Learn how a BHO (Browser Helper Object) could be used to block a particular Web site.
Latest Security Articles
Browsing XML/XSLT with HTA/Scripting Runtime
Learn about a simplistic example of using a Scripting Runtime Library.
Keyboard Spy: Implementation and Counter Measures
Learn to develop hook-based key loggers and hook-safe software.
Peeking into Password Edit '& Internet Explorer - Super Password Spy++
If you need a tool to peek into not only the password edit boxes on different programs, but also the **** password input field on a homepage residing inside an Internet Explorer, here it is --- SuperPasswordSpy++.
Latest Developer Videos
More...Latest CodeGuru Developer Columns
C++ Tips and Tricks
Quirky and yet persistent, C++ is a language that keeps programmers coming back to it. Pick up some new ways to wrangle it into your workflow.

Creating a Server with .NET Socket Programming
HTTP isn't the only network protocol that's useful. Learn about, or beef up your skills with, socket-level programming.

Common Library Functions in Visual Basic
Learn about the functions, and see a small example of how the particular functions can be used.
The Top Challenge for Developers is...
Most developers face a grueling challenge to please their end users. We asked their top challenge is. With over 3,000 responses, the results are now available!






