Less than half of all developers implement any type of security development procedure when designing their applications, a recent Microsoft study revealed.
Latest Security Articles
Discover how to deal with C4996 warning, what secure CRT functions are and how to correctly use them.
Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.
Did you ever stop to thoroughly explore some of the more esoteric types, Lists and Stacks, that are available in the .NET collections namespace?
Learn how to make your own usable .NET Component with Visual Basic.
Arun Karthick introduces you to the state machine model and shows you how to create a simple working state machine sample using the .NET framework in the C# language.