Victor
Network Security Team
Development Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author
Monitoring Processes in User Mode with the Linux Audit Daemon
Process monitoring in Linux can be useful for a security audit, performance analysis, software improvement, and many other development activities. The...
Practical Comparison of the Most Popular API Hooking Libraries: Microsoft Detours, EasyHook, Nektra Deviare, and Mhook
Hooking API function calls is an efficient way to change or augment the behavior of an operating system (OS). Developers rely on API hooking in projec...
A Brief Tutorial on Modifying Network Traffic in Windows and Linux
Enterprises send gigabytes of sensitive data through their networks daily. The bigger the organization, the more data it needs to process and the more...
Handling OS Shutdown Events with WinAPI
When a user shuts down a computer or ends a session, there’s always a risk that an active application won’t save the latest changes or won’t end...
User Mode and Kernel Mode in Cyber Security Technology Implementation
Technologies operating at the kernel level are extensively used in various cybersecurity, virtualization, system control, and monitoring solutions. At...
Simple Antirootkit Development Tutorial
This article includes description of simple unhooker that restores original System Service Table hooked by unknown rootkits, which hide some services...
Session of low-level optimization of memory usage in the C++ programs with the total exposure
In this article, we will try to make our programs working faster using the C++ software algorithms optimization tips, in particular C++ low-level opti...
Simple Anti-Splicer
This article is a logical continuation of the Simple SST Unhooker article. This article is written as an answer to the article Driver to Hide Processe...