Solved

Changing a DFM without form

Posted on 1998-09-28
1
279 Views
Last Modified: 2010-04-06
How can I change .dfm file without using a form? Thx..
0
Comment
Question by:fatih
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
itamar earned 100 total points
ID: 1341062
Hi fatih,

this component does the job:
"...FormRead is a D3 Form Reader which allows you to edit a DFM file
   as text and save it too. (ver. 1.0, added 12/7/97, no src., Price : FREE. Source : Email
   dshenoy@icodeindia.soft.net Conditions : None. Just don't sue me.)  by Deepak    Shenoy..."
http://sunsite.icm.edu.pl/delphi/ftp/d30free/formread.zip

IHTH,
Itamar
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month5 days, 23 hours left to enroll

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question