Answer Posted / vinodh anandhan
A widely used technique for securing computer systems is to
execute programs inside protection domains that enforce
established security policies. These containers, often
referred to as sandboxes, come in a variety of forms.
Although current sandboxing techniques have individual
strengths, they also have limitations that reduce the scope
of their applicability. In this paper, we give a detailed
analysis of the options available to designers of
sandboxing mechanisms. As we discuss the tradeoffs of
various design choices, we present a sandboxing facility
that combines the strengths of a wide variety of design
alternatives. Our design provides a set of simple yet
powerful primitives that serve as a flexible, general-
purpose framework for confining untrusted programs. As we
present our work, we compare and contrast it with the work
of others and give preliminary results.
Vinodh Anandhan
Software Test Engineer
Bangalore
vinodhanandhan@gmail.com
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What are the advantages of black box testing?
What was a problem you had in your previous assignment (testing if possible)? How did you resolve it?
Describe a past experience with implementing a test harness in the development of software.
1. what is a date guidelines ?
Give me an example of something you tried at work but did not work out so you had to go at things another way.
If we have no srs, brs but we have test cases does you execute the test cases blindly or do you follow any other process?
How do you Prepare a Defect Managemnt Policy
consider therez 1 land and it has mango trees in it, what are the tets cases or how will we count no of mangoes on all trees
what risks do u faced u r projest how do you solve
what is a data guidelines?
Define what is a critical bug.
Can you explain the various elements of function points ftr, ilf, eif, ei, eo, eq, and gsc?
What are noise variables?
Have you prepared traceability matrix and how to prepare it?
What is AGP?what is setup.inf?What are the ways to install driver?