Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Latest Security Articles
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Learn to implement discretionary access control on securable NT objects.
Learn how to retrieve a current user's basic security information, such as the fully qualified user name (with domain or workgroup), whether the user is authenticated, and the authentication type.
Hook into Internet Explorer.
The second article in the "Keystroke Logger and more" series. Learn about the principle of MSN Messenger Hooking in version 5 of MSN and before.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
Become more proficient on the usage of statements to control the flow of execution through a C++/CLI application.
Discover (Rediscover?) an image-manipulating tool that's been around for ages, but is especially suited to working within the .NET framework.
The concepts of boxing and unboxing data might be second nature for many, but for newbies it's worth covering. And, the "old hands" may learn something new, as well.
Most developers face a grueling challenge to please their end users. We asked their top challenge is. With over 3,000 responses, the results are now available!