Please read my blog's comment policy here.
Microsoft’s Security Research and Defense team has released an updated version of their Enhanced Mitigation Experience Toolkit (EMET), a tool that allows the application of enhanced security mitigations around the application of your choice.
While Internet Explorer 9 already natively includes many of the protections that EMET provides (including DEP/NX and SEHOP), the tool includes several mitigations that are not otherwise available, including the ability to force all DLLs to load with randomized base addresses (aka ForceASLR). These mitigations can help prevent exploitation of certain types of memory-related vulnerabilities-- for instance, the SRD team blogs about a case where EMET blocked an exploit of a PDF Reader application by randomizing the base address of modules it loads.
EMET has moved out of its experimental incubation phase and is now an officially supported Microsoft product.
Would EMET work on a .NET application that hosts the browser control - among other things?
@JohnS: Yup, that would work!
Permanent download link: go.microsoft.com/fwlink