473,699 Members | 2,264 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Install a program while installing the "real" program

6 New Member
Hi,
I've got a problem! Or two actually at this moment...

I want to:


- When I'm installing my program (coded in C#, installed on computer by windows installer), we can call it for "Program A", I want another program (a .exe file), "Program B", to install simultaneously without users knowledge.


If I put "Registers" value to "csdrfCOMSelfRe g" for the .exe file in "Properties " I will get the possibility to click through an installer guide for Program B while my program A is installing.
And I want Program B to install, but without the guide because I don't want user to know about it and that the user doesn't need to do anything for it.

- Later when user uninstall "Program A", I would like "program B" to uninstall too, without effort by user of course...

Is this possible to do through the cmd? I really have no idea what to do... I've tried to google, but haven't find any solution. Maybe someone out there can put me on the right track? I think that "-k" could help me, but I don't know how, yet...
Oct 7 '08 #1
10 1767
Plater
7,872 Recognized Expert Expert
I think you can do that in an installer package project. Dependancies or something. I've never done it though
Oct 7 '08 #2
pstve
6 New Member
I think you can do that in an installer package project. Dependancies or something. I've never done it though

I thougt that too! But I haven't found anything there that could have helped me. I'll get the "Program B" to install when installing "Program A" there, but then user has to go through the installation guide. I want the "Program B" to install by itself...

Thanks for your answear anyway!!
Oct 8 '08 #3
pstve
6 New Member
OK! I've found half the solution.

In "Custom actions" it is just to "Add Custom Action" under "Installati on", and in properties window insert /S to Arguments. And TADAA! Program B is installed without user will notice.

Then it is just the second problem left, how to uninstall automaticly...
Oct 8 '08 #4
tlhintoq
3,525 Recognized Expert Specialist
I think you can do that in an installer package project. Dependancies or something. I've never done it though
This sounds a lot like giving advice on how to install a virus, trojan or tracker. Which I thought we didn't do here. I've seen a lot of 'scoldings' for even asking how to log keystrokes and the like. But its okay to hide the installation of an entire program from the user? They think they are installing a.exe and they are also getting b.exe without their knowledge so it can do.. what? report all their credit card details and use their email to spread?
Oct 8 '08 #5
Plater
7,872 Recognized Expert Expert
I thought that too. But the OP said they wanted it to be removed when A gets uninstalled too. So it *could* be legitamate.
Oct 8 '08 #6
myusernotyours
188 New Member
Maybe the OP should tell us why he wants to install secretly... It may be interesting to know. But we can be sure the user din't request it.

Regards,

Alex.
Oct 8 '08 #7
Frinavale
9,735 Recognized Expert Moderator Expert
I thought that too. But the OP said they wanted it to be removed when A gets uninstalled too. So it *could* be legitamate.
That's why I didn't remove this post when I first read it.
Oct 8 '08 #8
pstve
6 New Member
This sounds a lot like giving advice on how to install a virus, trojan or tracker. Which I thought we didn't do here. I've seen a lot of 'scoldings' for even asking how to log keystrokes and the like. But its okay to hide the installation of an entire program from the user? They think they are installing a.exe and they are also getting b.exe without their knowledge so it can do.. what? report all their credit card details and use their email to spread?

NO NO NO NO NO!! THIS IS NOT ABOUT ANY VIRUS!!!! And I can promise this is absolutely legal!!!!
Oct 20 '08 #9
pstve
6 New Member
Maybe the OP should tell us why he wants to install secretly... It may be interesting to know. But we can be sure the user din't request it.

Regards,

Alex.
What do you mean with "sure the user didn't request it"?
I've got my program A (which NOT handling any type of virus, it takes care of signals), and a feature in A, is that user can use program B (which is comlepetly legal, both for me to use and for the user to use and in all ways you can think about) for analyzing these signals. But so the user doesn't have to think so much by him/herself, it will install automaticly, and also uninstall when A is uninstalled. So - NO VIRUS OR UNLEGAL THINGS HERE!!!
Oct 20 '08 #10

Sign in to post your reply or Sign up for a free account.

Similar topics

4
3131
by: Silas | last post by:
Hi, I use view to join difference table together for some function. However, when the "real" table fields changed (e.g. add/delete/change field). The view table still use the "old fields". Therefore everytimes when I change the real table, I also needed open the view table and save it by SQL enterprise manager manually for update the view table field.
30
2904
by: bblais | last post by:
Hello, Let me start by saying that I am coming from a background using Matlab (or Octave), and C++. I am going to outline the basic nuts-and-bolts of how I work in these languages, and ask for some help to find out how the same thing is done in Python. I am not sure what the standard is. In C++, I open up an editor in one window, a Unix shell in another. I write the code in the editor, then switch to the shell window for compile...
1
3128
by: Tyno Gendo | last post by:
Hi everyone I need to move on a step in my PHP... I know what classes are, both in PHP4 and 5 and I'm aware of "patterns" existing, but what I'm looking for are some real world projects eg. Open Source that people consider to use classes and patterns correctly. I lack a senior person to lead me in this so I feel I'm losing out on only using bare PHP class features and not really knowing how to design
71
3309
by: Jack | last post by:
I understand that the standard Python distribution is considered the C-Python. Howerver, the current C-Python is really a combination of C and Python implementation. There are about 2000 Python files included in the Windows version of Python distribution. I'm not sure how much of the C-Python is implemented in C but I think the more modules implemented in C, the better performance and lower memory footprint it will get. I wonder if it's...
0
8697
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9184
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9045
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8930
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
7761
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6538
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5878
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4381
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
3
2013
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.