Click here to Skip to main content
15,881,204 members

Articles by Bruno van Dooren (Articles: 25, Tip/Tricks: 4)

Articles: 25, Tip/Tricks: 4

RSS Feed

Average article rating: 4.96

Desktop Programming
Win32
21 Jul 2022   Updated: 21 Jul 2022   Rating: 5.00/5    Votes: 20   Popularity: 6.51
Licence: MIT    Views: 9,693     Bookmarked: 32   Downloaded: 297
Please Sign up or sign in to vote.
This article demonstrates how to use Win32 transactions with file and registry operations.
16 Aug 2022   Updated: 16 Aug 2022   Rating: 5.00/5    Votes: 5   Popularity: 3.49
Licence: MIT    Views: 6,800     Bookmarked: 2   Downloaded: 158
Please Sign up or sign in to vote.
This article describes how to use Windows transactions to recursively delete a registry tree under a registry subkey and then the subkey itself.
26 Aug 2022   Updated: 26 Aug 2022   Rating: 5.00/5    Votes: 11   Popularity: 5.21
Licence: MIT    Views: 9,132     Bookmarked: 11   Downloaded: 308
Please Sign up or sign in to vote.
This article describes a way to hash data using the latest Win32 API and C++
22 Sep 2022   Updated: 22 Sep 2022   Rating: 5.00/5    Votes: 6   Popularity: 3.89
Licence: MIT    Views: 8,591     Bookmarked: 8   Downloaded: 326
Please Sign up or sign in to vote.
This article shows how to retrieve the Privileges and Groups that are part of an access token such as the current thread token.
21 Oct 2022   Updated: 21 Oct 2022   Rating: 4.88/5    Votes: 13   Popularity: 5.43
Licence: MIT    Views: 9,191     Bookmarked: 12   Downloaded: 196
Please Sign up or sign in to vote.
This article shows how to use a win32 mutex during application startup to figure out if an application instance is the first one.
3 Nov 2022   Updated: 3 Nov 2022   Rating: 4.97/5    Votes: 19   Popularity: 6.36
Licence: MIT    Views: 10,771     Bookmarked: 20   Downloaded: 98
Please Sign up or sign in to vote.
The win32 subsystem often returns pointers to objects that need to be deallocated by the caller. In this article, I show a way to do this reliably and in an exception-safe manner.
24 Nov 2022   Updated: 24 Nov 2022   Rating: 4.91/5    Votes: 7   Popularity: 4.15
Licence: MIT    Views: 6,040     Bookmarked: 8   Downloaded: 0
Please Sign up or sign in to vote.
When calling into the win32 API, there are many times when you must deal with structures that have a variable size. This article shows how to do that in a convenient way.
9 Dec 2022   Updated: 9 Dec 2022   Rating: 5.00/5    Votes: 7   Popularity: 4.23
Licence: MIT    Views: 10,914     Bookmarked: 22   Downloaded: 0
Please Sign up or sign in to vote.
How to implement named pipe server for communicating with client apps
22 Dec 2022   Updated: 22 Dec 2022   Rating: 4.73/5    Votes: 4   Popularity: 2.85
Licence: MIT    Views: 12,530     Bookmarked: 17   Downloaded: 397
Please Sign up or sign in to vote.
How to implement named pipe server for communicating with client apps
11 Jan 2024   Updated: 11 Jan 2024   Rating: 5.00/5    Votes: 5   Popularity: 3.49
Licence: CPOL    Views: 3,450     Bookmarked: 8   Downloaded: 0
Please Sign up or sign in to vote.
In this article, I explain how to create win32 style DLLs and what the various significant intricacies are.
25 Jan 2024   Updated: 25 Jan 2024   Rating: 5.00/5    Votes: 7   Popularity: 4.23
Licence: CPOL    Views: 3,585     Bookmarked: 7   Downloaded: 92
Please Sign up or sign in to vote.
An introduction to exporting functions from DLLs
General Programming
Memory Management
22 Jan 2023   Updated: 22 Jan 2023   Rating: 5.00/5    Votes: 8   Popularity: 4.52
Licence: MIT    Views: 13,731     Bookmarked: 10   Downloaded: 115
Please Sign up or sign in to vote.
How to use C++ templates for implementing dynamic memory objects with custom allocator
High Performance Computing
Parallelization
5 Oct 2022   Updated: 5 Oct 2022   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: MIT    Views: 4,552     Bookmarked: 0   Downloaded: 111
Please Sign up or sign in to vote.
How to improve time consuming operations through parallelization, when multiple similar operations need to be performed
2 Apr 2023   Updated: 2 Apr 2023   Rating: 5.00/5    Votes: 10   Popularity: 5.00
Licence: MIT    Views: 8,634     Bookmarked: 18   Downloaded: 227
Please Sign up or sign in to vote.
In this article, I will explain Asynchronous Procedure Calls (APCs), their uses and their pitfalls
8 Dec 2023   Updated: 8 Dec 2023   Rating: 5.00/5    Votes: 11   Popularity: 5.21
Licence: MIT    Views: 12,422     Bookmarked: 22   Downloaded: 344
Please Sign up or sign in to vote.
How to use APCs to perform user interface updates
Programming Languages
C
30 Mar 2006   Updated: 30 Mar 2006   Rating: 4.94/5    Votes: 59   Popularity: 8.70
Licence: MIT    Views: 321,842     Bookmarked: 180   Downloaded: 10,489
Please Sign up or sign in to vote.
This article describes the process of developing a USB Kernel mode device driver using the WDF Kernel Mode Driver Foundation.
16 Feb 2006   Updated: 20 Apr 2006   Rating: 4.94/5    Votes: 55   Popularity: 8.51
Licence: MIT    Views: 451,256     Bookmarked: 205   Downloaded: 5,163
Please Sign up or sign in to vote.
An article about developing a driver for the WDF Kernel Mode Driver Foundation.
C#
19 Oct 2023   Updated: 19 Oct 2023   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: MIT    Views: 8,781     Bookmarked: 7   Downloaded: 0
Please Sign up or sign in to vote.
An overview of the different ways to mitigate the impact of DCOM hardening
15 Nov 2023   Updated: 15 Nov 2023   Rating: 5.00/5    Votes: 8   Popularity: 4.52
Licence: CPOL    Views: 4,090     Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
Mitigate problems caused by DCOM hardening, by reverse engineering a non-compliant .NET app
C++20
8 Sep 2022   Updated: 8 Sep 2022   Rating: 5.00/5    Votes: 20   Popularity: 6.39
Licence: MIT    Views: 20,422     Bookmarked: 19   Downloaded: 0
Please Sign up or sign in to vote.
How concepts can be used in template programming for partial specialization
2 Feb 2023   Updated: 2 Feb 2023   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: MIT    Views: 12,631     Bookmarked: 10   Downloaded: 0
Please Sign up or sign in to vote.
Ways to enforce an interface contract on static methods, similar to what you would expect from static virtual methods if they'd exist in C++
PowerShell
5 Jul 2022   Updated: 5 Jul 2022   Rating: 4.81/5    Votes: 7   Popularity: 4.07
Licence: MIT    Views: 9,512     Bookmarked: 5   Downloaded: 240
Please Sign up or sign in to vote.
How to read data from OPC DA servers into a PowerShell script
9 Mar 2023   Updated: 9 Mar 2023   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: MIT    Views: 17,166     Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
How to clean up user profiles on a computer
Security
4 May 2023   Updated: 4 May 2023   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: CPOL    Views: 7,093     Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
Ways to deal with changed security for CLR code in SQL databases
15 May 2023   Updated: 15 May 2023   Rating: 4.94/5    Votes: 8   Popularity: 4.46
Licence: CPOL    Views: 11,728     Bookmarked: 10   Downloaded: 0
Please Sign up or sign in to vote.
Basics of Service Principal names, and what they mean for SQL Server security

Average blogs rating:

No blogs have been submitted.

Average tips rating: 5.00

Active Directory
6 Oct 2022   Updated: 6 Oct 2022   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: CPOL    Views: 3,540     Bookmarked: 0   Downloaded: 0
Please Sign up or sign in to vote.
When retrieving claims information from user token, SDK documentation concerning the supported data types is incorrect.
Desktop Programming
Win32
27 Dec 2022   Updated: 27 Dec 2022   Rating: 5.00/5    Votes: 5   Popularity: 3.49
Licence: MIT    Views: 14,633     Bookmarked: 7   Downloaded: 0
Please Sign up or sign in to vote.
What to do when you want to use the current thread handle
General Programming
Exceptions
7 Sep 2022   Updated: 7 Sep 2022   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: MIT    Views: 5,931     Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
Symantec can cause valid applications to crash and be gone without a trace
Security
21 Jun 2023   Updated: 21 Jun 2023   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: CPOL    Views: 2,600     Bookmarked: 2   Downloaded: 0
Please Sign up or sign in to vote.
Exploring an alternative reason for LAN Manager Authentication Failure

Average reference rating:

No reference articles have been posted.

Average project rating:

No projects have been posted.
Software Developer
Belgium Belgium
I am a former professional software developer (now a system admin) with an interest in everything that is about making hardware work. In the course of my work, I have programmed device drivers and services on Windows and linux.

I have written firmware for embedded devices in C and assembly language, and have designed and implemented real-time applications for testing of satellite payload equipment.

Generally, finding out how to interface hardware with software is my hobby and job.