Mass Effect 3 Message Board  STATUS: ACTIVE - Trainers are still being considered and updated for this title as patches are released. There is no guarantee that a trainer can be made or updated but it will be reviewed by our staff.

Our Mass Effect 3 Trainer is now available for version 06.28.2020 and supports STEAM, ORIGIN. Our Mass Effect 3 message board is available to provide feedback on our trainers or cheats.
Mass Effect 3 Trainer
REQUEST MORE OPTIONS
0 option(s) for voting
FILE UPDATE REQUEST
0 report(s) filed
BOOST UPDATE PRIORITY
Boost currently not available
Message Board for PC version
Page 2 of 2   •  First Page  •  Previous Page  •   Next Page  •   Last Page
Signup or Login to Post
DEP
  • Current rank: 4 Stars. Next Rank at 10.000 Posts.
    Send a message to Neo7
    AUTHOR
    Neo7 posted on Mar 13, 2012 7:24:24 AM - Report post
     
    quote:
    originally posted by Drakonis

    Excuse my ignorance but what is "dep"

    Data Execution Prevention (known on other systems as the NX bit) is a protective measure against buffer overflows. It works by marking privileged areas in memory with the NX marker (No eXecute) which prevents these memory areas from executing code from any account that is not part of the NT_AUTHORITY family of users (and it is near impossible to log into these accounts and have them do stuff). This prevents exploits based off of buffer overflows and stack smashing since the intended code the attacker needs to execute to do whatever will never execute because the OS is instructed at the hardware level to never let it happen. Poorly coded software that isn't malicious can often trigger false positives with this scheme.

    The end result is that instead of being exploited, Windows will immediately kill the offending process and notify you of the incident. Under Linux, it will most likely appear as a violation under SE Linux and the front end application for that will notify you.

    [Edited by Neo7, 3/13/2012 7:26:34 AM]

    Your bitterness, I will dispel
  • Premium Plus
    Send a message to Drakonis
    TIER 7
    Drakonis posted on Mar 13, 2012 7:52:45 AM - Report post
     
    quote:
    originally posted by Neo7

    quote:
    originally posted by Drakonis

    Excuse my ignorance but what is "dep"

    Data Execution Prevention (known on other systems as the NX bit) is a protective measure against buffer overflows. It works by marking privileged areas in memory with the NX marker (No eXecute) which prevents these memory areas from executing code from any account that is not part of the NT_AUTHORITY family of users (and it is near impossible to log into these accounts and have them do stuff). This prevents exploits based off of buffer overflows and stack smashing since the intended code the attacker needs to execute to do whatever will never execute because the OS is instructed at the hardware level to never let it happen. Poorly coded software that isn't malicious can often trigger false positives with this scheme.

    The end result is that instead of being exploited, Windows will immediately kill the offending process and notify you of the incident. Under Linux, it will most likely appear as a violation under SE Linux and the front end application for that will notify you.

    [Edited by Neo7, 3/13/2012 7:26:34 AM]

    Thanks for the detailed explanation, that was informative. If you have a good AV program and are very careful with what you allow would you still need something like this?

    EA is the anti-Midas touch company. Everything they touch turns to garbage.
  • Current rank: 4 Stars. Next Rank at 10.000 Posts.
    Send a message to Neo7
    AUTHOR
    Neo7 posted on Mar 13, 2012 8:57:47 AM - Report post
     
    Absolutely. Anti-Viruses are actually not as helpful as you think they are and most damage comes fro zero-day malware (which AVs can't do anything to counter it). An outdated AV is also useless. It is more secure to run Windows Update and keep your programs and run-times up to date. My previous Windows installation had 4 java exploits for those fake AV things attempt to break into my computer and was stopped cold by the Java runtime since it was up-to-date (it exploited older Java runtime versions by exploiting a specific method that allowed arbitrary code to be executed at the administrator level bypassing any need for user interaction). AV didn't need to jump in at all.

    They still lingered on my system afterwards since when it did try to exploit the specific point, it wound up crashing since it wasn't programmed to be able to handle that scenario (and the cleanup process to hide it's track never executed). One fresh install to Windows 8 (using backups) and found that those malware were still there (although dead at that point).

    [Edited by Neo7, 3/13/2012 9:00:04 AM]
    Your bitterness, I will dispel
  • Current rank: 4.5 Stars. Next Rank at 20.000 Posts.
    Send a message to ServiusTheBear
    AUTHOR
    ServiusTheBear posted on Mar 13, 2012 11:44:58 AM - Report post
     
    It can be handy but can be annoying sometimes lol.
    CH Moderator From 16.12.2018 to 24.12.2021
    Active Community Helper from 25.12.2021
    My Site - www.serviusthebear.webs.com
  • Premium Plus
    Send a message to Drakonis
    TIER 7
    Drakonis posted on Mar 13, 2012 12:39:58 PM - Report post
     
    quote:
    originally posted by Neo7

    Absolutely. Anti-Viruses are actually not as helpful as you think they are and most damage comes fro zero-day malware (which AVs can't do anything to counter it). An outdated AV is also useless. It is more secure to run Windows Update and keep your programs and run-times up to date. My previous Windows installation had 4 java exploits for those fake AV things attempt to break into my computer and was stopped cold by the Java runtime since it was up-to-date (it exploited older Java runtime versions by exploiting a specific method that allowed arbitrary code to be executed at the administrator level bypassing any need for user interaction). AV didn't need to jump in at all.

    They still lingered on my system afterwards since when it did try to exploit the specific point, it wound up crashing since it wasn't programmed to be able to handle that scenario (and the cleanup process to hide it's track never executed). One fresh install to Windows 8 (using backups) and found that those malware were still there (although dead at that point).

    [Edited by Neo7, 3/13/2012 9:00:04 AM]

    Might have to check it out then, thanks. I've never had any problems but you can't be too careful these days.

    EA is the anti-Midas touch company. Everything they touch turns to garbage.
  • Current rank: 1.5 Stars. Next Rank at 500 Posts.
    Send a message to Dragoneye
    ELITE
    Dragoneye posted on Mar 13, 2012 1:38:09 PM - Report post
     
    DEPEE.......sounds like your computer has issues
    It's all in the......whoops!
  • Current rank: 4.5 Stars. Next Rank at 20.000 Posts.
    Send a message to ServiusTheBear
    AUTHOR
    ServiusTheBear posted on Mar 14, 2012 12:22:42 AM - Report post
     
    quote:
    originally posted by Dragoneye

    DEPEE.......sounds like your computer has issues

    lol na its not got issues.

    CH Moderator From 16.12.2018 to 24.12.2021
    Active Community Helper from 25.12.2021
    My Site - www.serviusthebear.webs.com
Page 2 of 2   •  First Page  •  Previous Page  •   Next Page  •   Last Page
Signup or Login to Post
All times are (GMT -06:00) Central Time (US & Canada). Current time is 2:55:41 PM