Latest com-tech Articles - Page 20

Cascading and Bitmapped Context Menus

Dino Esposito demonstrates a context menu shell extension which mimics the SendTo menu. It exposes a list of frequently visited folders each with its own icon and also pops up clicking on the folder's background.

COM Security Primer, Part I

In the first of a two-part series, Jeff Prosise covers the all-important issues of COM security in terms of activation security and access security.

Understanding COM Apartments, Part I

In the first part of a two-part series on COM apartments, Jeff Prosise describes what apartments are, why they exist, and how to avoid the problems that they introduce.

Understanding COM Apartments, Part II

In the completion of his two-part series on understanding COM apartments, Jeff Prosise illustrates why the lessons learned in last month's discussion of COM apartments are so important by giving concrete examples of how this knowledge can help you develop better and more efficient COM applications.

Latest Developer Videos


Latest CodeGuru Developer Columns

The Value of APIs

Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.

Top White Papers and Webcasts

  • Featuring Doug Kaplan, Director of Customer Success at InfoArmor Live Event Date: October 26, 2016 @ 10 AM PT / 1 PM ET We'll be highlighting InfoArmor, a solution provider for identity protection software, who recently made the move to a cloud contact center to support their advanced threat protection services offered to their large user base in the cloud. Join InfoArmor and Genesys to hear: An insider view of how InfoArmor built a justification and gained consensus to make the move to the cloud Tips on …

  • Protect Your Business against Today's Rapidly Growing Threats Your business, employees, partners, and customers are depending more and more on network connectivity, and protecting data and infrastructure has moved to the top of the IT agenda. You can't arm yourself against today's rapidly increasing threats unless you understand how they work. Read this ebook to learn more about the top 10 DNS attacks that can target your external and internal DNS infrastructure, the impact they can have on the DNS server …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date