Learn how a BHO (Browser Helper Object) could be used to block a particular Web site.
Latest Security Articles
Browsing XML/XSLT with HTA/Scripting Runtime
Learn about a simplistic example of using a Scripting Runtime Library.
Keyboard Spy: Implementation and Counter Measures
Learn to develop hook-based key loggers and hook-safe software.
Peeking into Password Edit '& Internet Explorer - Super Password Spy++
If you need a tool to peek into not only the password edit boxes on different programs, but also the **** password input field on a homepage residing inside an Internet Explorer, here it is --- SuperPasswordSpy++.
Latest Developer Videos
More...Latest CodeGuru Developer Columns
Comparing the stdio and iostream C++ Libraries
It's essential to know the differences in these libraries and use them correctly. This brief tutorial will guide you.

Ten Reasons to Look at .NET Core Now
The .NET Core is here now, and here are some reasons to begin using it.

Creating a Command Prompt Window Using Visual Basic
Learn how to simulate the DOS Command Prompt window from a Visual Basic form.
The Value of APIs
Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.