Click here to Skip to main content
15,178,202 members

Articles by Apriorit Inc (Articles: 88, Tip/Tricks: 2)

Articles: 88, Tip/Tricks: 2

RSS Feed

Average article rating: 4.72

All Topics
Posted: 19 Aug 2009   Updated: 23 Sep 2009   Views: 22,860   Rating: 4.93/5    Votes: 14   Popularity: 5.32
Licence: The Code Project Open License (CPOL)      Bookmarked: 16   Downloaded: 0
Please Sign up or sign in to vote.
This article describes the protocol of data exchange that is the modification of the well-known OBEX protocol used in the GSM Samsung phones from the SHP family
Artificial Intelligence
Posted: 19 Oct 2018   Updated: 19 Oct 2018   Views: 12,804   Rating: 4.81/5    Votes: 5   Popularity: 3.36
Licence: The Code Project Open License (CPOL)      Bookmarked: 24   Downloaded: 0
Please Sign up or sign in to vote.
Two ways of performing object recognition using OpenCV and comparing them to each other. Both approaches have their own pros and cons. This comparison will help to choose the best one for your task.
Posted: 7 Mar 2019   Updated: 7 Mar 2019   Views: 5,182   Rating: 3.86/5    Votes: 3   Popularity: 1.84
Licence: The Code Project Open License (CPOL)      Bookmarked: 10   Downloaded: 0
Please Sign up or sign in to vote.
How to use this Google service and the free NVIDIA Tesla K80 GPU to achieve your own goals in training neural networks
Deep Learning
Posted: 10 Dec 2018   Updated: 10 Dec 2018   Views: 8,597   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
The experience of improving Mask R-CNN performance six to ten times by applying TensorRT
Machine Learning
Posted: 4 Apr 2019   Updated: 4 Apr 2019   Views: 3,061   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Please Sign up or sign in to vote.
Find out an easy way to use the pretrained Inception V3 neural network for video classification.
Posted: 19 Feb 2019   Updated: 19 Feb 2019   Views: 4,973   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: The Code Project Open License (CPOL)      Bookmarked: 16   Downloaded: 0
Please Sign up or sign in to vote.
A detailed description of an FPGA-specific framework called ISE Design Suite, and the main steps you need to take in order to create a VGA driver using FPGA
Neural Networks
Posted: 22 Mar 2019   Updated: 22 Mar 2019   Views: 5,771   Rating: 4.50/5    Votes: 5   Popularity: 3.15
Licence: The Code Project Open License (CPOL)      Bookmarked: 8   Downloaded: 0
Please Sign up or sign in to vote.
Learn more about the challenges we faced with dataset preparation and network configuration, and how these problems can be solved.
Posted: 30 Apr 2019   Updated: 30 Apr 2019   Views: 4,970   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: The Code Project Open License (CPOL)      Bookmarked: 7   Downloaded: 0
Please Sign up or sign in to vote.
The approach that allows you to make a neural network analyze the current frame while remembering the state of previous frames
Containers
Virtual Machine
Posted: 21 Sep 2009   Updated: 21 Sep 2009   Views: 43,203   Rating: 4.96/5    Votes: 17   Popularity: 5.84
Licence: The Code Project Open License (CPOL)      Bookmarked: 20   Downloaded: 116
Please Sign up or sign in to vote.
This article describes the process of initial configuration and basic work with Palm Web OS on the lower level than it's described in Palm SDK docs.
Posted: 24 Feb 2010   Updated: 24 Feb 2010   Views: 27,322   Rating: 4.87/5    Votes: 12   Popularity: 5.25
Licence: The Code Project Open License (CPOL)      Bookmarked: 36   Downloaded: 1,052
Please Sign up or sign in to vote.
This article is a brief description of some tools and methods of application architecture research. Premilinary research, sniffers, hooks.
Posted: 2 Jun 2009   Updated: 23 Jul 2009   Views: 748,923   Rating: 4.95/5    Votes: 260   Popularity: 11.94
Licence: The Code Project Open License (CPOL)      Bookmarked: 592   Downloaded: 19,739
Please Sign up or sign in to vote.
This article describes the first steps in low-level programming on the example of developing of simple boot loader
Posted: 18 Jan 2019   Updated: 18 Jan 2019   Views: 3,091   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
Please Sign up or sign in to vote.
This article allows you to save valuable time
Posted: 24 Sep 2010   Updated: 24 Sep 2010   Views: 28,251   Rating: 4.38/5    Votes: 5   Popularity: 3.06
Licence: The Code Project Open License (CPOL)      Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
The aim of the article is to present a step-by-step description of the installation and configuration of the domain controller, Exchange Server, and MS Outlook with two accounts for the testing purposes.
Cryptocurrency
Posted: 28 Feb 2019   Updated: 28 Feb 2019   Views: 1,960   Rating: 4.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Please Sign up or sign in to vote.
The details of the NEO DoS vulnerability and how to recreate it.
Database Development
Posted: 5 Aug 2010   Updated: 6 Aug 2010   Views: 45,117   Rating: 4.67/5    Votes: 6   Popularity: 3.63
Licence: The Code Project Open License (CPOL)      Bookmarked: 23   Downloaded: 958
Please Sign up or sign in to vote.
The aim of this article is to create the library for writing e-mail messages in the *.pst format (used by Microsoft Outlook) to the file.
Data Visualization
Posted: 4 Nov 2010   Updated: 4 Nov 2010   Views: 25,790   Rating: 4.88/5    Votes: 19   Popularity: 6.23
Licence: The Code Project Open License (CPOL)      Bookmarked: 23   Downloaded: 536
Please Sign up or sign in to vote.
This article describes the method to perform user mode region monitoring of the specified window.
Desktop Programming
ATL
Posted: 27 May 2010   Updated: 27 May 2010   Views: 57,652   Rating: 4.75/5    Votes: 7   Popularity: 4.01
Licence: The Code Project Open License (CPOL)      Bookmarked: 17   Downloaded: 1,419
Please Sign up or sign in to vote.
In this article, we examine the problems of program control of the Microsoft Hyper-V hypervisor with the help of the C++ language and WMI technology.
MFC
Posted: 21 Jan 2009   Updated: 17 Aug 2009   Views: 572,146   Rating: 4.56/5    Votes: 143   Popularity: 9.81
Licence: The Code Project Open License (CPOL)      Bookmarked: 369   Downloaded: 27,628
Please Sign up or sign in to vote.
In this article, we describe the driver we created to hide processes and files in a system.
Win32
Posted: 6 Feb 2012   Updated: 6 Feb 2012   Views: 61,052   Rating: 4.82/5    Votes: 22   Popularity: 6.47
Licence: The Code Project Open License (CPOL)      Bookmarked: 72   Downloaded: 2,184
Please Sign up or sign in to vote.
In his article, we will consider an interesting, universal and rarely used method of code injection into a Windows process using KnownDlls sections. To demonstrate the method work we will develop a sample project to inject into all running processes and intercept some calls from ws2_32.dll.
Posted: 9 Jul 2009   Updated: 23 Jul 2009   Views: 133,185   Rating: 4.57/5    Votes: 19   Popularity: 5.62
Licence: The Code Project Open License (CPOL)      Bookmarked: 53   Downloaded: 4,508
Please Sign up or sign in to vote.
This article shows how to use FTDI API to interact with the devices, which have FTDI chip within. EEPROM programming is also discussed.
DevOps
Testing
Posted: 24 Jan 2019   Updated: 24 Jan 2019   Views: 3,600   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
The article is about smart security contract in Cardano and Zilliqa with a description of testing both networks.
General Programming
Algorithms
Posted: 20 Nov 2018   Updated: 20 Nov 2018   Views: 4,442   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
Find out approaches which you can use to improve runtime algorithms for zero-day threat detection
Debugging
Posted: 2 Jul 2013   Updated: 3 Jul 2013   Views: 39,167   Rating: 4.92/5    Votes: 13   Popularity: 5.48
Licence: The Code Project Open License (CPOL)      Bookmarked: 29   Downloaded: 1,419
Please Sign up or sign in to vote.
This article describes the implementation of a simple tool to deal with debug blocking based on the function execution time
Posted: 15 Jul 2013   Updated: 15 Jul 2013   Views: 17,933   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
Please Sign up or sign in to vote.
Modern anti-debug techniques - Nanomites and Debug Blocker - are considered for Windows and Linux code
Posted: 4 Mar 2019   Updated: 4 Mar 2019   Views: 4,440   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: The Code Project Open License (CPOL)      Bookmarked: 7   Downloaded: 0
Please Sign up or sign in to vote.
A clear overview on how you can establish communication between a device and its driver
Posted: 1 Mar 2019   Updated: 1 Mar 2019   Views: 2,851   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
Please Sign up or sign in to vote.
And its modules during runtime
Posted: 7 Apr 2016   Updated: 7 Apr 2016   Views: 63,085   Rating: 4.97/5    Votes: 40   Popularity: 7.96
Licence: The Code Project Open License (CPOL)      Bookmarked: 62   Downloaded: 0
Please Sign up or sign in to vote.
Several approaches of anti-debug protection and some tips about how they are usually neutralized by reversers
File
Posted: 18 May 2010   Updated: 18 May 2010   Views: 44,101   Rating: 4.50/5    Votes: 7   Popularity: 3.80
Licence: The Code Project Open License (CPOL)      Bookmarked: 29   Downloaded: 1,867
Please Sign up or sign in to vote.
In this article, we will examine a problem of receiving the correct value of the dmCopies variable in the DEVMODE structure while printing from Microsoft Word 2003.
Threads
Posted: 3 Dec 2010   Updated: 6 Dec 2010   Views: 71,233   Rating: 4.40/5    Votes: 13   Popularity: 4.90
Licence: The Code Project Open License (CPOL)      Bookmarked: 38   Downloaded: 2,139
Please Sign up or sign in to vote.
This article includes a description of the monitoring process for the session logon/logout, connect/disconnect (regarding terminal and client sessions). Obtained results will be then used in the next article ”Creating process in the session”.
Posted: 3 Dec 2010   Updated: 6 Dec 2010   Views: 59,504   Rating: 4.83/5    Votes: 10   Popularity: 4.83
Licence: The Code Project Open License (CPOL)      Bookmarked: 31   Downloaded: 1,631
Please Sign up or sign in to vote.
This article contains the description of how to start a process in the current active session on session logon notification event with permissions of system process running in the current session.
macOS
Posted: 26 Apr 2011   Updated: 26 Apr 2011   Views: 36,745   Rating: 4.83/5    Votes: 8   Popularity: 4.36
Licence: The Code Project Open License (CPOL)      Bookmarked: 9   Downloaded: 0
Please Sign up or sign in to vote.
Knowing the principle of linking of imported functions in Mach-O libraries, we can achieve a rather interesting effect: we can redirect their calls to our code, in which, in its turn, we can use the original one.
Mobile Apps
Posted: 16 Mar 2011   Updated: 16 Mar 2011   Views: 48,593   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 17   Downloaded: 904
Please Sign up or sign in to vote.
This article covers the creation of the CAB-installers for the Windows CE 5.0/6.0 applications for thin clients.
Android
Posted: 11 Aug 2009   Updated: 23 Sep 2009   Views: 48,531   Rating: 4.68/5    Votes: 17   Popularity: 5.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 45   Downloaded: 1,943
Please Sign up or sign in to vote.
In this article I described how to develop and install remotely Java service for the Android devices
Posted: 9 Sep 2013   Updated: 9 Sep 2013   Views: 28,430   Rating: 4.69/5    Votes: 11   Popularity: 4.47
Licence: The Code Project Open License (CPOL)      Bookmarked: 19   Downloaded: 8
Please Sign up or sign in to vote.
Development of an application for analysis of programs installed on a mobile device.
Posted: 4 Mar 2015   Updated: 5 Mar 2015   Views: 24,081   Rating: 3.61/5    Votes: 11   Popularity: 3.76
Licence: The Code Project Open License (CPOL)      Bookmarked: 21   Downloaded: 882
Please Sign up or sign in to vote.
An interesting approach to create Android applications, which user cannot remove or stop (only admin can do this applying specific password), without using ROOT permissions.
Windows Mobile
Posted: 3 Nov 2010   Updated: 4 Nov 2010   Views: 31,592   Rating: 4.75/5    Votes: 7   Popularity: 4.01
Licence: The Code Project Open License (CPOL)      Bookmarked: 18   Downloaded: 668
Please Sign up or sign in to vote.
In this article, I would like to tell you how to read the SMS, MMS, and Emails data from your Windows Mobile device. Also I’ll describe some differences between reading message body in Windows Mobile 5 and Windows Mobile 6 devices.
Operating Systems
Linux
Posted: 29 Nov 2010   Updated: 29 Nov 2010   Views: 59,145   Rating: 4.68/5    Votes: 17   Popularity: 5.76
Licence: The Code Project Open License (CPOL)      Bookmarked: 26   Downloaded: 0
Please Sign up or sign in to vote.
Some general features and some specific ones of the memory management in Linux are discribed; some approaches of memory allocation are proposed
Windows
Posted: 11 Mar 2011   Updated: 11 Mar 2011   Views: 67,078   Rating: 4.93/5    Votes: 13   Popularity: 5.49
Licence: The Code Project Open License (CPOL)      Bookmarked: 15   Downloaded: 0
Please Sign up or sign in to vote.
This article will describe basics of static code analysis with PREfast in Visual Studio.
Posted: 20 Nov 2009   Updated: 20 Nov 2009   Views: 94,437   Rating: 4.97/5    Votes: 24   Popularity: 6.77
Licence: The Code Project Open License (CPOL)      Bookmarked: 61   Downloaded: 2,614
Please Sign up or sign in to vote.
This article is devoted to the methods of the driver packages installation/uninstallation using WiX.
Posted: 17 Dec 2010   Updated: 28 Dec 2010   Views: 31,010   Rating: 4.40/5    Votes: 5   Popularity: 3.08
Licence: The Code Project Open License (CPOL)      Bookmarked: 8   Downloaded: 222
Please Sign up or sign in to vote.
In this article, I will describe the usage of external files for storing of test data and their usage in TestComplete scripts
Posted: 30 Nov 2010   Updated: 30 Nov 2010   Views: 88,624   Rating: 4.71/5    Votes: 12   Popularity: 4.90
Licence: The Code Project Open License (CPOL)      Bookmarked: 45   Downloaded: 0
Please Sign up or sign in to vote.
This article describes the story of an experiment whose main goal was to perform the Windows OS debugging using the USB bus.
Programming Languages
ASM
Posted: 8 Dec 2009   Updated: 8 Dec 2009   Views: 44,241   Rating: 4.98/5    Votes: 29   Popularity: 7.28
Licence: The Code Project Open License (CPOL)      Bookmarked: 104   Downloaded: 1,246
Please Sign up or sign in to vote.
In this article, we continue investigation in the field of hiding application in the system. This article will tell where Windows OS stores the services and how uses them. We’ll discuss how this knowledge can be applied to finding our custom service and hiding it.
C
Posted: 11 Nov 2009   Updated: 11 Nov 2009   Views: 46,034   Rating: 4.93/5    Votes: 49   Popularity: 8.20
Licence: The Code Project Open License (CPOL)      Bookmarked: 66   Downloaded: 1,006
Please Sign up or sign in to vote.
In this article we'll consider some things about the Clipboard internals by showing how you can forbid access to it.
Posted: 19 Aug 2009   Updated: 23 Sep 2009   Views: 41,601   Rating: 4.25/5    Votes: 9   Popularity: 4.06
Licence: The Code Project Open License (CPOL)      Bookmarked: 24   Downloaded: 1,068
Please Sign up or sign in to vote.
This article is devoted to the Embedded Firebird database usage and also development of C++ wrapper of this database.
Posted: 22 Aug 2012   Updated: 2 Sep 2012   Views: 38,833   Rating: 4.44/5    Votes: 13   Popularity: 4.95
Licence: The Code Project Open License (CPOL)      Bookmarked: 33   Downloaded: 761
Please Sign up or sign in to vote.
Simple driver for Linux OS that performs hiding of the selected files from the system
Posted: 24 Sep 2010   Updated: 26 Sep 2010   Views: 136,666   Rating: 4.91/5    Votes: 48   Popularity: 8.26
Licence: The Code Project Open License (CPOL)      Bookmarked: 108   Downloaded: 2,634
Please Sign up or sign in to vote.
In this article, I am going to describe the process of writing and building of a simple driver-module for Linux OS
Posted: 2 Apr 2010   Updated: 25 Jul 2013   Views: 121,926   Rating: 4.90/5    Votes: 33   Popularity: 7.37
Licence: The Code Project Open License (CPOL)      Bookmarked: 66   Downloaded: 1,038
Please Sign up or sign in to vote.
This article gives a brief description of ELF libs structure and functioning and also shows how to intercept function calls from one library into another.
Posted: 28 Dec 2009   Updated: 19 Mar 2012   Views: 373,688   Rating: 4.99/5    Votes: 44   Popularity: 8.09
Licence: The Code Project Open License (CPOL)      Bookmarked: 183   Downloaded: 8,127
Please Sign up or sign in to vote.
This article describes an easy way to set up system-wide global API hooks.
Posted: 26 Apr 2011   Updated: 26 Apr 2011   Views: 29,951   Rating: 4.78/5    Votes: 6   Popularity: 3.72
Licence: The Code Project Open License (CPOL)      Bookmarked: 9   Downloaded: 229
Please Sign up or sign in to vote.
The article covers the interception and redirection of calls to the third-party dynamically linked libraries in the program under Mac OS X.
Posted: 15 Feb 2010   Updated: 15 Feb 2010   Views: 177,803   Rating: 4.99/5    Votes: 98   Popularity: 9.87
Licence: The Code Project Open License (CPOL)      Bookmarked: 332   Downloaded: 7,987
Please Sign up or sign in to vote.
This article is oriented to Windows-developers and considers how to create virtual disk in Windows system.
Posted: 17 Mar 2010   Updated: 17 Mar 2010   Views: 34,616   Rating: 4.92/5    Votes: 13   Popularity: 5.48
Licence: The Code Project Open License (CPOL)      Bookmarked: 26   Downloaded: 1,214
Please Sign up or sign in to vote.
This article includes a description of a simple unhooker that restores original SST hooked by unknown rootkits, which hide some services and processes.
Posted: 6 Nov 2009   Updated: 10 Jun 2015   Views: 912,277   Rating: 4.89/5    Votes: 118   Popularity: 10.04
Licence: The Code Project Open License (CPOL)      Bookmarked: 303   Downloaded: 11,692
Please Sign up or sign in to vote.
This tutorial will show you how to develop a simple file system filter driver.
C#
Posted: 9 Jun 2010   Updated: 7 Jun 2011   Views: 83,663   Rating: 4.81/5    Votes: 38   Popularity: 7.60
Licence: The Code Project Open License (CPOL)      Bookmarked: 127   Downloaded: 1,866
Please Sign up or sign in to vote.
This article will help you to examine the main features of XSL schemes to generate programmatically advanced PDF reports.
Posted: 26 Jun 2009   Updated: 26 Jun 2009   Views: 30,392   Rating: 4.70/5    Votes: 8   Popularity: 4.24
Licence: The Code Project Open License (CPOL)      Bookmarked: 13   Downloaded: 0
Please Sign up or sign in to vote.
In this article, we will review some aspects of using data types and ways of using them during marshaling data. We’ll concentrate on marshaling to and from unmanaged code.
Posted: 20 May 2009   Updated: 20 May 2009   Views: 134,727   Rating: 4.97/5    Votes: 33   Popularity: 7.35
Licence: The Code Project Open License (CPOL)      Bookmarked: 93   Downloaded: 7,324
Please Sign up or sign in to vote.
This article is devoted to the issue of working with services and applications in Windows Vista. Solutions are given both for C++ and C#. This article might be useful for those who deal with the task of organizing interactions between services and applications on Windows Vista.
C++
Posted: 17 Apr 2014   Updated: 17 Apr 2014   Views: 17,721   Rating: 4.85/5    Votes: 11   Popularity: 5.05
Licence: The Code Project Open License (CPOL)      Bookmarked: 23   Downloaded: 0
Please Sign up or sign in to vote.
In this article, we’ll consider Dynamic Disks. We are going to explore the program implementation with the help of the LDM (Logical Disk Manager) technology.
Posted: 30 Nov 2010   Updated: 30 Nov 2010   Views: 77,619   Rating: 4.83/5    Votes: 20   Popularity: 6.18
Licence: The Code Project Open License (CPOL)      Bookmarked: 43   Downloaded: 3,697
Please Sign up or sign in to vote.
In this article, I will describe the method of setting the printer settings and the problems I faced on different OS versions.
Posted: 15 Jun 2010   Updated: 15 Jun 2010   Views: 30,892   Rating: 4.40/5    Votes: 5   Popularity: 3.08
Licence: The Code Project Open License (CPOL)      Bookmarked: 10   Downloaded: 699
Please Sign up or sign in to vote.
In this article, we provide the library which can be used in client – server applications to cover transport layer using virtual channels.
Posted: 12 Aug 2010   Updated: 12 Aug 2010   Views: 50,695   Rating: 4.90/5    Votes: 17   Popularity: 6.02
Licence: The Code Project Open License (CPOL)      Bookmarked: 44   Downloaded: 2,079
Please Sign up or sign in to vote.
This article includes a description of the simple multi-monitor screenshot creation and splicing screenshots from the display monitor into the one virtual screen sized bitmap using Windows GDI functions.
Posted: 4 Oct 2018   Updated: 5 Oct 2018   Views: 6,140   Rating: 5.00/5    Votes: 7   Popularity: 4.23
Licence: The MIT License      Bookmarked: 7   Downloaded: 0
Please Sign up or sign in to vote.
Learn how was increased mhook’s performance, enhanced its capabilities and eliminated certain bugs.
Posted: 16 Jun 2009   Updated: 22 Jun 2009   Views: 36,053   Rating: 5.00/5    Votes: 13   Popularity: 5.57
Licence: The Code Project Open License (CPOL)      Bookmarked: 44   Downloaded: 242
Please Sign up or sign in to vote.
In this article, we will try to make our algorithms work faster using the methods of low-level optimization of memory allocation in C++.
Posted: 1 Dec 2009   Updated: 1 Dec 2009   Views: 30,938   Rating: 4.70/5    Votes: 14   Popularity: 5.24
Licence: The Code Project Open License (CPOL)      Bookmarked: 33   Downloaded: 0
Please Sign up or sign in to vote.
This article was mostly written for Linux developers. The article gives a method of writing out-of-process plugins to open source software.
Posted: 28 Dec 2010   Updated: 29 Dec 2010   Views: 60,033   Rating: 4.88/5    Votes: 41   Popularity: 7.87
Licence: The Code Project Open License (CPOL)      Bookmarked: 92   Downloaded: 756
Please Sign up or sign in to vote.
This article describes the differences in sockets usage under BSD and Windows
Posted: 14 Dec 2009   Updated: 14 Dec 2009   Views: 66,904   Rating: 4.97/5    Votes: 24   Popularity: 6.47
Licence: The Code Project Open License (CPOL)      Bookmarked: 56   Downloaded: 1,312
Please Sign up or sign in to vote.
This article is the description of the first steps in setting QT, Visual Studio and FireBird.
Posted: 17 May 2010   Updated: 17 May 2010   Views: 75,685   Rating: 4.87/5    Votes: 43   Popularity: 7.85
Licence: The Code Project Open License (CPOL)      Bookmarked: 103   Downloaded: 2,519
Please Sign up or sign in to vote.
This article describes some basic specific moments of porting application from Windows to Linux
Posted: 15 Feb 2010   Updated: 10 Mar 2010   Views: 95,892   Rating: 5.00/5    Votes: 45   Popularity: 8.12
Licence: The Code Project Open License (CPOL)      Bookmarked: 151   Downloaded: 8,871
Please Sign up or sign in to vote.
This article is the continue of the previously posted article Hide Driver. Some methods to detect hidden files and processes are described in it
Posted: 11 Mar 2011   Updated: 11 Mar 2011   Views: 64,115   Rating: 4.93/5    Votes: 33   Popularity: 7.49
Licence: The Code Project Open License (CPOL)      Bookmarked: 115   Downloaded: 8,706
Please Sign up or sign in to vote.
This article describes a driver that hides processes and files using the method of splicing.
Posted: 19 Oct 2009   Updated: 19 Oct 2009   Views: 95,288   Rating: 4.93/5    Votes: 53   Popularity: 8.37
Licence: The Code Project Open License (CPOL)      Bookmarked: 161   Downloaded: 4,610
Please Sign up or sign in to vote.
In this article, we will consider the methods of hooking keyboard data in the kernel mode.
Posted: 18 Oct 2010   Updated: 18 Oct 2010   Views: 112,835   Rating: 4.78/5    Votes: 34   Popularity: 7.27
Licence: The Code Project Open License (CPOL)      Bookmarked: 102   Downloaded: 7,471
Please Sign up or sign in to vote.
How to detect device changes in the user-mode applications for Windows
Posted: 2 Feb 2011   Updated: 2 Feb 2011   Views: 77,923   Rating: 4.91/5    Votes: 34   Popularity: 7.52
Licence: The Code Project Open License (CPOL)      Bookmarked: 100   Downloaded: 2,495
Please Sign up or sign in to vote.
In this article, I’m going to describe how to implement COM interface hooks.
Posted: 22 Dec 2010   Updated: 7 Aug 2012   Views: 69,240   Rating: 4.75/5    Votes: 37   Popularity: 7.45
Licence: The Code Project Open License (CPOL)      Bookmarked: 112   Downloaded: 2,804
Please Sign up or sign in to vote.
This article describes the process of recovering of deleted data from the flash drive
Posted: 29 Jun 2009   Updated: 29 Jun 2009   Views: 30,832   Rating: 4.88/5    Votes: 18   Popularity: 6.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 37   Downloaded: 1,108
Please Sign up or sign in to vote.
This article describes a sample parser of reg files using the Boost Spirit Parser Framework. We'll discuss why we use the curtain libraries and make one or another solution, algorithm, and also tests.
Posted: 18 May 2011   Updated: 20 May 2011   Views: 41,661   Rating: 4.83/5    Votes: 12   Popularity: 5.22
Licence: The Code Project Open License (CPOL)      Bookmarked: 46   Downloaded: 1,155
Please Sign up or sign in to vote.
This article describes the development of the library for performing text search based on Boolean search queries.
Posted: 2 Apr 2010   Updated: 2 Apr 2010   Views: 100,501   Rating: 4.88/5    Votes: 14   Popularity: 5.59
Licence: The Code Project Open License (CPOL)      Bookmarked: 31   Downloaded: 3,692
Please Sign up or sign in to vote.
The article is devoted to the development of the library that implements the Diffie – Hellman cryptographic algorithm of key exchange.
Posted: 5 Aug 2010   Updated: 5 Aug 2010   Views: 143,918   Rating: 4.80/5    Votes: 46   Popularity: 7.93
Licence: The Code Project Open License (CPOL)      Bookmarked: 254   Downloaded: 13,812
Please Sign up or sign in to vote.
This article is devoted to the development of the key licensing system for the applications.
Posted: 23 Mar 2020   Updated: 23 Mar 2020   Views: 6,645   Rating: 5.00/5    Votes: 8   Popularity: 4.52
Licence: The Code Project Open License (CPOL)      Bookmarked: 13   Downloaded: 0
Please Sign up or sign in to vote.
Being able to switch between 32-bit and 64-bit modes in Windows is a useful skill. Learn about the heaven’s gate technique and the tools and methods needed for hooking 64-bit processes from the 32-bit WOW64 mode.
Javascript
Posted: 7 Nov 2018   Updated: 7 Nov 2018   Views: 6,212   Rating: 5.00/5    Votes: 8   Popularity: 4.52
Licence: The Code Project Open License (CPOL)      Bookmarked: 11   Downloaded: 0
Please Sign up or sign in to vote.
Take a look at how to intercept HTTP traffic in order to inject custom code into Windows HTML markup
Rust
Posted: 11 Oct 2018   Updated: 11 Oct 2018   Views: 9,433   Rating: 4.43/5    Votes: 4   Popularity: 2.67
Licence: The Code Project Open License (CPOL)      Bookmarked: 8   Downloaded: 0
Please Sign up or sign in to vote.
This article will be useful for people who are familiar with C++ but are new to Rust.
SQL
Posted: 21 Oct 2009   Updated: 23 Oct 2009   Views: 38,364   Rating: 4.92/5    Votes: 19   Popularity: 6.29
Licence: The Code Project Open License (CPOL)      Bookmarked: 28   Downloaded: 674
Please Sign up or sign in to vote.
We will describe how to create your own native Firebird extension and show some approaches how to use it in managed code applications
Security
Posted: 9 Jan 2019   Updated: 9 Jan 2019   Views: 5,653   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
Please Sign up or sign in to vote.
Two theoretical ways to protect a Linux kernel module from hooks.
Posted: 18 Jan 2019   Updated: 18 Jan 2019   Views: 3,440   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
In this article, we focus on the main ftrace pros and cons and describe some unexpected surprises we’ve faced when hooking Linux kernel functions with this utility.
Posted: 22 Jan 2019   Updated: 22 Jan 2019   Views: 3,242   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Please Sign up or sign in to vote.
Learn how you can use ftrace to hook critical function calls in the Linux kernel
Posted: 7 May 2019   Updated: 7 May 2019   Views: 6,161   Rating: 2.48/5    Votes: 6   Popularity: 1.93
Licence: The Code Project Open License (CPOL)      Bookmarked: 11   Downloaded: 0
Please Sign up or sign in to vote.
With a step-by-step example of reverse engineering an application.
Blockchain
Posted: 14 Dec 2018   Updated: 14 Dec 2018   Views: 3,062   Rating: 2.50/5    Votes: 4   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
The article with examples of fixing vulnerabilities in smart contracts
Posted: 5 Feb 2019   Updated: 5 Feb 2019   Views: 4,720   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 5   Downloaded: 0
Please Sign up or sign in to vote.
The experience of creating a custom blockchain network using the Graphene framework.
Posted: 15 Mar 2019   Updated: 15 Mar 2019   Views: 2,590   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Please Sign up or sign in to vote.
We analyze the pros and cons of formal verification.
Posted: 19 Aug 2019   Updated: 19 Aug 2019   Views: 2,602   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
This article will be useful for both businesses and developers who want more information about Hyperledger Fabric and its use cases.
Encryption
Posted: 8 Dec 2010   Updated: 22 Feb 2011   Views: 57,436   Rating: 4.68/5    Votes: 14   Popularity: 5.37
Licence: The Code Project Open License (CPOL)      Bookmarked: 37   Downloaded: 1,982
Please Sign up or sign in to vote.
In this article, the use of open source OpenSSL library for file and disk encryption is described

Average blogs rating:

No blogs have been submitted.

Average tips rating: 5.00

Programming Languages
C++
Posted: 5 Oct 2018   Updated: 5 Oct 2018   Views: 4,462   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: The MIT License      Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
Use of Gmock makes unit testing much faster and less resource intensive. Mock objects mimic real objects, but provide specific responses.
Security
Blockchain
Posted: 23 Jan 2019   Updated: 23 Jan 2019   Views: 2,140   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
The article with a practical solution to the problem.

Average reference rating:

No reference articles have been posted.

Average project rating:

No projects have been posted.

Apriorit Inc
Chief Technology Officer Apriorit Inc.
United States United States
ApriorIT is a software research and development company specializing in cybersecurity and data management technology engineering. We work for a broad range of clients from Fortune 500 technology leaders to small innovative startups building unique solutions.

As Apriorit offers integrated research&development services for the software projects in such areas as endpoint security, network security, data security, embedded Systems, and virtualization, we have strong kernel and driver development skills, huge system programming expertise, and are reals fans of research projects.

Our specialty is reverse engineering, we apply it for security testing and security-related projects.

A separate department of Apriorit works on large-scale business SaaS solutions, handling tasks from business analysis, data architecture design, and web development to performance optimization and DevOps.

Official site: https://www.apriorit.com
Clutch profile: https://clutch.co/profile/apriorit
Group type: Organisation

33 members