We've all heard the hype from AMD about EVP (Enhanced Virus Protection formerly known as DEP Data Execution Protection). We've also heard the hype from Intel about EDB Execute Disable Bit. These with Windows XP SP2 are supposed to stop the buffer overflow vulnerabilities that allow virii and trojans to execute on the computer. How effective are these hardware solutions in a real world situation? Say you have SP2 (to enable EVP & EDB), but none of the newer patches, so there are some known buffer overflow exploits, would these exploits be blocked (only using EVP or EDB not additional security software)? Does it only work with OS buffer overflow exploits or other program buffer overflows (like WinZip, etc.)? Has anyone read any reviews, tests, or comparisons of either? Are EVP and EDB just hype to sell new CPUs but in actuality something that is easily bypassed or doesn't work at all? It would be nice to know.