mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-27 16:23:36 +00:00
Add lightbox to aid readability
This commit is contained in:
@ -168,7 +168,7 @@ One of the most common techniques used to gain access to a system is to find a v
|
|||||||
|
|
||||||
Address Space Layout Randomization (ASLR) makes that type of attack much more difficult because it randomizes how and where important data is stored in memory. With ASLR, it is more difficult for malware to find the specific location it needs to attack. Figure 3 illustrates how ASLR works by showing how the locations of different critical Windows components can change in memory between restarts.
|
Address Space Layout Randomization (ASLR) makes that type of attack much more difficult because it randomizes how and where important data is stored in memory. With ASLR, it is more difficult for malware to find the specific location it needs to attack. Figure 3 illustrates how ASLR works by showing how the locations of different critical Windows components can change in memory between restarts.
|
||||||
|
|
||||||

|
:::image type="content" alt-text="ASLR at work." source="images/security-fig4-aslr.png" lightbox="images/security-fig4-aslr.png":::
|
||||||
|
|
||||||
**Figure 3. ASLR at work**
|
**Figure 3. ASLR at work**
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user