Solved

Delphi 2 components in Delphi 4

Posted on 1998-11-14
3
387 Views
Last Modified: 2010-04-04
I am thinking of upgrading from Delphi 2 to Delphi 4, and I want to know how I can use all my old Delphi 2 components (in .PAS form) in Delphi 4. I heard that you have to load them in a new format. Is it possible to install a component from a .PAS or .DCU file, just like in Delphi 2?
0
Comment
Question by:mmarvi
3 Comments
 
LVL 4

Expert Comment

by:dwwang
ID: 1346808
I think you can install the .PAS file with no problem, but not the .DCU file.
0
 
LVL 5

Expert Comment

by:scrapdog
ID: 1346809
.PAS is nothing more than a text file.
0
 
LVL 1

Accepted Solution

by:
xpher earned 10 total points
ID: 1346810
I have done this myself. If you have the source(pas) then you will need to install as new component and D4 then recompiles the
the file and updates your dclusr40.dpk.

Be brave it works 9 times out of ten.

Good luck
Chris :)
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you how to use the Windows Speech API in Delphi. I will only cover basic functions such as text to speech and controlling the speed of the speech. SAPI Installation First you need to install the SAPI type library, th…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question