I am wondering about Windows XP because I thought I had read somewhere that Winxp did not allow buffer overflow errors somehow... ie overwriting execution data with data until the end of the block and somehow allowing it to keep writing off the end of the block onto another process be it accidental due to incorrect installation of software or hardware or on purpose by ovewriting data with zero's until you can 'drop' commands onto the shell process... but recently I have been having some NO_MORE_IRP_STACK_LOCATIONS issues and upon reading further on this error (35) it sounds very similar to a buffer overflow... now I suppose I have a few questions, Is this what I think it is... and two, can this be exploited?(I hope not), and can buffer overflows be eliminated in a windows environment? A few months back an employee downloaded a very nasty virus that installed itself and waited for a reboot and logon by an administrator account at which point it overwrote a specific security zone of ntoskrnl with zero's allowing guest users admin status and patched ntldr to not notice a bad checksum! after that an attacker was allowed to upload anything he liked to the computer... which had Norton Internet Security installed, all updates, etc... It actually used Norton CCAPP (symantec common client architecture) against me in that it would lock up everything whenever it was loaded into memory. I was wondering if a buffer overflow is how they gained access in the first place as aren't those files normally locked from changes?