Defesas contra buffer overflows no Vista

Um artigo interessante da Microsoft:

http://msdn2.microsoft.com/en-us/library/bb430720.aspx

Windows Vista incorporates numerous defensive strategies to protect customers from exploits. Some of these defenses are in the core operating system, and others are offered by the Microsoft Visual C++ compiler. The defenses include:

* /GS Stack buffer overrun detection.
* /SafeSEH exception handling protection.
* No eXecute (NX) / Data Execution Prevention (DEP) / eXecute Disable (XD).
* Address space layout randomization (ASLR).
* Heap randomization.
* Stack randomization.
* Heap corruption detection.

In the rest of this document, we will briefly explain each of these defenses and offer guidance deployment and test guidance.