Hi,
I've got a problem! Or two actually at this moment...
I want to:
- When I'm installing my program (coded in C#, installed on computer by windows installer), we can call it for "Program A", I want another program (a .exe file), "Program B", to install simultaneously without users knowledge.
If I put "Registers" value to "csdrfCOMSelfRe g" for the .exe file in "Properties " I will get the possibility to click through an installer guide for Program B while my program A is installing.
And I want Program B to install, but without the guide because I don't want user to know about it and that the user doesn't need to do anything for it. - Later when user uninstall "Program A", I would like "program B" to uninstall too, without effort by user of course...
Is this possible to do through the cmd? I really have no idea what to do... I've tried to google, but haven't find any solution. Maybe someone out there can put me on the right track? I think that "-k" could help me, but I don't know how, yet...
10 1767 Plater 7,872
Recognized Expert Expert
I think you can do that in an installer package project. Dependancies or something. I've never done it though
I think you can do that in an installer package project. Dependancies or something. I've never done it though
I thougt that too! But I haven't found anything there that could have helped me. I'll get the "Program B" to install when installing "Program A" there, but then user has to go through the installation guide. I want the "Program B" to install by itself...
Thanks for your answear anyway!!
OK! I've found half the solution.
In "Custom actions" it is just to "Add Custom Action" under "Installati on", and in properties window insert /S to Arguments. And TADAA! Program B is installed without user will notice.
Then it is just the second problem left, how to uninstall automaticly...
tlhintoq 3,525
Recognized Expert Specialist
I think you can do that in an installer package project. Dependancies or something. I've never done it though
This sounds a lot like giving advice on how to install a virus, trojan or tracker. Which I thought we didn't do here. I've seen a lot of 'scoldings' for even asking how to log keystrokes and the like. But its okay to hide the installation of an entire program from the user? They think they are installing a.exe and they are also getting b.exe without their knowledge so it can do.. what? report all their credit card details and use their email to spread?
Plater 7,872
Recognized Expert Expert
I thought that too. But the OP said they wanted it to be removed when A gets uninstalled too. So it *could* be legitamate.
Maybe the OP should tell us why he wants to install secretly... It may be interesting to know. But we can be sure the user din't request it.
Regards,
Alex.
Frinavale 9,735
Recognized Expert Moderator Expert
I thought that too. But the OP said they wanted it to be removed when A gets uninstalled too. So it *could* be legitamate.
That's why I didn't remove this post when I first read it.
This sounds a lot like giving advice on how to install a virus, trojan or tracker. Which I thought we didn't do here. I've seen a lot of 'scoldings' for even asking how to log keystrokes and the like. But its okay to hide the installation of an entire program from the user? They think they are installing a.exe and they are also getting b.exe without their knowledge so it can do.. what? report all their credit card details and use their email to spread?
NO NO NO NO NO!! THIS IS NOT ABOUT ANY VIRUS!!!! And I can promise this is absolutely legal!!!!
Maybe the OP should tell us why he wants to install secretly... It may be interesting to know. But we can be sure the user din't request it.
Regards,
Alex.
What do you mean with "sure the user didn't request it"?
I've got my program A (which NOT handling any type of virus, it takes care of signals), and a feature in A, is that user can use program B (which is comlepetly legal, both for me to use and for the user to use and in all ways you can think about) for analyzing these signals. But so the user doesn't have to think so much by him/herself, it will install automaticly, and also uninstall when A is uninstalled. So - NO VIRUS OR UNLEGAL THINGS HERE!!!
Sign in to post your reply or Sign up for a free account.
Similar topics |
by: Silas |
last post by:
Hi,
I use view to join difference table together for some function. However,
when the "real" table fields changed (e.g. add/delete/change field). The
view table still use the "old fields".
Therefore everytimes when I change the real table, I also needed open the
view table and save it by SQL enterprise manager manually for update the
view table field.
|
by: bblais |
last post by:
Hello,
Let me start by saying that I am coming from a background using Matlab
(or Octave), and C++. I am going to outline the basic nuts-and-bolts
of how I work in these languages, and ask for some help to find out how
the same thing is done in Python. I am not sure what the standard is.
In C++, I open up an editor in one window, a Unix shell in another. I
write the code in the editor, then switch to the shell window for
compile...
|
by: Tyno Gendo |
last post by:
Hi everyone
I need to move on a step in my PHP...
I know what classes are, both in PHP4 and 5 and I'm aware of "patterns"
existing, but what I'm looking for are some real world projects eg. Open
Source that people consider to use classes and patterns correctly.
I lack a senior person to lead me in this so I feel I'm losing out on
only using bare PHP class features and not really knowing how to design
|
by: Jack |
last post by:
I understand that the standard Python distribution is considered
the C-Python. Howerver, the current C-Python is really a combination
of C and Python implementation. There are about 2000 Python files
included in the Windows version of Python distribution. I'm not sure
how much of the C-Python is implemented in C but I think the more
modules implemented in C, the better performance and lower memory
footprint it will get.
I wonder if it's...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
| |
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
| |
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |