Visual C++.NET supports the automatic detection of stack-based buffer overruns through the use of the /GS compiler switch. Learn why stack-based buffer overruns are so serious, and how /GS and other Visual C++ settings can combat them.
Latest Buffer & Memory Manipulation Articles
VMemPool
If you deal with same size objects in server coding, VMemPool shows a good way for beginners.
Automatic Deallocation of Unwanted Memory
The most common yet repeated mistake that programmers make occurs while using system memory. This program automatically deallocates memory back to the system!
MemCheck Driver Memory Tool
Code to help driver developers locate and solve memory problems. The code includes checks for buffer overruns, double-frees, invalid memory accesses.
Inflable Arrays in Win32
The inflable array described here allows to declare really huge buffers without actually allocating much more memory than is really needed to store the actual data.
Expandable, Data Type-Neutral Buffer Class
Expandable, Data Type-Neutral Buffer Class
Latest Developer Videos
More...Latest CodeGuru Developer Columns
C++ Tips and Tricks
Quirky and yet persistent, C++ is a language that keeps programmers coming back to it. Pick up some new ways to wrangle it into your workflow.

Accessing Flickr Using .NET
Learn how to search for keywords in a command line app on Flickr.

Owner Drawn Comboboxes, Listboxes, and Menus in Visual Basic
This article will provide you with enough background to be able to use the Owner draw methods to add more spice to your controls.
Top 7 Tips for Developing a Secure ASP.NET Web Application
As a web developer you should be aware of a few security best practices while developing your ASP.NET web application. Arun Karthick lists his top 7 tips to help you keep your ASP.NET security intact.