473,394 Members | 1,843 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

How Intercept DNS request?

How can I write an application that intercep the client DNS request (from
browser or any other application)?
Thanks.

Andrew
Nov 20 '05 #1
2 3336
I'm not familiar with DNS protocol, but if you are, just write a program to
listen on the port DNS uses.

"Andrea" <an****@totalshareware.com> wrote in message
news:fu*********************@tornado.fastwebnet.it ...
How can I write an application that intercep the client DNS request (from
browser or any other application)?
Thanks.

Andrew

Nov 20 '05 #2
This will be quite difficult because your computer will be assigned an IP
address that points to the DNS server. You'll need to be listening on the
DNS port.

--
HTH,
-- Tom Spink, Über Geek

Please respond to the newsgroup,
so all can benefit

"Maybe it's a game called 'Punish the User'"
"Andrea" <an****@totalshareware.com> wrote in message
news:fu*********************@tornado.fastwebnet.it ...
How can I write an application that intercep the client DNS request (from
browser or any other application)?
Thanks.

Andrew

Nov 20 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

13
by: Kai Grossjohann | last post by:
It seems that Ctrl-N in Mozilla opens a new empty browser window. That's fine, I don't need to do anything about it. But Ctrl-N in IE appears to clone the current window. Is there a way to...
1
by: Imran | last post by:
Hi, Please bear with me as I have only 1 weeks .NET experience. I am using VB.NET to write a stand-alone client application that connects to a Web service. I successfully send a request for a...
4
by: _max_ | last post by:
HttpWebRequest() allows 'pseudo-browser' simulation to intercept incoming HTML for 'screen scraping', etc. But how would you do the opposite: Programmatically find out what a browser is sending...
25
by: moondaddy | last post by:
I have an application where users need to upload images and in my web.config file I have a setting like this: <httpRuntime maxRequestLength="512" /> Which restricts image larger than 500k from...
2
by: rpale | last post by:
We want to create server-side code that will retrieve the user requested pages, then manipulate the content of those pages just before being sent back to the user. We tried the following: ...
2
by: Jonathan Folland | last post by:
I have been working on this most of the day and cannot find a solution to my problem. I have an application where I may not actually have a page. for example a user may make a request for...
1
by: super todd | last post by:
user launches: GET http://www.somewhere.com/someVirtual we need to intercept and redirect to: http://www.somewhere.com/handler.aspx?virtual=someVirtual Any ideas how? The key here is...
1
by: Ondrej Dobias | last post by:
Hello, I would like to intercept WebBrowser's HTTP requests in order to be able to supply custom login to the proxy server, as well as choose the right certificate for several specific sites. I'm...
0
by: rsiena | last post by:
When a page is requested in the .net architecture I believe there are a number of events that happen prior to .net actually trying to find the page in the file system. I would like to intercept...
7
by: ADN | last post by:
Hi, I am creating a custom HTTPModule to intercept the request of when the user is attempting to retrieve a session variable. For instance, if I set a session variable in my code like so: ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.