Protecting Against Programs With Security Risk

The following procedures find risky executables on the system and prevent programs from exploiting process heaps and executable stacks.