Fans of delving into the settings of the Windows operating system must have met the mention of DEP. This is an English abbreviation formed from the words Data Execution Prevention, which in Russian transcription means the function to prevent the execution of data. For example, these settings in the "Seven" can be easily found if you follow the path: "My computer" - open "Properties" - go to "Advanced options" - now "Advanced" and "Settings". The only tab you need is data execution prevention. Here the user is given the opportunity to select the mode of operation of the function: use for some system services and programs or for all but the specified exception. True, disconnecting dep from here will fail, but more on that later.
The DEP function is a software solution integrated into Windows (starting with XP with the second service pack) that allows you to prevent the execution of program code from the data area (heap, stack). The mechanism of working with memory suggests that there are several areas in which executable code sections should not be located. Despite this, in Linux with the kernel up to 2.3.23 and in Windows up to SP2, no control over the placement of program data in the system memory was performed. Of course, with the exception of protecting the core itself. The creators of malicious programs (viruses) simply could not help but exploit this vulnerability, as a result of which various worms and exploits began to actively expand, gaining access rights through root. In addition, many viruses caused buffer overflows and actual computer freezes.
To prevent this, a protection mechanism was implemented. At that time, no one even thought about how to disable dep, because it seemed good. Processor developers quickly orientated themselves and turned on hardware support for this function - these are the XD bits for the Pentium 4 of the sixth series and the NX bits for the Athlon 64. Interestingly, due to the proper marketing, the availability of such support cost the buyer extra money. Currently, processors without XD (NX) do not exist, as well as operating systems. It is especially noteworthy that even in Android 4.1, support for dep appeared. You can learn more about the features of this function on the global network.
If everything is so good, then why is the question โhow to disable depโ sometimes asked? The answer is simple - some programs are written without considering the features of the system memory manager. Prior to the โeraโ of DEP, this was not of fundamental importance, since the user needs the application that he runs to work, and how it interacts with the system there is the tenth thing. Of course, we are talking about normal programs, not viruses.
With the advent of DEP, Windows began to prohibit code execution from incorrectly written programs. This is understandable, because the system does not know exactly what caused the strange behavior - a virus or a legal program. There is only one way out - to figure out how to disable dep. By the way, rumors persisted at one time that turning off this function allows you to increase the speed of your computer. Some users have argued that since the CPU and operating system use part of their resources to check the status of memory pages, knowing how to disable dep can increase system performance. The basis of this assumption is true, but the acceleration of work is within the margin of error, therefore, it can be neglected.
Nevertheless, if due to DEP there are problems with starting any program, the function may be disabled. In the "Seven" to do this, do the following:
- click the combination of Win + R;
- in the line that appears, type "bcdedit.exe / set {current} nx AlwaysOff" (without quotes) and press Enter.
Important: the user must work in the system with administrator rights. So simple. After this operation, the function will be disabled for all applications and services.