Solved

How to connect ext. prog. to WinExplorer?

Posted on 1998-06-17
3
137 Views
Last Modified: 2010-04-04
Hi,
Anybody knows how to connect the external program to the WindowsExplorer in the main menu or the popup menu.
0
Comment
Question by:DValery
3 Comments
 
LVL 3

Accepted Solution

by:
rickpet earned 100 total points
ID: 1353632
Your looking for the Item Context Menu in the Shell.

check out this demo on your delphi cd...

C:\Program Files\Borland\Delphi 3\Demos\SHELLEXT

Rick
0
 
LVL 3

Expert Comment

by:vladika
ID: 1353633
See in '...\Delphi 3\Demos\SHELLEXT\contmenu.dpr'
ContMenu is shell extension which add 'Compile...' to
context menu for DPR files.

0
 
LVL 1

Author Comment

by:DValery
ID: 1353634
Thanks!
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you how to use the Windows Speech API in Delphi. I will only cover basic functions such as text to speech and controlling the speed of the speech. SAPI Installation First you need to install the SAPI type library, th…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question