Sandbox: The data training ground

Almost everyone has had them in their folders: emails with dubious attachments. The 'sandbox' was created for such potential malware. Like generals who first play through the suspected course of a battle in a sandbox, the impact of the code is analyzed in a quarantine area. Some programs already have a (weak) sandbox function as a plug-in, e.g. the Java Runtime Environment (JRE). Other methods take a much more restrictive approach: the entire browser is executed in an isolation area, sealed off from all write access to the hard disk. Any attempted access is redirected to a separate subdirectory that can be easily deleted. Possible 'malware' does not reach its target. Others build a 'virtual machine' (VM). The computer is simulated on a software level, isolated from the real computer in every respect. Only a 'virtual prison' is then 'infected'. Attempts at system changes, the creation of new network connections or the unmotivated opening of files are always considered suspicious.

Gray lists

Our customers regularly receive emails from us alerting them to 'suspected spam'. They tell them about all the emails they have received that advertise an unexpected inheritance from Nigeria or super-duper-cheap tool sets. This process is called greylisting.

With greylisting, an email that has come under suspicion is initially held back by the provider. However, the recipient receives an automatic message about the measure and can - if they wish - subsequently release the mail within a certain period of time.

Greylisting is therefore an IT service that was developed to prevent the erroneous deletion of emails. After all, the classification of 'spam' is not always clear-cut; no e-mail can be labeled as 'garbage' or 'malware'. However, we distinguish ourselves with a service that provides security in this area.