Data Execution Prevention

Results: 21



#Item
1Surveillance Devices Act / Crime prevention / Law enforcement / National security / Security / Privacy of telecommunications / Independent Commission Against Corruption / Surveillance / Section summary of the Patriot Act /  Title II / Patriot Act

Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2015-06-15 22:41:23
2

Installing and Executing your SkyMate Application on Windows® 8 ® The SkyMate software can be installed and run without restriction on any Windows 8 release with the DEP (Data Execution Prevention) feature disabled. Yo

Add to Reading List

Source URL: ftp.skymate.com

Language: English - Date: 2015-01-05 18:51:24
    3Programming language implementation / JIT spraying / Cross-platform software / Computing platforms / Java platform / Just-in-time compilation / Interpreter / Heap spraying / Data Execution Prevention / Computing / Software / Compiler construction

    L OBOTOMY An Architecture for JIT Spraying Mitigation Martin Jauernig Matthias Neugschwandtner

    Add to Reading List

    Source URL: www.syssec-project.eu

    Language: English - Date: 2014-11-07 13:39:36
    4Software bugs / Central processing unit / NX bit / Buffer overflow / NX technology / Data Execution Prevention / Operating system / Black Hat Briefings / Code injection / Computer security / Software / Computing

    PDF Document

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:36
    5Software bugs / Address space layout randomization / Shellcode / PaX / Buffer overflow / Data Execution Prevention / Return-oriented programming / Grsecurity / Arbitrary code execution / Computer security / Cyberwarfare / Computing

    security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2015-04-14 20:45:31
    6Address space layout randomization / Data Execution Prevention / Exploit / Pointer / JIT spraying / Computer security / Cyberwarfare / Shellcode

    Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos, and David Brumley Carnegie Mellon University[removed]

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-12-17 15:18:11
    7Software bugs / Address space layout randomization / Microsoft Windows / Resource Interchange File Format / NX bit / ANI / Buffer overflow protection / Data Execution Prevention / Computer virus / Computer security / Computing / Cyberwarfare

    VIRUS BULLETIN www.virusbtn.com EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

    Add to Reading List

    Source URL: pferrie.host22.com

    Language: English - Date: 2011-09-27 16:13:20
    8Law enforcement / Crime prevention / Surveillance / Independent Commission Against Corruption / Section summary of the USA PATRIOT Act /  Title II / National security / Security / Privacy of telecommunications

    Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

    Add to Reading List

    Source URL: www.oiicac.nsw.gov.au

    Language: English - Date: 2014-06-10 20:55:19
    9

    DxO Optics Pro v5 DEP (Data Execution Prevention) configuration under Windows Vista 1) Go to “Control Panel – System” and click on “Advanced system settings” 2) If “User Account Control” is activated, in th

    Add to Reading List

    Source URL: octopus2.dxo.com

    - Date: 2010-01-20 06:10:27
      10Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors

      Bypassing Browser Memory Protections

      Add to Reading List

      Source URL: www.azimuthsecurity.com

      Language: English - Date: 2010-04-10 04:10:26
      UPDATE