muhammadsaqib

Saqib is Master-level Senior Software Engineer with over 15 years of experience in designing and developing large-scale software and web applications. He has more than ten years experience of leading software development teams. Saqib provides consultancy to develop software systems and web services for Fortune 500 companies. He has hands-on experience in C/C++ Java, JavaScript, PHP and .NET Technologies. Saqib owns and write contents on mycplus.com since 2004.

File Listing Utility - Directory Structure
C Programming Source Code Examples

C Programming: File Listing Utility – Directory Structure

The C program is a file listing utility that displays information about files in a specified directory. It uses command line arguments to display the listing in a tree style. The program iterates through the files in the specified directory and shows all the files and folders in specific directory with the file size, last modified date and other file attributes.

, ,
Defensive Programming Techniques
C Programming Source Code Examples

Defensive Programming Techniques

This source code is from Thinking in C++, 2nd Edition, Volume 2, by Bruce Eckel & Chuck Allison. You can use Borland, G++ (For version 3 and above only), Microsoft (For C++ with .NET only) to compile and build this source code. Writing perfect software may be a daunting task for developers, but a few defensive techniques which are routinely applied can go a long way toward narrowing the gap between code and ideal. Defensive programming practices are often used where high availability of the application is required, safety if utmost concern, or security is needed for application to work.

, ,
Base 64 Encoding and Decoding
Visual Basic Source Code Examples

256-bit Serpent VB Implementation

This is a slow but working Visual Basic implementation of the 256-bit Serpent algorithm. Serpent was a finalist for Advanced Encryption Standard (AES) and appears to be a very secure powerful algorithm. The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government for the encryption of classified electronic data and is implemented in software and hardware throughout the world to encrypt sensitive data.

, ,
Scroll to Top