Hi All, I'm curious to learn about your regard for and experience with software-based memory firewall functionality (e.g., Comodo Memory Firewall, Determina, CoreTrace, etc.). What does this mean to you? What have you observed in various memory firewall implementations (no problems at all, false positives, software conflicts, effectiveness, reaction to attacks, etc.)? With ASLR, DEP, 64 bit registers, and other mechanisms included with newer operating systems, what do you think of the value of memory firewall functionality? What are you observing and reading about with respect to the quantity/trend of code injection attacks in the wild? What do you consider the most notorious memory-based malware samples? Considering what robust HIPS products can do regarding over-flow attacks that 'own' a process, or inter-process attacks, how would you characterize the state of the art? What approaches work, what does not? I very much look forward to you insights, observations, and opinions. There are quite a few opinions within Blue Ridge. However, I view this thread like a mirror: we vendors need to look in them to see if our teeth have been stained by the company Kool Aid. Cheers, Eirik P.S. I named a few vendors above to more easily communicate the issue. I wish to pick your brains on concepts and technology, not solicit negatives on other vendors.