Talk:Sandbox (computer security)
This is the talk page for discussing improvements to the Sandbox (computer security) article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||
|
Defenition
[edit]What exactly sandbox meaning? and where it come from?At Last ... (talk) 12:56, 12 October 2019 (UTC)
Storage is the correct terminology, not disc.
[edit]I revised the third sentence in the first paragraph to "A sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as storage and memory scratch space."
The original sentence referred to disc rather than storage, but disc is only one of many types of storage, all of which apply in the statement. That is, neither the type of memory nor the type of storage is relevant - whatever their type, a sandbox typically creates isolated (scratch) memory and storage space for the subject process to utilize.
Also my sense is in general "scratch" memory or storage space can be either isolated or not, depending upon how it's implemented. If so it can, and I suspect often has, been configured to allow access by multiple processes or entire systems with limited or no functional isolation. So perhaps "separate and fully isolated" is more accurate terminology than "scratch" for that sentence as well, such as, including other refinements:
"A sandbox typically provides a tightly controlled set of resources for a guest process to run within, such as separate and fully isolated storage and memory space."
Nonetheless I didn't implement that revision yet, but do support it. So if there are no objections I might study the term "Scratch" and if my current sense is reasonably confirmed invoke the revision later. Or another Wikipedian is welcome to do so as far as I'm concerned.
Please advise if I've erred, composed poorly, or caused any discomfort. Cheers, --H Bruce Campbell (talk) 09:35, 15 January 2020 (UTC).
Added Android as an example of sandbox implementations
[edit]I noticed that Android's app sandboxes aren't listed as example, which seems like a pretty large hole since I think they were the first implementation of extensive app sandboxes in a commercial OS (and arguably set the standard for what is now expected security on mobile operating systems).
I am however clearly not unbiased on this, since I work on Android. Just want to make sure others agree this is a reasonable addition. --Dianne Hackborn (talk) 17:04, 2 April 2021 (UTC)
- C-Class Computing articles
- Mid-importance Computing articles
- C-Class software articles
- Mid-importance software articles
- C-Class software articles of Mid-importance
- All Software articles
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles