Less than half of all developers implement any type of security development procedure when designing their applications, a recent Microsoft study revealed.
Latest Security Articles
Discover how to deal with C4996 warning, what secure CRT functions are and how to correctly use them.
Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.
In today's world of mobile apps, it's not an unreasonable expectation to want a database that's small, lightweight, and travels with the app from device to device. Take a quick look at what's available out there, and a few of the pros and cons of each.
Learn how to create your own class and create objects representing that class using Visual Basic.
Arun Karthick introduces you to the state machine model and shows you how to create a simple working state machine sample using the .NET framework in the C# language.