Free Workshop: Investigating Insider Threats — February 20-27

Sandboxing

Some systems will deliberately run software and deny it access to the network, the file system, or other resources. These limits prevent it from causing damage. The process is often a compromise that allows untrusted code from questionable sources to run safely.