Solved

Hotkey without hooks

Posted on 2001-06-04
2
276 Views
Last Modified: 2013-11-20
I wrote an application which I want to activate by pressing a hotkey (F12). Currently, the only solution I found is to use keyboard hooks so I need to use external DLL file for it and I also need to set and remove them. Is there any way to set a hotkey for an application without hooks ? I need it to be "memory resident" and to become active upon pressing the hotkey.

Regards,
     Gilad
0
Comment
Question by:gilad_no
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 32

Accepted Solution

by:
jhance earned 50 total points
ID: 6153595
Why don't you use the RegisterHotKey() Windows API function?  As long as your application is running it can call RegisterHotKey() and from then on receive notification that the key was pressed.
0
 

Author Comment

by:gilad_no
ID: 6155523
Thanks, it works :)
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I'll describe -- and show pictures of -- some of the significant additions that have been made available to programmers in the MFC Feature Pack for Visual C++ 2008.  These same feature are in the MFC libraries that come with Visual …
Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question