Self-signed certificates aren't just for securing communication with sockets. Learn how to use them to encrypt text.
Latest Security Articles
P/Invoke Refresher
It might be older technology, but P/Invoke is still useful today. Learn how to leverage it to your advantage.
Working with Digital Certificates in .NET
Use the .NET framework for enumerating and finding certificates, importing, exporting or deleting certificates.
Records Management for Microsoft Office SharePoint Server
The Records Center is an important MOSS (Microsoft Office SharePoint Server) component for companies that need to save critical or legally sensitive information. Discover how to create a Records Center then secure its contents with the MOSS Object Model and one of its default WebServices.
Cryptographically Random Password Generator
Create a cryptographically random password generator, including options that allow the user to specify allowable characters in the password.
Implementing a Custom ConnectionString Installer for Setup
See how a setup project with a custom action lets the user define the connection string using the Data Links dialog and encrypt that connection string using RSA encryption.
Latest Developer Videos
More...Latest CodeGuru Developer Columns

Comparing the stdio and iostream C++ Libraries
It's essential to know the differences in these libraries and use them correctly. This brief tutorial will guide you.

Managing Your Drives Using C#
Sooner or later you'll need to find out about, and deal with, the various storage devices ("drives") available in your system.

Getting Started with Visual Basic: Getting the VB Software
After you've read this article, you're well on your way to becoming a Visual Basic developer.
Influencing Users: Compliance and Conformity
Learn about two common influence techniques, compliance and conformity, as well as how to design for them.