Solved

Intercepting File I/O from a Child Process??

Posted on 2004-04-08
4
214 Views
Last Modified: 2013-12-03
I need to monitor the log file activity of a third party application in real time.  However, it has placed a read lock on the file so I cannot access it directly off the disk.

Is it possible to redirect or intercept File I/O if I launch it as a Child Process?  I see lots of examples of reading the Standard I/O but I need to read the file stream.  

If that is not possible or you have another way of reading the file, please let me know.

Thanks!
0
Comment
Question by:joecm
4 Comments
 
LVL 86

Accepted Solution

by:
jkr earned 250 total points
ID: 10792739
Check out http://www.codeproject.com/system/hooksys.asp ("API hooking revealed"). This approach allows you to intercept all file I/O calls in the 3rd party app and thus monitoring the log file activity.
0
 
LVL 20

Assisted Solution

by:Madshi
Madshi earned 250 total points
ID: 10796323
Or look here:

http://help.madshi.net/madCodeHook.htm

(free for non-commercial purpose)
0
 

Author Comment

by:joecm
ID: 11103950
Good to know I can split... Thank you both for pointing me in the right direction.
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

zlib is a free compression library (a DLL) on which the popular gzip utility is built.  In this article, we'll see how to use the zlib functions to compress and decompress data in memory; that is, without needing to use a temporary file.  We'll be c…
A theme is a collection of property settings that allow you to define the look of pages and controls, and then apply the look consistently across pages in an application. Themes can be made up of a set of elements: skins, style sheets, images, and o…
This is Part 3 in a 3-part series on Experts Exchange to discuss error handling in VBA code written for Excel. Part 1 of this series discussed basic error handling code using VBA. http://www.experts-exchange.com/videos/1478/Excel-Error-Handlin…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question