5 Articles Written

Drew Hendricks

Popular by Author

Injective Code Inside an Import Table

Imagine that you could redirect the thoroughfare of the imported function's entrances into your special routines by manipulating the import table thunks. It could...

Inject Your Code to a Portable Executable...

0 Preface You might demand to comprehend the ways a virus program injects its procedure into the interior of a portable executable file and...

Six Programming Languages and Libraries Taking Over...

By Drew Hendricks It's a good time to be a developer. Simply put, the explosive rise of the tech industry has led to a widespread...

Similar Articles

Using Command Query Responsibility Segregation (CQRS)

Introduction Before we dive in, let's investigate classic architecture. It has four layers. Each layer has its own responsibility, such...

Top Five Cross-platform Testing Issues

Anyone developing a software application today is going to run into some serious cross-platform challenges during testing. It may...

Six Programming Languages and Libraries Taking Over In 2016

By Drew Hendricks It's a good time to be a developer. Simply put, the explosive rise of the tech industry...

Injective Code Inside an Import Table

Imagine that you could redirect the thoroughfare of the imported function's entrances into your special routines by manipulating the...

Inject Your Code to a Portable Executable File

0 Preface You might demand to comprehend the ways a virus program injects its procedure into the interior of...

News & Trends