User Mode and Kernel Mode in Cyber Security Technology Implementation
Comparison of driver (kernel mode) and user mode solutions for a set of system monitoring and management tasks
Comparison of driver (kernel mode) and user mode solutions for a set of system monitoring and management tasks
A collection of articles on software development and research topics: tips, best practices, code samples, tutorials, particular tasks
A list of most used techniques, in-built tools, and best practicies to ensure data security in iOS apps
Learn how to protect your application from ever popular stack overflow exploits
An overview of main mobile information security issues, with some suggestions on how to deal with them
A sample Android app implementing Android KeyStore and its alternatives for previous versions
An explained example of JavaScript plugin for Outlook development, pros and cons of JavaScript and COM plugins
The method of accessing third-party app private data like skype messages on Android - with sample code
A collection of articles on software development and research topics: tips, best practices, code samples, tutorials, particular tasks
A custom library to organize communication between clients and servers working in different processes: schemes, source code
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.