HP 303B Maintenance & Service Guide: HP 303B Microtower Business PC - Page 45

Computer Setup F10 Utilities, Computer Setup-Power continued

Page 45 highlights

Table A-3 Computer Setup-Power (continued) After AC Power Failure Allows you to select system restart behavior after power loss: ● Stay Off ● Power On ● Auto XD Disables/enables XD (eXecute Disable) bit. NOTE: The XD bit is a technology used in to separate areas of memory for use by either storage of processor instructions or code or for storage of data. Memory designated with the NX attribute may only be used for storing data. Processor instructions should not reside and cannot be executed there. This technology is used to prevent buffer overflow attacks - malicious software that takes over computers by inserting code into another program's data storage area and running that code. Computer Setup (F10) Utilities 37

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87

Table A-3
Computer Setup—Power (continued)
After AC Power
Failure
Allows you to select system restart behavior after power loss:
Stay Off
Power On
Auto
XD
Disables/enables XD (eXecute Disable) bit.
NOTE:
The XD bit is a technology used in to separate areas of memory for use by either storage
of processor instructions or code or for storage of data. Memory designated with the NX attribute
may only be used for storing data. Processor instructions should not reside and cannot be
executed there. This technology is used to prevent buffer overflow attacks – malicious software
that takes over computers by inserting code into another program's data storage area and running
that code.
Computer Setup (F10) Utilities
37