Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

wrapping all resistry access

Posted on 1998-10-05
1
Medium Priority
?
134 Views
Last Modified: 2010-04-06
I have been commitioned to write an application the logs registry access.  My question is, where do I start?  does anyone have any example code of how to wrap all registry access?  What is the diference between 95 and NT in this context?  I've seen an app called regmon... Ideally I would like the source.. Delphi is best but I'll take C, or any other language examples for that matter...
0
Comment
Question by:KirkGray
1 Comment
 
LVL 20

Accepted Solution

by:
Madshi earned 600 total points
ID: 1341912
Kirk,

that can't be done with normal Delphi or C++ code (AFAIK).

Please look at "www.sysinternals.com". There you'll find exactly what you need - two little drivers, one for Win95 and one for WinNT. With full source code!!!
I don't know. Perhaps you can use them as they are. Ask the sysinternals team about that. To rebuild these drivers you'll need a C(++) compiler (Microsoft or Borland) and both Vireo's driver kits for Win95 and WinNT.

Regards, Madshi.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question