
Keystroke Monitoring
In this article we will consider the methods of kernel mode hooking of keyboard data. The described approaches can be used for solving the tasks of ke...
In this article we will consider the methods of kernel mode hooking of keyboard data. The described approaches can be used for solving the tasks of ke...
This article describes how to detect newly plugged and unplugged devices in the user-mode application while it's running
In this article, we will describe the method to perform user mode region monitoring of the specified window.
Provide blocking of access and hiding of the system registry keys depending on the context of user in the current application.
Article about automated testing environment configuration
This article can be useful for those testers who configure their test environment themselves without the help of the system administrator. The aim of...
This article is the brief description of the tools and methods, which are used for application architecture research
Low level development for Palm Web OS guide
Fixed price project delivery model with detailed estimation is a perfect option to evaluate R&D partner within the pilot project
Managed research and development services is the best option as compared with outstaffing in terms of process stabilization and releasing in-house man...
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.