Spam filtering LSP
We developed an LSP that intercepts mail traffic based on dynamically-set rules defined by the customer. After the traffic is intercepted it is sent to the customer’s local proxy for further processing. On top of the mail traffic interception, the LSP also intercepts DNS calls and translates IP addresses to domain addresses when communicating with the proxy server.
Miniature content filtering LSP
We developed an LSP that sends all web requests and the first 1.5k of the web answers to the customer’s local service using named pipes that allows the customer to block website browsing.
NDIS IM driver
We developed an NDIS IM driver that intercepted all TCP/IP traffic and transferred all the packets from kernel level to user level, where the customer is able to discard the packets or let them through.
Native startup driver
We developed a “native driver”: a driver that is loaded at startup at the same location where “chkdsk” runs. At this stage, there are only 127 functions available, from which 38 are documented. The driver is performs file and registry maintenance that is not possible with regular user applications due to locks and viruses.
We developed a component that saves all registry hives during normal OS operation using VSS (Volume Shadow Service) and then analyzes the differences between the “live” registry and the offline files to locate rootkits and viruses.
Online QA testing platform
We developed a system that operates a number of computers, each running several VMWare workstation machines, as well as a controlling server. The server receives a VNC session request and relays it to an available machine (that doesn’t host a VNC session). If no machine is available, the server relays the session to a machine with a “busy” wallpaper. I addition, the server is in charge of saving the state of the VMWare machine when it is done and preparing it for a new session.
Offline QA testing platform
We developed a system that operates a number of computers, each running several VMWare workstation machines, as well as a controlling server. The customer places the latest software that he is testing on the server, and the server sends the latest software to all the controlled VMWare machines for testing. The server then runs the software on its controlled machine, gathers the logs when the run is over, and compares them to the previous runs. When all the machines are tested, the server issues a report with all the differences between this and previous runs, allowing the customer to track bugs on various platforms without the need for a QA employee.
We developed a system that allows the customer to use the VS2005 remote debug technology while crossing the firewalls at the customer’s facilities and at their clients’ facilities. Without this solution, it is impossible to use such technology with firewalls present.
OS API encapsulation
We developed a component that allows the customer to perform installation, undo and validation on the OS, both at normal run mode and from another OS or live CD, so that operations performed during normal mode could be undone from a live CD and vice versa. The customer uses my API without having to know the running mode of his software.