
Hooking COM Objects: Intercepting Calls to COM Interfaces
The two main approaches to COM intercepting hooks are described and discussed
The two main approaches to COM intercepting hooks are described and discussed
This article includes description of some general features and some specific ones of the memory management in Linux.
In this article, Iโm going to tell you something about the Clipboard internals by showing how you can forbid access to it.
This article was written mainly for developers who use Firebird Embedded SQL Server in .Net framework applications and want to speed up or optimize DB...
In this article we will consider the methods of kernel mode hooking of keyboard data. The described approaches can be used for solving the tasks of ke...
This article describes how to detect newly plugged and unplugged devices in the user-mode application while it's running
In this article, we will describe the method to perform user mode region monitoring of the specified window.
Provide blocking of access and hiding of the system registry keys depending on the context of user in the current application.
Low level development for Palm Web OS guide
Article that describes development of a simple file system Linux driver to hide files from the system under Linux OS
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.