Learn how a BHO (Browser Helper Object) could be used to block a particular Web site.
Latest Security Articles
Browsing XML/XSLT with HTA/Scripting Runtime
Learn about a simplistic example of using a Scripting Runtime Library.
Keyboard Spy: Implementation and Counter Measures
Learn to develop hook-based key loggers and hook-safe software.
Peeking into Password Edit '& Internet Explorer - Super Password Spy++
If you need a tool to peek into not only the password edit boxes on different programs, but also the **** password input field on a homepage residing inside an Internet Explorer, here it is --- SuperPasswordSpy++.
Latest CodeGuru Developer Columns
Understanding the C++ Utility Components in the C++ Standard Library
Learn more about a few commonly used components and explore their utility and usages.

Top Programming Languages to Use for .NET Development
Take a look at some of the most popular languages to use within the .NET paradigm.

Using Common Visual Basic Maths Conversion Functions—Imperial to Metric
When you need to convert imperial to metric and vice versa, here are some formulas to keep on hand.
The Value of APIs
Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.