CertCities.com -- The Ultimate Site for Certified IT Professionals
Visit CertCities.com Forums and Ost Your Mind Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Columns ..Column Story Friday: April 4, 2014


 Zubair's Security Zone  
Zubair Alexander
Zubair Alexander


 How DEP Protects Your Computer
Microsoft's Data Execution Prevention tool keeps tabs on your system's memory to make sure applications are using it properly.
by Zubair Alexander  
3/15/2007 -- Hackers are busy every day writing malicious code that can harm our computers. They attack our systems and spread viruses using various methods, like writing applications that execute code from system memory areas that are reserved for only authorized applications. Once a program takes over your system, it can spread over to files, other applications or your e-mail contacts.

Keeping computers safe from hackers is essentially a cat-and-mouse game, where the good guys have the upper hand only until the bad guys come up with ways to circumvent the safeguard. Microsoft and other vendors are constantly working on ways to prevent these attacks and close security holes.

One such security feature in Windows is called Data Execution Prevention (DEP). DEP is supported on at least the following Windows operating systems:

  • Windows XP SP2 or later
  • Windows XP Tablet PC Edition 2005
  • Windows Server 2003 SP1 or later
  • Windows Vista

DEP can be enforced either by hardware or by software. It's primarily a set of technologies that perform memory checks to protect against viruses and other security threats on a computer. Simply put, DEP acts like a security guard that monitors your system's memory to ensure that applications are using it properly.

DEP software can work alone or in conjunction with compatible CPUs. If your computer has a CPU that supports a hardware-based technology known as "execution protection," DEP can tag certain areas of memory as "non-executable." If it discovers that an application is using the system memory incorrectly and is executing code from the area marked as "non-executable," it will close the application and inform you of the violation.

To configure DEP in Windows XP/2003, go to Control Panel, System, Advanced and click Settings under Performance. Click on the Date Execution Prevention tab to configure the options for DEP. In Vista, go to Control Panel, System and Maintenance, System, Advanced system settings under task and then click Settings under Performance. Click on the Date Execution Prevention tab to configure the options for DEP (as shown in Figure 1).

Figure 1
[Click on image for larger view.]
Figure 1. Configuring DEP options.

Tip: You can quickly get to System Properties by using the Windows key-Pause/Break key combination in Windows XP/2003/Vista.

If your computer doesn't support hardware-based DEP, Windows will offer to use DEP software to help protect your system. There are two ways you can configure DEP:

1. Turn on DEP for essential Windows programs and services only.
2. Turn on DEP for all programs and services except those you select.

The first option is the default option. The second option provides a higher level of security; DEP will monitor all programs, not just the essential programs and services. If you want, you can exclude certain programs from this list -- if you trust the programs' vendors, of course. For example, you can add iTunes to the list of applications that DEP shouldn't monitor.

If you get a warning from DEP and it closes an application, you can run the application again as long as you haven't turned DEP off. However, if you keep getting a notification from DEP that a specific program isn't running correctly, instead of turning DEP off, contact the software vendor and inquire about a DEP-compatible version or update.

For more information, check out Microsoft's Knowledge Base article 875352. Although the KB article doesn't mention Vista, DEP is also supported on Vista computers as I pointed out earlier.


Zubair Alexander, MCSE, MCT, MCSA and Microsoft MVP is the founder of SeattlePro Enterprises, an IT training and consulting business. His experience covers a wide range of spectrum: trainer, consultant, systems administrator, security architect, network engineer, author, technical editor, college instructor and public speaker. Zubair holds more than 25 technical certifications and Bachelor of Science degrees in Aeronautics & Astronautics Engineering, Mathematics and Computer Information Systems. His Web site, www.techgalaxy.net, is dedicated to technical resources for IT professionals. Zubair may be reached at .

 


More articles by Zubair Alexander:

-- advertisement --


There are 14 CertCities.com user Comments for “How DEP Protects Your Computer”
Page 1 of 2
6/20/11: Cherlin from wZspygaWY says: ThatÂ’s not just logic. ThatÂ’s rlealy sensible.
6/12/13: Richard Brown from USA says: We are pleased to invite you to our upcoming CISSP (Certified Information System Security Professional) Certification Training Workshop scheduled in Houston, TX on June 25-28, 2013. The CISSP® program is a credential for professionals who develop policies and procedures in Information Security. The CISSP® exam tests one's competence in the ten domains of the (ISC)² CBK, which cover critical topics in security today, including risk management, cloud computing, mobile security, application development security and more. Course Features 1. Offers a career differentiator, with enhanced credibility and marketability 2. Provides access to valuable resources, such as peer networking and idea exchange 3. Makes broad-based security information resources readily available 4. Adds to credibility with the rigor and regimen of the certification examinations 5. Provides a business and technology orientation to risk management 6. Provides a business and technology orientation to risk management 7. Offers a solutions-orientation, not specialization, based on the broader understanding of the (ISC)² CBK Course Kit: 1. 4-days of Intensive classroom training from our highly qualified & experienced instructor 2. 90 days of Online Coaching 3. Life-time enrollment to CISSP® Discussion Forums 4. A copy of "Official (ISC)² CISSP® CBK" 5. Attain Live weekly webinars (weekends) 6. Avail_35 CPE Certificates Complimentary Online Course of your choice: CISA CISM, ASTQB CTFL, ITIL Foundation or Agile & Scrum e-learning course (worth USD175) Grab this opportunity now. “Register Now” http://www.simplilearn.com/it-security-management/cissp-certification-training/ Daniel Irwin, Global Manager, Simplilearn Americas LLC. 281-668-7691 [email protected]
7/1/13: louis vuitton outlet online from [email protected] says: nice articles louis vuitton outlet online http://www.louisvuittonttoutlet.com
7/1/13: michael kors outlet from [email protected] says: nice articles michael kors outlet http://www.michaelkorsioutlet.org/
7/5/13: gucci outlet store from [email protected] says: nice articles gucci outlet store http://www.guccioutletstore-online.com
7/5/13: christian louboutin outlet store from [email protected] says: ths christian louboutin outlet store http://www.christianlouboutinoutleta.com
7/24/13: Discount Louboutin from [email protected] says: thanks for share! Discount Louboutin http://www.discount-louboutin.net/
8/30/13: best nfl uniforms from [email protected] says: good articles best nfl uniforms http://www.bestnflluniforms.com
8/31/13: michael kors outlet from [email protected] says: thanks for share! michael kors outlet http://www.michaelkorsioutlet.org/
8/31/13: michael kors outlet online from [email protected] says: thank you for share! michael kors outlet online http://www.michaelkorsioutlet.org/
First Page   Next Page   Last Page
Your comment about: “How DEP Protects Your Computer”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top