
Victor
Network Security Team
Development Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
System ProgrammingCybersecurity
More articles from author

Process monitoring in Linux can be useful for a security audit, performance analysis, software improvement, and many other development activities. The...

Hooking API function calls is an efficient way to change or augment the behavior of an operating system (OS). Developers rely on API hooking in projec...

Enterprises send gigabytes of sensitive data through their networks daily. The bigger the organization, the more data it needs to process and the more...

When a user shuts down a computer or ends a session, there’s always a risk that an active application won’t save the latest changes or won’t end...

Technologies operating at the kernel level are extensively used in various cybersecurity, virtualization, system control, and monitoring solutions. At...

This article includes description of simple unhooker that restores original System Service Table hooked by unknown rootkits, which hide some services ...