Three elephants that support logging in Windows
We continue our series of articles on the types and methods of data collectors from endpoints, or, as they are commonly called, agents. In the first article, we got acquainted…
We continue our series of articles on the types and methods of data collectors from endpoints, or, as they are commonly called, agents. In the first article, we got acquainted…
On November 16, 1996, the Windows CE 1.0 operating system was born. It was fast, resource-efficient, adaptive — and became one of the drivers of the rapid development…
Every year in the world of technology, events occur that can be conditionally nominated for the "Darwin Award". 2024 is not over yet, but even now some nominees for the…
Frameworks simplify development, eliminate chaos, and set clear boundaries when creating an application.
I, like many others, use Discord and Chinese proxy clients, but unfortunately, Discord voice chat does not support working through a proxy. Because of this, I constantly…
Hello, tekkix, my name is Alexey Onosov, I am an author at vAITI media. In this article, I will talk about setting up DLNA on servers, TV and mobile players, and hardware…
When investigating computer incidents, one of the most important actions is the collection of evidence. So it is very important for us to have a dump of the RAM, because…
Trentechix, hello! I am Alexander Leonov, a leading expert at the PT Expert Security Center laboratory. Every month, my team of analysts at Positive Technologies researches…
This publication is a translation of the article - HUNTING FOR MALWARE WITH COMMAND LINE LOGGING AND PROCESS TREES by Vanja Svajcer. The article is about how to use command…
tekkix, hello! I am Alexander Leonov, leading expert of the PT Expert Security Center laboratory. Every month, my team of analysts at Positive Technologies researches…