in
Microsoft
The Intel memory protection is primitive. And Intel writes C compilers for their processors, which cheerfully mix data, code, and stacks in the same space. Which is why a simple buffer or stack overflow can plant and run hostile code in an application. After decades of chasing buffer overflow exploits, Wintel has STILL not managed to make them impossible. The common NOP SLED exploit works if the data on the stack can be executed!
Windows sales are down, and with luck will continue to decline.