Sometimes we do use up the applications from the third party websites on our devices and on Linux also it is done by the users. And for checking these apps before using you can use the below-mentioned tool to sandbox them before using in the system for security.
Although the Linux system is said to be least prone to the malware, viruses hence the third-party applications may also not cause up any trouble most of the times. But wait! The Linux systems are most safe and least vulnerable operating system but this doesn’t mean that it won’t get affected by anything at any time, it could be affected by the non-trusted apps, third-party apps etc all. To protect out the Linux system from the negative effect of these non-trusted apps there is one way out, run up the non-trusted apps in an isolated container Sandbox. This Sandboxing of the apps prevent up the system information and data from being utilized by these apps and hence protect up the whole system from being affected by the malware, virus etc! Now the thought might be coming in your mind i.e how could you also Sandbox apps on the Linux, don’t bother as we have written about the whole method in this article and you just have to read it all to know about it.
How to Sandbox Non-trusted Apps in Linux Systems
The method is little technical one and you should be sound in that to easily judge the non-trusted apps that can endanger your security in Linux system. So have a look at the step by step guide below to proceed.
Also Read: Reasons Why Hackers Prefer to Use Linux OS
Steps to Sandbox Non-trusted Apps on Linux Systems:
1. Download up the “Firejail” on your Linux. To do that on Debian Ubuntu/Linux Mint just open up the Terminal inside the OS and then type up the following command:
“sudo apt install firejail”
Now enter up your account password when asked and press enter. For confirmation, if asked type up the key ‘y’ and press up the enter key again. This will start up the installation process of the Firejail automatically but check that you are running active internet on your system unless you cannot get any results and installation won’t be done.
For any RedHat or Fedora based distro of Linux then use up the below command for downloading up the Firejail and follow up the same procedure:
“sudo yumo install firejail”
2. After you have downloaded up to the Firejail file just locate it from the terminal by the command “cd~/Downloads“. Install up the file from the package file by running up the command: “sudo dpkg –i firetools*.deb“. Fill up your password if prompted and then press the enter key.
3. Now if you want to run any installed application inside the Firejail or just run it by sandboxing then run up the below command in the terminal.
” firejail app_name” for example ” firejail firefox” command will run up the Firefox web browser in sandbox mode. This will restrict up that particular app from accessing your directories and files. Still, if you aren’t happy with the restrictions that the above mode provides and want to run up the apps in much more private mode then do that by running up the command :
4. Still, if you aren’t happy with the restrictions that the above mode provides and want to run up the apps in much more private mode then do that by running up the command :
“firejail appname –private” for example “firejail firefox –private” command will run the firefox web browser in a completely restricted mode where it cannot access even the small data from your device directories.
5. This can be done all through the commands but if you want to perform up the same actions in GUI mode then or in a software like platform then you can do that by typing up the command “firetools” and you will see a software running on your screen through which you can perform up the similar actions as described above but not using up the commands but through simple surfing method.
This was all ways through which you can easily run up the non-trusted apps in the sandbox on your Linux and hence protect up your device from the threats that these apps could probably cause to your device. You should also run up the web browsers, other online apps in sandbox mode as these apps could be most vulnerable as there is a transfer of data between your system and servers and the virus, malware is all transferred through this way only!