Implementation of Diffie-Hellman Algorithm of Key Exchange
The article is devoted to the development of the library that implements the Diffie โ Hellman cryptographic algorithm of key exchange.
The article is devoted to the development of the library that implements the Diffie โ Hellman cryptographic algorithm of key exchange.
This article includes brief description of ELF structure and principles of its usage. It is used to provide the solution for intercepting function cal...
A research case about redirecting files so that the restricted processes still have permission to access and modify them.
How to get the HMODULE/HINSTANCE/HANDLE from static library in C++. An article by one of ApriorIT software developers. ApriorIT provides offshore syst...
Article describes how to read the SMS, MMS, and Emails data from the Windows Mobile device.
2 methods of changing printer parameters for different Windows OS versions are described
This article demonstrates one possible method of merging N sorted large text files using Forecasting algorithm in the style suggested by D.Knuth. The...
This article about GUI element arrangement testing, tools for it, test cases, documentation
This article includes practical recommendations on testing of software installation process and also includes a bulk of ready tests that are a good ba...
Article about programming for Data Execution Prevention environment in Windows - and how to switch it off
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.