News
Microsoft Aims To Boost Security With New APIs for Developers
New APIs that will make security settings easier for developers, particularly for those writing code to run on Windows Server 2008, Vista and XP SP3.
In a blog post today, Microsoft announced new APIs that will make security settings easier for developers, particularly for those writing solutions that will run on Windows Server 2008, Windows Vista and Windows XP SP3.
The APIs support Microsoft's Data Execution Prevention approach to application security.
"We want more people to opt-in to using Data Execution Prevention (aka DEP aka NX)," the blog post from Michael Howard reads. "We've added some new APIs that allow a developer to set DEP on their process at runtime rather than using linker options. The new APIs also give developers some more flexibility if your application uses an older version of the Abstract Type Library (ATL.)"
Microsoft's DEP technologies help prevent malicious code downloads from data pages by performing "additional checks on memory," according to the company.
The new APIs are SetProcessDEPPolicy, GetSystemDEPPolicy, GetProcessDEPPolicy. More details on how to implement them, as well as possible downsides and conflicts, are described in Howard's blog post here.
About the Author
Becky Nagel serves as vice president of AI for 1105 Media specializing in developing media, events and training for companies around AI and generative AI technology. She also regularly writes and reports on AI news, and is the founding editor of PureAI.com. She's the author of "ChatGPT Prompt 101 Guide for Business Users" and other popular AI resources with a real-world business perspective. She regularly speaks, writes and develops content around AI, generative AI and other business tech. Find her on X/Twitter @beckynagel.