Sandbox

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(New page: A '''sandbox''' (in terms computer security) is a security mechanism used on servers and personal computers to execute third-party programs that are unverified or have a non- trusted sourc...)
Line 1: Line 1:
-
A '''sandbox''' (in terms computer security) is a security mechanism used on servers and personal computers to execute third-party programs that are unverified or have a non- trusted source. A sandbox allows a guest program to run under tightly-controlled conditions, which typically prevent the guest program to write to the host computer’s hard drive and provide a highly restricted network access. Some sandboxes also disallow the guest program to read from the host’s input devices as a means to prevent malicious programs from reading sensitive data like passwords, network keys and credit card information.
+
A '''sandbox''' (in terms computer security) is a security mechanism used on servers and personal computers to execute third-party programs that are unverified or have a non-trusted source. A sandbox allows a guest program to run under tightly-controlled conditions, which typically prevent the guest program to write to the host computer’s hard drive and provide a highly restricted network access. Some sandboxes also disallow the guest program to read from the host’s input devices as a means to prevent malicious programs from reading sensitive data like passwords, network keys and credit card information.

Revision as of 04:20, 6 April 2008

A sandbox (in terms computer security) is a security mechanism used on servers and personal computers to execute third-party programs that are unverified or have a non-trusted source. A sandbox allows a guest program to run under tightly-controlled conditions, which typically prevent the guest program to write to the host computer’s hard drive and provide a highly restricted network access. Some sandboxes also disallow the guest program to read from the host’s input devices as a means to prevent malicious programs from reading sensitive data like passwords, network keys and credit card information.

Personal tools