Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Currently, this is the best way to protect XP systems from malware and accidental changes.
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest CodeGuru Developer Columns
With the addition of the C/C++ extension to Visual Studio Code, you might have what is needed in a small, cross-platform editor.
Explore how to access the data from a JsonResult object and display it in a browser. An example is given so you can follow along.
Learn what GUIDs are, how to randomly generate GUIDs, and how to copy them. Examples are given both in C# and VB.NET.
Onion Architecture addresses the challenges faced with 3-tier and n-tier architectures, and provides a solution for common problems.