I\'m writing a test webpage which calls into a function in a DLL file. But every time before i use IE or FF to open it i have to disable DEP(Data Execution Prevention) or the sc
Buffer overflow exploits for windows will often call SetProcessDEPPolicy() after they have gained control of the instruction pointer(EIP). This step is used to make shellcode executable.