Apriorit
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author

Web Applications: Common Vulnerabilities and Ways to Eliminate Them
Is your web application secure and free from vulnerabilities? Read this article to learn about common web application vulnerabilities and ways to miti...

Analyzing Network Activities with Bro IDS and Intel Critical Stack
This article may be useful for security administrators and DevSecOps who are looking for alternative ways of detecting network intrusions and suspicio...

Typical Web Application Security Issues and Solutions
Get a brief overview of the 3 most widespread web app vulnerabilities: security Misconfiguration; broken session and authentication problems; and Cros...

How to Build Android Application .apk File From the Command Line
In this article, I will describe how to use the Android tools for building the .apk file using the command line

Caching in .NET and SQL Server Notifications
Get a quick overview of various caching methods used in ASP.NET projects with their pros, cons, and implementation tips

Testing JavaScript with Jasmine
Get insights, settings, and ready code pieces to organize testing of JavaScript with Jasmine

Classes Restoration – Useful Tips for Software Reverse Engineers
A short intro lesson for software reverse engineers considering classes restoration in Delphi. Learn how to get class methods and arguments.

Apriorit Code Protection for Linux: Scheme, Main Components
White paper describes the custom implementation of the nanomite and debug blocker technologies for Linux applications

A Cross-platform Parser of the Dynamic Disks Structure
Short description of basics of dynamic disk types and structures, main volume structures, and an example of a simple parser of dynamic disk structure...

