|
by: Pat Blair |
last post by:
Sorry to anyone who read this post, but in case it's useful to anyone:
Further experiments reveal that while a tuple comes back if you read a
multi-line string, you set the value using a list (not a tuple). That's
sensible and I don't know why this didn't occur to me before I posted.
Thanks
-----Original Message-----
From: Pat Blair
|
by: DJP |
last post by:
Hi there
I need to be able to programmatically set permissions on registry keys using
VB / VBScript / VBA. So far I have had a look at doing this using the
WScript.Shell object, API calls, and WMI but the only one of these that goes
any where near registry permissions is WMI and that is only to get the
permissions of a key (cannot set). I...
|
by: Gustaf |
last post by:
My Windows app is dependant on some registry keys settings. In case the
subkey for the app doesn't exists, I want to show a messagebox, and then
quit the whole program (without showing the main form). How do you
accomplish this?
The program starts with:
static void Main()
{
|
by: jphelan |
last post by:
I was testing the install and uninstall, on my WindowsXP Pro SP2
machine, of software that I created, called, "inbusiness". Because of
the following error message that I received on attempting to uninstall
the program through, "Add/Remove", I assume that I will have to find
some other way to remove it.
"An installation package for the...
|
by: TheSilverHammer |
last post by:
I am trying to figure out how to enumerate through registry keys and values
using WMI and C#.
Please, NO VB or VB.SCRIPTS. I have found plenty of examples of how to do
this in VB and VBS. I would like see how to do this under C#.
I need to write an application that looks at processes, files, scan the
registry of a remote computer. I...
|
|
by: Sin Jeong-hun |
last post by:
I need to read some registry keys of a remote computer. The key will
be any key users provide. (For example : HKEY_CURRENT_USER\SOFTWARE
\MyGame) I found that there was a handy method called
RegistryKey.OpenRemoteBaseKey(); I tried
But everytime I execute it, an UnauthorizedAccessException occurred at
the OpenRemoteBaseKey method. Both...
|
by: John |
last post by:
Hi
How does one set registry keys in a set-up project? Would these keys come
off on uninstall?
Thanks
Regards
|
by: kalichakradhar |
last post by:
hi
I am new to VB 6.0 . I want to add new registry keys in teh system registry under HKEY_LOCAL_MACHINE and add key value to teh respective key. how can i access the system registry using VB 6.0? Also please give me the commands to add/delete the key values in the registry
thanks
with regards
kalichakradhar
|
by: Gary |
last post by:
I'm having trouble entering Additional Registry Keys into my Package
Solution that will deploy the Access 2007 runtime. (Client machine is
running XP with Office 2007 Standard.)
The Package Solution Wizard, on about page 3, has a section for
entering Additional Registry Keys. I want to include a locations key
that will identify my install...
|
by: diego72 |
last post by:
Hi!, I'm trying to delete some registry keys and subkeys with a vbs script, deploying it through gpo starup script. The Os is Windows 2003 Enterprise Server R2 and the clients are Windows Xp.
The problem is that, although I run the script perfectly in local double-clicking it, when the script is deployed via gpo, registry keys remain undeleted....
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
|
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it. ...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert...
|
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in...
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...
|