Finger Utility

System requirements (in square brackets data of my system)

  • Windows NT 4.0 [Workstation, Build 1381: Service Pack 4]
  • Windows Sockets 1.1 Network Support [wsock32.dll, ws2_32.dll]
  • Microsoft Visual C++ 6.0, MFC 4.2 [mfc42.dll]

  1. 1. Install, configure

  2. Unzip finger.zip retaining directory structure to any location
    with approx 20Mb of free space. You'll get a folder ./finger
  3. 2. Build

  4. Open workspace ./finger/finger.dsw, run build.
    If building debug configuration, browse info will be available.

Program's Design:

  • CFingerDlg class - user interaction, maintains a pool of threads
  • CFingerThread class - creates a socket and sends messages to dialog, when socket events occur, keeps query results
  • CFingerSocket class - implements socket, establishes connection, sends and receives data

Downloads

Download application (with source code) - 29 Kb


Comments

  • does it answer if the server is patched for security

    Posted by Legacy on 12/26/2001 12:00am

    Originally posted by: harshal

    does it answer if the server is patched for security
    if finger prot is closed ? then

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: August 27, 2015 With the cloud enabling companies to spin up servers and stand up data stores more quickly, mobile apps can be created faster, reducing the time-to-value. But three major obstacles stand in the way for many organizations: The backlog of app project requests confronting every enterprise regardless of their internal app development capabilities Finding and employing better, faster tools to speed and simplify the process of developing those apps. The emergence of …

  • When individual departments procure cloud service for their own use, they usually don't consider the hazardous organization-wide implications. Read this paper to learn best practices for setting up an internal, IT-based cloud brokerage function that service the entire organization. Find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date