Solved

for Philip

Posted on 1999-01-17
2
217 Views
Last Modified: 2010-04-06
You ask I gave.
:O)
0
Comment
Question by:bruintje
2 Comments
 
LVL 3

Accepted Solution

by:
philipleighs earned 20 total points
ID: 1362298
Thanks bruintje, sorry for the confusion :)
0
 
LVL 44

Author Comment

by:bruintje
ID: 1362299
Well........ doesn't matter.

You have them, all the questions of mathes about ini files led me to put my own routines into a proggie to manipulate ini files at a project I'm working on with some 8 different servers all with their own ini files it comes in handy to manipulate them in one place.

Good luck!
:O)
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Intraweb submit form as a POST request 4 303
Path  to current project in Delphi. 2 79
Making delphi communicate with a c# service 16 103
Dynamically Created Query 3 55
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question