Learn how a BHO (Browser Helper Object) could be used to block a particular Web site.
Latest Security Articles
Browsing XML/XSLT with HTA/Scripting Runtime
Learn about a simplistic example of using a Scripting Runtime Library.
Keyboard Spy: Implementation and Counter Measures
Learn to develop hook-based key loggers and hook-safe software.
Peeking into Password Edit '& Internet Explorer - Super Password Spy++
If you need a tool to peek into not only the password edit boxes on different programs, but also the **** password input field on a homepage residing inside an Internet Explorer, here it is --- SuperPasswordSpy++.
Latest Developer Videos
More...Latest CodeGuru Developer Columns
MFC Integration with the Windows Transactional File System (TxF)
The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.
.NET Framework: Collections and Generics
The original release of the .NET Framework included collections as .NET was introduced to the Microsoft programming world. The .NET Framework 2.0 introduced generics to complement the System.Collections namespace and provide a more efficient and well performing option. Read on to learn more...
Videos and VB.NET 2012 Part 4 - Creating a Video Player for the Windows 8 Store
Hannes du Preez shows you how to create a video player and a Windows 8 Store application.

Top 7 Tips for Developing a Secure ASP.NET Web Application
As a web developer you should be aware of a few security best practices while developing your ASP.NET web application. Arun Karthick lists his top 7 tips to help you keep your ASP.NET security intact.