Modern operating systems have incorporated a bit "non_executable" to label
whether the content in a memory page (e.g., a memory block) can be executed.
If stack frames are organized into these memory pages and labeled as "non_executable".
(1)Will this stop the shellcode injected to the stack (e.g.,
the buffer allocated in the stack) from be executed? Please justify.
2)Will this eradicate the possibility that an attacker executes unwanted code in the target system?