Memory protection

 
 
By Jason Brooks  |  Posted 2004-08-23 Email Print this article Print
 
 
 
 
 
 
 


Memory protection

SP2 provides for DEP (data execution prevention), where areas of system memory, such as those in which data is meant to reside, are marked as nonexecutable. This should help prevent buffer overrun attacks.

DEP in SP2 is enforced by hardware, requiring an Advanced Micro Devices Inc. processor with no-execute page protection or an Intel Corp. chip with the Execute Disable bit feature. SP2 also provides for software enforcement of DEP in core Windows XP code. Administrators can shut off DEP in Windows on a systemwide or per-application basis.

Next page: Wi-Fi and Bluetooth.



 
 
 
 
As Editor in Chief of eWEEK Labs, Jason Brooks manages the Labs team and is responsible for eWEEK's print edition. Brooks joined eWEEK in 1999, and has covered wireless networking, office productivity suites, mobile devices, Windows, virtualization, and desktops and notebooks. JasonÔÇÖs coverage is currently focused on Linux and Unix operating systems, open-source software and licensing, cloud computing and Software as a Service. Follow Jason on Twitter at jasonbrooks, or reach him by email at jbrooks@eweek.com.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel