| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 72182 | 2006-09-02 23:12:00 | Date Execution Prevention... | The_End_Of_Reality (334) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 482289 | 2006-09-02 23:12:00 | Hey people :) I have heard of this, and have just recently got one of these messages saying WMP had done something, I can't remember what, but that is not important... What I was wanting to know is what exactly is Data Execution Prevention and what does it do? Thanks :) |
The_End_Of_Reality (334) | ||
| 482290 | 2006-09-02 23:22:00 | Info here (en.wikipedia.org) | Speedy Gonzales (78) | ||
| 482291 | 2006-09-02 23:30:00 | Despite your heading, I think you mean Data Execution Prevention. DEP is simply a set of hardware and software memory checks that prevent you running malicious code on your computer. BURNZEE |
Burnzee (6950) | ||
| 482292 | 2006-09-03 01:28:00 | Oh, oops my bad :p Thanks Speedy, I will read up about it |
The_End_Of_Reality (334) | ||
| 482293 | 2006-09-03 04:54:00 | It's so new (like all Microsoft innovative inventions) that the Burroughs 5000 series computers had a better way to do that in the 1960s. Tag bits on every memory word showed exactly what it was: executable code, integer, real, characters, variable location (and if it had been given a value!). No way for users to change that ... only a compiler could write the tag bits. | Graham L (2) | ||
| 482294 | 2006-09-03 07:54:00 | DEP is a rather poor attempt to reduce the impact of buffer overflow attacks (often used by worms to spread automatically). This may reduce the risk that badly designed Windows services can be compromised to execute arbitrary code. It unfortunately doesn't work. | TGoddard (7263) | ||
| 482295 | 2006-09-04 20:38:00 | I read up on it, not sure why I didn't Google it first :confused: but now I understand what it is there for... Thanks :) |
The_End_Of_Reality (334) | ||
| 1 | |||||