Hooking Linux Kernel Functions, Part 1: Looking for the Perfect Solution
Meet the first part of our series dedicated to hooking Linux kernel functions using ftrace. Explore four helpful approaches to use for your solutions...
Meet the first part of our series dedicated to hooking Linux kernel functions using ftrace. Explore four helpful approaches to use for your solutions...
The article provides a close look at the host-based firewall architecture and explains the principles behind host-based firewalls with real-life examp...
Practical tips on how to use LD_PRELOAD with the GCC attribute constructor to preload libraries in the custom order.
Is it possible to build a transparent SSL proxy on a regular PC?
What are MITM attacks and how to protect against them?
Based on our experience in programming, we decided to create a Rust vs C++ comparison chart that clearly shows the differences between these two popul...
In this part of the Rust Language Tutorial, weโll tell you about pattern matching, automatically deducing types using type inference, and ensuring m...
This part of our Rust Programming Tutorial describes the features that help programmers eliminate data races in threads and reduce code duplication wi...
This article is the second part of our Rust Programming Language Tutorial written for software developers. This part describes Rust features that guar...
This Rust programming language tutorial based on our experience at Apriorit will provide you with a deep look into Rust features and their practical a...
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.