?
Solved

Hidden Icons

Posted on 1997-03-05
2
Medium Priority
?
151 Views
Last Modified: 2013-12-16
Thank you for your previous Help! Well this time I would like to know where I can view the different icons that are apparently on my computer that are to my knowledge "hidden".
In a computer magazine it states that if we change for example the default icon key (for My Computer) to C:\windows\system\pifmgr.dll,30 this now shows a life raft icon or using the same string different digets(for the Recycle Bin) C:\windows\system\pifmgr.dll,37 this will show sticks of dynamite. ?How does one find all the different types of icons available, to view visibly as icons, with out knowledge of the above strings. Thank you.
Regards Ian Kendall
0
Comment
Question by:ik030197
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 14

Accepted Solution

by:
smeebud earned 210 total points
ID: 1744586
ik
  Right click on any shortcut, then choose properties, then click the "Shortcut" tab. You will see a button that says
"Change Icon". Choose Browse and look at "Shell32.dll" or "Pifmgr.dll" or in windows "moricons.dll". There is an easier way by finding a icon viewer utility(there's dozens of them) that will open up a dll icon file. The best In my opinion is "Microangelo".

If you need further help,
bwil@erinet.com
0
 
LVL 14

Expert Comment

by:smeebud
ID: 1744587
Oh, by the way, go to icon heaven. viewer/converter/eritor, you want it they got it. At:
http://pen.net/__c__/files/wb027.htm 

This way you don't have to layout a ton of $$$$$ for "Microangelo"
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article summaries thoughts and ideas from two years of sustained use. It provides good reasoning to make the jump to Windows 10.
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question