that. We'll also review those submissions to possibly be included in future SBIE releases.

:!: The use of any such templates in this thread (or otherwise in this forum) will be at the discretion of the end user and shall not guarantee any level of support and the end user shall hold harmless the creator of said template as well as Sandboxie Holdings (Invincea, inc.) with that understanding. You also accept the knowledge that using such templates may open up security hole(s) within Sandboxie and may expose the user to unknown threats while online and/or cause SBIE not function correctly.

Syrinx has been designated as my defacto copy editor :lol:

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

MailBird settings

Post by Craig@Invincea » Mon Jan 18, 2016 8:06 pm

Courtesy of @Guest10

Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: mailbird.exe
"Add" button: Navigate to and select the folder where Mailbird saves its emails.
OK your way out.

Additional:
I also will sometimes save a copy of an email as an individual .eml file.
If you want to save an .eml file out of the sandbox, using something like File > Save As > File, then add:
Sandbox Settings > Resource Access > File Access > Direct Access
"Add Program" button: mailbird.exe
"Edit/Add" button: *.eml
OK your way out.

Syrinx
Sandboxie Guru
Sandboxie Guru
Posts: 613
Joined: Fri Nov 13, 2015 10:11 pm

Direct Folders

Post by Syrinx » Tue Jan 19, 2016 2:01 am

This one is a template I recently worked on for Direct Folders, it seems to do the trick for the most part but I wasn't able to reproduce or solve (sorry Rasheed187) an issue the original poster had with it and another program so I'm not sure it should even be considered for the templates.ini but it could still be useful for others who want to use the software along with sandboxie.

This template won't allow a user to run DirectFolders sandboxed but should allow it to operate normally with sandboxed apps (for the most part). DirectFolders itself will NOT install/run inside a sandbox even using this template.

Code: Select all

[Template_DirectFolders]

Tmpl.Title=Direct Folders
Tmpl.Class=Misc
Tmpl.Scan=s
Tmpl.ScanFile=%APPDATA%\Direct Folders
OpenWinClass=$:df.exe
OpenWinClass=#
I'm not allowed to say certain things, ah! You want to point your finger but there's no one else to blame. You're guilty all the same!

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

Cyberfox 32/64

Post by Craig@Invincea » Sun Jan 24, 2016 9:44 pm

Courtesy of @Guest10
Here are some traditional type Sandboxie templates, adapted for use with sandboxed Cyberfox 36 on 64-bit Windows.

They are written as Local Templates, so after you add them to Sandboxie's configuration file you will not find them listed at Sandbox Settings > Applications > Web Browser
They will be listed at Sandbox Settings > Applications > Local

The exclusions use a wild card character (*) in place of the path to each file or folder, so they should work regardless of the actual location of the profile files. As long as the portable version of Cyberfox uses "cyberfox.exe" (as shown in Sandboxie Control's window <- not checked), they should also work with the portable version.

In addition to the traditional templates, I have also included an alternative template that uses a whitelist approach. One template contains the exclusions for all of the Cyberfox files that you always want to be saved out of the sandbox. If you use the whitelist template, you don't need any of the other templates - unless you also want to use the Force template (assuming that you have a registered version of Sandboxie).

If you use the traditional templates instead of the whitelist template, be sure to use the "Phishing" template. It's primarily needed to keep the "safebrowsing" anti-phishing files updated while running sandboxed. These files are not saved in the profile folder in a normal install of Cyberfox, although they might be saved there in a portable install. The Phishing template will allow the anti-phishing files to be kept updated, wherever they are stored.

Copy the text in this post to your Clipboard, and save it to a Notepad document, so you can Copy and Paste from it while off line.
----

For a sandbox that you will use with Cyberfox:
(A) Open Sandboxie Control's window and right-click the sandbox name, then click...
Sandbox Settings > Applications > Local
1) Click the "Create New" button and Paste one template at a time into the window.
2) Then, click OK in the "Create New" window.
3) Repeat steps 1 and 2 until you have entered all of the local templates that you want to use.

(B) After the templates have been added, click on one of them and then click the "Add" button.
Repeat, selecting templates and clicking the Add button, until all of the templates have been applied for that sandbox [+].
Then, click OK to close the "Sandbox Settings" window.
At this point, if you have templates that you haven't applied, you will asked if you want to remove the unused templates. Answering "No" will keep those templates in the configuration file.

If you have another sandbox that will also use the template(s), you can repeat step (B) for that sandbox at:
(Right-click the sandbox name) > Sandbox Settings > Applications > Local

Only one sandbox should "Force" Cyberfox. If multiple force settings exist, the first one that is found will be the one that's used. Also, running multiple instances of Cyberfox, with each of them trying to use the same profile files, is best avoided.
------
Traditional type templates follow...


[Template_Local_Cyberfox_Force]
Tmpl.Title=Force Cyberfox to run in this sandbox (Registered version only)
Tmpl.Class=Local
Tmpl.Comment=As an alternative to this template: Sandbox Settings > Program Start > Forced Programs
ForceProcess=cyberfox.exe


[Template_Local_Cyberfox_Bookmarks_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox bookmark and history database
Tmpl.Class=Local
Tmpl.Comment=To delete the browsing history, use Cyberfox's own "Options" settings
Tmpl.Comment=Deleting browsing history will keep "session management" from working
Tmpl.Comment=Deleting browsing history will delete "thumbnails"
OpenFilePath=cyberfox.exe,*\bookmark*
OpenFilePath=cyberfox.exe,*\places*


[Template_Local_Cyberfox_Cookies_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox cookies
Tmpl.Class=Local
OpenFilePath=cyberfox.exe,*\cookies*


[Template_Local_Cyberfox_Passwords_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox passwords
Tmpl.Class=Local
Tmpl.Comment=Applies to Firefox derivatives, version 32 and later
Tmpl.Comment=Previous to version 32: signons.sqlite was used instead of logins.json
OpenFilePath=cyberfox.exe,*\logins.json
OpenFilePath=cyberfox.exe,*\key3.db


[Template_Local_Cyberfox_Phishing_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox phishing database and blocklist files
Tmpl.Class=Local
Tmpl.Comment=On a normal install, the "safebrowsing" folder is beneath AppData\Local
OpenFilePath=cyberfox.exe,*\cert8.db
OpenFilePath=cyberfox.exe,*\blocklist.xml
OpenFilePath=cyberfox.exe,*\safebrowsing\*


[Template_Local_Cyberfox_Session_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox session management
Tmpl.Class=Local
Tmpl.Comment=This won't work if you delete browsing history
OpenFilePath=cyberfox.exe,*\sessionstore.js
OpenFilePath=cyberfox.exe,*\sessionstore-backups\*


[Template_Local_Cyberfox_Thumbnails_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox thumbnails folder
Tmpl.Class=Local
Tmpl.Comment=If you delete browsing history, thumbnails will be deleted
Tmpl.Comment=The "thumbnails" folder is beneath AppData\Local, not AppData\Roaming
OpenFilePath=cyberfox.exe,*\thumbnails\*


[Template_Local_Cyberfox_Settings_DirectAccess]
Tmpl.Title=Allow direct access to Cyberfox preferences
Tmpl.Class=Local
Tmpl.Comment=The exclusions for "search" and "xulstore" allow changes to the search engine setting
OpenFilePath=cyberfox.exe,*\prefs.js
OpenFilePath=cyberfox.exe,*\search*
OpenFilePath=cyberfox.exe,*\xulstore.json


If you've picked the templates that you want from the above, then you don't need the following one.
If you use this one, read the template comments.

[Template_Local_Cyberfox_Profile_DirectAccess]
Tmpl.Title=Allow direct access to entire Cyberfox profile folder
Tmpl.Class=Local
Tmpl.Comment=This template only works if the Cyberfox profile is in its default folder beneath AppData\Roaming
Tmpl.Comment=You also need to use the Phishing template, if you use this one
Tmpl.Comment=If you want to save thumbnails, you also need the Thumbnails template
OpenFilePath=cyberfox.exe,%AppData%\8pecxstudios\Cyberfox\Profiles\*\


------
An alternative approach:
You could use just one "whitelist" template. All of the files/folders that you want to save out of the sandbox are listed in one template. You would only use this one template, unless you also wanted to use the Forcing template. This is the same approach that I use for 2 of my Firefox profiles, both of which make use of the same whitelist template.


[Template_Local_Cyberfox_Whitelist]
Tmpl.Title=My Cyberfox whitelisted files and folders
Tmpl.Class=Local
OpenFilePath=cyberfox.exe,*\bookmark*
OpenFilePath=cyberfox.exe,*\places*
OpenFilePath=cyberfox.exe,*\cookies*
OpenFilePath=cyberfox.exe,*\logins.json
OpenFilePath=cyberfox.exe,*\key3.db
OpenFilePath=cyberfox.exe,*\cert8.db
OpenFilePath=cyberfox.exe,*\blocklist.xml
OpenFilePath=cyberfox.exe,*\safebrowsing\*
OpenFilePath=cyberfox.exe,*\sessionstore.js
OpenFilePath=cyberfox.exe,*\sessionstore-backups\*
OpenFilePath=cyberfox.exe,*\thumbnails\*
OpenFilePath=cyberfox.exe,*\prefs.js
OpenFilePath=cyberfox.exe,*\search*
OpenFilePath=cyberfox.exe,*\xulstore.json


Here are a few exclusions for files and extensions that I use for Firefox, that also seem to apply with Cyberfox, and the OpenFilePath=... settings could be added to the list, above.
Listed, in order:
The Cyberfox personal (spelling) dictionary file;
"Adblock Plus" and "Element Hiding Helper For AdBlock Plus" extensions;
"Paste Email Plus" extension

OpenFilePath=cyberfox.exe,*\persdict.dat
OpenFilePath=cyberfox.exe,*\adblockplus\*
OpenFilePath=cyberfox.exe,*\pasteemailplus.json

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

New Delete Command for Eraser v6.2.0.2962

Post by Craig@Invincea » Tue Feb 09, 2016 5:43 pm

Courtesy of @Guest10

New Delete Command for Eraser v6.2.0.2962 and Sandboxie
Tested with Sandboxie v4.16 and v4.17 on 64-bit Win 8.1
Edit Also works with Eraser v6.2.0.2963 and 6.2.0.2967, but does NOT work for me with 6.2.0.2969. On 6.2.0.2969 it leaves behind the renamed sandbox folder "__Delete_xxxxx_xxxxxxxx" /Edit

Copy all of the text from this post to your Clipboard, and then Paste it into a Notepad document, so that you will have it available when you are off-line.

Edit: I should mention that the command lines assume that the "Eraser.exe" program file is located at "C:\Program Files\Eraser\Eraser.exe". If that's not correct for your computer, then the path inside of the following command lines must be corrected. /Edit

Choose from these two eraser methods...

Command line for 3 Pass deletion - DOD /E method (This is the usual method used by Sandboxie):

Code: Select all

"C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=ecbf4998-0b4f-445c-9a06-23627659e419 dir="%SANDBOX%"
Command line for 1 Pass deletion with PseudoRandom Data (A quicker method that I use, and all that's really needed):

Code: Select all

"C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=bf8ba267-231a-4085-9bf9-204de65a6641 dir="%SANDBOX%"
Decide which of the above erase methods you will use (1 Pass or 3 Pass), and have the Notepad document open so you can Copy to the Clipboard.

For each sandbox where you use Eraser v6.2 for secure deletion:
(Right-click the sandbox name) > Sandbox Settings > Delete > Delete Command

In the "Delete Command" box, use the arrow keys or your mouse to select everything in the box, and then delete it by pressing the <Delete> key on your keyboard.
Text in that box extends beyond what you can see, so make sure that it has all been deleted.
Paste the new command line of your choice from above into the Delete Command box, and Click OK to close the Sandbox Settings window.

Repeat for the next sandbox.


NOTES:
If you have multiple sandboxes that use Eraser v6.2, you could use:
Sandboxie Control window > Configure > Edit Configuration
Scroll down to each "DeleteCommand=..." line and replace the line with the new DeleteCommand=..." line of your choice:

Either the 3 Pass method that's usually used by Sandboxie:

DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=ecbf4998-0b4f-445c-9a06-23627659e419 dir="%SANDBOX%"

Or the 1 Pass method:

DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /method=bf8ba267-231a-4085-9bf9-204de65a6641 dir="%SANDBOX%"

Edit Here's an example using methodName:

DeleteCommand="C:\Program Files\Eraser\Eraser.exe" erase /quiet /methodName=Pseudorandom data dir="%SANDBOX%"

/Edit
------
Justification for only using 1 Pass deletion -
At the bottom of Peter Gutmann's paper on Secure Deletion Methods:
https://www.cs.auckland.ac.nz/~pgut001/ ... l#Epilogue
Why Eraser still sets 35-Pass Gutmann method as the default setting when installing Eraser is a mystery to me.
------
Eraser Help usage screen follows:

Code: Select all

Eraser 6.2.0.2962
(c) 2008-2015 The Eraser Project
Eraser is Open-Source Software: see http://eraser.heidi.ie/ for details.

usage: Eraser <action> <arguments>
where action is
  help                Show this help message.
  erase               Erases items specified on the command line. This is equivalent to addtask, with the schedule set to "now".
  addtask             Adds a task to the current task list.
  importtasklist      Imports an Eraser Task list to the current user's Task List.

global parameters:
  /quiet              Do not create a Console window to display progress.

parameters for help:
  eraser help         No parameters to set.

parameters for erase and addtask:
  eraser erase [/method=(<methodGUID>|<methodName>)] <target> [target [...]]
  eraser addtask [/method=(<methodGUID>|<methodName>)] [/schedule=(now|manually|restart)] <target> [target [...]]

  /method             The Erasure method to use.
    methodGUID and methodName can be any GUID/Name from the following list:
       Erasure Method                      GUID
    ---------------------------------------------------------------------------
    U  Gutmann                             1407fc4e-feff-4375-b4fb-d7efbb7e9922
    U  US DoD 5220.22-M (8-306./E, C & E)  d1583631-702e-4dbf-a0e9-c35dba481702
    U  RCMP TSSIT OPS-II                   f335cc40-5de5-4733-90b1-6957b4a45688
    U  Schneier 7 pass                     b1bfab4a-31d3-43a5-914c-e9892c78afd8
    U  German VSITR                        607632b2-651b-4935-883a-bdaa74febb54
    U  US DoD 5220.22-M (8-306./E)         ecbf4998-0b4f-445c-9a06-23627659e419
    U  British HMG IS5 (Enhanced)          45671da4-9401-46e4-9c0d-89b94e89c8b5
    U  US Air Force 5020                   7bf5b185-8ea5-4e12-83f1-f6c2efb3d2c2
    U  US Army AR380-19                    0fe620ea-8055-4861-b5bb-bd8bdc3fd4ac
    U  Russian GOST P50739-95              92681583-f484-415f-a66c-cc210222edc5
    U  British HMG IS5 (Baseline)          9acdbd78-0406-4116-87e5-263e5e3b2e0d
    U  Pseudorandom Data                   bf8ba267-231a-4085-9bf9-204de65a6641
       First/last 16KB Erasure             0c2e07bf-0207-49a3-ade8-46f9e1499c01

    Only erasure methods labelled "U" can be used to erase unused disk space.

  /schedule           The schedule the task will follow. The value must be one of:
    now               The task will be queued for immediate execution.
    manually          The task will be created but not queued for execution.
    restart           The task will be queued for execution when the computer is next restarted.
                      This parameter is only valid for use with "addtask".

  target is one or more of:
    file                Erases the specified file
      argument: file=<path>
    dir                 Erases files and folders in the directory
      arguments: dir=<directory>[,-excludeMask][,+includeMask][,deleteIfEmpty[=true|false]]
        excludeMask     A wildcard expression for files and folders to exclude.
        includeMask     A wildcard expression for files and folders to include.
                        The include mask is applied before the exclude mask.
        deleteIfEmpty   Deletes the folder at the end of the erasure if it is
                        empty. If this parameter is not specified, it defaults to true.
    recyclebin          Erases files and folders in the recycle bin
    unused              Erases unused space in the volume.
      arguments: unused=<drive>[,clusterTips[=(true|false)]]
      clusterTips     If specified, the drive's files will have their cluster tips erased.
                      This parameter accepts a Boolean value (true/false) as an argument;
                      if none is specified true is assumed.
    move                Securely moves a file/directory to a new location
      arguments: move=<source>|<destination>
    drive               Erases partitions, volumes or drives
      arguments:
        drive=\Device\Harddisk<index>
        drive=\\.\PhysicalDrive<index>
        drive=\\?\Volume<guid>

parameters for importtasklist:
  eraser importtasklist <file>[...]

    file               A list of one or more files to import.

All arguments are case sensitive.

Response files can be used for very long command lines (generally, anything
involving more than 32,000 characters.) Response files are used by prepending
"@" to the path to the file, and passing it into the command line. The
contents of the response files' will be substituted at the same position into
the command line.
End of post

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

IE 11 web credentials

Post by Craig@Invincea » Fri Feb 12, 2016 9:38 pm

From Curt:

IE 11 has changed the way they store web credentials.
If you want to have them saved outside the sandbox, you can open

Code: Select all

 IPC path \RPC Control\Vault
.

But be aware that when you do this, and you clear them inside the sandbox, you will be clearing them outside the sandbox (in the host) as well. And anything running in the sandbox will have access to all your web credentials.

Solution-Design
Posts: 28
Joined: Thu Oct 21, 2010 1:06 pm
Contact:

Opera 35

Post by Solution-Design » Tue Feb 16, 2016 10:08 pm

Is it possible for the team, to integrate Opera35 in the templates.ini?

Code: Select all

[TemplateSettings]
Tmpl.OperaStable=%AppData%\Opera Software\*


#
# Opera Stable
#

[Template_OperaStable_Force]
Tmpl.Title=#4323,Opera Stable
Tmpl.Class=WebBrowser
ForceProcess=opera.exe

[Template_OperaStable_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Bookmarks*
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Thumbnails*

[Template_OperaStable_History_DirectAccess]
Tmpl.Title=#4336,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Bookmarks*
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Thumbnails*
OpenFilePath=opera.exe,%Tmpl.OperaStable%\*History*
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Current *
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Last *
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Visited Links*

[Template_OperaStable_Cookies_DirectAccess]
Tmpl.Title=#4328,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Cookies*

[Template_OperaStable_Passwords_DirectAccess]
Tmpl.Title=#4331,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Login Data*

[Template_OperaStable_Preferences_DirectAccess]
Tmpl.Title=#4339,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\Preferences*

[Template_OperaStable_Profile_DirectAccess]
Tmpl.Title=#4338,Opera Stable
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.OperaStable%\*

[Template_OperaStable_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

Chrome & uBlock Origin

Post by Craig@Invincea » Mon Mar 07, 2016 4:02 pm

courtesy of @Dun

Code: Select all

OpenFilePath=firefox.exe,%appdata%\Mozilla\Firefox\Profiles\[profile name]\extension-data\

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

Chrome, uBlock. Auto update uBlock

Post by Craig@Invincea » Wed Mar 23, 2016 5:09 pm

Per this thread http://forums.sandboxie.com/phpBB3/view ... ck#p119412 Thanks to @cj716

Code: Select all

OpenFilePath=chrome.exe,%Local AppData%\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm\
OpenFilePath=chrome.exe,%Local AppData%\Google\Chrome\User Data\Default\Local Extension Settings\cjpalhdlnbpafiamejdnhcphjbkeiagm

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

Google Hangouts [Web Version] [Chrome qWave]

Post by Craig@Invincea » Thu Mar 31, 2016 8:11 pm

When using the website hangouts.google.com

hangouts.google.com

Add code:

Code: Select all

OpenPipePath=\Device\QWAVEdrv
Make sure that you grant Chrome access to your mic/device when it asks for it.

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 8:00 pm
Location: DC Metro Area
Contact:

"New" Opera [v36 and above]

Post by Craig@Invincea » Tue May 10, 2016 4:26 pm

Direct access to bookmarks and thumbnails [@rpljhun]

Code: Select all

[Template_New_Opera_Bookmarks_Thumbnails_DirectAccess]
Tmpl.Title=#4356,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%AppData%\Opera Software\*\Bookmarks*
OpenFilePath=opera.exe,%AppData%\Opera Software\*\Thumbnails*
Use this to create a template in SBIE.

Guest10
Posts: 5115
Joined: Sun Apr 27, 2008 10:24 pm
Location: Ohio, USA

Re: Program Compatibility Templates [non-security programs]

Post by Guest10 » Thu Jun 08, 2017 2:11 am

Recent versions of AdBlock Plus no longer save data to the browser's profile folder in "adblockplus\patterns.ini"
Recent versions will delete the "patterns.ini" file when they are installed.

If you no longer have a "patterns.ini" file in that folder, you need to define a new Direct Access setting.

Data is now saved to...
(For Firefox):
%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js

(For Cyberfox):
%AppData%\8pecxstudios\Cyberfox\Profiles\xxxxxxx.default\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js


For the above, add the appropriate OpenFilePath setting to the settings for your sandbox...

(For Firefox):

Code: Select all

OpenFilePath=firefox.exe,%AppData%\*\Profiles\*\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js
(For Cyberfox):

Code: Select all

OpenFilePath=cyberfox.exe,%AppData%\*\Profiles\*\browser-extension-data\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}\storage.js
The "Element Hiding Helper For AdBlock Plus" will also save it's data there, if you have it installed.
Paul
Win 10 Home 64-bit - Zone Alarm Pro Firewall, Malwarebytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007

bo.elam
Sandboxie Guru
Sandboxie Guru
Posts: 2743
Joined: Thu Apr 23, 2009 2:17 am

Re: Program Compatibility Templates [non-security programs]

Post by bo.elam » Thu Jun 08, 2017 10:05 pm

Guest10 wrote:
Thu Jun 08, 2017 2:11 am
Recent versions of AdBlock Plus no longer save data to the browser's profile folder in "adblockplus\patterns.ini"
.......

Data is now saved to...
(For Firefox):
Hi Guest10. I did notice this change a few days ago. What I also had noticed is that Firefox freezes during the first few minutes after opening the browser. In my case it happened every time I opened the browser. Yesterday I switched adblocker to UBO, and all is well.

Today I learned that the issue is a known bug, supposedly fixed in version 2.91. I retested 2.91 today in a new Firefox profile and still experience the problem. I ll keep using UBO.
https://issues.adblockplus.org/ticket/5298

Bo

Guest10
Posts: 5115
Joined: Sun Apr 27, 2008 10:24 pm
Location: Ohio, USA

Re: Program Compatibility Templates [non-security programs]

Post by Guest10 » Fri Jun 09, 2017 11:26 am

bo.elam wrote:
Thu Jun 08, 2017 10:05 pm
Today I learned that the issue is a known bug, supposedly fixed in version 2.91. I retested 2.91 today in a new Firefox profile and still experience the problem. I ll keep using UBO.
No problem here with 2.91, using 64-bit Cyberfox.

The add-on Ghostery keeps it's data in the same profile folder:
%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\browser-extension-data
only a different sub-folder:

Code: Select all

%AppData%\Mozilla\Firefox\Profiles\xxxxxxxx.default\browser-extension-data\firefox@ghostery.com\storage.js
For Firefox:

Code: Select all

OpenFilePath=firefox.exe,%AppData%\*\Profiles\*\browser-extension-data\firefox@ghostery\storage.js
For Cyberfox:

Code: Select all

OpenFilePath=cyberfox.exe,%AppData%\*\Profiles\*\browser-extension-data\firefox@ghostery\storage.js
Paul
Win 10 Home 64-bit - Zone Alarm Pro Firewall, Malwarebytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007

APMichael
Posts: 126
Joined: Sun Sep 07, 2014 10:54 am
Location: Germany

Re: Program Compatibility Templates [non-security programs]

Post by APMichael » Thu Aug 10, 2017 4:39 pm

Updated templates for Firefox:

Code: Select all

[Template_Firefox_Bookmarks_DirectAccess]
Tmpl.Title=#4336,Firefox
Tmpl.Class=WebBrowser
OpenFilePath=firefox.exe,%Tmpl.Firefox%\bookmark*
OpenFilePath=firefox.exe,%Tmpl.Firefox%\favicons*
OpenFilePath=firefox.exe,%Tmpl.Firefox%\places*

Code: Select all

[Template_Firefox_Phishing_DirectAccess]
Tmpl.Title=#4337,Firefox/Waterfox/Pale Moon
Tmpl.Class=WebBrowser
ProcessGroup=<FirefoxPrograms>,firefox.exe,waterfox.exe,palemoon.exe
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\blocklist*
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\cert8.db
OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\safebrowsing*
I hope you will add them to the Templates.ini. And please check my other post: viewtopic.php?f=4&t=24698#p129424. Thanks!

Post Reply

Who is online

Users browsing this forum: No registered users and 3 guests