The Wayback Machine - https://web.archive.org/web/20140313115436/http://www.codeguru.com:80/cpp/i-n/network/

Latest Network Protocols Articles

Distributed Network Object

Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.

Step by Step Developing a SOHO HTTP Filter

Most available web filters work inline, meaning that all outgoing and incoming packets are passed through a filter driver. This approach along with its own benefits has a big flaw; the filtering process affects data transfer throughput. Learn about an experimental remedy to this issue by putting the filter engine in sniffer mode. This way, the filtering process and data transfer act independently.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

.NET Framework: Collections and Generics

The original release of the .NET Framework included collections as .NET was introduced to the Microsoft programming world. The .NET Framework 2.0 introduced generics to complement the System.Collections namespace and provide a more efficient and well performing option. Read on to learn more...

Top White Papers and Webcasts

  • The cloud is gaining traction in the enterprise resource planning (ERP) market and most vendors now have a cloud offering. After examining small and medium companies that have implemented cloud ERP, Nucleus found customers were able to achieve substantial benefits, including reduced IT costs, increased employee productivity, and better inventory management. This report analyzes the benefits of cloud ERP and provides examples of how vendors helped their customers increase return on investment (ROI) and reduce …

  • Third-party applications, browsers and plugins have become the attack vector of choice for the modern cyber criminal. Computing surveyed over 200 UK business decision makers to understand how they perceived the risks that they faced from third-party applications. We set out to understand how they were managing and mitigating the challenges to employee productivity, compliance and information security. This paper features a detailed discussion of the survey findings alongside analysis of how third-party …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds