Solved

Writing a frontend to a DOS app. What's the easiest way to control the different command line switches?

Posted on 2004-10-18
2
191 Views
Last Modified: 2010-04-23
I'm looking to write a frontend for the NAVDX norton command line scanner similar to the frontend written for McAfee's command line scanner for Barts PE. McAfee seems to miss viruses too often (Yes, it's always updated) and I'd like to have the Norton available to me but not have to type everything out.

If anybody has some simple example source code for a frontend I could download that'd be great. (This is what I get for not programming, EVER anymore)

Thanks in advance.
0
Comment
Question by:Sootah
  • 2
2 Comments
 
LVL 4

Accepted Solution

by:
Jigit earned 500 total points
ID: 12345073
0
 
LVL 4

Expert Comment

by:Jigit
ID: 12395241
Sootah, thanks for accepting my answer. Would you be so kind to fill feedback? (Just click on the link near my answer).

Thanks,
Jigit
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

1.0 - Introduction Converting Visual Basic 6.0 (VB6) to Visual Basic 2008+ (VB.NET). If ever there was a subject full of murkiness and bad decisions, it is this one!   The first problem seems to be that people considering this task of converting…
Microsoft Reports are based on a report definition, which is an XML file that describes data and layout for the report, with a different extension. You can create a client-side report definition language (*.rdlc) file with Visual Studio, and build g…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question