Solved

Hooks into Exchange

Posted on 2002-05-29
9
156 Views
Last Modified: 2010-05-02
Could someone give me an example of how to hook into Microsoft Exchange.  I need to parse through email groups.
0
Comment
Question by:CSharpRules
9 Comments
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
it is possible to access Exchange with MAPI.
0
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
Unfortunatelly, it was along time ago when i used it.
0
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
0
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
And, since your handle:
http://www.darkweb.com/~beng/exchange/book/dame.htm
;)
Hope it helps
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 3

Expert Comment

by:MCummings111400
Comment Utility
How to parse Distribution Groups depends on the version of Exchange you are using. Versions 5.5 and below you would either use MAPI, or CDO. For 2000 you can use ADSI since the directory is now schema extensions to the Active Directory
0
 
LVL 28

Expert Comment

by:vinnyd79
Comment Utility
%listening
0
 

Author Comment

by:CSharpRules
Comment Utility
I used a .exe that Microsoft distrubutes with Exchange called ondl.exe.  This exe will parse through the group you requested and dump the information into a text file.
0
 
LVL 49

Expert Comment

by:DanRollins
Comment Utility
Hi CSharpRules,
It appears that you have forgotten this question. I will ask Community Support to close it unless you finalize it within 7 days. I will ask a Community Support Moderator to:

    Refund points and save as a 0-pt PAQ.

CSharpRules, Please DO NOT accept this comment as an answer.
EXPERTS: Post a comment if you are certain that an expert deserves credit.  Explain why.
==========
DanRollins -- EE database cleanup volunteer
0
 

Accepted Solution

by:
SpideyMod earned 0 total points
Comment Utility
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Enums (shorthand for ‘enumerations’) are not often used by programmers but they can be quite valuable when they are.  What are they? An Enum is just a type of variable like a string or an Integer, but in this case one that you create that contains…
Since upgrading to Office 2013 or higher installing the Smart Indenter addin will fail. This article will explain how to install it so it will work regardless of the Office version installed.
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now