Much like "security," I think of "sandboxing" as "defense against what"? Because on one end of the spectrum is "system prints hello world, exits" and the other is emulated ... everything, virtual filesystem, virtual network, etc, as one might find in a capture the flag scenario
So, I guess the rest of the owl is: what, if you had a magic wand, would you use such a system to run user submitted code to do?
So, I guess the rest of the owl is: what, if you had a magic wand, would you use such a system to run user submitted code to do?