Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 11 January 2010

Windows 7 - Fine-Tuning Data Execution Prevention

Posted on 10:58 by Unknown
Data Execution Prevention (DEP) is a memory protection technology. Your computer uses DEP to mark all memory locations used by applications as nonexecutable unless the location explicitly contains executable code. If an application attempts to execute code from a memory page marked as nonexecutable, the processor can raise an exception and prevent it from executing. This behavior is designed to thwart a malicious program, such as a virus, from inserting itself into areas of memory. By allowing only specific areas of memory to run executable code, DEP protects your computer from many types of self-replicating viruses.

You can implement DEP via hardware or software. Hardware-based DEP is more robust because you can extend it to any program or service running on the computer. Softwarebased DEP is less robust because it typically works best when protecting Windows programs and services.

Windows 32-bit versions support DEP as implemented originally by Advanced Micro
Devices Inc. (AMD) processors that provide the no-execute page-protection (NX) processor feature. Such processors support the related instructions and must be running in Physical Address Extension (PAE) mode. Windows 64-bit versions also support the
NX processor feature but do not need to be running in PAE mode. And 64-bit computers natively support very large memory configurations.

You can determine whether your computer hardware supports DEP by completing the following steps:
1. In the Control Panel, click the System and Security category heading link.

2. Click System. In the left pane under See Also, click Performance Information and Tools.

3. Under Tasks, click “Adjust visual effects.” This opens the Performance Options dialog box.

4. Click the Data Execution Prevention tab. The lower portion of this tab lists the DEP support available.

Once you’ve accessed the Data Execution Prevention tab, you can configure the way DEP works using these options:

Turn on DEP for essential Windows programs and services only
Enables DEP only for the operating system services, programs, and components. This is the default and recommended option for computers that support execution protection and are configured appropriately.

Turn on DEP for all programs except those I select
Enables DEP for the operating system, as well as all programs and services you are running.

Because some programs won’t work with or will become unstable with software-based
DEP, you may find that you have to add exceptions when you enable DEP for all programs. Click Add to specify programs that should run without execution protection.
In this way, execution protection will work for all programs except those you have listed.

Source of Information : OReilly Windows 7 The Definitive Guide
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Windows 7 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ▼  January (33)
      • Windows 7 - If the Printer Isn’t Found
      • Windows 7 - Installing a Local Printer
      • Windows 7 - Installing and Configuring a Printer
      • Windows 7 Printing Primer
      • Windows 7 Network Locations
      • What’s New in Windows 7 Networking
      • Windows XP with SP2: A First Look at Today’s Netwo...
      • Windows 7 UAC
      • How UAC Has Changed in Windows 7
      • How UAC Works
      • User Account Control
      • Understanding User Accounts
      • Internet Explorer 8 Security Features
      • Windows 7 - Action Center
      • Securing Windows 7 in Just Two Steps
      • Windows Security
      • Windows 7 - 32-bit vs 64-bit versions
      • Improving Windows 7’s Memory
      • Windows 7 Appearance and Performance Tweaking
      • Using Windows 7’s Performance Options
      • Windows 7 - Fine-Tuning Data Execution Prevention
      • Windows 7 - Improving Your Windows Experience Inde...
      • Windows 7 - Understanding Your Windows Experience ...
      • Windows 7 - Getting Your Windows Experience Index ...
      • Windows 7 - Advanced Printer Management
      • Windows 7 - Using the System Configuration Tool to...
      • Windows 7 - Printing Offline
      • Windows 7 - Starting Application Programs Automati...
      • Windows 7 - Understanding Automatic Updates
      • Windows 7 - Making It Boot Faster
      • Virtual Folders—A Short History Lesson
      • Windwos 7 - Virtual Folders 101
      • Windows 7 Changing Search and Indexing Settings
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile