Consider the programs virtual address space as that programs own sand box. The computer maps all virtual addresses to real memory addresses (or virtual memory - ie swap file). This way, if a...
Type: Posts; User: KinoCode
Consider the programs virtual address space as that programs own sand box. The computer maps all virtual addresses to real memory addresses (or virtual memory - ie swap file). This way, if a...
Microangelo is the best I've seen. Awesome features and very professional editor. It can also do animated and transparent icons as well as cursors.
Well, if your creating your windows from scratch using regions, then you will need to create a function to respond to mouse clicks. Just call the function from WM_LBUTTONDOWN. Pass the LPARAM to...
I believe that the DELETE flag for CreateFile() is based on user access rights, and not on current file operations. Therefore, the user may have the rights to delete the file, but still would not be...
It's not locked in the since that a process has called LockFile(), it's just the file has been opened for reading by another process. In NT/2000/XP, if a file is open by another process already,...
That would be even slower than renaming the file.
Which every OS has it's code in the Master Boot record will be loaded when the system starts. There are programs like System Commander that will allow you to load many different OS's and when you...
The reason I need to know before I delete is that I need to zero the file out before deleting. If I zero the file out, then try to delete and I can't delete, then I don't want to delete the file. ...
I need to be able to determine if I can delete a file in NT/2000/XP, before actually deleteing it. The problem is, other applications may already have an open handle to the file. This causes any...
There is an API function for selecting folders:
SHBrowseForFolder
This function can also be overloaded so that you can embed it into a dialog of your choice.
Does anybody know of a way to detect global keyboard hooks? I want to be able to detect keyboard hooks and possibly remove them from the system.
Basically, a way to stop key loggers from stealing...
Well, you put code after you return FALSE to the OS. This code will never be reached. I think the best move for you is to do this:
case WM_QUERYENDSESSION:
case WM_DESTROY:
case WM_CLOSE:
...
First off, change your case statement in your procedure function to:
case WM_DESTROY:
case WM_CLOSE:
get_second_time();
PostQuitMessage(0);
break;
This way your...
Did you set the "HWND hwndOwner" and "HINSTANCE hInstance" variables in the OPENFILENAME struct? If so, I believe the dialog should center on the owners window.
Well, if you want to go low level, then you can write kernel mode drivers (NT/2000/XP) and process interupt request packets (IRP's) yourself. There are a couple of companies that sell both libraries...
Are you wanting to handle interrupts so that you can read data the moment it arrives at the port? If so, there's an excellent article on MSDN called "Serial Communications in Win32" that shows you...