Learn about some techniques that IoT device developers should consider implementing to help protect their devices against threats such as Mirai.
Latest Security Articles
Become proficient with security aspects before a web application goes live over the Internet.
Less than half of all developers implement any type of security development procedure when designing their applications, a recent Microsoft study revealed.
Discover how to deal with C4996 warning, what secure CRT functions are and how to correctly use them.
Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.
Latest CodeGuru Developer Columns
A pointer-to-member represents a location inside a class; selecting a member means offsetting into it. Explore this intricate idea. With examples.
Read through various ways to license and protect your .NET applications from potential pirates. You may find the perfect choice for your own work.
Explore two ways to check whether an application is already running. Example code is both in C# and VB.NET.
Discover the world of Portable Class Libraries (PCLs) and how they can work for you.