Data Execution Prevention (DEP)

The best-known data execution prevention (DEP) is found on Windows computers. This is a method of preventing the launch of unwanted or malicious program code. DEP does not allow programs to use their own or third-party memory areas in a suspicious manner during their intended execution.

Such attacks using 'executables' are typical for viruses or Trojans that want to gain access to the system. If an attacker succeeds in executing his malicious program code in the system memory, the security and integrity of the system would no longer be guaranteed. If the upstream DEP detects such an illegal access attempt, it terminates the program immediately. The user usually only sees a window pop up informing them that the program has been stopped.

DEP is activated by default on 64-bit systems. It protects the Windows programs and services there. On 32-bit systems, this DEP function must first be activated. It is possible to exclude unsuspicious programs from this monitoring at any time. However, this is done at your own risk.

Write a comment