Solved

Hot key

Posted on 1998-02-02
17
245 Views
Last Modified: 2010-04-04
Does anyone have either Delphi code, Pascal code or just a working utility in any code that will produce a "Boss Button". There is a TSR running and no matter what application you are running you can press a hot key when the boss arrives and get a screen that has been captured as a .BMP file and looks like legitimate work.
0
Comment
Question by:frog
  • 8
  • 4
  • 4
  • +1
17 Comments
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1358097
Hehe... I wrote an app written for that very purpose.  I can mail it to you (with source) if you want.

JB
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1358098
Groovie! Can you send it to me too?
0
 
LVL 4

Expert Comment

by:itamar
ID: 1358099
Hi Jim
I also have interest on it.
0
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1358100
I need e-mail addresses...  (ZifNab: I think I have yours, but give it again anyway.)
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1358101
Ok JimBob, thanks already! Tom.Deprez@uz.kuleuven.ac.be
0
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1358102
ZifNab: I have sent it to you...
JB
0
 

Author Comment

by:frog
ID: 1358103
Thanks JB, if I increase the points to 200 can you also tell me where I can get the command set to directly drive an IDE HDD? I mean the hex codes to do things like seek a particular track, read, write, etc. I want to be able to sequentially write sector by sector, track by track with only a track to adjacent track seek. The aim is to get data onto the drive as fast as possible via a dedicated microprocessor. (nothing on the drive to start with). Just a URL to a site will do.



0
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1358104
Howdy

Sorry, I don't know much about raw I/O to a HDD.

But if you want me to send the other app to you, I'll need your e-mail address...

JB
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:frog
ID: 1358105
OK JB, I can do without the codes.

>But if you want me to send the other app to you, I'll need your e-mail address...    olson@senet.com.au  
How do I get this question to 'lock' so you get your points? That should be worth the extras you could have got from the drive codes!

0
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1358106
frog:  I have mailed the app to you.  If it meets your needs, add a comment and I will answer (lock) the question for you to grade.
0
 

Author Comment

by:frog
ID: 1358107
Thanks JimBob. A perfect example of what I wanted. Contains source code and a working example.
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1358108
Strange, haven't received it yet.
0
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1358109
ZifNab: If you still haven't received it when you read this, I will send it again.

Itamar: What about you?  You expressed interest, but I need your e-mail address...
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1358110
JimBob, I received it, thanks a lot!
0
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1358111
Ok.
0
 
LVL 5

Accepted Solution

by:
JimBob091197 earned 200 total points
ID: 1358112
I have sent frog the app which uses SetWindowsHookEx...
0
 

Author Comment

by:frog
ID: 1358113
Thanks JimBob. A perfect example of what I wanted. Contains source code and a working example.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article explains how to create forms/units independent of other forms/units object names in a delphi project. Have you ever created a form for user input in a Delphi project and then had the need to have that same form in a other Delphi proj…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…
This is a video that shows how the OnPage alerts system integrates into ConnectWise, how a trigger is set, how a page is sent via the trigger, and how the SENT, DELIVERED, READ & REPLIED receipts get entered into the internal tab of the ConnectWise …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now