- Implement IRemUnknown.
- Use IRemUnknown for life-cycle management instead of the current
  hacks.

4 files changed