Skip to main content

Securely Run Applications In Comodo Sandbox

Every time you download and Install applications from an unknown source, or visit websites and click on links unbeknownst to you, there's a risk that your computer may be Infected by a virus. Even If you have the best antivirus software that's updated with the latest virus definitions, It still won't prevent your PC from being compromised. As such, In this tutorial, I will show you how to securely run applications In Comodo sandbox.

So what Is a sandbox? In computing terms and simply stated, It's a virtual Isolated environment that's segregated from your computer thus any application that runs In the sandbox, will remain there and not affect your PC. In other words, It Isolates programs and applications and prevents them from Infecting the rest of your computer.

It's always good practice to execute software & applications In a sandbox environment, particularly when you're not sure whether they're malicious-free. The same applies when navigating online to websites that you've never visited before and seem somewhat suspicious.

To achieve this, I will be using Comodo Sandbox, that's part of a freeware security software named Comodo Firewall. You can download It from the official website, or via this reputable source. Prior to Installing It, to avoid compatibility Issues, be sure to uninstall any third-party firewall software from your computer. So without further delay, let's get this tutorial started.

Step One:

The first thing you need to do, Is download Comodo Firewall and Install It on your PC. The process Is straightforward, so there's no need to elaborate on that. Once that's done, execute It, select Run Virtual and then hit Choose and Run as shown below.

Step Two:

Next, navigate to the Installation directory of the application that you wish to add to the Sandbox, and select It's executable file. In my case, my application Is named Slitheris.exe. When you've made your choice, click Open.

Step Three:

As you can see, my application Is running In the Sandbox. How do I know this? It's denoted by the green border around the window. When you see that, It's Isolated In the Sandbox environment. If this application was Infected, It will not affect my computer.

Step Four:

To see that It Is In fact running In the Sandbox, click on Advanced View at the top right of the window.

Step Five:

Then simply hit Contained Apps as Illustrated below.

Step Six:

You will then see Fully Virtualized next to your application, thus It confirms It's operating within the Sandbox.

Last Step:

As mentioned toward the beginning of this article, you can also run your web browser In the Sandbox. I've decided on Internet Explorer, thereby I can now safely navigate online.

Final Thoughts:

I've used quite a few Sandbox software and I must say that Comodo Is the most user-friendly, therefore users with little to no computing experience, will have no Issues whatsoever. The good thing about It, Is that It's totally free of cost, so be sure to Install Comodo Firewall and keep It active at all times.


  1. You're amazing since the article you've written is both engaging and informative Real Time Facial Detections kiosk Service. Thank you for sharing that. Keep up the good work.


Post a Comment

Popular posts from this blog

How To Decode The Windows 10 Product Key

Every Windows 10 operating system that's Installed and activated on the computer, has what's called a Product Key , that Is either pre-Installed by the manufacturer, or added by the end user when formatting their PC. In order to have a fully-functional OS, It must contain a valid Product Key. Whilst there are many tools that can extract It from the operating system, In this tutorial, I will show you how to manually decode the Product Key.

How To Check Faulty Drivers In Windows 10

For hardware devices to function properly, they must have device drivers  Installed, thus allow them to perform at their optimal state. It's all well and good when they're running without error, but they do tend to fail at the best of times, which can cause system Instability and/or loss of functionality. It can be a difficult task pinpointing the problematic driver(s), so In this tutorial, I will show you how to check faulty drivers , without the aid of third-party tools.

How To Create A Fake File Of Any File Size

Depending on your business environment or Individual requirements, sometimes there Is the need to test files of a given capacity. Such tests can Include Identifying how well your hard disks perform under heavy read/write operations, or to establish whether files can be securely deleted beyond recovery. Whatever the reason may be, In this tutorial, I will show you how to create a fake file of any file size.