Starting process in the logged session under the local system account
This article contains the description of how to start a process in the current active session on session logon notification event with permissions of...
LIVE WEBINAR
MASTERING SECURITY FOR FINTECH MOBILE APPLICATIONS: ADVANCED STRATEGIES
LIVE ON
FEBRUARY 13TH
9 AM PST | 7 PM EET
LIVE WEBINAR
MASTERING SECURITY FOR FINTECH MOBILE APPLICATIONS: ADVANCED STRATEGIES
This article contains the description of how to start a process in the current active session on session logon notification event with permissions of...
This article includes a description of the monitoring process for the session logon/logout, connect/disconnect (regarding terminal and client sessions...
The two main approaches to COM intercepting hooks are described and discussed
This article includes description of some general features and some specific ones of the memory management in Linux.
This article is for those who write or are going to write functional tests for any programs. The goal of this article is to give the flavor of the mai...
In this article, Iโm going to tell you something about the Clipboard internals by showing how you can forbid access to it.
This article describes how to root android device using ADB. Learn how android root exploit works and get to know main principles of android rooting.
This article was written mainly for developers who use Firebird Embedded SQL Server in .Net framework applications and want to speed up or optimize DB...
Article is devoted to the basic principles of exploratory testing
In this article we will consider the methods of kernel mode hooking of keyboard data. The described approaches can be used for solving the tasks of ke...
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.