Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Latest Security Articles
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Learn to implement discretionary access control on securable NT objects.
Learn how to retrieve a current user's basic security information, such as the fully qualified user name (with domain or workgroup), whether the user is authenticated, and the authentication type.
Hook into Internet Explorer.
The second article in the "Keystroke Logger and more" series. Learn about the principle of MSN Messenger Hooking in version 5 of MSN and before.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
Quirky and yet persistent, C++ is a language that keeps programmers coming back to it. Pick up some new ways to wrangle it into your workflow.
Just a few lines of code will let your program determine whether it's being reached by a mobile device.
Pick up the basics of how to create dynamic assemblies and how to run dynamic code.
As a web developer you should be aware of a few security best practices while developing your ASP.NET web application. Arun Karthick lists his top 7 tips to help you keep your ASP.NET security intact.