Hi,
you can try to analyze the source code of netstatp, that demonstrates how
TCPView works (a tool from Sysinternals that let you see a list of TCP/UDP
connections per process) and then integrate it in a WinPcap-based
application. The tool page is
http://www.sysinternals.com/Utilities/TcpView.html, the source code is
http://www.sysinternals.com/Files/NetstatpSource.zip.
Ciao
Davide
> -----Messaggio originale-----
> Da: wireshark-users-bounces@xxxxxxxxxxxxx
> [mailto:wireshark-users-bounces@xxxxxxxxxxxxx] Per conto di Mathias .
> Inviato: mercoledì 14 giugno 2006 22.00
> A: wireshark-users@xxxxxxxxxxxxx
> Oggetto: [Wireshark-users] Capture specific process frames
>
> Hi everyone.
>
> Does somebody knows if it is possible to filter out the
> frames that are sent from or (received by) a specific process
> (Win 32).
>
> Regards Mathias
>
>
> _______________________________________________
> Wireshark-users mailing list
> Wireshark-users@xxxxxxxxxxxxx
> http://www.wireshark.org/mailman/listinfo/wireshark-users