previous

Microsoft's Data Execution Prevention

Data Execution Prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. In Microsoft Windows XP Service Pack 2 (SP2) and Microsoft Windows XP Tablet PC Edition 2005, DEP is enforced by hardware and by software.

The primary benefit of DEP is to help prevent code execution from data pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. Software-enforced DEP can help prevent malicious code from taking advantage of exception-handling mechanisms in Windows.

DEP Solutions

In some regions, they are disabling DEP by default at the time of the OS build.  That can be done by setting one of these two values in the c:\boot.ini (hidden file). This requires a reboot of the server.

/noexecute=OptIn
or
/noexecute=AlwaysOff

The other option is to allow Screen Painter to bypass DEP.  (Other programs may also need to be given the same access.) This is done by the following process.

Instructional Procedures

  1. Right-click on My Computer and select Properties.
  2. Go to the Advanced tab then click on Performance.
  3. Select Data Execution Prevention and click Add.
  4. Select and add the Screenwiz executable.

See Also