Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Currently, this is the best way to protect XP systems from malware and accidental changes.
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.
Did you ever stop to thoroughly explore some of the more esoteric types, Lists and Stacks, that are available in the .NET collections namespace?
Learn how to make your own usable .NET Component with Visual Basic.
Arun Karthick introduces you to the state machine model and shows you how to create a simple working state machine sample using the .NET framework in the C# language.