Latest posts

Happy Programmers' Day !

Happy Programmers' Day !

Today (1410566400), my fellow coders, is a remarkable day! For those who don't know, it's the 256th(=28) day of this year - known as the international Programmers' Day. /* I actually didn't know about it, a friend told me - but when I found out, ...


'Microsoft.VisualStudio.Editor.Implementation' package did not load correctly

'Microsoft.VisualStudio.Editor.Implementation' package did not load correctly

Dear Coders, Today is a sad day... Visual Studio 2010 crashed on duty after a long coding journey...journey which brought immeasurable values to mankind. Its end was nevertheless as heroic as its existence: gave up only after, with a last effort, compiled one last project (was a C++ one btw.), ending ...


Calling a C# Method from C/C++ (native process)

Calling a C# Method from C/C++ (native process)

So...I received a challenge from a friend (lost a bet...) regarding how to load a managed (C#) dll in a native (C++) process by using the Common Language Runtime (CLR). This is confirmed to work with .Net Framework 4.0. The trick is to host the CLR in the process and using ...


C# Get Frames from a GIF

C# Get Frames from a GIF

This is a simple method to extract a certain frame (or all of them) from a GIF, using C#. As always, .NET provides all the functions we need, so it shouldn't take more than 12 lines of code. Basic Information As you know, GIFs contain various images (frames) that are displayed one ...


C# How to Scan a Process' Memory

C# How to Scan a Process' Memory

Intro This article is about how to get the memory dump of a process, by checking almost all memory addresses that can store data. Since C# is quite a high level programming language, I think this is the only method available to do this. And since someone asked how to search a ...


C# Password Protected File

C# Password Protected File

In this article...I'll talk about how to protect a file with a password (any file type) - without using ZIP or any other archivers. The file will be encrypted and then 'attached' to an executable, which will be later used to decrypt it using the password provided. Starting information Initially there'll be ...