WebBrowser documentaation and example source

Posted on 2000-04-06
Last Modified: 2010-04-04
I'm writing my own Web browser with full IE capabilities. I don't want use the IE, only the WebBrowser component. Need advices and answers on the following questions:

1. What is the difference between TWebBrowser in Delphi 5 and IE WebBrowser (V and V1) ActiveX components?
2. How to use the IE WebBrowser component without distributing it (it's present on alnost every client computer)?
3. Do u know any location where to find the full documentation for IE WebBrowser component with(out) source code examples in off-line (not the MS on-line ones)?

I'm ready to increase the points for full advices.
Question by:hhamster
LVL 15

Accepted Solution

simonet earned 25 total points
ID: 2691966
Here's some grat stuff to get you started:


Expert Comment

ID: 2692779
1-not much difference, the latest import some function only found in ie5.X
2-what do you mean ?, anyway you always need internet explorer to be installed.
3-simonet is right, go there. They component import much more function then webbrowser, even if they work on the same controls. They do much more work for you. Use those, but it's a work in progress...

Author Comment

ID: 2693584
Adjusted points from 20 to 25
Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

LVL 17

Expert Comment

ID: 2693892
>>I don't want use the IE, only the WebBrowser component

mmm..that could be quite difficult ;o)

well simonet has  certainly gave best link but also see:

and maybe

Author Comment

ID: 2697922
It look interesting and enough saying about all my wonderings.

Author Comment

ID: 2697936
I'm wondering why only 2 points. I was offering 25.
If I have done something wrong, simonet, i'll refound it. Just tell me. The documentation about this site is too short, i dont understand all the possibilities yet.
Btw, where can i read everithing about the points system?
LVL 15

Expert Comment

ID: 2698183
Everything is right, fellow, thanks!

This is how it works:

When you grade a question, the expert who answered it gets the amount of points of the question times the grade you gave (A=4; B=3; C=2).

Then, if anyone else (who didn't take part on the thread) wants to read the contents of the thread, that user has to "pay" 10% of the original amount of points of the question. EE always rounds the 10% to the nearest lower whole number.

So, your question was worth 25pts and is now graded (in the PAQ). 10% of 25 round to the lower nearest whole number is 2. Therefore, if anyone other than those who took part in this thread wants to read it, he/she will have to pay 2 points.

I looked at EE for some place where this was explained, but sadly I didn't find anything. The closest thing I found was:




Author Comment

ID: 2701603
thanks u2

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question