StealthyBoi Posted January 1, 2013 Share Posted January 1, 2013 With the official release of Firefox 17, a new sub-folder is created for anti-phishing use. XP location: C:\Documents and Settings\(user)\Local Settings\Application Data\Mozilla\Firefox\Profiles\xxxxxxxx.default\safebrowsing Vista/Win 7 location (Win 8 not known) should be: C:\Users\(user)\AppData\Local\Mozilla\Firefox\Profiles\xxxxxxxx.default\safebrowsing The "safebrowsing" folder contains multiple files with extensions like: .pset, .sbstore, .hashkey, .cache The current Sandboxie anti-phishing template for Firefox does not allow the contents of the "safebrowsing" folder to be saved out of the sandbox, so until that template can be updated, I recommend that users of Fx17 give 'firefox.exe' a direct access setting for the entire "safebrowsing" folder after they update the program. Notes: - The "safebrowsing" folder does not exist until Firefox is updated to version 17. - I don't know if future Waterfox or Palemoon versions will also use a "safebrowsing" folder, so the following Direct Access setting specifies 'firefox.exe'. (In the case of Waterfox or Palemoon, you would substitute that program's .exe name in place of 'firefox.exe') [Method 1] Sandbox Settings > Resource Access > File Access > Direct Access "Add Program" button: firefox.exe "Add" button: Navigate to the "safebrowsing" folder, located as above, and select the folder. OK [Method 2] A new Firefox anti-phishing template (for Fx17 and earlier), for inclusion in future updates to 'templates.ini' (located @ SBIE install dir): (For most people: those whose Firefox profile folders are all located in the default location underneath %USERPROFILE%) [Template_Firefox_Phishing_DirectAccess] Tmpl.Title=#4337,Firefox/Waterfox/Pale Moon Tmpl.Class=WebBrowser ProcessGroup=<FirefoxPrograms>,firefox.exe,waterfox.exe,palemoon.exe OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\urlclassifier.pset OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\urlclassifier*.sqlite* OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\cert8.db OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\blocklist.xml OpenFilePath=<FirefoxPrograms>,%USERPROFILE%\*\safebrowsing\* [Method 3] An (alternate) Local Template for those who (like me) may have Firefox profile(s) located at non-default locations: (Specifies firefox.exe only; not written for use with Waterfox or Palemoon) Sandbox Settings > Applications > Local "Create New", Paste: [Template_Local_Firefox_Phishing_DirectAccess] Tmpl.Title=My Firefox Phishing Direct Access OpenFilePath=firefox.exe,*\blocklist.xml OpenFilePath=firefox.exe,*\cert8.db OpenFilePath=firefox.exe,*\urlclassifier*.sqlite* OpenFilePath=firefox.exe,*\urlclassifier.pset OpenFilePath=firefox.exe,*\safebrowsing\* Tmpl.Class=Local :view: Original Article (I edited the original topic here, so correct me if I did something wrong) Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.