
Hiding of registry keys
Provide blocking of access and hiding of the system registry keys depending on the context of user in the current application.
Meet Apriorit Team at Automotive Testing Expo Europe 2025
Halls 8 & 10, Messe Stuttgart, Germany | May 20-22
Provide blocking of access and hiding of the system registry keys depending on the context of user in the current application.
This article describes the method how to remove all hooks from the system, which were set by means of splicing method
I described how to read the the attachments from the emails from your Windows Mobile device.
The article is devoted to the development of the library that implements the Diffie – Hellman cryptographic algorithm of key exchange.
The task was to implement the system for protection against unauthorized data exchange via the Clipboard
Port Locking - Case Study for USB blocking implementation
Business case study about DLP system creation with some unique security features: file system drivers, clipboard protection, temporary file encryption...
Business case study about corporate security system development to support multiple client monitoring agents (process monitoring, service monitoring...
Business case study describing backup system creation with some advanced features
Business case study on backup solution development, in particular locked file access task solution with some advanced file system drivers
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.