NX bit marks parts of memory as "no execute", so that even if it contains executable code, the CPU will not execute it. Some buffer overflow exploits place executable code in a buffer (and beyond), then attempt to redirect execution to this area to gain control over a process.
In windows this is called Data Execution Prevention.