Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

[how] make the shellCopyHook exemple work ?

Posted on 1997-10-18
4
Medium Priority
?
238 Views
Last Modified: 2010-04-04
hi,
I've not been able to make the shellCopyHook example work,
can someone help me ?
By the way, is it possible to make a copyHook on files too ?
As far as I know it is only possible on directory ?
This is what VC++5 doc says ...
If it is possible, how can I do ? Can someone give me an example ?
Thanks in advance

      Jeurk.
0
Comment
Question by:jeurk
  • 2
  • 2
4 Comments
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1348023
Hi Jeurk

I noticed a few things with the Shell CopyHook sample.  (Some of these may seem obvious, but it helps to check everything.)
1)  You need to reboot your system before it will work.
2)  You have to edit the CopyHook.reg file before you merge it with the registy, so that it points to your DLL path.  (Do this before you reboot.)  Change the line after:
[HKEY_CLASSES_ROOT\CLSID\{8e3e0f0a-0fcc-11ce-bcb0-b3fd0e253819}\InProcServer32]
from:
    @= "copyhook.dll"
to:
    @= "C:\\MyPath\\MySubPath\\copyhook.dll"
This assumes your DLL is in C:\MyPath\MySubPath.
NOTE: You must use double backslashes in this line for the path separators!!

Then merge this file with the registry.

Regarding your question on files:  As far as I know the Copy Hook can only be applied to shell folders and printer objects, but NOT to files.  

JB
0
 
LVL 4

Author Comment

by:jeurk
ID: 1348024
ok, this will do the thing I suppose.

How can I give you some points for your help?

regards.
0
 
LVL 5

Accepted Solution

by:
JimBob091197 earned 330 total points
ID: 1348025
You can grade this answer.
JB
0
 
LVL 4

Author Comment

by:jeurk
ID: 1348026
Thanks for the answer.
By the way I have a new question but i'll have to wait to get
some more points to spend ;)

      Jeurk.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
Whether it be Exchange Server Crash Issues, Dirty Shutdown Errors or Failed to mount error, Stellar Phoenix Mailbox Exchange Recovery has always got your back. With the help of its easy to understand user interface and 3 simple steps recovery proced…
Suggested Courses
Course of the Month10 days, 4 hours left to enroll

569 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question