How we developed the NIOS II processor module for IDA Pro

IDA Pro UI IDA Pro has a well-earned place in the toolkit of security researchers worldwide. We at Positive Technologies are no exception. In fact, we like it so much that we developed a disassembler processor module for the NIOS II architecture to make analyzing code faster and more convenient. Here I will give a brief history of the project and share what exactly it … Continue reading How we developed the NIOS II processor module for IDA Pro

Web Application Vulnerabilities-2016: Users Unprotected

Modern web technologies allow businesses to solve organizational issues cost-effectively and efficiently and demonstrate their services and products to a wide range of audiences through the Internet. However, attackers may exploit websites as an easy access point to company infrastructure. This can cause financial and reputational damage, and despite well documented incidents involving compromised security, developers and administrators still pay little attention to the security … Continue reading Web Application Vulnerabilities-2016: Users Unprotected

Practical Example of Code Review Implementation

Our previous post concerning a code review implemented by our company caused a particular interest of the IT community, so we decided to write an extra article on this theme. Today we\’ll consider this practice implementation in terms of a specific example.Let\’s consider code review implementation as exemplified by a project and project team structure. There are two groups in the team: one consists of … Continue reading Practical Example of Code Review Implementation

Code Review Implemented into Development

Attention! This article is meant for those people, who have an idea of what a code review is and who want to implement this technology in their companies. When we started implementing code reviews in our projects, we were disappointed by the lack of good materials related to the process organizing from the very beginning. One more aspect that has hardly ever been described is … Continue reading Code Review Implemented into Development