|
My current project needs to be supported by IKnownFolder.
But I've never programmed with this kind of interfaces.
So anyone could help?
I'll really appreciate it if you could give some links or codes on what files should be introduced in and how and the initialization codes.
Thanks in advance.
|
|
|
|
|
|
Hi
I am using UnDecorateSymbolName() method get function name and argument data type. but i want actual argument variable name? i try this code like
void ExtractCppSymbol(char *szDecoratedName)
{
char szFunc[512];
if ( UnDecorateSymbolName(szDecoratedName, szFunc, 512, UNDNAME_COMPLETE > 0 ))
{
cout<
|
|
|
|
|
As far as I know the argument names aren't in the decorated name, so there is NO way to extract them.
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler.
-- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong.
-- Iain Clarke
[My articles]
|
|
|
|
|
i am using input mangled data from VC++ MAP file. This MAP file contains all details.
i parse MAP file and pass to UnDecorateSymbolName() method.
OR
how to pass input for argument name with mangle data?
|
|
|
|
|
The function and method names are decorated accordingly to the used calling convention, anyway what you can extract from a decorated name is, at most, the type of the formal parameters of a function (e.g. int , char * , struct MyStruct & , etc.), but not the name used in the source code.
|
|
|
|
|
Hi All
How can i check which OS is Install(xp,vista or Windows 7 etc) in System? Please help me
|
|
|
|
|
|
In addition to answer from Rejeesh, you can check out this[^] class. It does not support Windows 2008 Server and Windows 7 but the code could easily be updated in order to support these systems.
|
|
|
|
|
I am reading the TCP/IP Illustrated Volumn1 the Protocol. I find that is hard to acknowledge so many protocol. So I want to know which protocol are important for the network development.
Is the Volumn 2 needed to read?
|
|
|
|
|
You don't need to know every detail of the TCP/IP protocol stack for network development.
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler.
-- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong.
-- Iain Clarke
[My articles]
|
|
|
|
|
Good evening, CPallini
Do you think which protocols is important ?
|
|
|
|
|
It really depends on your needs. For instance, if you want to use sockets for developing a chat application then a general understanding of the TCP protocol would be required.
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler.
-- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong.
-- Iain Clarke
[My articles]
|
|
|
|
|
I agree with you. It's a lot of information, so how can someone decide which protocols are important?
Well, depends on who you are asking. If you are a beginner most in this book isn't needed, the author is a legend in his field, but I would rather start with practical experience to make yourself familiar with one thing at a time. There are very few cases where someone would need to know all low-level and high level-protocols in use like ARP, ICMP, IGMP, DNS, TFTP, BOOTP, TCP, TELNET, FTP, HTTP, SMTP and DHCP. I would pick one that you are interested in and then dig deeper. If you are already familiar with networking, let's say using TCP/UDP/DNS, it could be interesting to dig deeper and see how things work in detail and how on a deeper OSI-level. Let's say how IP/TCP/UDP/routing/switching/ARP works, definitely worth the time in the log run! But it could also that you want to specialise in application layer protocol design, then it would be better to focus on HTTP/IMAP/SMTP/POP/XMPP, the theory and design decision behind them. Another area to specialise is encryption, which algorithms have been used trough time, how to exchange keys/certificates and how communication integrates with applications.
Regarding Volume 2, not sure. The only book from W. Richard Stevens I personally own is UNIX Network Programming: Networking APIs: Sockets and XTI. Very detailed book, he really enjoyed writing about the topic and it's a classic if you are into network programming.
Hope it helps!
/M
|
|
|
|
|
For 95% of programmers there are no important protocols. You'll just use a programming library to interface with the network. With TCP/IP you'll be using sockets (although older UNIX variants use another API known as TLI - I've not seen it in the wild in years though).
So for the programmer the API is the most important thing. Sometimes it's helpful to know the details of the protocols you're using (i.e. when something goes wrong and you're forced to use a packet sniffer or the like) but it's not a daily occurrence. The most useful protocols to know about are probably TCP and DNS as they're the things you're closest to when you're programming.
Cheers,
Ash
Edited as I messed up the author, confusing him with Doug Comer whose books cover the same ground
|
|
|
|
|
Transparent:It means there is no background pannel.The toolbar just looks like a floating imagelist(picture shaped button).
Enlarge:It means when the mouse hover on ,the hot icon would enlarge,bigger than the others,and would restore to it's original size when the mouse leave.
More:It would be much better if I can use png format pictures as resource.PS: Not use .Net Framework.(USE VC6 or VC2005)
Any suggestions would be fine!
Much thanks
|
|
|
|
|
I'd say, use Layered window(s)[^], handle mouse messages like WM_MOUSEMOVE[^], use GDI+ for loading PNG images from resource[^] or CxImage[^], possibly you could also need TrackMouseEvent[^] to know when the mouse leaves. I hope these pointers can help you start off in the right direction.
> The problem with computers is that they do what you tell them to do and not what you want them to do. <
> Leela: Fry, you're wasting your life sitting in front of that TV. You need to get out and see the real world.
Fry: But this is HDTV. It's got better resolution than the real world <
|
|
|
|
|
Thank you for so much information. I can swim now.
|
|
|
|
|
Happy dabbling.
> The problem with computers is that they do what you tell them to do and not what you want them to do. <
> Leela: Fry, you're wasting your life sitting in front of that TV. You need to get out and see the real world.
Fry: But this is HDTV. It's got better resolution than the real world <
|
|
|
|
|
|
Please, don't cross post. You have already posted the same question on Q&A (and you got an answer there).
|
|
|
|
|
Hi All
I am try find out UAC is Enable or Disable through this code
HKEY pHKey;
BYTE pData[64];
DWORD type = REG_DWORD;
DWORD size =64;
LONG uVal = RegOpenKeyEx(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System",0,KEY_ALL_ACCESS, &pHKey);
if(uVal != ERROR_SUCCESS)
{
}
RegQueryValueEx(pHKey, _T("EnableLUA"), 0, &type, pData, &size);
if(pData[0] == 1)
{
}
if(pData[0] == 0)
{
}
RegCloseKey(pHKey);
But it always show Enable.If UAC is enable or disable.
Please help me.
|
|
|
|
|
Why didn't you check RegQueryValueEx return value?
Anyway I would do:
...
DWORD dwEnable;
size = sizeof(dwEnable);
...
LONG lRet = RegQueryValueEx(pHKey, _T("EnableLUA"), 0, &type, (BYTE*) &dwEnable, &size);
if ( lRet != ERROR_SUCCESS)
{
}
else
{
if(dwEnable == 1)
{
}
else
{
}
}
[added]Thanks to MsmVc for pointing out the mistake[/added]
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler.
-- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong.
-- Iain Clarke
[My articles]
modified on Saturday, November 20, 2010 8:20 AM
|
|
|
|
|
Thanks for reply
modified on Saturday, November 20, 2010 7:03 AM
|
|
|
|
|
One more thing i want to discuss with you.When i follow your step then i am getting UAC Enable or Disabled in Windows 7.
Same code when i am running on Vista then give error.But when i run code Run AS Admin then show UAC Enable or Disable.
Can you explain me why this type of result showing.
Please help me
|
|
|
|