Protection from zero-day attacks is one of the biggest challenges of modern cybersecurity. Although vendors are getting better and better at detecting zero-day exploits, the number of zero-day attacks and the effectiveness of them keeps increasing....
  At Apriorit, kernel and driver development is one of our key competences. We extensively use technologies operating at the kernel level in various security, virtualization, system control, and monitoring solutions that we develop for our...
This article covers the topic of email server security. Security measures covered here will allow you to greatly increase the level of protection of your email server and prevent any successful attacks.
Software industry is actively growing for many years with new technology startups appearing each day. Besides major changes it brings to the world economy and traditional industries, this rapid and constant growth affects software engineering...
Project management outsourcing, especially on the Information Technology (IT) side, has been a burgeoning industry for some time. External vendors leverage a range of expertise, and for the client having capable engineers and development personnel when...
Despite the fact that technology itself was available for a while, cloud services and related SaaS platform development only relatively recently entered our business and daily lives. Cloud boom a couple of years ago saw many companies moving their whole...
The internet makes everything easier, faster and cheaper. People are using mobile devices to access their data and services on the go. At the same time, enterprises are no longer willing to pay large licensing fees and handle maintenance for on-site...
The importance of a IT business analyst in software industry, in a modern managed development team is hard to overstate. This person helps to shape the project from its very inception by facilitating communication between development team and upper...
Program optimization, and in particular code and algorithm optimization, are very important tasks for different kinds of systems: extended client-server applications, heavy-data processors, network monitoring tools, etc. This article is a short...
With cloud services becoming increasingly popular in recent years, more and more companies, both large and small, looking into development of their own SaaS projects, whether for an external market or for internal use to streamline operations within the...
Cloud computing and virtualization are two main terms that people encounter when looking to optimize and modernize IT infrastructure of their organization. Both terms are often used in conjunction with one another and sometimes, erroneously, even...
As the 2016 year begins, we can read a series of traditionally published recent trend analysis and predictions made by industry experts after watching the IT sector, analyzing statistics, and conducting surveys. Global IT outsourcing trend analysis is...
The wide popularity of agile methodology in current software development is hard to overestimate. Advent of agile techniques allowed to save costs and greatly shortened time to market for many companies. However, one of the basic principle of agile...
The white paper describes the technology of code protection for Linux applications, which is based on the so-called “Nanomite” approach applied previously for Windows systems. It is one of the modern antidebugging methods that can be also effectively...
In this white paper, we will examine one of the modern antidebugging methods that is based on software nanomites technology. It’s also an effecient method of the process antidumping. This approach was first introduced in the Armadillo protector for...
In this article, we will tell you our own way of Impact Analysis introduction and work with it. Why did we decide to introduce Impact Analysis in software testing in our teams? What practical benefit from this innovation have we got and are getting...
This article shows how to use FTDI API to interact with the devices, which have FTDI chip within. The basic API set necessary for common operations is described. The article also touches upon topic of FTDI chips EEPROM programming.
The task was to write a utility that allow address to a specific server under FTP protocol by creation of network disk (at that, the disk must look as usual network disk in Windows). Also it was required to supply the maximum independence of separate...
This white paper concludes our Testing Process Improvement series and considers maybe one of the most difficult questions of test planning: how to estimate time required for the new tasks.
In this white paper, I will share our experience on how collaboration ot testers and developers can help to deal with the most complicated bugs.
Subscribe to updates