Sandbox (Computer Security)


What is a sandbox?

A sandbox is used to run untrusted, untested code or programs without risking your own operating system or computer while determining whether the code or program contains something malicious.

How does a sandbox work?

Sandboxing essentially isolates a program to keep dangerous code from prying into your private information stored on your computer, keep it from damaging your system, and your personal life.

It’s used to restrict what actions a code can carry out and to give it only the authorization it needs while running on your computer.

Many activities you carry out on a computer are already protected with a sandbox.

For instance, modern web browsers sandbox the pages they load, restricting plug-ins like JavaScript and preventing items from accessing a computer file without your permission.

Adobe Reader is another program that uses sandboxing technology to protect you.

When you open a PDF in Adobe Reader, the program keeps files from accessing your computer system.

Mobile applications also run within a sandbox, typically.

You may not realize it, but you’ll know sandboxing is part of your mobile device when an app asks for permission to access your location or photos, for instance.

Can I use a sandbox?

Most of the time, the programs you’re using already carry out the sandboxing process for you and keep your systems secure.

But there are tools that can be used to sandbox a program that might not otherwise be sandboxes.

You may choose to use a sandbox if you’re testing a program or installing an untrusted file.

If you use Windows, Sandboxie is a program you might find helpful.

It essentially sets up an isolated environment for your programs and keeps them from making any major changes to your computer. It’s often used for software testing.

Otherwise, look into using a virtual machine program that isolates a program and keeps it from accessing anything outside of its own virtual machine.

Some anti-virus softwares include sandbox technology and automatically run suspicious programs in an isolated environment.

Avast, for instance, provides sandbox security that you can customize.


Leave a Reply

Your email address will not be published.