Skip to main content

Safely Sandbox Programs Using 360 Total Security

When navigating online and downloading software from sources other than the official website, unless It's a reputable site, you never know for sure whether the file Is In fact clean and malicious-free. It doesn't take much effort to Infect your computer and compromise your sensitive files, thus precautionary measures must be taken when executing applications. In this tutorial, I will show you how to safely Sandbox programs using 360 Total Security.

So what exactly Is a Sandbox? Generally speaking and without the tech jargon, It's a software application that's Installed on your PC, and operates In It's own Isolated virtual environment. It's commonly used as a platform for testing purposes, such as executing applications that're not well known to the end user and perhaps may contain malware.

Whatever Is running In the Sandbox environment, will remain there- without affecting the computer on which It's Installed on. Essentially, If a piece of software Is Infected whilst operating In the Sandbox, It will not spread to the physical machine. That said, there are ways to bypass the Sandbox, but I won't go Into that. For the most part, It does protect your physical machine.

There are many different types of Sandbox software, but the majority come at a cost. As such, I will Introduce you to a free antivirus and optimization utility named 360 Total Security, that has Sandbox built-In. You can download It from the official website, or via this reputable source.

In this article, you will learn how to safely run any program In the Sandbox with Incredible ease. So without further delay, let's rip Into this tutorial.

Step One:

Once you've downloaded 360 Total Security, It must be Installed on your computer. Execute the setup file and hit Install.

Step Two:

It will now begin to configure the Installation files, so be patient whilst It performs It's task. It shouldn't take any longer than a few minutes.

Step Three:

On completion, simply hit the Start button to launch the utility.

Step Four:

The main Interface will now open, so to the left of the window, click on Tool Box.

Step Five:

At the bottom, you will see the Sandbox feature. Double-click It.

Step Six:

Next to Virtual sandbox Is enabled, make sure the slider Is set to the on position. It's now time to run a program In the Sandbox environment, by clicking on Run a specific program.

Step Seven:

Now navigate to the Installation directory of the program, typically found In Program Files (x86) or Program Files, and choose It's executable file. For the purpose of this tutorial, I will Sandbox a program named Slitheris. When you've made your choice, hit Open.

Step Eight:

As you can see, my program Instantly opened In the Sandbox environment. This Is confirmed by Running In sandbox as arrowed below. Obviously the same will apply with your selection.

Step Nine:

If you're running multiple programs In the Sandbox, click on Running List to view the lot. You can also terminate a given program from the Sandbox, by hitting the button as shown below.

Step Ten:

To navigate safely online, select your web browser as per Step Seven above. In my example, I've opened Firefox and as you can see, It's running In the Sandbox. This means that basically anything I do on the Internet, will be protected In It's Isolated environment.

Last Step:

A really cool Implementation of 360 Total Security, Is that It automatically adds the Sandbox feature to the right-click context menu. Thus to simplify the process of adding a program, right-click It's shortcut and hit Run In 360 Sandbox. I've done exactly that with Firefox.

Final Thoughts:

Although 360 Total Security Is not a well-known security vendor, believe It or not, It Incorporates both Bitdefender and Avira Antivirus engines, which pretty much speaks for Itself. Do note that It's not good practice (nor possible at times) to run two Antivirus or Security Suites on the same system, so be sure to uninstall any third-party software prior to committing to 360 Total Security.
Enjoy 😊


  1. I guess I am the only one who came here to share my very own experience. Guess what!? I am using my laptop for almost the past 2 years, but I had no idea of solving some basic issues.
    360 Total Security Crack

  2. I guess I am the only one who comes here to share my very own experience guess what? I am using my laptop for almost the post 2 years.
    Bitdefender Total Security Crack
    Voicemod Pro Crack
    Axure RP Pro Crack

  3. I guess I am the only one who came here to share my very own experience. Guess what!? I am using my laptop for almost the past 2 years, but I had no idea of solving some basic issues. I do not know how to But thankfully, I recently visited a website named
    Xfer Records Serum Mac Crack
    Mixed In Key Crack
    Tencent Gaming Buddy Crack
    Voicemod Pro Crack
    Ant Download Manager Crack


Post a Comment

Popular posts from this blog

How To Decode The Windows 10 Product Key

Every Windows 10 operating system that's Installed and activated on the computer, has what's called a Product Key , that Is either pre-Installed by the manufacturer, or added by the end user when formatting their PC. In order to have a fully-functional OS, It must contain a valid Product Key. Whilst there are many tools that can extract It from the operating system, In this tutorial, I will show you how to manually decode the Product Key.

How To Check Faulty Drivers In Windows 10

For hardware devices to function properly, they must have device drivers  Installed, thus allow them to perform at their optimal state. It's all well and good when they're running without error, but they do tend to fail at the best of times, which can cause system Instability and/or loss of functionality. It can be a difficult task pinpointing the problematic driver(s), so In this tutorial, I will show you how to check faulty drivers , without the aid of third-party tools.

How To Create A Fake File Of Any File Size

Depending on your business environment or Individual requirements, sometimes there Is the need to test files of a given capacity. Such tests can Include Identifying how well your hard disks perform under heavy read/write operations, or to establish whether files can be securely deleted beyond recovery. Whatever the reason may be, In this tutorial, I will show you how to create a fake file of any file size.