- Song Tom
- PowerBuilder
- Friday, 16 August 2024 09:23 AM UTC
Dear Appeon:
There is another security issue to ask your advice, Is there any way for Powerbuiilder to prevent code injection by marking memory regions as non-executable? as we known ASLR, DEP, and SafeSEH are considered best practices for all developers to implement as they help protect against users exploiting insecure code. DEP helps to prevent code injection by marking memory regions as non-executable as protection against buffer overflows. Is there any way for Powerbuilder to protect memory against buffer overflow like that? A penetration test suggest us to compile application with some additional security measures to protect against code exploitation (in this case with DEP), Can give us some advice on that?
Find Questions by Tag
Helpful?
If a reply or comment is helpful for you, please don’t hesitate to click the Helpful button. This action is further confirmation of their invaluable contribution to the Appeon Community.