
Pros and Cons of Using DKMS
This article explains the pros and cons of using DKMS. It will be useful for driver developers who are debating whether to use DKMS to distribute thei...
LIVE Webinar
Secure SDLC with Automation Pipelines for SaaS Products
LIVE ON
December 11, 2025
9 AM PST | 6 PM CET


This article explains the pros and cons of using DKMS. It will be useful for driver developers who are debating whether to use DKMS to distribute thei...

In this article, we explain our approach to developing Windows drivers using a QEMU virtual device.

Learn how to significantly improve and simplify your runtime algorithms with the help of Diana Dasm and Diana Processor - the solutions developed by t...

Learn more about FPGA technology and how to create a VGA driver based on FPGA from this article.

Meet the third part of our special series on hooking Linux kernel functions with the help of ftrace.

Meet the second part of our series on hooking Linux kernel functions with ftrace.

Meet the first part of our series dedicated to hooking Linux kernel functions using ftrace. Explore four helpful approaches to use for your solutions...

The article provides a close look at the host-based firewall architecture and explains the principles behind host-based firewalls with real-life examp...

Practical tips on how to use LD_PRELOAD with the GCC attribute constructor to preload libraries in the custom order.

Is it possible to build a transparent SSL proxy on a regular PC?
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.