473,748 Members | 2,496 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Install a program while installing the "real" program

6 New Member
Hi,
I've got a problem! Or two actually at this moment...

I want to:


- When I'm installing my program (coded in C#, installed on computer by windows installer), we can call it for "Program A", I want another program (a .exe file), "Program B", to install simultaneously without users knowledge.


If I put "Registers" value to "csdrfCOMSelfRe g" for the .exe file in "Properties " I will get the possibility to click through an installer guide for Program B while my program A is installing.
And I want Program B to install, but without the guide because I don't want user to know about it and that the user doesn't need to do anything for it.

- Later when user uninstall "Program A", I would like "program B" to uninstall too, without effort by user of course...

Is this possible to do through the cmd? I really have no idea what to do... I've tried to google, but haven't find any solution. Maybe someone out there can put me on the right track? I think that "-k" could help me, but I don't know how, yet...
Oct 7 '08 #1
10 1771
Plater
7,872 Recognized Expert Expert
I think you can do that in an installer package project. Dependancies or something. I've never done it though
Oct 7 '08 #2
pstve
6 New Member
I think you can do that in an installer package project. Dependancies or something. I've never done it though

I thougt that too! But I haven't found anything there that could have helped me. I'll get the "Program B" to install when installing "Program A" there, but then user has to go through the installation guide. I want the "Program B" to install by itself...

Thanks for your answear anyway!!
Oct 8 '08 #3
pstve
6 New Member
OK! I've found half the solution.

In "Custom actions" it is just to "Add Custom Action" under "Installati on", and in properties window insert /S to Arguments. And TADAA! Program B is installed without user will notice.

Then it is just the second problem left, how to uninstall automaticly...
Oct 8 '08 #4
tlhintoq
3,525 Recognized Expert Specialist
I think you can do that in an installer package project. Dependancies or something. I've never done it though
This sounds a lot like giving advice on how to install a virus, trojan or tracker. Which I thought we didn't do here. I've seen a lot of 'scoldings' for even asking how to log keystrokes and the like. But its okay to hide the installation of an entire program from the user? They think they are installing a.exe and they are also getting b.exe without their knowledge so it can do.. what? report all their credit card details and use their email to spread?
Oct 8 '08 #5
Plater
7,872 Recognized Expert Expert
I thought that too. But the OP said they wanted it to be removed when A gets uninstalled too. So it *could* be legitamate.
Oct 8 '08 #6
myusernotyours
188 New Member
Maybe the OP should tell us why he wants to install secretly... It may be interesting to know. But we can be sure the user din't request it.

Regards,

Alex.
Oct 8 '08 #7
Frinavale
9,735 Recognized Expert Moderator Expert
I thought that too. But the OP said they wanted it to be removed when A gets uninstalled too. So it *could* be legitamate.
That's why I didn't remove this post when I first read it.
Oct 8 '08 #8
pstve
6 New Member
This sounds a lot like giving advice on how to install a virus, trojan or tracker. Which I thought we didn't do here. I've seen a lot of 'scoldings' for even asking how to log keystrokes and the like. But its okay to hide the installation of an entire program from the user? They think they are installing a.exe and they are also getting b.exe without their knowledge so it can do.. what? report all their credit card details and use their email to spread?

NO NO NO NO NO!! THIS IS NOT ABOUT ANY VIRUS!!!! And I can promise this is absolutely legal!!!!
Oct 20 '08 #9
pstve
6 New Member
Maybe the OP should tell us why he wants to install secretly... It may be interesting to know. But we can be sure the user din't request it.

Regards,

Alex.
What do you mean with "sure the user didn't request it"?
I've got my program A (which NOT handling any type of virus, it takes care of signals), and a feature in A, is that user can use program B (which is comlepetly legal, both for me to use and for the user to use and in all ways you can think about) for analyzing these signals. But so the user doesn't have to think so much by him/herself, it will install automaticly, and also uninstall when A is uninstalled. So - NO VIRUS OR UNLEGAL THINGS HERE!!!
Oct 20 '08 #10

Sign in to post your reply or Sign up for a free account.

Similar topics

4
3133
by: Silas | last post by:
Hi, I use view to join difference table together for some function. However, when the "real" table fields changed (e.g. add/delete/change field). The view table still use the "old fields". Therefore everytimes when I change the real table, I also needed open the view table and save it by SQL enterprise manager manually for update the view table field.
30
2913
by: bblais | last post by:
Hello, Let me start by saying that I am coming from a background using Matlab (or Octave), and C++. I am going to outline the basic nuts-and-bolts of how I work in these languages, and ask for some help to find out how the same thing is done in Python. I am not sure what the standard is. In C++, I open up an editor in one window, a Unix shell in another. I write the code in the editor, then switch to the shell window for compile...
1
3131
by: Tyno Gendo | last post by:
Hi everyone I need to move on a step in my PHP... I know what classes are, both in PHP4 and 5 and I'm aware of "patterns" existing, but what I'm looking for are some real world projects eg. Open Source that people consider to use classes and patterns correctly. I lack a senior person to lead me in this so I feel I'm losing out on only using bare PHP class features and not really knowing how to design
71
3342
by: Jack | last post by:
I understand that the standard Python distribution is considered the C-Python. Howerver, the current C-Python is really a combination of C and Python implementation. There are about 2000 Python files included in the Windows version of Python distribution. I'm not sure how much of the C-Python is implemented in C but I think the more modules implemented in C, the better performance and lower memory footprint it will get. I wonder if it's...
0
8994
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9555
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
9329
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9250
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8247
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6796
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4878
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
3315
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
2787
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.