Finger Utility

System requirements (in square brackets data of my system)

  • Windows NT 4.0 [Workstation, Build 1381: Service Pack 4]
  • Windows Sockets 1.1 Network Support [wsock32.dll, ws2_32.dll]
  • Microsoft Visual C++ 6.0, MFC 4.2 [mfc42.dll]

  1. 1. Install, configure

  2. Unzip retaining directory structure to any location
    with approx 20Mb of free space. You'll get a folder ./finger
  3. 2. Build

  4. Open workspace ./finger/finger.dsw, run build.
    If building debug configuration, browse info will be available.

Program's Design:

  • CFingerDlg class - user interaction, maintains a pool of threads
  • CFingerThread class - creates a socket and sends messages to dialog, when socket events occur, keeps query results
  • CFingerSocket class - implements socket, establishes connection, sends and receives data


Download application (with source code) - 29 Kb


  • does it answer if the server is patched for security

    Posted by Legacy on 12/26/2001 12:00am

    Originally posted by: harshal

    does it answer if the server is patched for security
    if finger prot is closed ? then

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Moving from an on-premises environment to Office 365 does not remove the need to plan for disruptions or reduce the business risk requirements for protecting email services. If anything, some risks increase with a move to the cloud. Read how to ease the transition every business faces if considering or already migrating to cloud email. This white paper discusses: Setting expectations when migrating to Office 365 Understanding the implications of relying solely on Exchange Online security Necessary archiving …

  • U.S. companies are desperately trying to recruit and hire skilled software engineers and developers, but there's simply not enough quality talent to go around. In response, companies often resort to inferior solutions -- hiring substandard developers and engineers, recruiting talent on a part-time or temporary basis, poaching people from competitors, or burdening an already stressed IT staff for more of their labor. Fortunately, there's a better solution. Read this white paper to learn the business value of …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date