What is the difference between a 360 isolation sandbox and a virtual machine

Updated on technology 2024-03-10
4 answers
  1. Anonymous users2024-02-06

    There are some similar functions, but there are also essential differences: the same place: all of them form an independent space on their own, so as to protect the different places of the physical machine

    The isolated sandbox is simply an independent space, in which nothing will affect the physical machine. In addition to the above functions, the virtual machine can also independently simulate and run some platform software, and can also form a local network with the physical machine components, you can completely treat the virtual machine as the computer in your computer, the virtual machine can be networked, and the physical machine can communicate with each other, which is more powerful.

  2. Anonymous users2024-02-05

    Standard answer! The isolation sandbox is to provide a copy of the system environment and reduce part of the permissions to a low level, and all the operations of the sandbox program to add files, modify files, login files, etc., are not really modified to the system, but changed to a copy.

    This copy is invisible to the normal programming of the real system. There is no change to the system at all, so the Trojan will not survive. Disappears as the sandbox is cleared.

    If you haven't changed the isolation folder, it's the 360rec folder that you install on the disk.

    In this case, it is recommended to reinstall the latest 360 security guard, and after reinstallation, you can have the function of isolating the sandbox.

    In your World of Warcraft profile, there's a folder name that says, and this is the Quarantine Plugin.

    If your virtual machine is installed on the D drive, you can find the Users folder in the D drive, find the Administrator folder in it, and then open it again.

    Try both.

    After creating a new virtual machine and installing the system, perform the following settings:

    Load the file in the installation directory and install VMware Tools (After entering the virtual machine system, double-click the CD drive in "My Computer" to install it, and you need to restart the virtual machine after installation.) )

    Right-click on "My Computer" in the virtual machine system to map the network drive.

    1: The file in the file is being used or the file is not released by the system after use.

    2: The folder is damaged.

    3: The folder name is invalid (e.g. folder name uses "aux", "1", "2", "prn", "con" and "nul").

    4: The properties of the folder are set to "read-only".

    5: The name of the folder contains illegal characters such as .

    6: Virus program is poisoning.

    Are you talking about VMware? The virtual operating system is actually a whole file, just like the ghost backup system, its suffix is ending with vmdk, and its preset path is in.

    Username My Files virtual machines"Inside.

  3. Anonymous users2024-02-04

    1. Intelligent identification of procedures that need to be isolated: isolate and run risky software, which can try the software without worrying about poisoning;

    3. There are two ways to manually isolate the running program: we can right-click or manually add the program that needs to be isolated and run.

    5. Enter the sandbox program mark: the yellow label prompts the program to run in the sandbox;

    6. Manage the isolation program at a glance: after the sandbox is opened, the right-click menu adds the quick entry sandbox program;

  4. Anonymous users2024-02-03

    1.What is the reason for the clump to put the program in the isolation sandbox and run it without poisoning or producing traces? The isolated sandbox provides a copy of the system environment and reduces some permissions, and all the operations of the program in the sandbox are not really modified to the system, but to a copy.

    This copy is invisible to the normal procedures of the real system. There is no change to the system at all, so the Trojan will not survive. Disappears as the sandbox is cleared.

    2.Can game plug-ins be run in an isolated sandbox? At present, we do not support game plug-ins running in the sandbox, because if the plug-in is only run in isolation and the game is running on a real system, then the plug-in cannot be operated and modified in the game.

    It is not possible to make the plug-in function work.

    If you run the game in a sandbox with a cheat, you can't avoid bad or malicious cheats hijacking or stealing your game account. Therefore, it is recommended that you use plug-ins with caution. 3.

    Can I conduct online banking transactions or online purchases in the sandbox? For online banking transactions or online shopping, it is recommended that you use the automatic clearance and browser reinforcement provided by 360 online shopping bodyguard to prevent malicious tampering with payments**. It has a higher level of protection for infiltration.

    Sandboxing is used to isolate the use of risky software to prevent Trojans or system modifications. 4.Do I still need to use an isolation sandbox with a Trojan firewall?

    If you frequently ** programs or receive programs from others, it is recommended that you use an isolation sandbox to run these potentially risky programs. The Isolation Sandbox provides another layer of protection, allowing you to try out the Seepage Software program without worrying about the system being modified.

    In addition to finding a way to break through the virtual system of the sandbox and the restricted permissions, the Trojan firewall can hold the last system defense line from being modified.

    The isolation sandbox and the Trojan firewall form two solid defense surfaces against viruses and Trojans. Maximize your defense.

Related questions
8 answers2024-03-10

Go to the registry and change the startup item. Start-Run-Type :regedit, and you will open the registry. >>>More

18 answers2024-03-10

The war of words between the two companies has been going on for a long time, and it is not recommended to install them at the same time. If you want to install Rising, just install a card assistant. The functionality is the same as 360.

13 answers2024-03-10

Use isolation first and then sunscreen.

7 answers2024-03-10

Novices do recommendation promotion, and the promotion advantages are as follows. >>>More

8 answers2024-03-10

Introduction to 360 Security Guard 360 Security Guard is currently the most powerful, most effective, and most popular essential security software for users. Not only is it free forever, but it also offers free versions of many well-known antiviruses exclusively. Due to its ease of use and good user reputation, among the 300 million Chinese netizens, more than 200 million have preferred to install 360. >>>More