Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Injective Code Inside an Import Table
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Crypto++� Holds the Key to Encrypting Your C++ Application Data
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Inject Your Code to a Portable Executable File
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Bulletproof Windows XP
Currently, this is the best way to protect XP systems from malware and accidental changes.
Crypt(API) any data WITHOUT password
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest Developer Videos
More...Latest CodeGuru Developer Columns

Understanding the C++ Utility Components in the C++ Standard Library
Learn more about a few commonly used components and explore their utility and usages.

Beginning C#: User-defined Type Conversion Operators
Become proficient with using type definitions in C#.

Doing Cryptography in Visual Basic
Learn about the various forms of encryption in Visual Basic and the differences among them.
The Value of APIs
Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.






