Click here to Skip to main content

Your Article bookmarks on CodeProject

Other recommendations:  Answer Tip/Trick Forum Member
 

Files and Folders

 
 
4.90/5 (38 votes)   Michael N. Haephrati Updated: 12 Jun 2014    Bookmarked: 18 Sep 2012    
How the Shopping List mechanism was used as part of the Target Eye project
 

Shell and IE programming

 
 
4.93/5 (55 votes)   Michael N. Haephrati Updated: 12 Jun 2014    Bookmarked: 6 Jan 2012    
How Target Eye's Auto updating mechanism allows a silent update of an application from identifying newer versions, downloading them and running them instead of the old one
 

Web Security

 
 
4.93/5 (48 votes)   Michael N. Haephrati Updated: 12 Jun 2014    Bookmarked: 14 Oct 2012    
How Target Eye's screen capturing mechanism works
 

iPhone

 
 
4.96/5 (48 votes)   Michael N. Haephrati Updated: 15 Feb 2013    Bookmarked: 2 Jun 2012    
How great could it be to be able to send SMS messages from your IPhone using the Internet connection
 

Database

 
 
5.00/5 (37 votes)   Michael N. Haephrati Updated: 15 Feb 2013    Bookmarked: 25 Sep 2012    
The DataTune system was one of the earliest data cleansing systems.
 

C / C++ Language

 
 
4.97/5 (57 votes)   Michael N. Haephrati Updated: 15 Feb 2013    Bookmarked: 3 Dec 2012    
A string obfuscation system that integrates in a Visual Studio C++ solution
 

Win32/64 SDK & OS

 
 
4.93/5 (53 votes)   Michael N. Haephrati Updated: 15 Feb 2013    Bookmarked: 27 Jan 2012    
How can an applicaiton elevate itself to gain "Admin" rights during runtime
 

Algorithms & Recipes

 
 
4.93/5 (50 votes)   Michael N. Haephrati Updated: 15 Feb 2013    Bookmarked: 19 Jan 2013    
Creating an application that can generate crosswords from a list of words
 

Internet / Network

 
 
4.91/5 (41 votes)   Anders Dalvander Updated: 22 Dec 2012    Bookmarked: 20 Feb 2013    
An introduction to context handles in RPC. A simple RPC client/server application using context handles is explained.
 

Hardware & System

 
 
4.92/5 (78 votes)   Michael N. Haephrati Updated: 20 Feb 2013    Bookmarked: 24 Jan 2013    
How a computer can be identified in order to generate a unique ID.
 

Product Showcase

 
 
0.00/5 (0 votes)   NineRays, Mark Sochan Updated: 16 Jun 2007    Bookmarked: 25 Aug 2010    
Most .NET software projects can easily be tampered, exposing your software to security risks and theft of intellectual property. This article shows different techniques used to protect .NET code and determine the best protection for you. 9rays.Net offers you Spices.Obfuscator to these ends.

Advertise | Privacy | Mobile
Web02 | 2.8.141022.2 | Last Updated 27 Nov 2007
Copyright © CodeProject, 1999-2014
All Rights Reserved. Terms of Service
Layout: fixed | fluid