Latest Network Protocols Articles

Distributed Network Object

Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.

Step by Step Developing a SOHO HTTP Filter

Most available web filters work inline, meaning that all outgoing and incoming packets are passed through a filter driver. This approach along with its own benefits has a big flaw; the filtering process affects data transfer throughput. Learn about an experimental remedy to this issue by putting the filter engine in sniffer mode. This way, the filtering process and data transfer act independently.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

The Sorry State of .NET ORMs

Looking to work with a non Microsoft Database in .NET? You need to know what ORM's are available, and why you can't currently use Entity Framework.

Top White Papers and Webcasts

  • A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. With many high profile breaches in 2013 occurring on endpoints, interest in improving endpoint security is top-of-mind for many information security professionals. The full results of the inaugural SANS Endpoint Security Survey are summarized in this white paper to help information security professionals track trends in endpoint …

  • Live Event Date: September 19, 2014 @ 2:00 p.m. ET / 11:00 a.m. PT In response to the rising number of data breaches and the regulatory and legal impact that can occur as a result of these incidents, leading analysts at Forrester Research have developed five important design principles that will help security professionals reduce their attack surface and mitigate vulnerabilities. Check out this upcoming eSeminar and join Chris Sherman of Forrester Research to learn how to deal with the influx of new device …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds