Learn about some techniques that IoT device developers should consider implementing to help protect their devices against threats such as Mirai.
Latest Security Articles
.NET Website Security Guidelines Checklist
Become proficient with security aspects before a web application goes live over the Internet.
Microsoft Study: Less Than Half of Developers Use a Security Process
Less than half of all developers implement any type of security development procedure when designing their applications, a recent Microsoft study revealed.
Microsoft Visual Studio: Secure CRT Functions
Discover how to deal with C4996 warning, what secure CRT functions are and how to correctly use them.
JavaScript Security
See how you can tighten security gaps using JavaScript and practices such as the Same Origin Policy, Data Tainting, and Signed Scripts.
Vista User Access Control and Visual C++
Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.
Latest CodeGuru Developer Columns
C++ Exception Handling: How to Handle Exceptions in C++
Learn to implement exception handling mechanism in C++.

Migrating to ASP.NET Core 2.0
Here's a checklist to prepare for upgrading from ASP.NET Core 1.1 to 2.0.

Creating a Tile Slide Puzzle Game in VB.NET
Create a Tile Slide game with Visual Basic.NET.
Programming Devices and Activities from the Microsoft Graph APIs
With Microsoft's new Project Rome, the user experience across all platforms (Windows, iOS, or Android) will be seamless among different hardware.