Sandbox
Para windows
http://www.sandboxie.com/index.php?DownloadSandboxie
Para linux
Grsecurity ends code reuse attacks with RAP
What is grsecurity?
Grsecurity® is an extensive security enhancement to the Linux kernel that defends against a wide range of security threats through intelligent access control, memory corruption-based exploit prevention, and a host of other system hardening that generally require no configuration. It has been actively developed and maintained for the past 15 years. Commercial support for grsecurity is available through Open Source Security, Inc.
Defends against zero-day
Mitigates shared-host/container weaknesses
Goes beyond access control
Integrates with your existing distribution
Has a proven track record
http://www.sandboxie.com/index.php?DownloadSandboxie
How It Works
Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.
The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk (no sandbox) shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.
Download Sandboxie now and give it a try!
Grsecurity ends code reuse attacks with RAP
What is grsecurity?
Grsecurity® is an extensive security enhancement to the Linux kernel that defends against a wide range of security threats through intelligent access control, memory corruption-based exploit prevention, and a host of other system hardening that generally require no configuration. It has been actively developed and maintained for the past 15 years. Commercial support for grsecurity is available through Open Source Security, Inc.
Defends against zero-day
Mitigates shared-host/container weaknesses
Goes beyond access control
Integrates with your existing distribution
Has a proven track record