Microsoft shares PowerShell sandbox script that makes Folding@Home run more secure

The popularity of COVID-19 has sparked another round of enthusiasm for the Folding-Home project, which is now the equivalent of the world’s top seven supercomputers. As a distributed computing project, it aims to perform molecular dynamics simulations of protein folding in a way that gathers firewood. Now, however, the organization has focused on dealing with the COVID-19 public health security crisis.

Microsoft shares PowerShell sandbox script that makes Folding@Home run more secure

As a software giant, Microsoft has been actively engaged in this work. But in addition to sharing existing hardware computing and expert technology, the company wants to help everyone who has invested in the Folding-Home project.

To make it more secure, the company has shared a PowerShell script specifically to allow users to run the Folding-Home client (script download address) on the Windows sandbox.

A friend who needs it can execute PowerShell as an administrator, or open the command prompt (CMD) and perform the following command:

Powershell.exe -ExecutionPolicy Bypass -File .install_folding_sandbox_on_host.ps1

To pass a user name, refer to the following command that comes with -username:

Powershell.exe -ExecutionPolicy Bypass -File .install_folding_sandbox_on_host.ps1 -username and

With this script, users can easily configure the latest version of the Folding and Home client that has been downloaded and installed.

If the sandbox is not enabled, the script enables the sandbox and asks for a reboot of the Windows system, and then you can re-execute the steps as previously.

Finally, Microsoft uploaded the script to the GitHub open source repository so that more people could submit ideas about running other applications in Kill Direction.