In my last two blog posts, I presented the idea of an Application Locking Mechanism and I also presented a prototype. I would now like to present the full implementation of this facility. This is the final post in this series.
//
//  The magic number is used to help detect data corruption in the lock
//  structure.
//
#define LOCK_MAGIC 314157
 
                            


