In my last two blog posts, I presented the idea of an Application Locking Mechanism and I also presented a prototype. I would now like to present the full implementation of this facility. This is the final post in this series.
//
// The magic number is used to help detect data corruption in the lock
// structure.
//
#define LOCK_MAGIC 314157