Click here to Skip to main content
936 members (103 online)
post an article ask a question Search our articles

Set your site filter

 Latest Articles

Featured article
10-Sep-13 15:00pm by Michael Haephrati (new) 
How Target Eye's Auto updating mechanism allows a silent update of an application from identifying newer versions, downloading them and running them instead of the old one
30-Mar-15 15:30pm by ProgramFOX (new) 
This blog describes how to use Batch files to add to your PATH if you have two executables with the same name you'd like to access without having to type the full path.
6-May-14 17:32pm by ledtech3 (new) 
Or, Why is the event log maxing out the log with useless user information. Anyone that has the Catalyst Control Center may have noticed the Ace Event Log. Mine seems to stay full of errors and if you clear the … Continue reading →
4-Mar-14 9:54am by Marco Bertschi (new) 
Short and easy description on how you get your own, private Git server running on your Raspberry Pi
10-Dec-13 13:36pm by ledtech3 (updated) 
Rootkits have become the most devious method of hiding malware on a system. They are being employed to every sector from the home user to government to private industry.The monetary and information losses along with infrastructure disruption will continue to … Continue reading →
4-Oct-13 15:40pm by Michael Haephrati (new) 
An example of a small and easy to implement monitoring application
4-Oct-13 15:39pm by Michael Haephrati (new) 
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it
13-Sep-13 14:26pm by Michael Haephrati (updated) 
Michael Haephrati explains how keyboard capturing should be done
13-Sep-13 14:02pm by Alex Marbus (updated) 
Ethernet connections
13-Sep-13 12:33pm by Michael Haephrati (new) 
Michael Haephrati describes the Shopping List and how it is used
13-Sep-13 9:24am by Michael Haephrati (new) 
Michael Haephrati describes how a hardware copy protection dongle was developed.

 Our Community

3What fun...Code Project reply, lounge, etc, takes me here! - The Lounge
2Code Project Down - The Lounge
2They found this site. - The Lounge
4Workspaces - The Lounge
8I've got five seconds - The Lounge
4All other forums are broken. - The Lounge

News Latest News

Discussions Latest Discussions

by Member 966
Hey , thanks for clicking this , I was wondering how to "minus" a value in Visual Basic? I know you can do "+ 100" but I try "- 100" and it doesn't work , is there ANY way to minus a value in Visual Basic? :)
by Member 966
Hey , Glad you're taking your time to read this , I am developing a game and I ran into a stump... I am trying to make a points-spending system where if you have enough points , you can buy the item , as many as you want.. I tried thisIf Game.NumericUpDown1.Contains("100") ThenBut it pops up...
by Roger Wright
At work we have a local network with 15 or so PCs and a couple of network printers connected to a 24 port switch, thence connected to the outside world via a SonicWall firewall. Since the SonicWall includes several VPN licenses, and I often travel, I thought it would be a snap to construct a...
by ledtech3
I'm thinking about a project for a set of remote temp sensors for where my dog sleeps in the garrage under my workbench.The outside temps here can range from near -10 to +115 give or take.My electronic project skills are kind of limited but would like to see how I may do this.It...
by Michael Haephrati
What are the advantages of binary search trees over hash tables?

Top articles Latest Best Picks

by Michael Haephrati  5.00/5 (2 votes)
An example of a small and easy to implement monitoring application
by Michael Haephrati  5.00/5 (2 votes)
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it

Advertise | Privacy | Mobile
RA-Web1 | 2.8.150728.1 | Last Updated 31 Jul 2015
Copyright © RootAdmin, 1999-2015
All Rights Reserved. Terms of Service
Layout: fixed | fluid