Software Engineering
Fast. Stable. Secure. Documented.
Innovate, Inspire, Enjoy!
Programmers who do not accept the Dao always lack time and space for their programs. Programmers who accept the Dao always have enough time and space to achieve their goals.
Could it have been otherwise?
Fast. Stable. Secure. Documented.
Quick. Economical. Functional. Demonstrative.
Functional. Stable. Reliable. Documented.
Technological. Performant. Stable. Documented.
Fast. Methodical. Attentive. Detailed.
Resilient. Flexible. Scalable. Minimalistic.
Fast. Optimized. Performant. Scalable.
Fast. Predictive. Profitable. Invisible.
Fast. Deep. Detailed. Informative.
Deep. Detailed. Thorough. Documented.
Attentive. Thorough. Methodical. Deep.
Attentive. Comprehensive. Accessible. Clear.
Friends, hello everyone! In this article, we will talk about such an important part of every antivirus engine as the hashing module. We will talk about data verification, blacklisting and whitelisting, finding out how similar or different data is, and touching on the topic of fuzzy hashing algorithms. Get comfortable in your chairs!
Hello friends! In this article, we will analyze an executable file that repeatedly found itself on the work network of one of our clients and created problems for the client. The client asked to reverse-engineer the threat, conduct a security audit and provide a solution, which we did. We are always glad to cooperate in the field of cyber security, reverse engineering and security audit!
Hello dear friends! In this article, we’ll cover the basics of the PE format and build our own parser from scratch. It will be useful for those working in cybersecurity with system software, antivirus solutions, and protection systems.