| |
|
|
 | KompilierenMarqueSéparationcls
print getComputerAndUserName()
waitinput
end
proc getComputerAndUserName
var sz&=256
var m&=external("kernel32.dll","GlobalAlloc",64,sz&)
ifnot external("secur32.dll","GetUserNameExA",2,m&,addr(sz&))
external("kernel32.dll","GlobalFree",m&)
return ""
endif
var s$=char$(m&,0,sz&)
external("kernel32.dll","GlobalFree",m&)
return s$
endproc
bzw. xpse KompilierenMarqueSéparationbzw. nativ: KompilierenMarqueSéparationcls
imprimer getComputerAndUserName()
waitinput
end
nproc getComputerAndUserName
string sz="xFFzzzz",
sm=space$(256)
long dll=loadLibrary("secur32.dll")
setlong(sz,1,call(getProcAddress(dll,"GetUserNameExA"),2,sm,sz))
freeLibrary(dll)
casenot long(sz,1) : return »
return char$(sm,0,ord(sz))
endproc
|
|
|
| |
|
|
|
 ByteAttack | Funktioniert Prima sous Win7/64bit et sous VMWare WinXP. Lob et Anerkennung  |
|
|
| |
|
|
|
 | Salve!  |
|
|
| |
|
|