All Topics
|
|
19 Aug 2009
Updated: 23 Sep 2009
Rating: 4.93/5
Votes: 14
Popularity: 5.32
Licence: CPOL
Views: 23,790
Bookmarked: 16
Downloaded: 0
This article describes the protocol of data exchange that is the modification of the well-known OBEX protocol used in the GSM Samsung phones from the SHP family
|
Artificial Intelligence
|
|
19 Oct 2018
Updated: 19 Oct 2018
Rating: 4.81/5
Votes: 5
Popularity: 3.36
Licence: CPOL
Views: 16,644
Bookmarked: 25
Downloaded: 0
Two ways of performing object recognition using OpenCV and comparing them to each other. Both approaches have their own pros and cons. This comparison will help to choose the best one for your task.
|
|
7 Mar 2019
Updated: 7 Mar 2019
Rating: 3.86/5
Votes: 3
Popularity: 1.84
Licence: CPOL
Views: 8,532
Bookmarked: 10
Downloaded: 0
How to use this Google service and the free NVIDIA Tesla K80 GPU to achieve your own goals in training neural networks
|
Deep Learning |
10 Dec 2018
Updated: 10 Dec 2018
Rating: 0.00/5
Votes: 0
Popularity: 0.00
Licence: CPOL
Views: 11,407
Bookmarked: 1
Downloaded: 0
The experience of improving Mask R-CNN performance six to ten times by applying TensorRT
|
Machine Learning |
4 Apr 2019
Updated: 4 Apr 2019
Rating: 5.00/5
Votes: 1
Popularity: 0.00
Licence: CPOL
Views: 5,431
Bookmarked: 0
Downloaded: 0
Find out an easy way to use the pretrained Inception V3 neural network for video classification.
|
|
18 Feb 2019
Updated: 18 Feb 2019
Rating: 5.00/5
Votes: 4
Popularity: 3.01
Licence: CPOL
Views: 7,754
Bookmarked: 16
Downloaded: 0
A detailed description of an FPGA-specific framework called ISE Design Suite, and the main steps you need to take in order to create a VGA driver using FPGA
|
Neural Networks |
30 Apr 2019
Updated: 30 Apr 2019
Rating: 5.00/5
Votes: 4
Popularity: 3.01
Licence: CPOL
Views: 7,590
Bookmarked: 7
Downloaded: 0
The approach that allows you to make a neural network analyze the current frame while remembering the state of previous frames
|
|
22 Mar 2019
Updated: 22 Mar 2019
Rating: 4.50/5
Votes: 5
Popularity: 3.15
Licence: CPOL
Views: 8,072
Bookmarked: 9
Downloaded: 0
Learn more about the challenges we faced with dataset preparation and network configuration, and how these problems can be solved.
|
Containers
|
Virtual Machine |
21 Sep 2009
Updated: 21 Sep 2009
Rating: 4.96/5
Votes: 17
Popularity: 5.84
Licence: CPOL
Views: 49,333
Bookmarked: 20
Downloaded: 118
This article describes the process of initial configuration and basic work with Palm Web OS on the lower level than it's described in Palm SDK docs.
|
|
24 Feb 2010
Updated: 24 Feb 2010
Rating: 4.87/5
Votes: 12
Popularity: 5.25
Licence: CPOL
Views: 29,072
Bookmarked: 37
Downloaded: 1,074
This article is a brief description of some tools and methods of application architecture research. Premilinary research, sniffers, hooks.
|
|
2 Jun 2009
Updated: 23 Jul 2009
Rating: 4.95/5
Votes: 260
Popularity: 11.94
Licence: CPOL
Views: 817,736
Bookmarked: 595
Downloaded: 20,026
This article describes the first steps in low-level programming on the example of developing of simple boot loader
|
|
24 Sep 2010
Updated: 24 Sep 2010
Rating: 4.38/5
Votes: 5
Popularity: 3.06
Licence: CPOL
Views: 31,131
Bookmarked: 6
Downloaded: 0
The aim of the article is to present a step-by-step description of the installation and configuration of the domain controller, Exchange Server, and MS Outlook with two accounts for the testing purposes.
|
|
18 Jan 2019
Updated: 18 Jan 2019
Rating: 0.00/5
Votes: 0
Popularity: 0.00
Licence: CPOL
Views: 4,721
Bookmarked: 2
Downloaded: 0
This article allows you to save valuable time
|
Cryptocurrency
|
|
28 Feb 2019
Updated: 28 Feb 2019
Rating: 4.00/5
Votes: 1
Popularity: 0.00
Licence: CPOL
Views: 2,630
Bookmarked: 0
Downloaded: 0
The details of the NEO DoS vulnerability and how to recreate it.
|
Database Development
|
|
5 Aug 2010
Updated: 6 Aug 2010
Rating: 4.67/5
Votes: 6
Popularity: 3.63
Licence: CPOL
Views: 48,977
Bookmarked: 24
Downloaded: 992
The aim of this article is to create the library for writing e-mail messages in the *.pst format (used by Microsoft Outlook) to the file.
|
Data Visualization |
4 Nov 2010
Updated: 4 Nov 2010
Rating: 4.88/5
Votes: 19
Popularity: 6.23
Licence: CPOL
Views: 28,480
Bookmarked: 23
Downloaded: 546
This article describes the method to perform user mode region monitoring of the specified window.
|
Desktop Programming
|
ATL |
27 May 2010
Updated: 27 May 2010
Rating: 4.75/5
Votes: 7
Popularity: 4.01
Licence: CPOL
Views: 62,922
Bookmarked: 17
Downloaded: 1,462
In this article, we examine the problems of program control of the Microsoft Hyper-V hypervisor with the help of the C++ language and WMI technology.
|
MFC |
21 Jan 2009
Updated: 17 Aug 2009
Rating: 4.57/5
Votes: 145
Popularity: 9.87
Licence: CPOL
Views: 650,299
Bookmarked: 369
Downloaded: 28,514
In this article, we describe the driver we created to hide processes and files in a system.
|
Win32 |
6 Feb 2012
Updated: 6 Feb 2012
Rating: 4.82/5
Votes: 22
Popularity: 6.47
Licence: CPOL
Views: 69,785
Bookmarked: 73
Downloaded: 2,266
In his article, we will consider an interesting, universal and rarely used method of code injection into a Windows process using KnownDlls sections. To demonstrate the method work we will develop a sample project to inject into all running processes and intercept some calls from ws2_32.dll.
|
|
9 Jul 2009
Updated: 23 Jul 2009
Rating: 4.57/5
Votes: 19
Popularity: 5.62
Licence: CPOL
Views: 142,786
Bookmarked: 53
Downloaded: 4,647
This article shows how to use FTDI API to interact with the devices, which have FTDI chip within. EEPROM programming is also discussed.
|
DevOps
|
Testing |
24 Jan 2019
Updated: 24 Jan 2019
Rating: 5.00/5
Votes: 1
Popularity: 0.00
Licence: CPOL
Views: 5,260
Bookmarked: 1
Downloaded: 0
Smart security contract in Cardano and Zilliqa
|
General Programming
|
Algorithms |
20 Nov 2018
Updated: 20 Nov 2018
Rating: 0.00/5
Votes: 0
Popularity: 0.00
Licence: CPOL
Views: 6,582
Bookmarked: 1
Downloaded: 0
Find out approaches which you can use to improve runtime algorithms for zero-day threat detection
|
Debugging |
2 Jul 2013
Updated: 3 Jul 2013
Rating: 4.92/5
Votes: 13
Popularity: 5.48
Licence: CPOL
Views: 43,228
Bookmarked: 29
Downloaded: 1,463
This article describes the implementation of a simple tool to deal with debug blocking based on the function execution time
|
|
15 Jul 2013
Updated: 15 Jul 2013
Rating: 5.00/5
Votes: 3
Popularity: 2.39
Licence: CPOL
Views: 20,993
Bookmarked: 2
Downloaded: 0
Modern anti-debug techniques - Nanomites and Debug Blocker - are considered for Windows and Linux code
|
|
4 Mar 2019
Updated: 4 Mar 2019
Rating: 5.00/5
Votes: 4
Popularity: 3.01
Licence: CPOL
Views: 6,800
Bookmarked: 7
Downloaded: 0
A clear overview on how you can establish communication between a device and its driver
|
|
1 Mar 2019
Updated: 1 Mar 2019
Rating: 5.00/5
Votes: 1
Popularity: 0.00
Licence: CPOL
Views: 4,461
Bookmarked: 3
Downloaded: 0
And its modules during runtime
|
|
7 Apr 2016
Updated: 7 Apr 2016
Rating: 4.97/5
Votes: 41
Popularity: 8.01
Licence: CPOL
Views: 77,986
Bookmarked: 65
Downloaded: 0
Several approaches of anti-debug protection and some tips about how they are usually neutralized by reversers
|
File |
17 May 2010
Updated: 17 May 2010
Rating: 4.50/5
Votes: 7
Popularity: 3.80
Licence: CPOL
Views: 49,161
Bookmarked: 29
Downloaded: 1,922
In this article, we will examine a problem of receiving the correct value of the dmCopies variable in the DEVMODE structure while printing from Microsoft Word 2003.
|
Threads |
3 Dec 2010
Updated: 6 Dec 2010
Rating: 4.40/5
Votes: 13
Popularity: 4.90
Licence: CPOL
Views: 78,408
Bookmarked: 38
Downloaded: 2,214
This article includes a description of the monitoring process for the session logon/logout, connect/disconnect (regarding terminal and client sessions). Obtained results will be then used in the next article ”Creating process in the session”.
|
|
3 Dec 2010
Updated: 6 Dec 2010
Rating: 4.83/5
Votes: 10
Popularity: 4.83
Licence: CPOL
Views: 66,546
Bookmarked: 32
Downloaded: 1,700
This article contains the description of how to start a process in the current active session on session logon notification event with permissions of system process running in the current session.
|
macOS
|
|
26 Apr 2011
Updated: 26 Apr 2011
Rating: 4.83/5
Votes: 8
Popularity: 4.36
Licence: CPOL
Views: 41,646
Bookmarked: 9
Downloaded: 0
Knowing the principle of linking of imported functions in Mach-O libraries, we can achieve a rather interesting effect: we can redirect their calls to our code, in which, in its turn, we can use the original one.
|
Mobile Apps
|
|
16 Mar 2011
Updated: 16 Mar 2011
Rating: 5.00/5
Votes: 1
Popularity: 0.00
Licence: CPOL
Views: 52,646
Bookmarked: 17
Downloaded: 942
This article covers the creation of the CAB-installers for the Windows CE 5.0/6.0 applications for thin clients.
|
Android |
11 Aug 2009
Updated: 23 Sep 2009
Rating: 4.68/5
Votes: 17
Popularity: 5.51
Licence: CPOL
Views: 50,303
Bookmarked: 45
Downloaded: 1,947
In this article I described how to develop and install remotely Java service for the Android devices
|
|
9 Sep 2013
Updated: 9 Sep 2013
Rating: 4.69/5
Votes: 11
Popularity: 4.47
Licence: CPOL
Views: 31,901
Bookmarked: 19
Downloaded: 8
Development of an application for analysis of programs installed on a mobile device.
|
|
4 Mar 2015
Updated: 5 Mar 2015
Rating: 3.61/5
Votes: 11
Popularity: 3.76
Licence: CPOL
Views: 27,253
Bookmarked: 21
Downloaded: 889
An interesting approach to create Android applications, which user cannot remove or stop (only admin can do this applying specific password), without using ROOT permissions.
|
Windows Mobile |
3 Nov 2010
Updated: 4 Nov 2010
Rating: 4.75/5
Votes: 7
Popularity: 4.01
Licence: CPOL
Views: 33,422
Bookmarked: 18
Downloaded: 673
In this article, I would like to tell you how to read the SMS, MMS, and Emails data from your Windows Mobile device. Also I’ll describe some differences between reading message body in Windows Mobile 5 and Windows Mobile 6 devices.
|
Operating Systems
|
Linux |
29 Nov 2010
Updated: 29 Nov 2010
Rating: 4.68/5
Votes: 17
Popularity: 5.76
Licence: CPOL
Views: 64,852
Bookmarked: 26
Downloaded: 0
Some general features and some specific ones of the memory management in Linux are discribed; some approaches of memory allocation are proposed
|
Windows |
11 Mar 2011
Updated: 11 Mar 2011
Rating: 4.93/5
Votes: 13
Popularity: 5.49
Licence: CPOL
Views: 75,469
Bookmarked: 15
Downloaded: 0
This article will describe basics of static code analysis with PREfast in Visual Studio.
|
|
20 Nov 2009
Updated: 20 Nov 2009
Rating: 4.97/5
Votes: 24
Popularity: 6.77
Licence: CPOL
Views: 101,128
Bookmarked: 62
Downloaded: 2,720
This article is devoted to the methods of the driver packages installation/uninstallation using WiX.
|
|
17 Dec 2010
Updated: 28 Dec 2010
Rating: 4.40/5
Votes: 5
Popularity: 3.08
Licence: CPOL
Views: 32,700
Bookmarked: 8
Downloaded: 227
In this article, I will describe the usage of external files for storing of test data and their usage in TestComplete scripts
|
|
30 Nov 2010
Updated: 30 Nov 2010
Rating: 4.71/5
Votes: 12
Popularity: 4.90
Licence: CPOL
Views: 94,907
Bookmarked: 45
Downloaded: 0
This article describes the story of an experiment whose main goal was to perform the Windows OS debugging using the USB bus.
|
Programming Languages
|
ASM |
8 Dec 2009
Updated: 8 Dec 2009
Rating: 4.98/5
Votes: 29
Popularity: 7.28
Licence: CPOL
Views: 52,692
Bookmarked: 104
Downloaded: 1,298
In this article, we continue investigation in the field of hiding application in the system. This article will tell where Windows OS stores the services and how uses them. We’ll discuss how this knowledge can be applied to finding our custom service and hiding it.
|
C |
11 Nov 2009
Updated: 11 Nov 2009
Rating: 4.93/5
Votes: 49
Popularity: 8.20
Licence: CPOL
Views: 51,239
Bookmarked: 67
Downloaded: 1,058
In this article we'll consider some things about the Clipboard internals by showing how you can forbid access to it.
|
|
19 Aug 2009
Updated: 23 Sep 2009
Rating: 4.25/5
Votes: 9
Popularity: 4.06
Licence: CPOL
Views: 45,341
Bookmarked: 24
Downloaded: 1,120
This article is devoted to the Embedded Firebird database usage and also development of C++ wrapper of this database.
|
|
22 Aug 2012
Updated: 2 Sep 2012
Rating: 4.44/5
Votes: 13
Popularity: 4.95
Licence: CPOL
Views: 43,714
Bookmarked: 34
Downloaded: 775
Simple driver for Linux OS that performs hiding of the selected files from the system
|
|
24 Sep 2010
Updated: 26 Sep 2010
Rating: 4.91/5
Votes: 48
Popularity: 8.26
Licence: CPOL
Views: 146,670
Bookmarked: 109
Downloaded: 2,669
In this article, I am going to describe the process of writing and building of a simple driver-module for Linux OS
|
|
2 Apr 2010
Updated: 25 Jul 2013
Rating: 4.90/5
Votes: 33
Popularity: 7.37
Licence: CPOL
Views: 135,234
Bookmarked: 67
Downloaded: 1,039
This article gives a brief description of ELF libs structure and functioning and also shows how to intercept function calls from one library into another.
|
|
28 Dec 2009
Updated: 19 Mar 2012
Rating: 4.99/5
Votes: 45
Popularity: 8.15
Licence: CPOL
Views: 436,294
Bookmarked: 183
Downloaded: 8,294
This article describes an easy way to set up system-wide global API hooks.
|
|
26 Apr 2011
Updated: 26 Apr 2011
Rating: 4.78/5
Votes: 6
Popularity: 3.72
Licence: CPOL
Views: 32,021
Bookmarked: 9
Downloaded: 229
The article covers the interception and redirection of calls to the third-party dynamically linked libraries in the program under Mac OS X.
|
|
15 Feb 2010
Updated: 15 Feb 2010
Rating: 4.99/5
Votes: 98
Popularity: 9.87
Licence: CPOL
Views: 194,651
Bookmarked: 335
Downloaded: 8,152
This article is oriented to Windows-developers and considers how to create virtual disk in Windows system.
|
|
17 Mar 2010
Updated: 17 Mar 2010
Rating: 4.92/5
Votes: 13
Popularity: 5.48
Licence: CPOL
Views: 37,246
Bookmarked: 26
Downloaded: 1,223
This article includes a description of a simple unhooker that restores original SST hooked by unknown rootkits, which hide some services and processes.
|
|
6 Nov 2009
Updated: 10 Jun 2015
Rating: 4.89/5
Votes: 118
Popularity: 10.04
Licence: CPOL
Views: 1,117,757
Bookmarked: 303
Downloaded: 12,009
This tutorial will show you how to develop a simple file system filter driver.
|
C# |
9 Jun 2010
Updated: 7 Jun 2011
Rating: 4.81/5
Votes: 38
Popularity: 7.60
Licence: CPOL
Views: 90,936
Bookmarked: 127
Downloaded: 1,893
This article will help you to examine the main features of XSL schemes to generate programmatically advanced PDF reports.
|
|
26 Jun 2009
Updated: 26 Jun 2009
Rating: 4.70/5
Votes: 8
Popularity: 4.24
Licence: CPOL
Views: 32,293
Bookmarked: 13
Downloaded: 0
In this article, we will review some aspects of using data types and ways of using them during marshaling data. We’ll concentrate on marshaling to and from unmanaged code.
|
|
20 May 2009
Updated: 20 May 2009
Rating: 4.97/5
Votes: 33
Popularity: 7.35
Licence: CPOL
Views: 146,150
Bookmarked: 93
Downloaded: 7,502
This article is devoted to the issue of working with services and applications in Windows Vista. Solutions are given both for C++ and C#. This article might be useful for those who deal with the task of organizing interactions between services and applications on Windows Vista.
|
C++ |
17 Apr 2014
Updated: 17 Apr 2014
Rating: 4.85/5
Votes: 11
Popularity: 5.05
Licence: CPOL
Views: 19,421
Bookmarked: 23
Downloaded: 0
In this article, we’ll consider Dynamic Disks. We are going to explore the program implementation with the help of the LDM (Logical Disk Manager) technology.
|
|
30 Nov 2010
Updated: 30 Nov 2010
Rating: 4.83/5
Votes: 20
Popularity: 6.18
Licence: CPOL
Views: 83,301
Bookmarked: 44
Downloaded: 3,807
In this article, I will describe the method of setting the printer settings and the problems I faced on different OS versions.
|
|
15 Jun 2010
Updated: 15 Jun 2010
Rating: 4.40/5
Votes: 5
Popularity: 3.08
Licence: CPOL
Views: 32,684
Bookmarked: 10
Downloaded: 714
In this article, we provide the library which can be used in client – server applications to cover transport layer using virtual channels.
|
|
12 Aug 2010
Updated: 12 Aug 2010
Rating: 4.90/5
Votes: 17
Popularity: 6.02
Licence: CPOL
Views: 54,686
Bookmarked: 45
Downloaded: 2,222
This article includes a description of the simple multi-monitor screenshot creation and splicing screenshots from the display monitor into the one virtual screen sized bitmap using Windows GDI functions.
|
|
4 Oct 2018
Updated: 4 Oct 2018
Rating: 5.00/5
Votes: 7
Popularity: 4.23
Licence: MIT
Views: 8,290
Bookmarked: 7
Downloaded: 0
Learn how was increased mhook’s performance, enhanced its capabilities and eliminated certain bugs.
|
|
16 Jun 2009
Updated: 22 Jun 2009
Rating: 5.00/5
Votes: 13
Popularity: 5.57
Licence: CPOL
Views: 39,344
Bookmarked: 44
Downloaded: 246
In this article, we will try to make our algorithms work faster using the methods of low-level optimization of memory allocation in C++.
|
|
1 Dec 2009
Updated: 1 Dec 2009
Rating: 4.70/5
Votes: 14
Popularity: 5.24
Licence: CPOL
Views: 32,888
Bookmarked: 33
Downloaded: 0
This article was mostly written for Linux developers. The article gives a method of writing out-of-process plugins to open source software.
|
|
28 Dec 2010
Updated: 29 Dec 2010
Rating: 4.88/5
Votes: 41
Popularity: 7.87
Licence: CPOL
Views: 65,243
Bookmarked: 93
Downloaded: 770
This article describes the differences in sockets usage under BSD and Windows
|
|
14 Dec 2009
Updated: 14 Dec 2009
Rating: 4.97/5
Votes: 24
Popularity: 6.47
Licence: CPOL
Views: 72,785
Bookmarked: 57
Downloaded: 1,337
This article is the description of the first steps in setting QT, Visual Studio and FireBird.
|
|
17 May 2010
Updated: 17 May 2010
Rating: 4.87/5
Votes: 44
Popularity: 7.91
Licence: CPOL
Views: 81,205
Bookmarked: 103
Downloaded: 2,591
This article describes some basic specific moments of porting application from Windows to Linux
|
|
15 Feb 2010
Updated: 10 Mar 2010
Rating: 5.00/5
Votes: 46
Popularity: 8.17
Licence: CPOL
Views: 109,474
Bookmarked: 155
Downloaded: 9,081
This article is the continue of the previously posted article Hide Driver. Some methods to detect hidden files and processes are described in it
|
|
11 Mar 2011
Updated: 11 Mar 2011
Rating: 4.93/5
Votes: 33
Popularity: 7.49
Licence: CPOL
Views: 69,037
Bookmarked: 115
Downloaded: 8,822
This article describes a driver that hides processes and files using the method of splicing.
|
|
19 Oct 2009
Updated: 19 Oct 2009
Rating: 4.93/5
Votes: 53
Popularity: 8.37
Licence: CPOL
Views: 102,502
Bookmarked: 163
Downloaded: 4,712
In this article, we will consider the methods of hooking keyboard data in the kernel mode.
|
|
18 Oct 2010
Updated: 18 Oct 2010
Rating: 4.78/5
Votes: 34
Popularity: 7.27
Licence: CPOL
Views: 122,689
Bookmarked: 102
Downloaded: 7,654
How to detect device changes in the user-mode applications for Windows
|
|
2 Feb 2011
Updated: 2 Feb 2011
Rating: 4.91/5
Votes: 34
Popularity: 7.52
Licence: CPOL
Views: 86,415
Bookmarked: 101
Downloaded: 2,564
In this article, I’m going to describe how to implement COM interface hooks.
|
|
22 Dec 2010
Updated: 7 Aug 2012
Rating: 4.75/5
Votes: 37
Popularity: 7.45
Licence: CPOL
Views: 75,151
Bookmarked: 112
Downloaded: 2,853
This article describes the process of recovering of deleted data from the flash drive
|
|
29 Jun 2009
Updated: 29 Jun 2009
Rating: 4.88/5
Votes: 18
Popularity: 6.00
Licence: CPOL
Views: 32,953
Bookmarked: 37
Downloaded: 1,131
This article describes a sample parser of reg files using the Boost Spirit Parser Framework. We'll discuss why we use the curtain libraries and make one or another solution, algorithm, and also tests.
|
|
18 May 2011
Updated: 20 May 2011
Rating: 4.83/5
Votes: 12
Popularity: 5.22
Licence: CPOL
Views: 45,392
Bookmarked: 46
Downloaded: 1,184
This article describes the development of the library for performing text search based on Boolean search queries.
|
|
2 Apr 2010
Updated: 2 Apr 2010
Rating: 4.88/5
Votes: 14
Popularity: 5.59
Licence: CPOL
Views: 104,932
Bookmarked: 31
Downloaded: 3,736
The article is devoted to the development of the library that implements the Diffie – Hellman cryptographic algorithm of key exchange.
|
|
5 Aug 2010
Updated: 5 Aug 2010
Rating: 4.80/5
Votes: 47
Popularity: 7.99
Licence: CPOL
Views: 159,642
Bookmarked: 254
Downloaded: 14,126
This article is devoted to the development of the key licensing system for the applications.
|
|
23 Mar 2020
Updated: 23 Mar 2020
Rating: 5.00/5
Votes: 8
Popularity: 4.52
Licence: CPOL
Views: 11,575
Bookmarked: 13
Downloaded: 0
Being able to switch between 32-bit and 64-bit modes in Windows is a useful skill. Learn about the heaven’s gate technique and the tools and methods needed for hooking 64-bit processes from the 32-bit WOW64 mode.
|
Javascript |
7 Nov 2018
Updated: 7 Nov 2018
Rating: 5.00/5
Votes: 8
Popularity: 4.52
Licence: CPOL
Views: 8,512
Bookmarked: 12
Downloaded: 0
Take a look at how to intercept HTTP traffic in order to inject custom code into Windows HTML markup
|
Rust |
11 Oct 2018
Updated: 11 Oct 2018
Rating: 4.43/5
Votes: 4
Popularity: 2.67
Licence: CPOL
Views: 11,853
Bookmarked: 8
Downloaded: 0
This article will be useful for people who are familiar with C++ but are new to Rust.
|
SQL |
21 Oct 2009
Updated: 23 Oct 2009
Rating: 4.92/5
Votes: 19
Popularity: 6.29
Licence: CPOL
Views: 39,914
Bookmarked: 29
Downloaded: 698
We will describe how to create your own native Firebird extension and show some approaches how to use it in managed code applications
|
Security
|
|
17 Jan 2019
Updated: 17 Jan 2019
Rating: 0.00/5
Votes: 0
Popularity: 0.00
Licence: CPOL
Views: 5,140
Bookmarked: 1
Downloaded: 0
In this article, we focus on the main ftrace pros and cons and describe some unexpected surprises we’ve faced when hooking Linux kernel functions with this utility.
|
|
22 Jan 2019
Updated: 22 Jan 2019
Rating: 0.00/5
Votes: 0
Popularity: 0.00
Licence: CPOL
Views: 8,302
Bookmarked: 0
Downloaded: 0
Learn how you can use ftrace to hook critical function calls in the Linux kernel
|
|
9 Jan 2019
Updated: 9 Jan 2019
Rating: 0.00/5
Votes: 0
Popularity: 0.00
Licence: CPOL
Views: 8,104
Bookmarked: 3
Downloaded: 0
Two theoretical ways to protect a Linux kernel module from hooks.
|
|
6 May 2019
Updated: 6 May 2019
Rating: 2.48/5
Votes: 6
Popularity: 1.93
Licence: CPOL
Views: 11,604
Bookmarked: 12
Downloaded: 0
Step-by-step example of reverse engineering an application
|
Blockchain |
5 Feb 2019
Updated: 5 Feb 2019
Rating: 5.00/5
Votes: 1
Popularity: 0.00
Licence: CPOL
Views: 6,580
Bookmarked: 6
Downloaded: 0
The experience of creating a custom blockchain network using the Graphene framework.
|
|
15 Mar 2019
Updated: 15 Mar 2019
Rating: 0.00/5
Votes: 0
Popularity: 0.00
Licence: CPOL
Views: 4,780
Bookmarked: 0
Downloaded: 0
We analyze the pros and cons of formal verification.
|
|
14 Dec 2018
Updated: 14 Dec 2018
Rating: 2.50/5
Votes: 4
Popularity: 1.51
Licence: CPOL
Views: 4,234
Bookmarked: 1
Downloaded: 0
Examples of fixing vulnerabilities in smart contracts
|
|
19 Aug 2019
Updated: 19 Aug 2019
Rating: 0.00/5
Votes: 0
Popularity: 0.00
Licence: CPOL
Views: 4,773
Bookmarked: 1
Downloaded: 0
This article will be useful for both businesses and developers who want more information about Hyperledger Fabric and its use cases.
|
Encryption |
8 Dec 2010
Updated: 22 Feb 2011
Rating: 4.68/5
Votes: 14
Popularity: 5.37
Licence: CPOL
Views: 64,426
Bookmarked: 38
Downloaded: 2,014
In this article, the use of open source OpenSSL library for file and disk encryption is described
|