Click here to Skip to main content
1,079 members
Everything / Multimedia / C++

C++

C++

Great Reads

by Michael_Haephrati
Developing NT services compatible with today's limitations
by Michael_Haephrati
Michael Haephrati explains how keyboard capturing should be done
by Michael_Haephrati
Michael Haephrati describes Target Eye screen capturing mechanism
by Michael_Haephrati
Michael Haephrati describes the Shopping List and how it is used

Latest Articles

by Michael_Haephrati
An example of a small and easy to implement monitoring application
by Michael_Haephrati
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it
by Michael_Haephrati
Michael Haephrati explains how keyboard capturing should be done
by Alex Marbus
Ethernet connections

All Articles

Sort by Score

C++ 

Please Sign up or sign in to vote.
28 Aug 2013
Michael_Haephrati
Developing NT services compatible with today's limitations
Please Sign up or sign in to vote.
13 Sep 2013
Michael_Haephrati
Michael Haephrati explains how keyboard capturing should be done
Please Sign up or sign in to vote.
10 Sep 2013
Michael_Haephrati
Michael Haephrati describes Target Eye screen capturing mechanism
Please Sign up or sign in to vote.
13 Sep 2013
Michael_Haephrati
Michael Haephrati describes the Shopping List and how it is used
Please Sign up or sign in to vote.
12 Apr 2012
DaveAuld
A beginners' introduction to using shift registers with the Arduino
Please Sign up or sign in to vote.
4 Oct 2013
Michael_Haephrati
An example of a small and easy to implement monitoring application
Please Sign up or sign in to vote.
4 Oct 2013
Michael_Haephrati
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it
Please Sign up or sign in to vote.
25 Nov 2011
gstolarov
SharePoint OCR image files indexing.
3 Apr 2012
LEADTOOLS Support
The benefits of grid and distributed computing are well established and indisputable.  However, implementing them can be a nightmare – converting audio/video files in separate chunks can result in video hiccups and out of sync audio – but not with LEADTOOLS!
Please Sign up or sign in to vote.
12 Apr 2012
Garth Tissington
After pulling my hair out for several days I finally figured out how to install and configure SQLCE with SQL Server for replication to a Windows CE device. I hope this saves you some pain
Please Sign up or sign in to vote.
12 Apr 2012
Sachin R Sangoi
Are you considering a move to 64-bit Windows? Read on...
Please Sign up or sign in to vote.
12 Apr 2012
tanvon malik
This article shows you ways to run Control Panel applets from VC++, even those that don't have a cpl extension file.
Please Sign up or sign in to vote.
12 Apr 2012
Sameers (theAngrycodeR )
An article on Changing the Windows Environment setting using Registry
Please Sign up or sign in to vote.
12 Apr 2012
Pradeep Kothari
Installing Windows XP Embedded
Please Sign up or sign in to vote.
12 Apr 2012
Pascal Ganaye
I use a procedure based on batch files to copy various versions of my project. I was a bit fed up to wait for the batch file to copy hundreads of files and wrote this small utility to speed up the process. I hope some of you will find it useful.
Please Sign up or sign in to vote.
12 Apr 2012
Anup Shinde
This article is intended for network administrators and internet users. It shows how users can bypass the firewall to get access to the restricted internet sites. This article is just an overview and does not cover the technical details.
Please Sign up or sign in to vote.
12 Apr 2012
slw1234@sbcglobal.net
This article will give beginners in network a simple Security strategy for network security for their small businesses and home use. These ideas were developed for our own small business network.
Please Sign up or sign in to vote.
12 Apr 2012
Lubna Luxmi Chowdhry
Cluster is a term meaning independent computers combined into a unified system through software and networking. Clusters are typically used for High Availability for greater reliability or High Performance Computing to provide greater computational power than a single computer can provide.
Please Sign up or sign in to vote.
12 Apr 2012
Dan Farino
A tool and code for accessing the console session of a logged-on user who has locked the workstation.
Please Sign up or sign in to vote.
5 Jun 2012
Michael_Haephrati
How a computer can be identified in order to generate a unique ID.
Please Sign up or sign in to vote.
10 Sep 2013
Michael_Haephrati
How Target Eye's Auto updating mechanism allows a silent update of an application from identifying newer versions, downloading them and running them instead of the old one
Please Sign up or sign in to vote.
12 Apr 2012
Sameers (theAngrycodeR )
Setting up IIS and PWS so that it recognises full domain names as belonging to your machine.
Please Sign up or sign in to vote.
12 Apr 2012
fraudlabs
solution to prevent chargebacks and to reduce fraud for online merchants