Learn to use the "Network Distributed Object Model" to have a simplified way of performing network communication at the object level.
Latest Security Articles
Injective Code Inside an Import Table
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Crypto++� Holds the Key to Encrypting Your C++ Application Data
The need to encrypt sensitive information is more important than ever. Luckily, the C++ class library Crypto++ enables you to encrypt your application data regularly and painlessly.
Inject Your Code to a Portable Executable File
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Bulletproof Windows XP
Currently, this is the best way to protect XP systems from malware and accidental changes.
Crypt(API) any data WITHOUT password
This is a set of complex functions for crypting, decrypting, hashing, signing and so on.
Latest CodeGuru Developer Columns
Understanding the C++ Utility Components in the C++ Standard Library
Learn more about a few commonly used components and explore their utility and usages.

Top Programming Languages to Use for .NET Development
Take a look at some of the most popular languages to use within the .NET paradigm.

Using Common Visual Basic Maths Conversion Functions—Imperial to Metric
When you need to convert imperial to metric and vice versa, here are some formulas to keep on hand.
The Value of APIs
Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.