?
Solved

Using Intercept's along with MIDAS Client applications

Posted on 2001-08-03
5
Medium Priority
?
140 Views
Last Modified: 2010-04-06

I have created a remote datamodule.My client application uses a socket connection for connecting to the remote data module  via net. So I want to compress/encrypt the data before sending and uncompress/decrypt it after receiving.

Can you send me a simple Intercept that can be used for this purpose?.

please help.
0
Comment
Question by:pradeep_pc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 8

Accepted Solution

by:
TOndrej earned 400 total points
ID: 6349062
I think that simple interceptors are included as demos with VisiBroker for C++
0
 

Author Comment

by:pradeep_pc
ID: 6351050

hi TOndrej,

Where will I get these demos?.Is there any site from where I can down load this?.
0
 
LVL 8

Expert Comment

by:TOndrej
ID: 6351307
You can download the trial VisiBroker for C++ from http://www.borland.com/visibroker/download/vbcpp4x_steps.html
If I remember correctly, the demos are included in that download.
0
 
LVL 26

Expert Comment

by:Russell Libby
ID: 8735344
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

Accept TOndrej's comment as answer

Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Thank you,
Russell

EE Cleanup Volunteer

0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month9 days, 20 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question