Skip to main content


Safely Sandbox Programs Using 360 Total Security


When navigating online and downloading software from sources other than the official website, unless It's a reputable site, you never know for sure whether the file Is In fact clean and malicious-free. It doesn't take much effort to Infect your computer and compromise your sensitive files, thus precautionary measures must be taken when executing applications. In this tutorial, I will show you how to safely Sandbox programs using 360 Total Security.


So what exactly Is a Sandbox? Generally speaking and without the tech jargon, It's a software application that's Installed on your PC, and operates In It's own Isolated virtual environment. It's commonly used as a platform for testing purposes, such as executing applications that're not well known to the end user and perhaps may contain malware.

Whatever Is running In the Sandbox environment, will remain there- without affecting the computer on which It's Installed on. Essentially, If a piece of software Is Infected whilst operating In the Sandbox, It will not spread to the physical machine. That said, there are ways to bypass the Sandbox, but I won't go Into that. For the most part, It does protect your physical machine.

There are many different types of Sandbox software, but the majority come at a cost. As such, I will Introduce you to a free antivirus and optimization utility named 360 Total Security, that has Sandbox built-In. You can download It from the official website, or via this reputable source.

In this article, you will learn how to safely run any program In the Sandbox with Incredible ease. So without further delay, let's rip Into this tutorial.

Step One:

Once you've downloaded 360 Total Security, It must be Installed on your computer. Execute the setup file and hit Install.


Step Two:

It will now begin to configure the Installation files, so be patient whilst It performs It's task. It shouldn't take any longer than a few minutes.


Step Three:

On completion, simply hit the Start button to launch the utility.


Step Four:

The main Interface will now open, so to the left of the window, click on Tool Box.


Step Five:

At the bottom, you will see the Sandbox feature. Double-click It.


Step Six:

Next to Virtual sandbox Is enabled, make sure the slider Is set to the on position. It's now time to run a program In the Sandbox environment, by clicking on Run a specific program.


Step Seven:

Now navigate to the Installation directory of the program, typically found In Program Files (x86) or Program Files, and choose It's executable file. For the purpose of this tutorial, I will Sandbox a program named Slitheris. When you've made your choice, hit Open.


Step Eight:

As you can see, my program Instantly opened In the Sandbox environment. This Is confirmed by Running In sandbox as arrowed below. Obviously the same will apply with your selection.


Step Nine:

If you're running multiple programs In the Sandbox, click on Running List to view the lot. You can also terminate a given program from the Sandbox, by hitting the button as shown below.


Step Ten:

To navigate safely online, select your web browser as per Step Seven above. In my example, I've opened Firefox and as you can see, It's running In the Sandbox. This means that basically anything I do on the Internet, will be protected In It's Isolated environment.


Last Step:

A really cool Implementation of 360 Total Security, Is that It automatically adds the Sandbox feature to the right-click context menu. Thus to simplify the process of adding a program, right-click It's shortcut and hit Run In 360 Sandbox. I've done exactly that with Firefox.


Final Thoughts:

Although 360 Total Security Is not a well-known security vendor, believe It or not, It Incorporates both Bitdefender and Avira Antivirus engines, which pretty much speaks for Itself. Do note that It's not good practice (nor possible at times) to run two Antivirus or Security Suites on the same system, so be sure to uninstall any third-party software prior to committing to 360 Total Security.
Enjoy 😊



Comments

Popular posts from this blog

How To Decode The Windows 10 Product Key

Every Windows 10 operating system that's Installed and activated on the computer, has what's called a Product Key, that Is either pre-Installed by the manufacturer, or added by the end user when formatting their PC. In order to have a fully-functional OS, It must contain a valid Product Key. Whilst there are many tools that can extract It from the operating system, In this tutorial, I will show you how to manually decode the Product Key.

How To Rename Any Power Plan In Windows 10

In terms of managing and controlling the way your computer utilizes power during It's computing operations, Windows has built-In power plans, that are basically a collection of hardware and system settings. By default, there are three In total, namely Balanced, Power Saver and High Performance. Whilst you can change the plan Itself, there's no option to do the same with It's name, hence In this tutorial, I will show you how to rename any power plan In Windows 10.

How To Create A Fake File Of Any File Size

Depending on your business environment or Individual requirements, sometimes there Is the need to test files of a given capacity. Such tests can Include Identifying how well your hard disks perform under heavy read/write operations, or to establish whether files can be securely deleted beyond recovery. Whatever the reason may be, In this tutorial, I will show you how to create a fake file of any file size.