12Haz
Understanding DEP as a mitigation technology part 2
In our previous blog post, we explained how DEP works and how to determine if / how a process opted-in to DEP. Now we will demonstrate how DEP can be used to mitigate the risk of a real-world attack.
We published a security advisory in February describ…