Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Currently, this is the best way to protect XP systems from malware and accidental changes.
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.
Looking to work with a non Microsoft Database in .NET? You need to know what ORM's are available, and why you can't currently use Entity Framework.
Hannes du Preez shows you how to create a User Control in your ASP.NET Web Application.
Arun Karthick introduces you to the state machine model and shows you how to create a simple working state machine sample using the .NET framework in the C# language.