Quote:
Originally Posted by bsd007
...I was looking for something simple...
|
Information security and privacy is a
very large field. You are only considering one small corner of that field.
These types of tools are designed to partially isolate the application's processes and resources from other processes on the same system. It is laudable, and useful.
But that is a relatively small fraction of the possible security issues any computer user may face.