Victor
Network Security Team
Development Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author
Monitoring Processes in User Mode with the Linux Audit Daemon
Learn three ways of process monitoring in Linux processes and master doing so with the audit daemon.
Practical Comparison of the Most Popular API Hooking Libraries: Microsoft Detours, EasyHook, Nektra Deviare, and Mhook
Explore a detailed practical comparison of the most popular API hooking libraries used to hook API function calls.
A Brief Tutorial on Modifying Network Traffic in Windows and Linux
Learn how to intercept SYN packets and modify network traffic in both Windows and Linux, as well as key use cases for doing so.
Handling OS Shutdown Events with WinAPI
Learn ways to make ways to make a console application, GUI application, and Windows service detect OS shutdown events.
User Mode and Kernel Mode in Cyber Security Technology Implementation
Comparison of driver (kernel mode) and user mode solutions for a set of system monitoring and management tasks
Simple Antirootkit Development Tutorial
This article includes description of simple unhooker that restores original System Service Table hooked by unknown rootkits, which hide some services...
Session of low-level optimization of memory usage in the C++ programs with the total exposure
In this article we will try to make our algorithms working faster using the methods of low-level optimization of memory allocation in C++.
Simple Anti-Splicer
This article describes the method how to remove all hooks from the system, which were set by means of splicing method