Latest Debugging Articles - Page 5

An STL Error Message Decryptor for visual C++

This package provides a set of tools to shorten the length of VC++ STL-related error messages so that the most vital information from a message fits within the visible portion of the status bar line at the bottom of the Visual Studio IDE.

Getting Started Reverse Engineering

Lots of people complain that Windows and other products should be open sourced. Well, they are! It's just that you don't have C or VB source code you have assembly language binaries. In this month's article, John discusses how to get started thinking about reverse engineering so you can figure out how things work.

Getting Started with SoftICE

While at NuMega, John Robbins helped to make SoftICE the preminent debugger for the Windows environment. Now, read what he has to say regarding this SoftICE in terms of its capabilities and even some tips and techniques on getting the most out of it.

How I Use BoundsChecker

The most frequently asked question of John Robbins is how he personally uses BoundsChecker, the award-winning bug-finding product that he helped to make famous while at NuMega. In this article, John shows us his favorite tricks and techniques.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • When it comes to desktops – physical or virtual – it's all about the applications. Cloud-hosted virtual desktops are growing fast because you get local data center-class security and 24x7 access with the complete personalization and flexibility of your own desktop. Organizations make five common mistakes when it comes to planning and implementing their application management strategy. This eBook tells you what they are and how to avoid them, and offers real-life case studies on customers who didn't …

  • Given today's threat environment and the increasing connectivity of digital infrastructures, security teams now realize that they must assume their IT environments are subject to periodic compromise. Gone are the days when preventive measures to secure the perimeter or trying to detect malware problems using signature-match technologies were enough. New practices based on an understanding of the phases of an attack, continuous threat monitoring, and rapid attack detection and remediation are necessary. This …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds