Data Execution Prevention (DEP) security feature

]There are several webpages, one in particular for my online account for school that will not open on my computer.(also occurred when I tried to download new flash).

Whenever i log on the page, it will freeze and direct me to a webpage error

“Internet Explorer has closed this webpage to help protect your computer”
A malfunctioning or malicious add-on has caused Internet Explorer to close this webpage.

I then proceded to windows help webside which instructed to Click the (control panel/system tools) Data Execution Prevention tab, and then click Turn on DEP for all programs and services except those I select.

I followed those intructions and no luck. Any advice!?!?! Thanks

get hijack this from here : http://www.filehippo.com/download_hijackthis/download/8571e06e5eb8ab03c649f3b5d647c599/

install and do a system scan only. do not fix anything beacuse the settings identified in a HijackThis log file can belong to both legitimate software and unwanted malware. post log here using additional options while posting.

Isn’t IE fun?

Have you tried running IE in ‘No Add-ons’ mode?

You may need to (temporarily) reduce ActiveX security in order to install the latest Flash. Makr sure you get it from the legitimate Adobe website!!

http://www.slickit.ca/2009/03/internet-explorer-fix-ie8-dep-crashes.html?showComment=1241737440000#c2475664414582364257

(Some of the comments are good, but the actually blog is gibberish MVM hasn’t been around since XP SP2, and this dude is writing about Windows 7.)

Turning off DEP may help as a last resort- although that reduces security.

Alternatively, try Firefox or Opera.

Thank you will try!

FreeWheelin Frank,

Looking at the quality of your post, I would think you would be the last person who could effectively differentiate between gibberish and a nice coherent piece of writing.

Obviously, you didn’t even read the article on Slick IT. In fact, the author - a guy that I know personally - even took the time to put a disclaimer in the article for dumbasses such as you. If you would have read it, you would have realized that the screen shots were from Windows 7 as he tells you, but the issue described is for Windows XP SP3.

You are right about XP SP3 not having the MVM - but what you are failing to take into account is the upgrade path that resulted in SP3 being applied. If you are going from SP1 on an OEM CD - like many people are - and end up using MS update to get up to SP3, MVM will be installed, alive, and well on that machine. Furthermore, it will be the source of issues as Paul pointed out.

Instead of offering anything helpful, you instead point the person to Opera or Firefox. This is not a solution - it isn’t even a workaround.
Disabling DEP…again that is not a solution. DEP, a feature that was engineered by people holding Ph.Ds in computer science, was put in place to stop rogue applications, bad drivers, and root kits from executing code in protected memory space. I know you don’t understand what that means, but you have definitely felt the effects on your spyware infested OS. Disabling DEP is stupid - it is a valuable tool in the fight against malware.

In the future, if you are going to critique a piece of writing, you should get your facts straight and take some time to actual (sp) read the post.

Hello slayer2009,

Have some respect to fwf. he is one of the contributors to forum.

you can say what you said, in a different way.

nmb

Well, I don’t know who engineered DEP (some other Windows features look more like they were engineered by a group of drunks :)), however, you seem not to understand DEP very much either - or at least formulate it in a strange way.
DEP doesn’t prevent rogue applications, bad drivers, and rootkits [I don’t see what is so special about rootkits to name them specifically - they are either rogue applications, or bad drivers] from executing code somewhere; when they are already active, they don’t need to execute code in DEP-protected areas!
DEP prevents (to a certain extent) exploits from being performed - thus preventing malicious code from starting in the first place.

That’s basically what Frank wrote - it you have happened to read his post.

@ slayer2009

there you go enough?

Sorry, I was wrong.

I doubt that Frank has had many, if any, spyware infections on any of his computers in the last 5 years or so.

Yes, an apology is in order.


I thought insulting other users was a no no on this forum. ??? I vote for a re-edit of the post to remove the insults.

Perhaps you should follow your own advice huh ? ::slight_smile:

While I will apologize for the insult, the essence of my post remains valid.

He called that particular blog post “gibberish” which is an insult in itself. I didn’t initiate the insult, he did. That being said, I will say sorry - dumbass was probably over the top.

DEP does exactly what I said it did. It prevents code from executing in sections of memory that are marked read only. Call it an exploit, call it whatever you like - many forms of malware get on to machines by executing code through buffer overflows etc. DEP will prevent that.

A rootkit is not really an application. Some rootkits actually modify the kernel itself.

And finally, while we all have fun taking pokes at Windows, there are very few of us that could engineer anything that even comes close to the complexity of the Windows OS architecture. The people that designed this are extremely intelligent and often understand and have reasons for design decisions that we are not privvy to.

Again, freewheeling Frank - I do apologize - dumbass was too harsh. I hope you will accept my apology, but I am also sure that you can appreciate some of what I said here.

CHeers. (And by the way, I help a lot of people in the MS forums and have rarely posted in anger such as I did here - If I can help in anyway on your forum, I most certainly will. )