Sandbox: The data training ground
Almost everyone has had them in their folders: emails with dubious attachments. The 'sandbox' was created for such potential malware. Like generals who first play through the suspected course of a battle in a sandbox, the impact of the code is analyzed in a quarantine area. Some programs already have a (weak) sandbox function as a plug-in, e.g. the Java Runtime Environment (JRE). Other methods take a much more restrictive approach: the entire browser is executed in an isolation area, sealed off from all write access to the hard disk. Any attempted access is redirected to a separate subdirectory that can be easily deleted. Possible 'malware' does not reach its target. Others build a 'virtual machine' (VM). The computer is simulated on a software level, isolated from the real computer in every respect. Only a 'virtual prison' is then 'infected'. Attempts at system changes, the creation of new network connections or the unmotivated opening of files are always considered suspicious.