Some systems will deliberately run software and deny it access to the network, the file system, or other resources. These limits prevent it from causing damage. The process is often a compromise that allows untrusted code from questionable sources to run safely.