Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Injective Code Inside an Import Table
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Crypto++� Holds the Key to Encrypting Your C++ Application Data
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Inject Your Code to a Portable Executable File
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Bulletproof Windows XP
Currently, this is the best way to protect XP systems from malware and accidental changes.
Crypt(API) any data WITHOUT password
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest Developer Videos
More...Latest CodeGuru Developer Columns
Comparing the stdio and iostream C++ Libraries
It's essential to know the differences in these libraries and use them correctly. This brief tutorial will guide you.
A Tipple with a Tuple
Fear not, Tuple lovers. This much-maligned data type is still in use today.

Creating Visual Basic String Enums
With just a few lines of code, you can have a quick way to make an Enum accept String values instead of an ordinary named constant.
The Value of APIs
Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.