Windows Data Execution Prevention is intended to hinder exploitation of memory corruption bugs by enforcing page permissions, thus preventing execution of shellcode from memory regions such as the stack or the heap. It turns out drraid doesn't like this, and has put together a talk on modern attacks on DEP so that we can keep sh*t moving. This talk covers old/lame techniques, as well as the modern and still effective techniques for beating DEP, and briefly discusses ASLR as well.
Dr Raid is a Pwnie-award winning rap artist who doesn't actually know technology but can string buzzwords together in a fancy way. He often huffs rubber cement and uses a divining rod to identify vulnerabilities in software, and then proceeds to curl into a fetal position and cry, pretending the bugs aren't real. Some where along the way an exploit gets written and he winds up drunk. He *definitely* doesn't work for a super huge security company that would be upset about his presentation or profane bio.