Learn about two Explorer Shell Extensions: One creates File Checksums; the other verifies File Checksums.
Latest Windows Programming Articles - Page 11
Protect software with product keys based on Elliptic Curve Cryptography.
The way Vista closes applications during operating system shut down has changed from prior Windows versions' approaches. Learn how to provide your users with appropriate notification from the Vista shut down screen.
Protect Software with Product Keys based on the Advanced Encryption Standard (AES).
Learn how to replace the displayed icon of an executable file with an .ICO file of your choice.
Learn how to build an efficient library to provide support for Message Only Windows. The article also shows how to use the Thunk32 library provided in an earlier article, as well as some general pointers on good practices and patterns.
Latest CodeGuru Developer Columns
Discover the concept of late binding—the work behind the scenes to realize the late binding mechanism. Sample code and examples are provided.
Explore how to perform basic serial port communication. Examples are in C# and VB.NET.
Explore how to create and use a Ubuntu virtual machine.