Raw TCP/IP library for Windows 2000

Environment: Win32 (Packet manipulations work only on 2000/XP), VC 6.0 (all samples come with complete source code)

This library enumerates the TCP/IP protocol, and allows the user to create custom TCP/IP headers. It is also now used for regular network communication (when you don't want to use MFC in your projects).

Features in version 4.0 are:

  • Full-fledged communication suite for all the major Internet protocols (IP/UDP/TCP/ICMP)
  • Ability to craft custom-made packets
  • Ability to spoof source address
  • Utility classes that perform: Ping, Traceroute, Traceroute with reverse DNS, Realtime Traceroute, and domain/IP whois
  • Utility classes that act as relays (Proxy TCP and UDP mapping)
  • Full-fledged DNS library

All come with complete samples and documentation.

The library is aimed toward the novice user who wants an easy-to-use TCP/IP communication library. At the same time, it's for advanced users who want to control every aspect of it.

Downloads

Download demo project - 6.2 Mb


Comments

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: October 29, 2014 @ 11:00 a.m. ET / 8:00 a.m. PT Are you interested in building a cognitive application using the power of IBM Watson? Need a platform that provides speed and ease for rapidly deploying this application? Join Chris Madison, Watson Solution Architect, as he walks through the process of building a Watson powered application on IBM Bluemix. Chris will talk about the new Watson Services just released on IBM bluemix, but more importantly he will do a step by step cognitive …

  • Businesses are moving more and more of their customer transactions to the web. Security is understandably a top concern as online transactions increase, so it is important to make sure your electronic signature provider meets the highest security standards. That means more than simply passing a security audit or obtaining a certification. This white paper provides recommendations for taking a broader view of e-signature security, and answers key questions that help identify the security requirements against …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds