Solved

Max Length of a "net send" message

Posted on 2004-09-28
2
539 Views
Last Modified: 2010-05-18
Good afternoon,

Was is the max length of a "net send" message from user to user in a Win 2K environment?

Thanks,
Tony
0
Comment
Question by:fattumsdad
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 85

Accepted Solution

by:
oBdA earned 500 total points
ID: 12173993
895 (at least on NT4, W2k, XP).
If you want to test it yourself, you can run this script in a command window. It will send a "net send" message in an endless loop, incrementing the message length in steps of 10 (until you hit <ctrl-c>), displaying the current length. Let it send (and click away ...) the messages until it will stop adding characters.

====8<----[NetSendTest.cmd]----
@echo off
setlocal
set Length=0
set Msg=
:loop
set /a Length+=10
set Len=%Length%
if %Length% LSS 100 set Len=0%Len%
if %Length% LSS 1000 set Len=0%Len%
set Msg=%Msg%......%Len%
echo Length: %Length%
net send %computername% %Msg% >NUL
set /a i+=1
pause >NUL
goto :loop
====8<----[NetSendTest.cmd]----
0
 
LVL 85

Expert Comment

by:oBdA
ID: 12174004
While I just see it, you can of course dispose of the "set /a i+=1" line; that's a leftover from an earlier version ...
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Popular third-party chat platforms like Slack, Discord, and Telegram are just a few of the many new productivity applications that are being hijacked by cybercriminals to create command-and-control (C&C) communications infrastructures for their malw…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question