Dear Appeon:
There is another security issue to ask your advice, Is there any way for Powerbuiilder to prevent code injection by marking memory regions as non-executable? as we known ASLR, DEP, and SafeSEH are considered best practices for all developers to implement as they help protect against users exploiting insecure code. DEP helps to prevent code injection by marking memory regions as non-executable as protection against buffer overflows. Is there any way for Powerbuilder to protect memory against buffer overflow like that? A penetration test suggest us to compile application with some additional security measures to protect against code exploitation (in this case with DEP), Can give us some advice on that?
Andreas.