<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SEHOP &#8211; Phocean.net</title>
	<atom:link href="/tag/sehop/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Computer Security Blog</description>
	<lastBuildDate>Fri, 24 Feb 2017 21:17:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.10</generator>
	<item>
		<title>EMET: configure memory protection on Windows</title>
		<link>/2010/09/25/emet-configure-memory-protection-on-windows.html</link>
		<pubDate>Sat, 25 Sep 2010 15:56:00 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[Reversing]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[ALSR]]></category>
		<category><![CDATA[buffer overflow]]></category>
		<category><![CDATA[DEP]]></category>
		<category><![CDATA[EMET]]></category>
		<category><![CDATA[SEHOP]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=911</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=911</guid>
		<description><![CDATA[Microsoft published a nice tool named EMET (Enhanced Mitigation Experience Toolkit) whose purpose is to check and enforce the memory security policies such as ALSR and DEP. It shows and allows to configure the global settings, but also, and this is the most interesting part, indicated for each process running if it supports those security...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2010/09/25/emet-configure-memory-protection-on-windows.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>Microsoft published a nice tool named <a title="EMET" href="http://www.microsoft.com/downloads/en/confirmation.aspx?FamilyID=c6f0a6ee-05ac-4eb6-acd0-362559fd2f04" target="_blank">EMET</a> (Enhanced Mitigation Experience Toolkit) whose purpose is to check and enforce the memory security policies such as ALSR and DEP.</p>
<p>It shows and allows to configure the global settings, but also, and this is the most interesting part, indicated for each process running if it supports those security measures. It is even able to enforce the protections for each application which would not support it natively (i.e. not set at compilation time).</p>
<p style="text-align: center;"><img class="aligncenter" title="EMET" src="/wp-content/uploads/2010/09/EMET.png" alt="" width="640" height="360" /></p>
]]></content:encoded>
			</item>
	</channel>
</rss>
