Respuesta :

tonb
NX bit marks parts of memory as "no execute", so that even if it contains executable code, the CPU will not execute it. Some buffer overflow exploits place executable code in a buffer (and beyond), then attempt to redirect execution to this area to gain control over a process. 

In windows this is called Data Execution Prevention.