Date: Mon, 30 May 2022 18:36:00 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 257589] [NEW-PORT] devel/py-jbxapi: fully integrate Joe Sandbox into your malware analysis framework Message-ID: <bug-257589-7788-BVoYIqttqn@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-257589-7788@https.bugs.freebsd.org/bugzilla/> References: <bug-257589-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D257589 Tech Doa <hevayo7064@about27.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |hevayo7064@about27.com --- Comment #2 from Tech Doa <hevayo7064@about27.com> --- A sandbox is a system for malware detection that runs a suspicious object i= n a virtual machine (VM) with a fully-featured OS and detects the object's malicious activity by analyzing its behavior. If the object performs malici= ous actions in a VM, the sandbox detects it as malware. WWW: https://techdoa.com/ --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-257589-7788-BVoYIqttqn>