|
by: Snuffy2 |
last post by:
I'm looking to try to get a users MAC and/or NetBIOS name when they visit
my website. It somehow can be done, I'm not sure with PHP, but it can be
done.
Does anyone have any idea how?
As an example check out:
http://stealthtests.lockdowncorp.com/
On that site, there are tests that will display NetBIOS & MAC addresses.
|
by: Miguel Orrego |
last post by:
Hi,
I have found some code that authenticates users agains a domain using ADSI.
I then redirect to another page and pass the username they have entered as a
string. However, it would be nice to also get their full name from Active
Directory once authenticated. Can anyone suggest how I may modify this code
to achieve this? I would also like to pass their full name to the next page
as a string. The code I found:
<%
|
by: Ryan Ritten |
last post by:
I was wondering if anyone knew how (or if it's even possible) to cache
the results of an ADSI call in asp for a longer period of time.
Basically what I am doing is I have a website that loads the 'full
name' of the user that logs into it. Once the user full nam ehas been
retreived (using adsi) the user can reload the page and it appears to
just check a cached version of the request (since the page loads very
fast). If however the user...
|
by: Dr. StrangeDub |
last post by:
Leaving network identification/DNS out of the picture, how does one
change the name of a computer in a local Workgroup (in C#)?
I implemented the SetComputerName() API call and that only seems to
change the NetBIOS Computer Name. I've verified that the underlying
registry key value that gets changed is:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName\ComputerName
Is there a recommended API (via Active...
|
by: LittlePython |
last post by:
I am a little confused on why I can not detect an object that does not exist
with a try and except. If I understand ADSI correctly from what I have read
you do not create these objects but rather get them. They already exist. I
believe if I do the equivalent in VB I would generate an error when I try to
get an object that does not exist (can not find). What have I done wrong?
I have included the function below that works in ever respect...
|
|
by: =?iso-8859-1?q?Magnus_T=F6rnvall?= |
last post by:
Hi!
I'm trying to write a program that can tell if a remote computer is
running Windows or not. The thing is, it have to go very fast, so I
don't want to "connect" to the computer.
My plan is to send a netbios request and if I get a response I know
it's probably a Windows machine.
The problem is that I can't use the Netbios function in NETAPI32.DLL,
|
by: Erjan |
last post by:
Hi,
I am using TcpClient to connect to a device which does not talk
NetBios. The TcpClient tries first to do something with Netbios. This
probably failes on a timeout and then TcpClient sets up the TCP
connection. Due to this it takes about 5 secons to set up a TCP
connection on a LAN.
Is it possible to disable the NetBios request ? I have rewritten the
program with sockets but also sockets try to
|
by: John |
last post by:
Hi, gurus,
How can I implement the following feature in C#:
Set objGroup = GetObject("WinNT://" & strComputer & "/" & strGroup & ", group")
For Each objMember In objGroup.Members
WScript.Echo vbCrLf & " Name: " & objMember.Name
Next
|
by: madankarmukta |
last post by:
HI,
I want to set my computername to be greate than 15 bytes.How can i do that since when i set the name greter that 15 bytes it's give me message that "The NetBIOS name of the computer is limited to 15 bytes" .
Can anybody tell me how can i edit this limit of 15 bytes of NetBIOS name ..?
Thanks!
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|