Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Latest Security Articles
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Learn to implement discretionary access control on securable NT objects.
Learn how to retrieve a current user's basic security information, such as the fully qualified user name (with domain or workgroup), whether the user is authenticated, and the authentication type.
Hook into Internet Explorer.
The second article in the "Keystroke Logger and more" series. Learn about the principle of MSN Messenger Hooking in version 5 of MSN and before.
Latest CodeGuru Developer Columns
A pointer-to-member represents a location inside a class; selecting a member means offsetting into it. Explore this intricate idea. With examples.
Read through various ways to license and protect your .NET applications from potential pirates. You may find the perfect choice for your own work.
Explore two ways to check whether an application is already running. Example code is both in C# and VB.NET.
Discover the world of Portable Class Libraries (PCLs) and how they can work for you.