Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Currently, this is the best way to protect XP systems from malware and accidental changes.
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest CodeGuru Developer Columns
A pointer-to-member represents a location inside a class; selecting a member means offsetting into it. Explore this intricate idea. With examples.
Read through various ways to license and protect your .NET applications from potential pirates. You may find the perfect choice for your own work.
Explore two ways to check whether an application is already running. Example code is both in C# and VB.NET.
Discover the world of Portable Class Libraries (PCLs) and how they can work for you.