15,745,506 members
Sign in
Sign in
Email
Password
Forgot your password?
Sign in with
home
articles
Browse Topics
>
Latest Articles
Top Articles
Posting/Update Guidelines
Article Help Forum
Submit an article or tip
Import GitHub Project
Import your Blog
quick answers
Q&A
Ask a Question
View Unanswered Questions
View All Questions
View C# questions
View Javascript questions
View C++ questions
View Python questions
View Java questions
discussions
forums
CodeProject.AI Server
All Message Boards...
Application Lifecycle
>
Running a Business
Sales / Marketing
Collaboration / Beta Testing
Work Issues
Design and Architecture
Artificial Intelligence
ASP.NET
JavaScript
Internet of Things
C / C++ / MFC
>
ATL / WTL / STL
Managed C++/CLI
C#
Free Tools
Objective-C and Swift
Database
Hardware & Devices
>
System Admin
Hosting and Servers
Java
Linux Programming
Python
.NET (Core and Framework)
Android
iOS
Mobile
WPF
Visual Basic
Web Development
Site Bugs / Suggestions
Spam and Abuse Watch
features
features
Competitions
News
The Insider Newsletter
The Daily Build Newsletter
Newsletter archive
Surveys
CodeProject Stuff
community
lounge
Who's Who
Most Valuable Professionals
The Lounge
The CodeProject Blog
Where I Am: Member Photos
The Insider News
The Weird & The Wonderful
help
?
What is 'CodeProject'?
General FAQ
Ask a Question
Bugs and Suggestions
Article Help Forum
About Us
Search within:
Articles
Quick Answers
Messages
Artificial Intelligence
Artificial Intelligence
Neural Networks
Machine Learning
Deep Learning
ML.Net
Big Data
Data Science
Tensorflow
ChatGPT
Internet of Things
Internet of Things
Arduino
Edge Device
Raspberry-Pi
Wearables
IoT Edge
Industrial IoT
DevOps
DevOps
Agile
Automation
Continuous Build
Continuous Delivery
Continuous Deployment
Continuous Integration
Deployment
Git
Installation
Integration Testing
Load Testing
Quality Assurance
TFS
Unit Testing
Testing
Containers
Containers
Docker
Kubernetes
Virtual Machine
High Performance Computing
High Performance Computing
GPU
Parallel Processing
Parallelization
Vectorization
Hosted Services
Hosted Services
AWS
Cordova
ExtJS
Google Cloud
Microservices
PhoneGap
Serverless
Storage
Web Hosting
WordPress
Azure
Security
Security
Blockchain
Cryptography
Encryption
Identity
Identity Server
Web Development
Web Development
Blazor
CSS3
Flask
HTML5
Kestrel
LESS
Nginx
Node.js
React
SCSS
Spring
Vue.js
ASP.NET
CSS
Apache
HTML
IIS
XHTML
Mobile Apps
Mobile Apps
Flutter
Ionic
iOS
Nativescript
React Native
Xamarin
Windows Mobile
Android
Desktop Programming
Desktop Programming
Cocoa
Electron
QT
Universal Windows Platform
X11
Windows Forms
ATL
MFC
Swing
Win32
WTL
WPF
XAML
System
Database Development
Database Development
Data Visualization
Elasticsearch
Lucene
MariaDB
MongoDB
NoSQL
PostgreSQL
Redis
MySQL
SQL Server
Productivity Apps and Services
Productivity Apps and Services
LibreOffice
OpenOffice
Sharepoint
Team Communication Tools
Biztalk
Microsoft Office
SAP
Game Development
Game Development
Doom
Kinect
Playstation 4
Playstation 5
Unity
Unreal
XBox
Multimedia
Multimedia
Audio
Image Processing
Video
Audio Video
DirectX
GDI
GDI+
OpenGL
General Programming
General Programming
Algorithms
Compression
Computational Geometry
Emulation
Exceptions
File
Internet
Localization
Memory Management
Optimization
Parser
Performance
Regular Expressions
Sorting
State Machines
Architecture
Design / Graphics
Printing
String
Threads
Usability
Programming Languages
Programming Languages
ASM
Bash
Basic
COBOL
Dart
Go
Haskell
Kotlin
Lua
Pascal
R
Razor
Rust
Scala
Swift
Typescript
Objective C
Visual Basic
VBScript
C++
C#
F#
FORTRAN
Java
Javascript
Perl
Python
Ruby
SQL
PHP
PowerShell
XML
Articles by Kewin Rausch (Articles: 9, Tip/Trick: 1)
Articles: 9, Tip/Trick: 1
Articles
Technical Blogs
Tips and Tricks
Reference Articles
Projects
Average article rating: 4.82
Programming Languages
ASM
Metamorphic engines
22 Jan 2017 Updated:
22 Jan 2017
Rating: 4.82/5 Votes: 7 Popularity: 4.07
Licence: CPOL Views: 18,965
Bookmarked: 9
Downloaded: 272
Please
Sign up or sign in
to vote.
How an application performs metamorphism to adapt and survive in an "hostile" environment.
C
Taking advantage of Windows Hot Patching mechanism
7 Mar 2014 Updated:
1 Apr 2014
Rating: 4.93/5 Votes: 19 Popularity: 6.31
Licence: CPOL Views: 33,112
Bookmarked: 35
Downloaded: 824
Please
Sign up or sign in
to vote.
Here I will show how to emulate Windows Hot Patching and how to use this mechanism to redirect the execution of a custom procedure, in a temporary or permanent way.
Patching the Linux kernel at run-time
6 Jul 2017 Updated:
10 Jul 2017
Rating: 4.93/5 Votes: 11 Popularity: 5.14
Licence: CPOL Views: 14,781
Bookmarked: 8
Downloaded: 104
Please
Sign up or sign in
to vote.
How to patch the Linux kernel with a custom mechanism and without having to reboot the system.
Binary Obfuscation
25 Dec 2014 Updated:
25 Dec 2014
Rating: 4.93/5 Votes: 23 Popularity: 6.62
Licence: CPOL Views: 56,572
Bookmarked: 47
Downloaded: 1,419
Please
Sign up or sign in
to vote.
How to add obfuscation at binary level to protect your technology
An autonomous and concealed IPC mechanism
12 Dec 2017 Updated:
16 Dec 2017
Rating: 3.75/5 Votes: 12 Popularity: 4.04
Licence: CPOL Views: 12,001
Bookmarked: 9
Downloaded: 195
Please
Sign up or sign in
to vote.
A really tiny IPC mechanism which does not rely on any existing system call or API.
Shell
Basic Cryptographic Protocols: Key Exchange
24 Aug 2018 Updated:
25 Aug 2018
Rating: 5.00/5 Votes: 7 Popularity: 4.23
Licence: CPOL Views: 12,134
Bookmarked: 11
Downloaded: 146
Please
Sign up or sign in
to vote.
Introduction to protocols to manage Key Exchange in secure channels communication
Recursive Internetworking
15 Jun 2016 Updated:
10 Sep 2018
Rating: 5.00/5 Votes: 21 Popularity: 6.39
Licence: CPOL Views: 18,244
Bookmarked: 19
Downloaded: 94
Please
Sign up or sign in
to vote.
Moving forward in the future networks evolution
Security
Evolution of Polymorphic Malware
14 Apr 2018 Updated:
14 Apr 2018
Rating: 5.00/5 Votes: 13 Popularity: 5.57
Licence: CPOL Views: 18,155
Bookmarked: 18
Downloaded: 217
Please
Sign up or sign in
to vote.
An introduction on how these applications self-defend themselves against scanning techniques, and how they could have evolved from simple and naive forms to more sophisticated ones.
Cryptography
Design and Develop an Anonymous Network
6 Oct 2017 Updated:
15 Oct 2017
Rating: 5.00/5 Votes: 11 Popularity: 5.21
Licence: CPOL Views: 23,474
Bookmarked: 22
Downloaded: 294
Please
Sign up or sign in
to vote.
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown
Average blogs rating:
No blogs have been submitted.
Average tips rating: 5.00
Programming Languages
VBScript
Automatically Translate makefile C/C++ Project for Visual Studio [Tip/Trick]
29 Jan 2015 Updated:
25 Feb 2015
Rating: 5.00/5 Votes: 19 Popularity: 6.28
Licence: CPOL Views: 68,664
Bookmarked: 23
Downloaded: 5,045
Please
Sign up or sign in
to vote.
A tool for translating C/C++ makefile projects in Visual Studio compatible ones
Average reference rating:
No reference articles have been posted.
Average project rating:
No projects have been posted.
Kewin Rausch
Software Developer
Italy
I'm a Software Engineer with deep and extended knowledge in Computer Networks and low level environments as kernels and drivers. My core competencies are C/C++ and Assembly programming languages, in both user- and kernel-space, together with an problem-solving oriented mindset and huge imagination to develop alternative approach to deal with them.