Solved

Using MaskBlt

Posted on 1997-07-19
1
1,318 Views
Last Modified: 2013-11-20
How can I use MaskBlt. I couldn't do it. (please give example of code).
0
Comment
Question by:emesh
1 Comment
 
LVL 7

Accepted Solution

by:
galkin earned 0 total points
ID: 1302682
As far as I know MaskBlt works only on Windows NT. If you need transparent blitting with mask you should use image list. Create image list with color to be transparent( pixels in your bitmap which have this color are not blitted) and then use one of drawing macros of image list( ImageList_Draw, ImageList_DrawEx).
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
VB.NET how to use the Vertical ScrollBar 5 103
Error on moodle after upgrade 3 130
Macro to save highlighted rows as a separate file 5 43
mapAB Challlenge 35 143
Introduction: Finishing the grid – keyboard support for arrow keys to manoeuvre, entering the numbers.  The PreTranslateMessage function is to be used to intercept and respond to keyboard events. Continuing from the fourth article about sudoku. …
Introduction: The undo support, implementing a stack. Continuing from the eigth article about sudoku.   We need a mechanism to keep track of the digits entered so as to implement an undo mechanism.  This should be a ‘Last In First Out’ collec…
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question