Click here to Skip to main content
15,884,176 members

Articles by Bruno van Dooren (Articles: 25, Tip/Tricks: 4)

Articles: 25, Tip/Tricks: 4

RSS Feed

Average article rating: 4.96

Desktop Programming
Win32
21 Jul 2022   Updated: 21 Jul 2022   Rating: 5.00/5    Votes: 20   Popularity: 6.51
Licence: MIT    Views: 9,723     Bookmarked: 32   Downloaded: 297
Please Sign up or sign in to vote.
This article demonstrates how to use Win32 transactions with file and registry operations.
16 Aug 2022   Updated: 16 Aug 2022   Rating: 5.00/5    Votes: 5   Popularity: 3.49
Licence: MIT    Views: 6,830     Bookmarked: 2   Downloaded: 158
Please Sign up or sign in to vote.
This article describes how to use Windows transactions to recursively delete a registry tree under a registry subkey and then the subkey itself.
26 Aug 2022   Updated: 26 Aug 2022   Rating: 5.00/5    Votes: 11   Popularity: 5.21
Licence: MIT    Views: 9,192     Bookmarked: 11   Downloaded: 313
Please Sign up or sign in to vote.
This article describes a way to hash data using the latest Win32 API and C++
22 Sep 2022   Updated: 22 Sep 2022   Rating: 5.00/5    Votes: 6   Popularity: 3.89
Licence: MIT    Views: 8,671     Bookmarked: 8   Downloaded: 327
Please Sign up or sign in to vote.
This article shows how to retrieve the Privileges and Groups that are part of an access token such as the current thread token.
21 Oct 2022   Updated: 21 Oct 2022   Rating: 4.88/5    Votes: 13   Popularity: 5.43
Licence: MIT    Views: 9,271     Bookmarked: 12   Downloaded: 197
Please Sign up or sign in to vote.
This article shows how to use a win32 mutex during application startup to figure out if an application instance is the first one.
3 Nov 2022   Updated: 3 Nov 2022   Rating: 4.97/5    Votes: 19   Popularity: 6.36
Licence: MIT    Views: 10,831     Bookmarked: 20   Downloaded: 98
Please Sign up or sign in to vote.
The win32 subsystem often returns pointers to objects that need to be deallocated by the caller. In this article, I show a way to do this reliably and in an exception-safe manner.
24 Nov 2022   Updated: 24 Nov 2022   Rating: 4.91/5    Votes: 7   Popularity: 4.15
Licence: MIT    Views: 6,070     Bookmarked: 8   Downloaded: 0
Please Sign up or sign in to vote.
When calling into the win32 API, there are many times when you must deal with structures that have a variable size. This article shows how to do that in a convenient way.
9 Dec 2022   Updated: 9 Dec 2022   Rating: 5.00/5    Votes: 7   Popularity: 4.23
Licence: MIT    Views: 11,034     Bookmarked: 22   Downloaded: 0
Please Sign up or sign in to vote.
How to implement named pipe server for communicating with client apps
22 Dec 2022   Updated: 22 Dec 2022   Rating: 4.73/5    Votes: 4   Popularity: 2.85
Licence: MIT    Views: 12,580     Bookmarked: 17   Downloaded: 398
Please Sign up or sign in to vote.
How to implement named pipe server for communicating with client apps
11 Jan 2024   Updated: 11 Jan 2024   Rating: 5.00/5    Votes: 5   Popularity: 3.49
Licence: CPOL    Views: 3,500     Bookmarked: 8   Downloaded: 0
Please Sign up or sign in to vote.
In this article, I explain how to create win32 style DLLs and what the various significant intricacies are.
25 Jan 2024   Updated: 25 Jan 2024   Rating: 5.00/5    Votes: 7   Popularity: 4.23
Licence: CPOL    Views: 3,675     Bookmarked: 7   Downloaded: 93
Please Sign up or sign in to vote.
An introduction to exporting functions from DLLs
General Programming
Memory Management
22 Jan 2023   Updated: 22 Jan 2023   Rating: 5.00/5    Votes: 8   Popularity: 4.52
Licence: MIT    Views: 13,781     Bookmarked: 10   Downloaded: 115
Please Sign up or sign in to vote.
How to use C++ templates for implementing dynamic memory objects with custom allocator
High Performance Computing
Parallelization
5 Oct 2022   Updated: 5 Oct 2022   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: MIT    Views: 4,592     Bookmarked: 0   Downloaded: 111
Please Sign up or sign in to vote.
How to improve time consuming operations through parallelization, when multiple similar operations need to be performed
2 Apr 2023   Updated: 2 Apr 2023   Rating: 5.00/5    Votes: 10   Popularity: 5.00
Licence: MIT    Views: 8,724     Bookmarked: 18   Downloaded: 227
Please Sign up or sign in to vote.
In this article, I will explain Asynchronous Procedure Calls (APCs), their uses and their pitfalls
8 Dec 2023   Updated: 8 Dec 2023   Rating: 5.00/5    Votes: 11   Popularity: 5.21
Licence: MIT    Views: 12,492     Bookmarked: 22   Downloaded: 345
Please Sign up or sign in to vote.
How to use APCs to perform user interface updates
Programming Languages
C
30 Mar 2006   Updated: 30 Mar 2006   Rating: 4.94/5    Votes: 59   Popularity: 8.70
Licence: MIT    Views: 322,062     Bookmarked: 180   Downloaded: 10,493
Please Sign up or sign in to vote.
This article describes the process of developing a USB Kernel mode device driver using the WDF Kernel Mode Driver Foundation.
16 Feb 2006   Updated: 20 Apr 2006   Rating: 4.94/5    Votes: 55   Popularity: 8.51
Licence: MIT    Views: 451,626     Bookmarked: 205   Downloaded: 5,163
Please Sign up or sign in to vote.
An article about developing a driver for the WDF Kernel Mode Driver Foundation.
C#
19 Oct 2023   Updated: 19 Oct 2023   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: MIT    Views: 8,911     Bookmarked: 7   Downloaded: 0
Please Sign up or sign in to vote.
An overview of the different ways to mitigate the impact of DCOM hardening
15 Nov 2023   Updated: 15 Nov 2023   Rating: 5.00/5    Votes: 8   Popularity: 4.52
Licence: CPOL    Views: 4,130     Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
Mitigate problems caused by DCOM hardening, by reverse engineering a non-compliant .NET app
C++20
8 Sep 2022   Updated: 8 Sep 2022   Rating: 5.00/5    Votes: 20   Popularity: 6.39
Licence: MIT    Views: 20,602     Bookmarked: 19   Downloaded: 0
Please Sign up or sign in to vote.
How concepts can be used in template programming for partial specialization
2 Feb 2023   Updated: 2 Feb 2023   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: MIT    Views: 12,691     Bookmarked: 10   Downloaded: 0
Please Sign up or sign in to vote.
Ways to enforce an interface contract on static methods, similar to what you would expect from static virtual methods if they'd exist in C++
PowerShell
5 Jul 2022   Updated: 5 Jul 2022   Rating: 4.81/5    Votes: 7   Popularity: 4.07
Licence: MIT    Views: 9,572     Bookmarked: 5   Downloaded: 241
Please Sign up or sign in to vote.
How to read data from OPC DA servers into a PowerShell script
9 Mar 2023   Updated: 9 Mar 2023   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: MIT    Views: 17,306     Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
How to clean up user profiles on a computer
Security
4 May 2023   Updated: 4 May 2023   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: CPOL    Views: 7,133     Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
Ways to deal with changed security for CLR code in SQL databases
15 May 2023   Updated: 15 May 2023   Rating: 4.94/5    Votes: 8   Popularity: 4.46
Licence: CPOL    Views: 11,838     Bookmarked: 10   Downloaded: 0
Please Sign up or sign in to vote.
Basics of Service Principal names, and what they mean for SQL Server security

Average blogs rating:

No blogs have been submitted.

Average tips rating: 5.00

Active Directory
6 Oct 2022   Updated: 6 Oct 2022   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: CPOL    Views: 3,560     Bookmarked: 0   Downloaded: 0
Please Sign up or sign in to vote.
When retrieving claims information from user token, SDK documentation concerning the supported data types is incorrect.
Desktop Programming
Win32
27 Dec 2022   Updated: 27 Dec 2022   Rating: 5.00/5    Votes: 5   Popularity: 3.49
Licence: MIT    Views: 14,653     Bookmarked: 7   Downloaded: 0
Please Sign up or sign in to vote.
What to do when you want to use the current thread handle
General Programming
Exceptions
7 Sep 2022   Updated: 7 Sep 2022   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: MIT    Views: 5,971     Bookmarked: 1   Downloaded: 0
Please Sign up or sign in to vote.
Symantec can cause valid applications to crash and be gone without a trace
Security
21 Jun 2023   Updated: 21 Jun 2023   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: CPOL    Views: 2,620     Bookmarked: 2   Downloaded: 0
Please Sign up or sign in to vote.
Exploring an alternative reason for LAN Manager Authentication Failure

Average reference rating:

No reference articles have been posted.

Average project rating:

No projects have been posted.
Software Developer
Belgium Belgium
I am a former professional software developer (now a system admin) with an interest in everything that is about making hardware work. In the course of my work, I have programmed device drivers and services on Windows and linux.

I have written firmware for embedded devices in C and assembly language, and have designed and implemented real-time applications for testing of satellite payload equipment.

Generally, finding out how to interface hardware with software is my hobby and job.