|
Undocumented Shell Path APIs (Extracting Component Parts).
|
Total Hit (4700) |
Way back when Microsoft released Internet Explorer 4.0, they bundled with it a number of upgrades to the operating system including a new DLL called SHLWAPI.DLL (Shell Lightweight Utility APIs). That DLL provided programmers with some useful path manipulation functions (amongst other things), but ob
....Read More |
Rating
|
|
|
Undocumented Shell Path APIs (Testing Path).
|
Total Hit (4293) |
Way back when Microsoft released Internet Explorer 4.0, they bundled with it a number of upgrades to the operating system including a new DLL called SHLWAPI.DLL (Shell Lightweight Utility APIs). That DLL provided programmers with some useful path manipulation functions (amongst other things), but ob
....Read More |
Rating
|
|
|
How to extract various parts of URL using UrlGetPart API ?
|
Total Hit (5070) |
Have you ever tried to extract various parts of URL....? If yes then you know how tedious it is. But in fact is very simple if you use API UrlGetPart.
Here is a simple example to use this API.
«b»Step-By-Step Example«/b»
- Create a standard exe project
- Place the following code in form1
....Read More |
Rating
|
|
|
Very simple way to create transparent image using API
|
Total Hit (2604) |
If you ever need to create transparent BMP then don't worry here is an API which makes your life easy. To make this demo simple I have avoided color selection. In this demo default transparent color is first left top pixel color of source image.
«b»Step-By-Step Example«/b»
- Create a standard
....Read More |
Rating
|
|
|
WMI : Retrive extended information about processor
|
Total Hit (3292) |
Windows Management Instrumentation (WMI) makes Windows extremely manageable using a single consistent, standards-based, extensible and object-orientated interface. WMI is the Microsoft implementation of Web-Based Enterprise Management (WBEM), an industry initiative to develop a standard technology f
....Read More |
Rating
|
|
|
Create and verify digital signature to detect data tampering.
|
Total Hit (19464) |
In this article we will talk about digital signature and how to use it to detect any intended/unintended data tampering. Data can be tmpered in many ways it can be intentionally tmpered or it can be currupted during communication or may be some other reason. Anyways today I will show you the use of
....Read More |
Rating
|
|
|
How to retrive and delete all internet cache entries?
|
Total Hit (4921) |
In this article I will show you the use of FindFirstUrlCacheEntry, FindNextUrlCacheEntry, FindCloseUrlCache and DeleteUrlCacheEntry APIs. First three APIs are used to retrive cache entries and DeleteUrlCacheEntry is used to delete a specific entry from the cache.
Here is the example
«b»Step-By
....Read More |
Rating
|
|
|
How to retrive only visible items of treeview control?
|
Total Hit (5833) |
If you want to retrive only visible item count for treeview control then you can use TreeView1.GetVisibleCount but the problem is this will only return items which are 100% visible so it wont give you exact number.
In this article I will show you the trick to get only visible items of treeview u
....Read More |
Rating
|
|
|
Create your own Image/Link extractor tool using Regular Expressions
|
Total Hit (3281) |
This is a very simple code to present use of Regular expression to solve some complex text operation which is kinda impossible using inbuilt string functions available in Visual Basic.
For More information Visit the following MSDN article
«a href='http://msdn.microsoft.com/library/en-us/dnclin
....Read More |
Rating
|
|
|
How to clear cached objects programatically?
|
Total Hit (2778) |
When you use cached output on your ASP.net page it won't be refreshed until times out or you recompile the web application. During development you might need to refresh your content frequently for testing purpose and then you can face problem because of cached output. Here is a simple solution to th
....Read More |
Rating
|
|
|
|
|
|
|
|
|
|
|
|
|
How To Automate Microsoft Excel from Visual Basic
|
Total Hit (3832) |
There are two ways to control an Automation server: by using either late binding or early binding. With late binding, methods are not bound until run-time and the Automation server is declared as Object. With early binding, your application knows at design-time the exact type of object it will be co
....Read More |
Rating
|
|
|
|
|
|
Working with ADSI (Active Directory Service Interface)
|
Total Hit (7627) |
Active Directory Services Interfaces (ADSI) is a set of open interfaces that abstract the capabilities of directory services from different network providers to present a single view for accessing and managing network resources. Administrators and developers can use ADSI services to enumerate and ma
....Read More |
Rating
|
|
|
Extending the functionality of the VB ListView controls
|
Total Hit (2166) |
The "ListView" control in both Comctl32.ocx and Mscomctl.ocx is simply a wrapper that superclasses (encapsulates) the real "listview" common control in Comctl32.dll. This allows the real listview common control messages and definitions to be used to override almost every aspect of the VB ListView co
....Read More |
Rating
|
|
|
How to Encode/Decode URL using API
|
Total Hit (5395) |
Sometimes you might need to Encode/Decode URL programatically. This article will show you how easy it is using 2 undocumented APIs.
Encoding URL means convert any unusual character into escape code (e.g. space will be replaced by %20).
Decoding URL means convert escape code into actaul charac
....Read More |
Rating
|
|
|
|
|
Undocumented Shell Path APIs (Combining and Constructing Path).
|
Total Hit (3218) |
Way back when Microsoft released Internet Explorer 4.0, they bundled with it a number of upgrades to the operating system including a new DLL called SHLWAPI.DLL (Shell Lightweight Utility APIs). That DLL provided programmers with some useful path manipulation functions (amongst other things), but ob
....Read More |
Rating
|
|