dcsimg

Command-line 'Where' Tool

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


Environment: Windows NT 4 SP6, Visual C++ 6 SP3

For a while, I've wished for tool that worked like the csh unix command, where. I.e. a tool to display where an executable is found in the search path. Finally, I wrapped the SearchPath API call in a command-line where utility. I added a couple of options to show version information. Here's the usage:

C:\>where
Usage: where [-v] [-x] [-s] [-d] <executable file>

Finds the file using the rules specified by the SearchPath 
API method:
  1. The directory from which the application loaded.
  2. The current directory.
  3. The Windows system directory.
  4. [Windows NT/2000] The 16-bit Windows system directory.
  5. The Windows directory.
  6. The directories that are listed in the PATH environment variable.
It uses .exe, .com, and .cmd as default file types if none is specified. See the documentation for the SearchPath API for more details. Options: -v Show version info -x Show extended version info -s Save command line settings (or lack of) as default -d Reset default command line settings

Downloads

Download source and exe - 53 Kb


Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Discover the best practices from HPE’s IT Advisory Consulting Services for migrating and transforming applications in Hybrid IT by capitalizing on innovative platforms, modern application architectures, agile development tools and proven methodologies. There are a number of challenges our customers face when migrating and transforming applications for a Hybrid IT environment. This guide provide proven strategies and application approaches that can help them understand and reduce risks and complexity.

  • The Internet of Things (IoT), a growing network of physical devices with Internet connectivity, can collect and exchange rich data. Organizations utilizing the Enterprise of Things (EoT) are also at a greater risk for data breaches and cybersecurity threats. Healthcare organizations striving to realize the full potential of the EoT must also be able to confidentially and reliably transmit highly sensitive data between connected devices. Read this white paper to discover the best cybersecurity strategies to get …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.