Victor Mylokum
Engineering Director
With 19 years at Apriorit, Victor brings deep technical expertise shaped by hands-on experience in software development and advanced system programming. His background includes NT driver development, high-load systems, malware research, and reverse engineering.
Victor holds a master’s degree in computer science and is a key contributor to Apriorit’s technical blog. His articles deliver in-depth, practical insights into low-level programming, system architecture, and cybersecurity, helping developers and engineers address complex challenges with clarity and precision.
Featured speaker at the Apriorit webinars:
Exploring Windows Kernel Extension Opportunities of Cybersecurity Solutions: Ready-made vs Custom vs Hybrid
Rust in Cybersecurity: Capabilities and Prospects for System Programming
Certificates:
EITC/IS/CCTF Computational Complexity Theory Fundamental
EITC/IS/CCF Classical Cryptography Fundamentals
EITC/IS/ACC Advanced Classical Cryptography
EITC/QI/QIF Quantum Information Fundamentals
EITC/IS/QCF Quantum Cryptography Fundamentals
More articles from author

Monitoring Processes in User Mode with the Linux Audit Daemon
Learn three ways of process monitoring in Linux processes and master doing so with the audit daemon.

Practical Comparison of the Most Popular API Hooking Libraries: Microsoft Detours, EasyHook, Nektra Deviare, and Mhook
Explore a detailed practical comparison of the most popular API hooking libraries used to hook API function calls.

A Brief Tutorial on Modifying Network Traffic in Windows and Linux
Learn how to intercept SYN packets and modify network traffic in both Windows and Linux, as well as key use cases for doing so.

Handling OS Shutdown Events with WinAPI
Learn ways to make ways to make a console application, GUI application, and Windows service detect OS shutdown events.

User Mode and Kernel Mode in Cyber Security Technology Implementation
Comparison of driver (kernel mode) and user mode solutions for a set of system monitoring and management tasks

Simple Antirootkit Development Tutorial
This article includes description of simple unhooker that restores original System Service Table hooked by unknown rootkits, which hide some services...

Session of low-level optimization of memory usage in the C++ programs with the total exposure
In this article we will try to make our algorithms working faster using the methods of low-level optimization of memory allocation in C++.

Simple Anti-Splicer
This article describes the method how to remove all hooks from the system, which were set by means of splicing method

