473,385 Members | 1,355 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

EXE from HTML: Critcal patches broke ShellExecute method. What now?

Note: There is considerable background detail here, but I do have
three questions, which are clearly marked and appear right before the
sample code.

I have a legitimate need to launch an EXE from an HTML page on Windows
XP/Internet Explorer. The EXE is already locally installed, and the
HTML page is also viewed locally on the PC- it's not a web site. I
know of two ways to do this, both of which are featured in the sample
HTML file at the bottom of my post.

The first method, using the Shell.Application ActiveX Object, used to
work until I installed the latest critical Windows XP patches from
Microsoft. Before these patches were installed, you could click the
‘Launch Notepad.exe' button in my sample HTML file and the program
would start right up. (Note that my Internet security settings are
always at Medium, my Local intranet security settings are at
Medium-low, and I've never had to mess with the individual ActiveX
security settings to get this code to work.)

However, one of the following critical updates has broken the ‘Launch
Notepad' code. It doesn't matter what my Internet/intranet security
settings are, or whether I've enabled unsafe ActiveX scripting. My
list of suspects is: KB842773, KB840315, KB841873, KB839645. (I have
four computers running Windows XP SP-1 at my desk, and each has the
same version of Internet Explorer installed-
6.0.2800.1106.xpsp2.030422-1633. The Launch Notepad code stopped
working on two of them this week, and still worked on the other two.
As a test, I ran Windows Update on one of the working systems and
found that after the patches were applied, my code no longer worked. I
even restored that machine's pre-patched ghost image and confirmed
that the code worked again. Next, I ran Windows Update a second time,
and allowed the aforementioned patches to be installed. Again, it
broke my code.)

You can confirm whether you have these patches installed on your
machine a number of ways, but perhaps the easiest is to open your
Windows folder and look for ‘$NtUninstallKBxxxxxx' folders with names
matching the patches I listed.

And then there's the second method, used by the ‘Launch Regedit.exe'
button. While this will actually still launch the EXE file, it's
undesirable because it always prompts you with a dialog that starts
out "An ActiveX control on this page might be unsafe…" Note that this
even happened before the patches, again regardless of the
Internet/Local intranet security settings.

* QUESTION 1: Is there any way to get ShellExecute to work again once
the new critical updates are installed?

* QUESTION 2: Failing that, how can I get around the unsafe control
warning with the Wscript.Shell method, for a local HTML file that's
trying to launch a local EXE?

* QUESTION 3: Is there any OTHER way for an honest guy like me to
launch a local EXE from a local HTML file?

Thanks, and here's the sample HTML file:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<script type="text/javascript" language="JavaScript">

function LaunchNotepad()
{
var launcher = new ActiveXObject("Shell.Application");
launcher.ShellExecute("Notepad.exe", "", "", "open", "1");
}

function LaunchRegedit()
{
var launcher = new ActiveXObject("WScript.Shell");
launcher.Run("Regedit.exe");
}

</script>
</head>
<body>
<form name="Form1">
<input name="ButtonNotepad" value="Launch Notepad.exe"
onclick="LaunchNotepad()" type="button"> <br>
<br>
<input name="ButtonRegedit" value="Launch Regedit.exe"
onclick="LaunchRegedit()" type="button">
</form>
</body>
</html>
Jul 23 '05 #1
9 8117
Fox


Josh Mayfield wrote:

Note: There is considerable background detail here, but I do have
three questions, which are clearly marked and appear right before the
sample code.
If you're running IE5.5 or better, try changing the file extension of
your "web" page to .hta (HyperText Application) -- which can be used to
turn IE into an application "shell". HTA's are automatically afforded
security permissions that should allow you to manipulate your system any
way you like (without certs, etc...).


I have a legitimate need to launch an EXE from an HTML page on Windows
XP/Internet Explorer. The EXE is already locally installed, and the
HTML page is also viewed locally on the PC- it's not a web site. I
know of two ways to do this, both of which are featured in the sample
HTML file at the bottom of my post.

The first method, using the Shell.Application ActiveX Object, used to
work until I installed the latest critical Windows XP patches from
Microsoft. Before these patches were installed, you could click the
‘Launch Notepad.exe' button in my sample HTML file and the program
would start right up. (Note that my Internet security settings are
always at Medium, my Local intranet security settings are at
Medium-low, and I've never had to mess with the individual ActiveX
security settings to get this code to work.)

However, one of the following critical updates has broken the ‘Launch
Notepad' code. It doesn't matter what my Internet/intranet security
settings are, or whether I've enabled unsafe ActiveX scripting. My
list of suspects is: KB842773, KB840315, KB841873, KB839645. (I have
four computers running Windows XP SP-1 at my desk, and each has the
same version of Internet Explorer installed-
6.0.2800.1106.xpsp2.030422-1633. The Launch Notepad code stopped
working on two of them this week, and still worked on the other two.
As a test, I ran Windows Update on one of the working systems and
found that after the patches were applied, my code no longer worked. I
even restored that machine's pre-patched ghost image and confirmed
that the code worked again. Next, I ran Windows Update a second time,
and allowed the aforementioned patches to be installed. Again, it
broke my code.)

You can confirm whether you have these patches installed on your
machine a number of ways, but perhaps the easiest is to open your
Windows folder and look for ‘$NtUninstallKBxxxxxx' folders with names
matching the patches I listed.

And then there's the second method, used by the ‘Launch Regedit.exe'
button. While this will actually still launch the EXE file, it's
undesirable because it always prompts you with a dialog that starts
out "An ActiveX control on this page might be unsafe…" Note that this
even happened before the patches, again regardless of the
Internet/Local intranet security settings.

* QUESTION 1: Is there any way to get ShellExecute to work again once
the new critical updates are installed?

* QUESTION 2: Failing that, how can I get around the unsafe control
warning with the Wscript.Shell method, for a local HTML file that's
trying to launch a local EXE?

* QUESTION 3: Is there any OTHER way for an honest guy like me to
launch a local EXE from a local HTML file?

Thanks, and here's the sample HTML file:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<script type="text/javascript" language="JavaScript">

function LaunchNotepad()
{
var launcher = new ActiveXObject("Shell.Application");
launcher.ShellExecute("Notepad.exe", "", "", "open", "1");
}

function LaunchRegedit()
{
var launcher = new ActiveXObject("WScript.Shell");
launcher.Run("Regedit.exe");
}

</script>
</head>
<body>
<form name="Form1">
<input name="ButtonNotepad" value="Launch Notepad.exe"
onclick="LaunchNotepad()" type="button"> <br>
<br>
<input name="ButtonRegedit" value="Launch Regedit.exe"
onclick="LaunchRegedit()" type="button">
</form>
</body>
</html>

Jul 23 '05 #2
Fox


Josh Mayfield wrote:

Note: There is considerable background detail here, but I do have
three questions, which are clearly marked and appear right before the
sample code.
If you're running IE5.5 or better, try changing the file extension of
your "web" page to .hta (HyperText Application) -- which can be used to
turn IE into an application "shell". HTA's are automatically afforded
security permissions that should allow you to manipulate your system any
way you like (without certs, etc...).


I have a legitimate need to launch an EXE from an HTML page on Windows
XP/Internet Explorer. The EXE is already locally installed, and the
HTML page is also viewed locally on the PC- it's not a web site. I
know of two ways to do this, both of which are featured in the sample
HTML file at the bottom of my post.

The first method, using the Shell.Application ActiveX Object, used to
work until I installed the latest critical Windows XP patches from
Microsoft. Before these patches were installed, you could click the
‘Launch Notepad.exe' button in my sample HTML file and the program
would start right up. (Note that my Internet security settings are
always at Medium, my Local intranet security settings are at
Medium-low, and I've never had to mess with the individual ActiveX
security settings to get this code to work.)

However, one of the following critical updates has broken the ‘Launch
Notepad' code. It doesn't matter what my Internet/intranet security
settings are, or whether I've enabled unsafe ActiveX scripting. My
list of suspects is: KB842773, KB840315, KB841873, KB839645. (I have
four computers running Windows XP SP-1 at my desk, and each has the
same version of Internet Explorer installed-
6.0.2800.1106.xpsp2.030422-1633. The Launch Notepad code stopped
working on two of them this week, and still worked on the other two.
As a test, I ran Windows Update on one of the working systems and
found that after the patches were applied, my code no longer worked. I
even restored that machine's pre-patched ghost image and confirmed
that the code worked again. Next, I ran Windows Update a second time,
and allowed the aforementioned patches to be installed. Again, it
broke my code.)

You can confirm whether you have these patches installed on your
machine a number of ways, but perhaps the easiest is to open your
Windows folder and look for ‘$NtUninstallKBxxxxxx' folders with names
matching the patches I listed.

And then there's the second method, used by the ‘Launch Regedit.exe'
button. While this will actually still launch the EXE file, it's
undesirable because it always prompts you with a dialog that starts
out "An ActiveX control on this page might be unsafe…" Note that this
even happened before the patches, again regardless of the
Internet/Local intranet security settings.

* QUESTION 1: Is there any way to get ShellExecute to work again once
the new critical updates are installed?

* QUESTION 2: Failing that, how can I get around the unsafe control
warning with the Wscript.Shell method, for a local HTML file that's
trying to launch a local EXE?

* QUESTION 3: Is there any OTHER way for an honest guy like me to
launch a local EXE from a local HTML file?

Thanks, and here's the sample HTML file:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<script type="text/javascript" language="JavaScript">

function LaunchNotepad()
{
var launcher = new ActiveXObject("Shell.Application");
launcher.ShellExecute("Notepad.exe", "", "", "open", "1");
}

function LaunchRegedit()
{
var launcher = new ActiveXObject("WScript.Shell");
launcher.Run("Regedit.exe");
}

</script>
</head>
<body>
<form name="Form1">
<input name="ButtonNotepad" value="Launch Notepad.exe"
onclick="LaunchNotepad()" type="button"> <br>
<br>
<input name="ButtonRegedit" value="Launch Regedit.exe"
onclick="LaunchRegedit()" type="button">
</form>
</body>
</html>

Jul 23 '05 #3
Fox


Josh Mayfield wrote:

Note: There is considerable background detail here, but I do have
three questions, which are clearly marked and appear right before the
sample code.
If you're running IE5.5 or better, try changing the file extension of
your "web" page to .hta (HyperText Application) -- which can be used to
turn IE into an application "shell". HTA's are automatically afforded
security permissions that should allow you to manipulate your system any
way you like (without certs, etc...).

I have a legitimate need to launch an EXE from an HTML page on Windows
XP/Internet Explorer. The EXE is already locally installed, and the
HTML page is also viewed locally on the PC- it's not a web site. I
know of two ways to do this, both of which are featured in the sample
HTML file at the bottom of my post.

The first method, using the Shell.Application ActiveX Object, used to
work until I installed the latest critical Windows XP patches from
Microsoft. Before these patches were installed, you could click the
‘Launch Notepad.exe' button in my sample HTML file and the program
would start right up. (Note that my Internet security settings are
always at Medium, my Local intranet security settings are at
Medium-low, and I've never had to mess with the individual ActiveX
security settings to get this code to work.)

However, one of the following critical updates has broken the ‘Launch
Notepad' code. It doesn't matter what my Internet/intranet security
settings are, or whether I've enabled unsafe ActiveX scripting. My
list of suspects is: KB842773, KB840315, KB841873, KB839645. (I have
four computers running Windows XP SP-1 at my desk, and each has the
same version of Internet Explorer installed-
6.0.2800.1106.xpsp2.030422-1633. The Launch Notepad code stopped
working on two of them this week, and still worked on the other two.
As a test, I ran Windows Update on one of the working systems and
found that after the patches were applied, my code no longer worked. I
even restored that machine's pre-patched ghost image and confirmed
that the code worked again. Next, I ran Windows Update a second time,
and allowed the aforementioned patches to be installed. Again, it
broke my code.)

You can confirm whether you have these patches installed on your
machine a number of ways, but perhaps the easiest is to open your
Windows folder and look for ‘$NtUninstallKBxxxxxx' folders with names
matching the patches I listed.

And then there's the second method, used by the ‘Launch Regedit.exe'
button. While this will actually still launch the EXE file, it's
undesirable because it always prompts you with a dialog that starts
out "An ActiveX control on this page might be unsafe…" Note that this
even happened before the patches, again regardless of the
Internet/Local intranet security settings.

* QUESTION 1: Is there any way to get ShellExecute to work again once
the new critical updates are installed?

* QUESTION 2: Failing that, how can I get around the unsafe control
warning with the Wscript.Shell method, for a local HTML file that's
trying to launch a local EXE?

* QUESTION 3: Is there any OTHER way for an honest guy like me to
launch a local EXE from a local HTML file?

Thanks, and here's the sample HTML file:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<script type="text/javascript" language="JavaScript">

function LaunchNotepad()
{
var launcher = new ActiveXObject("Shell.Application");
launcher.ShellExecute("Notepad.exe", "", "", "open", "1");
}

function LaunchRegedit()
{
var launcher = new ActiveXObject("WScript.Shell");
launcher.Run("Regedit.exe");
}

</script>
</head>
<body>
<form name="Form1">
<input name="ButtonNotepad" value="Launch Notepad.exe"
onclick="LaunchNotepad()" type="button"> <br>
<br>
<input name="ButtonRegedit" value="Launch Regedit.exe"
onclick="LaunchRegedit()" type="button">
</form>
</body>
</html>

Jul 23 '05 #4
Josh Mayfield wrote:
The first method, using the Shell.Application ActiveX Object, used to
work until I installed the latest critical Windows XP patches from
Microsoft. Before these patches were installed, you could click the
‘Launch Notepad.exe' button in my sample HTML file and the program
would start right up. (Note that my Internet security settings are
always at Medium, my Local intranet security settings are at
Medium-low, and I've never had to mess with the individual ActiveX
security settings to get this code to work.)
Your code will work, if loaded in IE from a page located on either your
own hard drive, or a network resource (such as a network drive). Both of
these are considered the Local Computer zone and allow the code to work
properly. It will/should never automatically launch an executable if the
page is located on an HTTP/HTTPS server (assuming default security
settings).
* QUESTION 1: Is there any way to get ShellExecute to work again once
the new critical updates are installed?
No, that's obviously the point of the patch(es).
* QUESTION 2: Failing that, how can I get around the unsafe control
warning with the Wscript.Shell method, for a local HTML file that's
trying to launch a local EXE?
You can't without changing your default security settings, or adding the
site you are loading the page from to your list of Trusted Sites.
* QUESTION 3: Is there any OTHER way for an honest guy like me to
launch a local EXE from a local HTML file?


No. If there were a way for an "honest guy like you" to run a local EXE
unprompted, then there would be a way for a malicious person to run a
local EXE unprompted. Not being able to do what you want to do is a GOOD
thing.

--
Grant Wagner <gw*****@agricoreunited.com>
comp.lang.javascript FAQ - http://jibbering.com/faq

Jul 23 '05 #5
ma**************@yahoo.com (Josh Mayfield) wrote in message news:<92**************************@posting.google. com>...
* QUESTION 1: Is there any way to get ShellExecute to work again once
the new critical updates are installed?


Thanks to Fox for the tip about changing the file extension to .HTA.
This indeed worked (for both of my launching methods). Unfortunately,
I was unable to use it because my HTM files are hosted by a shell EXE
that was developed by another team and is hardcoded to load a specific
HTM file (which is the one I needed to change).

Additional thanks to Joker, for explaining that the patches affected a
different security zone from the ones I was messing with. I have
looked into this and found that it is called the "My Computer Zone"
and it's the only one that's not configurable in the Internet Options
UI. (Which completely baffles me.)

I located the My Computer Zone's registry key, which is:

[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet
Settings\Zones\0]

And was able to tweak the settings there. Now both of my launching
methods work without popping up any annoying warnings, and without
requiring a filename change.
Jul 23 '05 #6
It's not a zone on the Internet is why it's not in Internet Properties.

Only Web based zones go there because that's what Internet Explorer was
designed for. It just happens to also work in the "My Computer" zone as
well.

Josh Mayfield wrote:
ma**************@yahoo.com (Josh Mayfield) wrote in message news:<92**************************@posting.google. com>...

* QUESTION 1: Is there any way to get ShellExecute to work again once
the new critical updates are installed?

Thanks to Fox for the tip about changing the file extension to .HTA.
This indeed worked (for both of my launching methods). Unfortunately,
I was unable to use it because my HTM files are hosted by a shell EXE
that was developed by another team and is hardcoded to load a specific
HTM file (which is the one I needed to change).

Additional thanks to Joker, for explaining that the patches affected a
different security zone from the ones I was messing with. I have
looked into this and found that it is called the "My Computer Zone"
and it's the only one that's not configurable in the Internet Options
UI. (Which completely baffles me.)

I located the My Computer Zone's registry key, which is:

[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet
Settings\Zones\0]

And was able to tweak the settings there. Now both of my launching
methods work without popping up any annoying warnings, and without
requiring a filename change.


Jul 23 '05 #7
Thanks to all for getting this started. YES - there are reasons t
execute an EXE from an HTML page that have nothing to do wit
vandalizing someones computer.

While it is obvious that en EXE should not be launched by the browse
without confirmation - it is just as sensible to provide for an "Alway
allow THIS file to run" option. The lack of options like that were th
root cause for the I LOVE YOU virus's vigor.

I will explain that: The ILY bug LOOKED like a TXT file - clicking o
it launched a window that end-users had been seeing for over a year o
TXT files, stupidly warning them that a harmless file might be harmful
The inability to stop the warnings led to the lack of attention on th
end-users part that fuled the spread of the virus.

I am careful and diligent - I am not ignorant about my computer'
weaknesses. A few weeks ago I clicked on continue on a file that I wa
99% positive was malware. WHy? Because I am so friggin programmed t
click that damn OK button when I dl things.

I SHOULD have the right to specify which locations are NEVER to b
questioned. Yep, some dummy is going to enable the ip range betwee
1.0.0.1 and 254.255.255.254 but that's HIS problem.

There's a MILLION legitimate reasons to want to launch an exe withou
having to get additional security warnings.

Here's another promissing approach:

http://www.whirlywiryweb.com/q/launchinie.asp

The HTA thing works <sort of> for me - but I am trying to make a custo
interface using DHTML menu builder and I am not sure how to pluc the J
codes you posted into my pull-down HTML page
-
thestra

Jul 23 '05 #8
thestrae wrote:
Thanks to all for getting this started. YES - there are reasons to
execute an EXE from an HTML page that have nothing to do with
vandalizing someones computer.

[snip "I Love You" misunderstanding]

There's a MILLION legitimate reasons to want to launch an exe without
having to get additional security warnings.

So tell me one - you STILL have not done. As far as I can see there are
none at all - EVER.
Jul 23 '05 #9
thestrae wrote:
Thanks to all for getting this started. YES - there are reasons to
execute an EXE from an HTML page that have nothing to do with
vandalizing someones computer.
Yes but how is the user to tell that he can/should trust you? And how is
the user to tell that you are you?
While it is obvious that en EXE should not be launched by the browser
without confirmation
No, it's called security!
- it is just as sensible to provide for an "Always allow THIS file to
run" option.
And how is the user to know/trust "this file"? And why wouldn't a hacker
attack exactly that privilege and pretend to be "this file" or "this
site"? And what if the hacker hacks the site and places his favorite
virus in "this file"?
The lack of options like that were the root cause for the I LOVE YOU
virus's vigor.
Ignorance! True ignorance! The "I Love You" virus came in email, not the
web, as an attachment that users opened up and where *not* given an
confirmation such as "Are you sure you want to run this?".
I will explain that: The ILY bug LOOKED like a TXT file - clicking on
it launched a window that end-users had been seeing for over a year on
TXT files, stupidly warning them that a harmless file might be harmful.
Clicking on txt files simply displays them. If it "looked" like a txt
file then it shouldn't have launched any window. If it looked like a txt
file and launched a window then that's a real good sign that it is not a
txt file and the warning should be heeded.
The inability to stop the warnings led to the lack of attention on the
end-users part that fuled the spread of the virus.
Huh? You're attempting to say that warning the user of a possible virus
invocation causes the virus to spread!?! Amazing! So you're solution is
to not warn the user so that what? The virus can spread faster?!?
I am careful and diligent - I am not ignorant about my computer's
weaknesses.
The computer's weakness is often it's owner.
A few weeks ago I clicked on continue on a file that I was 99%
positive was malware. WHy? Because I am so friggin programmed to click
that damn OK button when I dl things.
Bingo! Perhaps it's the MS mentality of "attach everything and have
everything attached run a separate program requiring the user to double
click just about everything in the normal course of doing their work"
that may make you programmed but it doesn't make me programmed. Oh yeah
I get the email messages that simply say see the attached Word/Excel/etc
document that contains content that could just as easily simply be
expressed in the email message itself. When I encounter such things I do
stop and think. Of course now I'm in the situation where I must open the
attachment but I've already thought about it and decided, based on the
sender (is it somebody I know, say from work, where I should open this
attachment), to open the attachment and read it. After reading it, if it
is one of those things that could have been as easily simply put in the
email message I respond and tell them "Hey why the doc file? Why not
simply write it directly into the email?" - but I guess I'm just like that.
I SHOULD have the right to specify which locations are NEVER to be
questioned.
I believe in many instances, and with MS insecure applications, you can.
You may need to configure it. But please allow security to be the rule
since there are so many people like you who ruin it for everybody else.
Yep, some dummy is going to enable the ip range between 1.0.0.1 and
254.255.255.254 but that's HIS problem.
No, it becomes *our* problem as they open attachments and click on exe's
on web sites, run the contain virii which then takes over their computer
and spreads the virii to *other* computers such as ours!
There's a MILLION legitimate reasons to want to launch an exe without
having to get additional security warnings.
The additional security warning is but a second or two of the end user's
time. Compare that with the millions of illegitimate reasons that
hackers and other such crooks have to launch an exe without security and
you should be able to see that the trade off is minimal.
Here's another promissing approach:

http://www.whirlywiryweb.com/q/launchinie.asp
Yet another IE only Active/X insecure control! Geeze, guess they never
learn...
The HTA thing works <sort of> for me - but I am trying to make a
custom interface using DHTML menu builder and I am not sure how to
pluc the JS codes you posted into my pull-down HTML pages

--
I said "NO" to drugs, but they didn't listen.

Jul 23 '05 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Josh | last post by:
Hi All, I am trying to print a pdf file from python using the Win32api shellexecute method and am having a problem, or perhaps just a misunderstanding, with the bshow parameter. Am I correct to...
0
by: Marcel Sammut | last post by:
Greetings, I am converting a VB6 application to .net and am having troubles trying to print a document directley to the printer. My VB6 app used the API ShellExecute method to accomplish this,...
3
by: Wiktor Zychla | last post by:
I have a problem I cannot solve. My application hosts IE activex control. I follow the standard procedure: I just aximp shdocvw.dll. Note that this gives you two files: axshdocvw.dll and...
0
by: the_openFace | last post by:
I'm trying to display the shell's property page for various files and I'm using this code: class Win32Shell { // ... other stuff here public static extern Int32 ShellExecute( Int32 hwnd,...
0
by: the openBack | last post by:
I'm trying to display the shell's property page for various files and I'm using this code: class Win32Shell { // ... other stuff here public static extern Int32 ShellExecute( Int32 hwnd,...
0
by: David | last post by:
We have an mfc application in which we use ShellExecute to launch the browser with an initial web site. {ShellExecute( NULL, "open", "http://www.SomeWebSite.com", NULL, NULL, SW_SHOWNORMAL ) } ...
2
by: Elga | last post by:
I have a user manual for my program in HTML format, and I want to open it from my program by clicking a button. How can I call the IE with my HTML file inside my program ? Thanks, Elga.
2
by: Terry Olsen | last post by:
When starting a process, what is the difference between using ShellExecute or not using it? I need to start IE when a link is clicked in my app. I want as little impact to my app as possible....
5
by: =?Utf-8?B?VG9tYXM=?= | last post by:
Hello, Somebody knows which is the equivalent one in C++/CLI ? HINSTANCE ShellExecute(HWND hwnd, LPCTSTR lpOperation, LPCTSTR lpFile, LPCTSTR lpParameters, LPCTSTR lpDirectory, INT nShowCmd
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.