Solved

call my provider

Posted on 1997-06-10
1
194 Views
Last Modified: 2010-04-06
I'd like to call my internet-provider without using a dialup-connection. My program has to make a connection in the background, so I don't want that dialup-form on my screen. How can I do that ?
0
Comment
Question by:duri
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
chrb earned 200 total points
ID: 1336915
Hi!

You must use RAS, since I can find the authors homepage I have uploaded it to mine:
http://home.sol.no/lboehn/ras.zip
This should be a complete example with source :)
I just uploaded another file to :
http://home.sol.no/lboehn/rasapi.zip :)

Hope it works !
If you is wondering on somethins just ask. (Sorry my bad english)

Chr
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
In this tutorial I will show you how to use the Windows Speech API in Delphi. I will only cover basic functions such as text to speech and controlling the speed of the speech. SAPI Installation First you need to install the SAPI type library, th…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 7 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question