GreenBorder Sends Bad Software To The Sandbox - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

09:50 AM

GreenBorder Sends Bad Software To The Sandbox

Untrusted files and programs are walled off from the rest of the system, making it ideal for use with the notoriously insecure Internet Explorer.

Most software that protects against malware uses a signature-based approach that tries to catalog all bad software so it can be recognized. This has become a challenge as the pace of malware creation quickens.

GreenBorder's GreenBorder Pro takes a different approach, running programs and files that come from untrusted sources inside a sandbox, walling them off from the rest of the system. This makes it ideal for use with the notoriously insecure Internet Explorer.

When GreenBorder is installed, it takes a snapshot of your system setup. Any program run inside it makes its changes only to that snapshot, not to the system configuration. Even if an attacker uses an exploit that could potentially compromise system files, changes are made only to the copy. When you exit and reset GreenBorder, the changes disappear.

GreenBorder's tray icon provides status indications and a menu for changing options. A green border around any IE window you launch indicates that protection is in effect.

You have to get used to how GreenBorder operates. For example, when you browse in IE, it silently blocks the installation of ActiveX controls such as the Macro- media Flash viewer. This can be confusing, since there's no information about why installation failed.

Malware--nowhere to run, nowhere to hide

(click image for larger view)

Malware--nowhere to run, nowhere to hide
You can overcome this by running an unprotected IE session and installing the ActiveX control. Once installed, ActiveX can be used from within GreenBorder sessions, since it will then be part of the baseline snapshot that GreenBorder uses.

If you download a program and save it to disk while using GreenBorder, protection extends to the downloaded file. A green border around the file icon indicates that protection is active. When you launch the file, GreenBorder's tray icon will report that the program is being run with protection. In most cases, that means a setup program won't have the required privileges to make system changes, and it will fail to install--good news when the program is malicious. If you're sure the download can be trusted, you must right-click the file, select Remove GreenBorder Protection, and rerun the .EXE file.

For more protection, GreenBorder offers a Privacy Zone option that can keep data such as cookies, form entries, and cache files from being available to anyone but the site you want to use them at. When you start Privacy Zone in IE, a yellow border appears around the browser. You can then visit a site and enter whatever data you need to. By clicking a button or closing the browser, GreenBorder will remove any accumulated browser data.

GreenBorder works best with IE, but its online help offers a way to use it with Firefox 1.5. Right-click the Firefox icon and select Add GreenBorder Protection, and the icon gets a green border around it to indicate that Firefox will be started in GreenBorder.

Most users shouldn't replace their other security measures with GreenBorder, but instead use it as another layer of protection. The $50 annual subscription is a bit high. However, the company offers a free one-year subscription to the first 10,000 users.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
Register for InformationWeek Newsletters
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll