Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Currently, this is the best way to protect XP systems from malware and accidental changes.
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
Discover Code::Blocks, an open source IDE for C/C++.
LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.
Create a multi-channel application with DevExtreme and Visual Studio.
Arun Karthick introduces you to the state machine model and shows you how to create a simple working state machine sample using the .NET framework in the C# language.