{"id":1566,"date":"2008-09-20T00:00:00","date_gmt":"2008-09-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/09\/20\/sandbox-analyzer-for-linux-and-addition-of-file-format-exploit-support\/"},"modified":"2021-12-30T11:39:37","modified_gmt":"2021-12-30T11:39:37","slug":"sandbox-analyzer-for-linux-and-addition-of-file-format-exploit-support","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/09\/20\/sandbox-analyzer-for-linux-and-addition-of-file-format-exploit-support\/","title":{"rendered":"SandBox Analyzer for Linux and addition of file-format exploit support"},"content":{"rendered":"<p>Norman&#8217;s SandBox technology continues to lead the fight against malware, helping security experts more quickly and accurately mitigate security threats.  Norman today released the SandBox Analyzer for Linux to the product line giving customers an important option to the popular Windows version of the SandBox Analyzer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In addition to these improvements, the recent release of the Norman SandBox includes a new emulator, advancing functionality, boosting analysis speed by 10%, and increasing detection by nearly 20%.<\/p>\n<p>SandBox Analyzer Pro also gained important debugging features and functionality.<\/p>\n<p>http:\/\/www.net-security.org\/secworld.php?id=6542<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1566","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1566"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1566\/revisions"}],"predecessor-version":[{"id":4053,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1566\/revisions\/4053"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}