Data Execution Prevention

Results: 21



#Item
1Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2015-06-15 22:41:23
2Installing and Executing your SkyMate Application on Windows® 8 ® The SkyMate software can be installed and run without restriction on any Windows 8 release with the DEP (Data Execution Prevention) feature disabled. Yo

Installing and Executing your SkyMate Application on Windows® 8 ® The SkyMate software can be installed and run without restriction on any Windows 8 release with the DEP (Data Execution Prevention) feature disabled. Yo

Add to Reading List

Source URL: ftp.skymate.com

Language: English - Date: 2015-01-05 18:51:24
    3L OBOTOMY An Architecture for JIT Spraying Mitigation Martin Jauernig Matthias Neugschwandtner

    L OBOTOMY An Architecture for JIT Spraying Mitigation Martin Jauernig Matthias Neugschwandtner

    Add to Reading List

    Source URL: www.syssec-project.eu

    Language: English - Date: 2014-11-07 13:39:36
    4

    PDF Document

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:36
    5security  The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z  Ed is currently working on his

    security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2015-04-14 20:45:31
    6Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos, and David Brumley Carnegie Mellon University[removed]

    Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos, and David Brumley Carnegie Mellon University[removed]

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-12-17 15:18:11
    7VIRUS BULLETIN www.virusbtn.com  EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

    VIRUS BULLETIN www.virusbtn.com EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

    Add to Reading List

    Source URL: pferrie.host22.com

    Language: English - Date: 2011-09-27 16:13:20
    8Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

    Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

    Add to Reading List

    Source URL: www.oiicac.nsw.gov.au

    Language: English - Date: 2014-06-10 20:55:19
    9DxO Optics Pro v5 DEP (Data Execution Prevention) configuration under Windows Vista 1) Go to “Control Panel – System” and click on “Advanced system settings” 2) If “User Account Control” is activated, in th

    DxO Optics Pro v5 DEP (Data Execution Prevention) configuration under Windows Vista 1) Go to “Control Panel – System” and click on “Advanced system settings” 2) If “User Account Control” is activated, in th

    Add to Reading List

    Source URL: octopus2.dxo.com

    - Date: 2010-01-20 06:10:27
      10Bypassing Browser Memory Protections

      Bypassing Browser Memory Protections

      Add to Reading List

      Source URL: www.azimuthsecurity.com

      Language: English - Date: 2010-04-10 04:10:26