FTP File Browser (with source!)

Sample Image

Environment: VC6 SP2, NT4 SP5

Many times I have needed to browse an FTP site and download a file. However, I could never locate any code to show me how. Therefore, I wrote a C++ class that enables you to browse and download files from any FTP site.

To use this class, simply insert the following files into your project:

  • FtpFileBrowse.cpp
  • FtpFilebrowse.h
  • CProp.cpp
  • CProp.h
Once you've done that, all you need to do is instantiate a FtpFileBrowse object and call its SetServer and DoModal methods.

 FtpFileBrowse myfile;
 myfile.SetServer("mozart","viragava","def123");
 if(myfile.DoModal()==IDOK)
	MessageBox(myfile.GetFilePath());

Downloads

Download demo source code - 29 Kb
Download demo application - 19 Kb


Comments

  • http://www.officialcowboysjerseyshop.com/miles+austin+jersey+nike+elite-c-6_16.html tuctanneguina

    Posted by bereBlepbal on 11/07/2012 12:19pm

    kneessystek Andre Johnson Jersey Haloti Ngata Black Jersey Ray Lewis Black Jersey

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Cloud computing isn't new, but it's still a hot topic in technology circles. Moving to the cloud has done great things for many businesses. When it comes to handling a basic business necessity, cloud computing has brought many improvements to overall business continuity. Using the cloud for DR makes a lot of sense for many, but it's not exactly the most simple concept. Read this eBook to find answers to all the key questions IT professionals have about cloud-based disaster recovery, and helpful info around the …

  • Do you spend a lot of time thinking about your enemies? Attacker attribution - figuring out who's out to get you - is one of the most important things an organization can do to protect itself.  Because you have no hope of defending yourself if you don't understand who the attackers are. Good news? Every organization isn't targeted by all the attackers. Bad news? No one can identify your potential attackers as well as you. Read this graphics-rich threat summary for 2014 to determine who might be your next …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date