Windows Tip Sheet
Data Execution Prevention
WinXP SP2 stops unauthorized code, like malware, from running off system memory.
WinXP SP2 supports a hardware standard called Data Execution Protection (DEP),
a feature of some microprocessors. The idea is to prevent malicious code from
maliciously inserting itself into otherwise non-malicious areas of Windows'
memory, which is typically reserved for non-executable code. WinXP SP2 also
includes a software version of DEP designed to, in Microsoft's words,
"reduce exploits of exception handling mechanisms in Windows" (read:
stop viruses from taking advantage of our bugs). And it's even on by default.
DEP isn't an antivirus solution: Viruses can still install themselves.
But DEP does keep an eye on system memory where no executable code should live,
and makes sure that it doesn't take up residence there to get itself called
in response to an operating system exception. Essentially, if code tries to
execute from these "non-executable" memory areas, Windows steps
on it.
By default, XP's software DEP is turned on for the core operating system
components, but you can turn it on for much more, enabling it for all programs,
disabling it entirely, or add applications to the DEP exception list. You can't
turn off hardware DEP, if your processor has it (many x64 processors do).
A link to the full DEP configuration instructions is below, but the short course
is: Open the Properties of My Computer, select the Advanced tab, and click Settings
under Performance. You'll see a DEP tab where configuration occurs. Enjoy.
Additional Resources:
About the Author
Don Jones is a multiple-year recipient of Microsoft’s MVP Award, and is Curriculum Director for IT Pro Content for video training company Pluralsight. Don is also a co-founder and President of PowerShell.org, a community dedicated to Microsoft’s Windows PowerShell technology. Don has more than two decades of experience in the IT industry, and specializes in the Microsoft business technology platform. He’s the author of more than 50 technology books, an accomplished IT journalist, and a sought-after speaker and instructor at conferences worldwide. Reach Don on Twitter at @concentratedDon, or on Facebook at Facebook.com/ConcentratedDon.