<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Sandbox</title><link>https://sourceforge.net/p/greasemonkey/wiki/Sandbox/</link><description>Recent changes to Sandbox</description><atom:link href="https://sourceforge.net/p/greasemonkey/wiki/Sandbox/feed" rel="self"/><language>en</language><lastBuildDate>Mon, 05 Aug 2019 09:55:02 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/greasemonkey/wiki/Sandbox/feed" rel="self" type="application/rss+xml"/><item><title>Sandbox modified by mmartz</title><link>https://sourceforge.net/p/greasemonkey/wiki/Sandbox/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -2,6 +2,6 @@

 Documentation for [Component.utils.Sandbox](https://developer.mozilla.org/docs/Components.utils.Sandbox) at [Component.utils](https://developer.mozilla.org/docs/Components.utils) page. There is documentation for [Components.utils.evalInSandbox](https://developer.mozilla.org/docs/Components.utils.evalInSandbox) which gives an example of Sandbox usage. 

-For information on sandboxes in general, see [Wikipedia's article on the topic](http://www.wikipedia.org/wiki/Sandbox_%28computer_security%29). 
+For information on sandboxes in general, see [Wikipedia's article on the topic](https://www.wikipedia.org/wiki/Sandbox_(computer_security)). 

 See also the effects that [XPCNativeWrapper](XPCNativeWrapper)s have on the Sandbox's relationship to the content page. 
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mmartz</dc:creator><pubDate>Mon, 05 Aug 2019 09:55:02 -0000</pubDate><guid>https://sourceforge.net79b344e2c53463443824b023fad6bc42baec3ff6</guid></item><item><title>Sandbox modified by Martz</title><link>https://sourceforge.net/p/greasemonkey/wiki/Sandbox/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -1,9 +1,7 @@
-For [Security] reasons, modern [versions](Version_history) of [Greasemonkey] execute each script in a "sandbox", which isolates trusted [User_script] code from potentially malicious web page code. 
+For [security](Security) reasons, modern [versions](Version_history) of Greasemonkey execute each script in a "sandbox", which isolates trusted [User script](User_script) code from potentially malicious web page code.

-Documentation for [Component.utils.Sandbox](http://developer.mozilla.org/en/docs/Components.utils.Sandbox) at [Component.utils](http://developer.mozilla.org/en/docs/Components.utils) page. There is documentation for [Components.utils.evalInSandbox](http://developer.mozilla.org/en/docs/Components.utils.evalInSandbox) which gives an example of Sandbox usage. 
+Documentation for [Component.utils.Sandbox](https://developer.mozilla.org/docs/Components.utils.Sandbox) at [Component.utils](https://developer.mozilla.org/docs/Components.utils) page. There is documentation for [Components.utils.evalInSandbox](https://developer.mozilla.org/docs/Components.utils.evalInSandbox) which gives an example of Sandbox usage. 

-For information on sandboxes in general, see [Wikipedia's article on the topic](Wikipedia:Sandbox_(computer_security)). 
+For information on sandboxes in general, see [Wikipedia's article on the topic](http://www.wikipedia.org/wiki/Sandbox_%28computer_security%29). 

-See also the effects that [XPCNativeWrappers] have on the Sandbox's relationship to the content page. 
-
-[Category:Scripting_context] 
+See also the effects that [XPCNativeWrapper](XPCNativeWrapper)s have on the Sandbox's relationship to the content page. 
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Martz</dc:creator><pubDate>Sun, 10 Aug 2014 06:50:46 -0000</pubDate><guid>https://sourceforge.neta88894fa64903dd28448e112c3091008447854be</guid></item><item><title>Sandbox modified by Martz</title><link>https://sourceforge.net/p/greasemonkey/wiki/Sandbox/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;For &lt;a class="alink" href="/p/greasemonkey/wiki/Security/"&gt;[Security]&lt;/a&gt; reasons, modern &lt;a class="" href="/p/greasemonkey/wiki/Version_history/"&gt;versions&lt;/a&gt; of &lt;span&gt;[Greasemonkey]&lt;/span&gt; execute each script in a "sandbox", which isolates trusted &lt;span&gt;[User_script]&lt;/span&gt; code from potentially malicious web page code. &lt;/p&gt;
&lt;p&gt;Documentation for &lt;a class="" href="http://developer.mozilla.org/en/docs/Components.utils.Sandbox" rel="nofollow"&gt;Component.utils.Sandbox&lt;/a&gt; at &lt;a class="" href="http://developer.mozilla.org/en/docs/Components.utils" rel="nofollow"&gt;Component.utils&lt;/a&gt; page. There is documentation for &lt;a class="" href="http://developer.mozilla.org/en/docs/Components.utils.evalInSandbox" rel="nofollow"&gt;Components.utils.evalInSandbox&lt;/a&gt; which gives an example of Sandbox usage. &lt;/p&gt;
&lt;p&gt;For information on sandboxes in general, see &lt;a class="" href="../"&gt;Wikipedia's article on the topic&lt;/a&gt;. &lt;/p&gt;
&lt;p&gt;See also the effects that &lt;span&gt;[XPCNativeWrappers]&lt;/span&gt; have on the Sandbox's relationship to the content page. &lt;/p&gt;
&lt;p&gt;&lt;span&gt;[Category:Scripting_context]&lt;/span&gt; &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Martz</dc:creator><pubDate>Fri, 27 Jun 2014 23:42:20 -0000</pubDate><guid>https://sourceforge.nete1f82ffbfea22a54f698fe9eeded100b7a5f0739</guid></item></channel></rss>