>aoa
>hi Citin
>Try this codes, These are not all my codes but its work good
>thanks
>clear
>*!* Let's get the CPU ID
>LOCAL lcComputerName, loWMI, lowmiWin32Objects, lowmiWin32Object
>lcComputerName = GETWORDNUM(SYS(0),1)
>loWMI = GETOBJECT("WinMgmts://" + lcComputerName)
>lowmiWin32Objects = loWMI.InstancesOf("Win32_Processor")
>FOR EACH lowmiWin32Object IN lowmiWin32Objects
> WITH lowmiWin32Object
> ? "ProcessorId: " + TRANSFORM(.ProcessorId)
> ENDWITH
>ENDFOR
That was completely news to me. Just googled WinMgmts:// and ended up in the WMI section of MS. What an incredible resource.
I hope MS did their homework on security, because you can imagine what a virus writer can do with this.
Alex
Previous
Next
Reply
View the map of this thread
View the map of this thread starting from this message only
View all messages of this thread
View all messages of this thread starting from this message only