?
Solved

About THTTP component

Posted on 1998-11-26
3
Medium Priority
?
458 Views
Last Modified: 2008-03-10
Hi,
I tried to make a program that use THTTP component in Delphi 3. When I ran it in my computer, it's ok. But when I ran it in a computer that has no Delphi in it, it's not working. The error was 'class not registerred'. What should I do to make my program to be able to work in any computer that has no Delphi?
0
Comment
Question by:anton_as
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 1

Accepted Solution

by:
jecksom earned 400 total points
ID: 1347942
hi anton_as!

Did you already registered winsck.ocx ?

c:\windows\system\regsvr32.exe c:\windows\system\winsck.ocx
 

jecksom
0
 
LVL 1

Expert Comment

by:jecksom
ID: 1347943
PS: btw , Install Shield could do this registration for you.

0
 

Author Comment

by:anton_as
ID: 1347944
It works. Thank you so much.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A lot of questions regard threads in Delphi.   One of the more specific questions is how to show progress of the thread.   Updating a progressbar from inside a thread is a mistake. A solution to this would be to send a synchronized message to the…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month14 days, 7 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question