R
RJ
One of the security features touted in XP SP2 is the prevention
of buffer overruns or buffer overflows. Applications and operating systems can store commands
in short-term memory, called buffer memory, and through poor programming
or hacking, that buffer memory can be overwritten by other code. This provides a way for hackers
to crash a computer, cause it to lock up, allow malevolent code to be executed, and so on.
SP2 is supposed to prevent buffer overruns. However, as reported on ZDNet, this needed addition
to Windows XP (hardware enforced DEP) will only work on a handful of PCs (comparitively) using
certain
processors (for now).
MS has done the right thing by adding this protection to XP, but maybe it won't do you any good.
See the link below for more info.
http://blogs.zdnet.com/index.php?p=283
of buffer overruns or buffer overflows. Applications and operating systems can store commands
in short-term memory, called buffer memory, and through poor programming
or hacking, that buffer memory can be overwritten by other code. This provides a way for hackers
to crash a computer, cause it to lock up, allow malevolent code to be executed, and so on.
SP2 is supposed to prevent buffer overruns. However, as reported on ZDNet, this needed addition
to Windows XP (hardware enforced DEP) will only work on a handful of PCs (comparitively) using
certain
processors (for now).
MS has done the right thing by adding this protection to XP, but maybe it won't do you any good.
See the link below for more info.
http://blogs.zdnet.com/index.php?p=283