Raw TCP/IP library for Windows 2000

Environment: Win32 (Packet manipulations work only on 2000/XP), VC 6.0 (all samples come with complete source code)

This library enumerates the TCP/IP protocol, and allows the user to create custom TCP/IP headers. It is also now used for regular network communication (when you don't want to use MFC in your projects).

Features in version 4.0 are:

  • Full-fledged communication suite for all the major Internet protocols (IP/UDP/TCP/ICMP)
  • Ability to craft custom-made packets
  • Ability to spoof source address
  • Utility classes that perform: Ping, Traceroute, Traceroute with reverse DNS, Realtime Traceroute, and domain/IP whois
  • Utility classes that act as relays (Proxy TCP and UDP mapping)
  • Full-fledged DNS library

All come with complete samples and documentation.

The library is aimed toward the novice user who wants an easy-to-use TCP/IP communication library. At the same time, it's for advanced users who want to control every aspect of it.

Downloads

Download demo project - 6.2 Mb


Comments

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Following an IT incident through to resolution is more than just acknowledging an alert and restarting a server. The recent State of On-Call Report found that it takes most companies an average of 10-30 minutes to resolve an incident with an average of 5 people involved. Imagine how much money and time companies are spending to deal with incident resolution. But what if you had a tool that offered solutions baked in? Or a tool that sent alerts to the right person or team every time? These are the kind of …

  • 2015 is shaping up to include some of the best innovation the mobile industry has ever experienced. There will be new discoveries, new technologies, and existing giants in the vendor space will test the limits to increase productivity while ensuring the confidentiality, integrity, and availability of data. While all of this innovation is taking place, enterprises must continue to remain vigilant as cybercriminals continue to look for weaknesses to steal company data, and intellectual property by infiltrating …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date