Finger Utility

System requirements

  • Windows NT 4.0 [Workstation, Build 1381: Service Pack 4]
  • Windows Sockets 1.1 Network Support [wsock32.dll, ws2_32.dll]
  • Microsoft Visual C++ 6.0, MFC 4.2 [mfc42.dll]

Install and Configure

Unzip finger.zip retaining directory structure to any location with approx 20Mb of free space. You'll get a folder ./finger

Build

Open workspace ./finger/finger.dsw, run build. If building debug configuration, browse info will be available.

Program's Design:

CFingerDlg class - user interaction, maintains a pool of threads CFingerThread class - creates a socket and sends messages to dialog, when socket events occur, keeps query results CFingerSocket class - implements socket, establishes connection, sends and receives data

Downloads

Download source - 30 Kb


Comments

  • !!Finger..!!

    Posted by Legacy on 04/25/2001 12:00am

    Originally posted by: net_evol_guy

    Can we get to know the users who sent us the mail ....
    through any means ....by appending any extra code
    in the FINGER.
    -------------Regards,
    Srinu.

    • to Alexei Veremenko

      Posted by dream_blue98 on 03/19/2008 01:47am

      thanks a million!men!

      Reply
    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Discover how to quickly remediate aggressive security threats. Read this report from Forrester Research and get the facts about new automated compliance processes and how they will reduce your organization's vulnerability and risk. Learn to: Adopt a set of cyber "Rules of Engagement" Define the appropriate response through the "Response Index" Create actionable response metrics Ensure multiple levels of audit and reinforcement Plus, find out how to better align security and operations teams and put the …

  • The growing importance of data to modern enterprises requires a strategic approach that properly aligns the cost of backup and recovery with the value of data and the ability to restore data with minimal disruption to the business. However, data backup is meaningless if a business can't efficiently recover the data and continue normal operations. Read this white paper to learn the value of employing best practices and best-in-class technology and service providers in order to avoid committing the ten deadly …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date