Solved

GUID structure

Posted on 1998-01-08
1
244 Views
Last Modified: 2013-11-20
I want to know EXACTLY what is Data1, Data2, Data3, Data4
members of GUID structure. Data4 has mac address in its
last 6 chars, but what is in its first two chars ? and
data1 is long number perhaps some seconds ? since jan ?
etc. but I want to know exactly what it has. no guesses please
0
Comment
Question by:hasmet
1 Comment
 
LVL 2

Accepted Solution

by:
anichini earned 50 total points
ID: 1313594
Microsoft's GUIDs comply with the OSF (Open Software Foundation) DCE (Distributed Computing Environment)'s specifications for UUIDs. CoCreateGuid calls the RPC UuidCreate, which uses the DCE algorithm...

Specifications for the format and algorithms used to generate UUIDs can be found at http://www.camb.opengroup.org/dce/info/ietf-draft.txt

Other information about DCE can be found at http://www.camb.opengroup.org/dce/

0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
if loop in java 3 154
has77  challenge 9 92
Line meaning 9 88
Thin secure Windows 10 5 102
In this article, I'll describe -- and show pictures of -- some of the significant additions that have been made available to programmers in the MFC Feature Pack for Visual C++ 2008.  These same feature are in the MFC libraries that come with Visual …
Introduction: The undo support, implementing a stack. Continuing from the eigth article about sudoku.   We need a mechanism to keep track of the digits entered so as to implement an undo mechanism.  This should be a ‘Last In First Out’ collec…
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question