The Wayback Machine - https://web.archive.org/web/20160201035429/http://www.codeguru.com/csharp/.net/net_general/comcom/

Latest COM/COM+ Articles

Build a Managed BHO and Plug into the Browser

Browser Helper Objects (BHOs) are COM components that communicate with Internet Explorer to enrich the browsing experience. Michele Leroux Bustamante returns to the world of COM to show you how to build a managed BHO with the help of the .NET Framework's COM interoperability features.

Simplify Application Deployment with Registration-Free COM

In the days before .NET, COM's dependency on the Registry and its backward compatibility issues were the Achilles' heels of Win32 development. Learn a technique for deploying your existing COM components without the pain traditionally associated with the Registry.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Managing Your Drives Using C#

Managing Your Drives Using C#

Sooner or later you'll need to find out about, and deal with, the various storage devices ("drives") available in your system.

Top White Papers and Webcasts

  • Live Event Date: February 18, 2016 @ 2:30 p.m. ET / 11:30 a.m. PT Just Released! The 2016 Mobile Enterprise Application Survey highlights how the most successful companies secure, manage and drive adoption of their mobile assets. In this webcast, Dan Woods, Editor and CTO of CITO Research, and Chris Hazelton, Director, Product Marketing & Strategy at Apperian breakdown the results of this survey and discuss real world examples of how companies are driving higher levels of mobile app security, gaining …

  • Live Event Date: February 10, 2016 | 1:00 p.m. EST / 10:00 a.m. PST The Dark Web is where cybercriminals are actively targeting, trading, and selling sensitive corporate and personal information. However these underground cybercriminal markets -- where company trade secrets, social security numbers, credit cards, bank accounts, medical records, malware for sale, hackers for hire, and more are all readily available -- are also rich sources of intelligence that you can use to mitigate critical risks. Check out …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date