- Data Execution Protection. DEP prevents code from executing from areas
of memory that should only contain data (and not code), such as the
stack and various memory pools. The rational for this is to prevent an
attacker from inserting rogue code into a PC's
memory and then persuading Windows to run it. To operate, DEP needs to
be supported by both the Operating System and the Processor.
Also known as Execution Protection, NX or No Execute.
For more information see:
- http://support.microsoft.com/kb/875352 - Detailed description of the Data Execution Prevention feature in Windows XP and Windows 2003.