Learn how a BHO (Browser Helper Object) could be used to block a particular Web site.
Latest Security Articles
Browsing XML/XSLT with HTA/Scripting Runtime
Learn about a simplistic example of using a Scripting Runtime Library.
Keyboard Spy: Implementation and Counter Measures
Learn to develop hook-based key loggers and hook-safe software.
Peeking into Password Edit '& Internet Explorer - Super Password Spy++
If you need a tool to peek into not only the password edit boxes on different programs, but also the **** password input field on a homepage residing inside an Internet Explorer, here it is --- SuperPasswordSpy++.
Latest Developer Videos
More...Latest CodeGuru Developer Columns
Comparing the stdio and iostream C++ Libraries
It's essential to know the differences in these libraries and use them correctly. This brief tutorial will guide you.

Ten Reasons to Look at .NET Core Now
The .NET Core is here now, and here are some reasons to begin using it.

Using Visual Basic to Create PDFs from Images
Explore how to convert images to a PDF document and how to combine two PDF documents into one.
The Value of APIs
Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.