Latest HTTP Articles

URI Encoding and Decoding

Learn about fast and portable URI encoding and decoding functions that use std::string as the argument and return type, and do the buffer conversion, including '\0'.

HTTP Post Using C

Learn to write a small routine or utility to make a post request to a Web server and retrieve the data. This article demonstrates such a technique, tested on Linux.

Crawling Using WINHTTP 5

The latest WINHTTP library from Microsoft replaces the older WININET libraries. This library is used internally in various Microsoft applications. Learn the various issues and characteristics of using this library's methods while crawling (reading Web data). This is most suitable for C++ coded, HTTP-based client/server applications.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • A help desk is critical to the operations of an IT services business. As a centralized intake location for technical issues, it allows for a responsive and timely solution to get clients and their staff back to business as usual. In addition to handling immediate IT issues, a help desk performs several proactive tasks to ensure clients' IT systems remain operational and downtime is minimized. Thus, utilizing a help desk and following best practices can improve the productivity, efficiency and satisfaction of …

  • Given today's threat environment and the increasing connectivity of digital infrastructures, security teams now realize that they must assume their IT environments are subject to periodic compromise. Gone are the days when preventive measures to secure the perimeter or trying to detect malware problems using signature-match technologies were enough. New practices based on an understanding of the phases of an attack, continuous threat monitoring, and rapid attack detection and remediation are necessary. This …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds