Latest Directories and Files Articles

Shutdown Manager

The Windows "Turn off" buttons are three or more steps away from the desktop work area, depending on your personal settings. This can be not only inconvenient, but downright bothersome at times. These programs can power down the computer, in just one or two steps.

VB 6 and USB Flash Disks

Learn to determine whether or not a disk is plugged in. Also, learn how to make the disk Autorun, similar to CD drives, and, how to run a normal VB 6 program from this disk, without needing to install it on the client machine.

Program Launcher

Learn about a simple utility to launch files/folders by pressing a combination of keys, irrespective of which application is active.

Working with File Type Associations

File type associations can be used in Windows to automatically start up a particular program every time someone double-clicks a file with a particular extension. This article shows how to do exactly that, using Visual Basic and the WIN32 API.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Working with Parallel LINQ

Working with Parallel LINQ

LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 11, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT New computing platforms, expanding information environments, recurrent security breaches and evolving regulatory frameworks are factors that security executives must contend with and address when developing their security strategy. In response to these dynamics, security executives are seeking stronger, more nimble and more pervasive security technologies to help protect business-critical information from unauthorized disclosure, loss or …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date