Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

WHAT IS DATA EXECUATION PREVANTION

Answer Posted / vinod kumar

Data Execution Prevention (DEP) is a security feature
included in modern Microsoft Windows operating systems (
introduced in Win XP SP 2 ) that is intended to prevent an
application or service from executing code from a
non-executable memory region. This helps prevent certain
exploits that store code via a buffer overflow, for example.
DEP runs in two modes: hardware-enforced DEP for CPUs that
can mark memory pages as nonexecutable, and
software-enforced DEP with a limited prevention for CPUs
that do not have hardware support. Software-enforced DEP
does not protect from execution of code in data pages, but
instead from another type of attack (SEH overwrite).

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is RIS?

977


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1567


What is the sense of a fingerprint?

1005


What are major types of networks and explain

1048


What are the different types of vpns?

975


What is the difference between arp & rarp?

933


What is information security?

1081


How long can a ddos attack last?

1145


What is Cross Site Request Forgery and how to defend against it?

974


How do we use rsa for both authentication and secrecy?

913


Explain how do we use rsa for both authentication and secrecy?

948


What are the main components of the CERT Taxonomy?

3911


What is adware?

984


Explain the difference between discretionary access control and mandatory access control?

919


How does the HTTP handle state?

999