The Wayback Machine - https://web.archive.org/web/20140211220618/http://www.codeguru.com:80/cpp/security/

Latest Security Articles

JavaScript Security

See how you can tighten security gaps using JavaScript and practices such as the Same Origin Policy, Data Tainting, and Signed Scripts.

Vista User Access Control and Visual C++

Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

.NET Framework: Collections and Generics

The original release of the .NET Framework included collections as .NET was introduced to the Microsoft programming world. The .NET Framework 2.0 introduced generics to complement the System.Collections namespace and provide a more efficient and well performing option. Read on to learn more...

How to Push Data from Server to Client Using SignalR

SignalR is an Asp.Net library that pushes data to a wide variety of clients. The burden of worrying about which server push transport to use and deciding on the fallbacks has been removed from developers. Read on to learn more.

Top White Papers and Webcasts

  • Cybersecurity has never been more complex than it is in today's business world. Confidential data outside your firewall, unpatched vulnerabilities in trusted third-party applications, the astronomical growth of malware, and the increasing number of mobile devices on your network have created a myriad of new risks. Ironically, many software and security systems designed to combat these threats are only adding a layer of complexity to the problem. Are you tired of choosing between security and efficiency? In …

  • The exponential growth of data in the enterprise is straining existing backup and recovery infrastructures to the breaking point, forcing many IT organizations to quickly explore and implement solutions that can accommodate this unexpected growth. This whitepaper analyzes the top storage and backup challenges CIOs and IT departments are facing today, along with three emerging storage models that promise to cost-effectively meet the exploding data growth needs of large organizations for many years to come.

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds