- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Computer systems have a versatility that is still capable of surprising. In most cases, this is used to protect systems, networks or tasks, against possible threats. Therefore, today we will help you answer what is sandbox in computing.
Knowing What a Sandbox Is
When we ask
ourselves what is a sandbox in computing, it refers to a security procedure in which
the isolation of a program from the rest of the operating
system is
executed.
In this way,
any application that is started within a sandbox is controlled to avoid
alterations or unwanted interactions with other
elements of the system.
These are
some of the characteristics of isolation carried out in a sandbox:
· Each program can be prevented from linking with other devices, especially external hard drives or portable memory.
· Your disk space allocation prevents these applications from accessing other disk space that is unrelated to their allocation.
· The program's ability to inspect the host device is limited.
· As for the space in the memory of the computer, the program in the sandbox receives its own. Of course, they are prevented from accessing other memory spaces that are not related to the isolated element.
· The bandwidth used by the program in question may be limited.
· When a program enters the sandbox, its access to the network and any server is limited.
· It is guaranteed at all times that the environment where the program will develop will be completely controlled, creating a virtualized version of it.
Why Are Sandbox Techniques Used?
The isolation of a program about their computing environment is used to run so without risk to the rest of
the system. This occurs when it is suspected that the isolated element may
have some corrupted characteristic.
In the same
way, it can be used when the selected program must undergo some test or evaluation of its
operation. So if left in normal condition with the rest of the
system, it could cause errors.
Thus, the
sandbox can be used in situations such as those described below:
· Starting Programs Downloaded from The Web
There are
certain programs
that can cause a security problem in an operating system, especially when they are downloaded from the internet. That
is why the sandbox acts in these cases.
Some
examples of this are browsers such as Google Chrome, Mozilla Firefox, Tor,
Opera, among others. Likewise, programs that make video calls, allow you
to view downloaded documents or control another computer remotely, can enter
the sandbox.
· Development of Performance Tests
Programmers
and developers often run countless tests of the software and code that
they have put so much work into. That is why they take advantage of the
sandbox to carry out these tests.
As a result,
the programs tested will in no way affect the operation of the operating
system.
· Running Potentially Malicious Programs
The sandbox process can be run to start an application for which there are unreliable signals. This
maybe related to its developer, download source, or functional description.
Some of
these programs may contain malicious software, which can severely affect the
device. Some examples are viruses, spyware, or Trojans, among others.
Use Total Security Software to Protect from Viruses, Spyware, or Trojans, Among Others.
· Make File Downloads
In many
cases, files downloadable from the internet, such as torrents, carry the risk of containing malware. That
is why the sandbox becomes a suitable process when executing them.
· There Is Also the Sandbox in Browsers
It is
important to note that web browsers often have their own sandbox mechanism,
especially applicable in the case of downloads. However, it is known that
these are often affected by vulnerabilities and security flaws.
Given this,
the execution of a second Sandbox is quite suitable, to prevent
greater evils in the system.
Tips for
Running a Sandbox
When a user
intends to sandbox a program, it is necessary to consider the following
aspects:
· The sandbox can be carried out by any user, but when it comes to a complex task it must be left in expert hands.
· In the case of systems belonging to companies, it is recommended to entrust this task to specialized IT personnel, since an error in this area can cause operational problems after its execution.
Finally, when we ask ourselves what is a sandbox in computing, we can affirm that it is a necessary process to ensure the correct functioning of a system, while preventing situations that could affect it.
- Get link
- X
- Other Apps
Comments
Post a Comment