what is containment mechanism
Answer / vinodh anandhan
A widely used technique for securing computer systems is to
execute programs inside protection domains that enforce
established security policies. These containers, often
referred to as sandboxes, come in a variety of forms.
Although current sandboxing techniques have individual
strengths, they also have limitations that reduce the scope
of their applicability. In this paper, we give a detailed
analysis of the options available to designers of
sandboxing mechanisms. As we discuss the tradeoffs of
various design choices, we present a sandboxing facility
that combines the strengths of a wide variety of design
alternatives. Our design provides a set of simple yet
powerful primitives that serve as a flexible, general-
purpose framework for confining untrusted programs. As we
present our work, we compare and contrast it with the work
of others and give preliminary results.
Vinodh Anandhan
Software Test Engineer
Bangalore
vinodhanandhan@gmail.com
Is This Answer Correct ? | 1 Yes | 0 No |
if u have 10 inputs & you written 500 testcases for that.out of this u found 20 defects.as a tester how u found from which requirement that a particular defect will occur.
Password is having 6 digit alphanumeric then what are the possible input conditions?
date format and we should 8 digits - not accepted only /accepted write how many in test cases in the date format valid , and in valid
In Testing why We need to Write Testcases compalsarly.
difference between internet exploral and netscape navigator?
What is big bang approach?
any body can explain me door lock test cases,cell phone test cases, table and chair test cases
In the Testing, How do we find the Duplicate Defects. In the case of testing is going on On-site r off-shore..some times on site and off-shore people may enter defects at the same time..those may include duplicate defects. how we have to find those defects..
Difference between functional testing and end to end testing?
when will tester do the smoke testing?
what is BVA,EP?if any body knows this, post the answer for me.
Our software designers use UML for modeling applications. Based on their use cases, we would like to plan a test strategy. Do you agree with this approach or would this mean more effort for the testers.