Solved

QUESTION FOR JIMBOB

Posted on 1998-02-04
6
183 Views
Last Modified: 2010-04-04
Hi there.

I was having a look through past questions a found one which you had answered about bitmaps in menus (like the Start Button).  In the answer you gave two responses.  The first was an url (http://ns.mygale.org/~jlucm/) which I cant seem to get working, and the second you offered to email some source which explained how to do this.

I was wondering if you could email me that source?  And also, do you know what file you where talking about before as I would like to get that if possible.  My email address is stuartj@futureschool.com.au

Many thanks,

Stuart.
0
Comment
Question by:Stuart_Johnson
6 Comments
 
LVL 5

Expert Comment

by:JimBob091197
ID: 1358289
Hi Stuart,

The URL you refer to was posted by ZifNab.  I couldn't get onto that page either...

I have mailed you the sample app with source that I wrote for aluiken for owner-drawing menus.  I trust it is what you are looking for.

Cheers,
JB
0
 
LVL 1

Expert Comment

by:SJohnson
ID: 1358290
Thanks for that.  Are you going to post this as a question so you can get your points???

Stu
0
 
LVL 6

Author Comment

by:Stuart_Johnson
ID: 1358291
Umm.  Yeah.  As you can see, I have two accounts - work and home.  The points are there if you want them, JimBob.

Stu
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 5

Accepted Solution

by:
JimBob091197 earned 100 total points
ID: 1358292
Hi

If the code was what you were looking for, then you can grade this answer.

Cheers,
JB
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1358293
Sorry to give a comment here, that URL I gave you is dead, pitty it was a good site.
0
 
LVL 6

Author Comment

by:Stuart_Johnson
ID: 1358294
That worked brilliantly!!  Thanks heaps.

To ZifNab - you wouldnt know of alternative URL would you?

Stu
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

This article explains how to create forms/units independent of other forms/units object names in a delphi project. Have you ever created a form for user input in a Delphi project and then had the need to have that same form in a other Delphi proj…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now