What is a Security Sandbox?

What is a security sandbox? Think about the type of sandbox that kids play in. It is small, safe environment where kids can play with just the toys in the sandbox, and they’re temporarily contained so that they can’t touch anything outside the sandbox (unless they leave the sandbox).

In computer security, there is […]

How to Implement Security Sandboxes

You may not know it, but ALL your programs can access your Quicken data. Not good. So, what can you do?

One solution to this nasty problem is to run all programs in a security sandbox. Unfortunately, the sandboxes in Windows 8 and Mac OS X Mountain Lion (10.8) are voluntary. Programmers can choose to […]

All Your Programs Can Access Your Quicken Data

Note: The issue discussed on this page affects you if you use Windows or Mac OS X, unless you have taken the following precautions:

For Windows: You are running Windows 8 or later, and only purchase and run programs from the Windows App store. For Mac OS X: You are running Mountain Lion (10.8) or […]

Security Sandboxes and Virtualization

The easiest way to take advantage of the new security sandbox technology is to upgrade your hardware and software. Not everyone can afford to do that. What other options are there if you want a security sandbox? Sandboxing is closely related to virtualization. Virtual computing is a good way to get some of the benefits […]

How to Make Your Browser More Secure

Indulge me in a little test. Create a text file on your PC. Copy and paste this into it:

<html>

<body>

<br>My secret plans to become the next billionaire.

<br>My secret recipe for killer scones to sell to Starbucks.

<br>My password to all my websites.

[…]

How to Keep Top-Secret Documents Off the Internet

I don’t know about you, but I don’t have any top-secret documents. But, suppose you use Quicken. Suppose you have a secret plan to become the world’s next billionaire. Suppose you don’t want the NSA prying into the photo collection of your, um, kids. Well, don’t connect your computer to the Internet.

Some people may […]