Solved

custom components

Posted on 1998-10-02
3
142 Views
Last Modified: 2010-04-06
if i include a custom winsock component (ics wsock) in my project, does delphi put in the .exe or do i have include it in the install program?
0
Comment
Question by:t0m3k
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
BoRiS earned 50 total points
ID: 1341534
t0m3k

Delphi will complie the custom component in the exe file for you, the only thing you might need to include in the install program is if the component uses any ocx's or dll's these you will need to include...

the easy way to check if delphi will complie the unit in the exe is to check the uses clause

 uses
  Windows, forms..., wsock; //or what ever the unit is called

Later
BoRiS
0
 
LVL 10

Expert Comment

by:Jacco
ID: 1341535
That depends on the component.

Normally winsock resides in the 'wsock32.dll', if the component uses only that dll you do not have to distribute anything. (Just as with the standard winsock component).

If the custom component uses other DLL you should distribute them as well.

If you use Delphi3 or 4 there are some other isues of which I am not sure. I believe the bpl's (D4) can be included or excluded from the exe. You should be able to check that in project6/options.

Regards Jacco
0
 
LVL 4

Expert Comment

by:BoRiS
ID: 1341536
t0m3k

Jacco is quite right...The delphi 4 option is also correct, as far as I know.
The wsock32.dll is installed on all machines that use the internet or tcp ip.

also check the readme file that normally comes with the components, it should tell you what you need to include with your app when distributing it (if anything is needed)

Later
BoRiS

0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Suggested Courses
Course of the Month3 days, 15 hours left to enroll

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question