Solved

NWAddFSMonitorHook(...) question

Posted on 1998-03-19
3
190 Views
Last Modified: 2012-06-22
Loading the fshook.nlm sample file that comes with the Novell SDK, I can sometimes execute a file once, but then the openFileCallBackFunc() or closeFileCallBackFunc() will
execute more than once for the same connection at the same time. Why? The same happens when catching other events like logins. Closing the file, a file handle is returned with which one can use FEGetOpenFileInfo (). This gives a Status Flag. The status flag differs for each time the closeFileCallBackFunc executes for the same file being closed.

Any help on how to catch an opened file or closed file only one will be very much appreciated.

Thanks.
0
Comment
Question by:Claude050897
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
paulnic earned 100 total points
ID: 1592000
Claude,

Guess there are all kinds of Netware experts, but you're probably deeper into the programming aspect than many of the folks I've seen here.  You may find good answers faster for this and your other question if you use a usenet newsreader (Free Agent, Communicator, IE4 etc.) to access the news server at devsup.netpub.com - No ID or password is required.

Under the novell.devsup.supported.* hierarchy, you'll get responses from Novell staff who support the SDK's and other developer products.  Of course, you may want to hurry...or wait a week...because most of Novell's top talent will be busy next week (23-27) at their annual Brainshare conference in Utah.

Peace^^Paul
0
 

Author Comment

by:Claude050897
ID: 1592001
Thanks for the advice. I just get so many junk mail from working on news groups, that I try to keep news groups to the minimum...
But I will give it a try!
0
 
LVL 3

Expert Comment

by:paulnic
ID: 1592002
I have had junkmail also from other groups.  Novell DevSup groups are not distributed through usenet (available only from Novell's server), and only moderately trafficked, so I think it's pretty safe. I've seen no spam there so far, anyway. Besides, a lot of people post with a modified sender address so a spammer's "harvesting" program has a difficult time cleaning it up, but a person can figure it out easily.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I'm trying, I really am. But I've seen so many wrong approaches involving date(time) boundaries I despair about my inability to explain it. I've seen quite a few recently that define a non-leap year as 364 days, or 366 days and the list goes on. …
Microsoft Office Picture Manager was included in Office 2003, 2007, and 2010, but not in Office 2013. Users had hopes that it would be in Office 2016/Office 365, but it is not. Fortunately, the same zero-cost technique that works to install it with …
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now