Less than half of all developers implement any type of security development procedure when designing their applications, a recent Microsoft study revealed.
Latest Security Articles
Discover how to deal with C4996 warning, what secure CRT functions are and how to correctly use them.
Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.
String.format is not just a relic from a bygone era, but is actually still very useful even in today's brave new world. It’s time to dig into some data formatting!
Hannes du Preez explains what delegates are and how to use them to call managed and unmanaged code in VB.NET.
This article introduces you to Big Data, Apache Hadoop and MapReduce jobs. We will also learn how to create MapReduce jobs using C#.