Posted on 1998-07-09
Last Modified: 2012-08-14
How would one go about to make a application a tsr? I am working on a small app that monitors activity on a pc and it would be ideal to have the program hidden.  Any help would be fantastic.
Thank you in advance,
Question by:rob2000
  • 2

Accepted Solution

clifABB earned 50 total points
Comment Utility
You can hide an application by simply creating it without a form or hiding a form (Form1.Visible = False).

A better idea (and more in line with Windows standards) is to put an icon in the Tray (where the clock is). To do this, you can use an OCX such as SysTray32.ocx available at:,4,0-37597,501000.html


Expert Comment

Comment Utility
As for clifABB's suggestion about the ocx, there is no need for an ocx. Goto the address below and use the code given.

Expert Comment

Comment Utility
Too much code to maintain.  Especially when the OCX is free.

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

There are many ways to remove duplicate entries in an SQL or Access database. Most make you temporarily insert an ID field, make a temp table and copy data back and forth, and/or are slow. Here is an easy way in VB6 using ADO to remove duplicate row…
If you have ever used Microsoft Word then you know that it has a good spell checker and it may have occurred to you that the ability to check spelling might be a nice piece of functionality to add to certain applications of yours. Well the code that…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now