Solved

DIR Function

Posted on 2001-07-30
10
655 Views
Last Modified: 2013-12-18
Hello i am using following code in the agent.
   but it  gives me error "Illegal function call"

 filename$ = Dir$("\\Lbriggi\dds-ljb",16)
     Msgbox(filename$)

where "Lbriggi" computername in network
and "dds-ljb" is  share directory name.

any comment wold be appreaciated.

Thanks,
shrirang
0
Comment
Question by:shrihalbe
  • 4
  • 3
  • 3
10 Comments
 
LVL 10

Expert Comment

by:zvonko
ID: 6335936
When you start the Domino server as service, than it is running under the system userid named SYSTEM.
This user does not have the shared fileservices mounted untill you mount it explicitly.

I have not testing environment at the moment, but think you can try this sequence:
rc = shell("NET USE Z: \\Lbriggi\dds-ljb topsecret /USER:domainname\username /PERSISTENT:YES")
filename$ = Dir$("\\Lbriggi\dds-ljb",16)
Msgbox(filename$)

Good luck,
zvonko
0
 
LVL 10

Accepted Solution

by:
zvonko earned 30 total points
ID: 6335946
not sure, perhaps you have to use the mounted device leter, like this:
filename$ = Dir$("Z:\dds-ljb",16)
Msgbox(filename$)
0
 
LVL 13

Expert Comment

by:CRAK
ID: 6336815
You said you run the code in an agent.
Well.... "Dir" contacts OS-level data; that's beyond the control of Notes, so you'd need pivileges to run "unrestricted agents". (Everything controlled by notes requires "restricted access")
0
 

Author Comment

by:shrihalbe
ID: 6340404
Hello crak,
 i have tested it as action button code but it still didn't work.
thanks,
shrirang
0
 
LVL 13

Expert Comment

by:CRAK
ID: 6344615
Have you tried zvonko's solution: assigning a driveletter to the server? It makes sense to me!

And I don't like asking, but have you taken notice of platform differences (or are you running Windows server and clients)?
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:shrihalbe
ID: 6344822
write now i have appl on my local machine  and i am using the windows ME.  

thnaks,
shrirang
0
 
LVL 13

Expert Comment

by:CRAK
ID: 6345015
Perhaps it's easier to look for just any file first (like Dir$("c:\*.*", 8) and then change things bit by bit: a dir instead of a file, a specified dir. or file etc. and in the end translate it to a server situation).
That should bring up something!
0
 

Author Comment

by:shrihalbe
ID: 6720962
Helo zvonok,

thanks for help

shriang
0
 

Author Comment

by:shrihalbe
ID: 6761721
thanks
shrirang
0
 
LVL 10

Expert Comment

by:zvonko
ID: 6761756
Thank you shrirang for the points :-)

can you please give a short feedback wath the final solution was.

Thanks.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

  In today’s Arena we can’t imagine our lives without Internet as we are highly used to of it. If we consider our life style just for only 2 min we found that face to face communication is swapped by e-communication.  Every Where from Works place to…
Article by: Rob
Notes 8.5 Archiving Steps and Tips This article covers setting up a Notes archive, and helps understand some of the menu choices making setting up and maintaining a Notes archive file easier.
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now