>>  <<  Ndx  Usr  Pri  Phr  Dic  Rel  Voc  !:  wd  Help  User

Java sandbox and applet security

A java applet downloaded from the web runs on your system in a secure environment called the sandbox. An applet running in the sandbox is not allowed to do anything that could violate the security of your system. In particular it can't read or write files. It is very important that a J object created in the sandbox obeys the rules. J foreigns ( !: ) and wd commands that could violate sandbox rules are disabled when the J object is created in the sandbox.

Important exception: loading ijs script files is allowed.

Be very careful about adding applet classes to your hard drive or changing your classpath. An applet loaded from your hard drive has complete access to your system. Allowing a strange applet to run from your hard drive is just as dangerous as running a strange exe program on your system.

It might sometimes be useful to explicitly request sandbox security completely independently from Java and Automation. For example, you might want sandbox security to run a script downloaded from the net. You trust the script, but setting sandbox security makes it safer. You can explicitly set sandbox security:

   wd'security 1'    NB. wd sandbox security
   9!:24 [ 1         NB. !: sandbox security

>>  <<  Ndx  Usr  Pri  Phr  Dic  Rel  Voc  !:  wd  Help  User