The Wayback Machine - https://web.archive.org/web/20160201081310/http://www.codeguru.com/cpp/w-p/files/folderdirectorymaintenance/

Latest Folder/Directory Maintenance Articles

Three Powerful Yet Untapped Features of NTFS

The NTFS windows file system has introduced several features that improve the performance, stability, and reliability of file storage. Of these, three features lend themselves to advanced methods of information storage and collation. Few applications have, however, made extensive use of these features. This article introduces these features and identifies some of the potential uses each one exhibits.

Enumerate WFP Files

Windows systems launched after Windows2000 include a WFP feature (Windows File Protection). This article glimpses over it and shows how to enumerate the list of all protected files.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Managing Your Drives Using C#

Managing Your Drives Using C#

Sooner or later you'll need to find out about, and deal with, the various storage devices ("drives") available in your system.

Top White Papers and Webcasts

  • Data (and database management systems, like Oracle) have never been more critical for competitive advantage. All modern IT initiatives – cloud, real time analytics, internet of things – intrinsically need to leverage more data, more quickly. All-flash storage is a next generation infrastructure technology that has the potential to unlock a new level of employee productivity and accelerate your business by reducing the amount of time spent waiting for databases and applications.

  • 2015 is shaping up to include some of the best innovation the mobile industry has ever experienced. There will be new discoveries, new technologies, and existing giants in the vendor space will test the limits to increase productivity while ensuring the confidentiality, integrity, and availability of data. While all of this innovation is taking place, enterprises must continue to remain vigilant as cybercriminals continue to look for weaknesses to steal company data, and intellectual property by infiltrating …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date