Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Injective Code Inside an Import Table
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Crypto++� Holds the Key to Encrypting Your C++ Application Data
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Inject Your Code to a Portable Executable File
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Bulletproof Windows XP
Currently, this is the best way to protect XP systems from malware and accidental changes.
Crypt(API) any data WITHOUT password
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest Developer Videos
More...Latest CodeGuru Developer Columns
Comparing the stdio and iostream C++ Libraries
It's essential to know the differences in these libraries and use them correctly. This brief tutorial will guide you.

Ten Reasons to Look at .NET Core Now
The .NET Core is here now, and here are some reasons to begin using it.

Creating a Command Prompt Window Using Visual Basic
Learn how to simulate the DOS Command Prompt window from a Visual Basic form.
The Value of APIs
Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.