Solved

Help me ..In SETUP configure database script

Posted on 2001-06-20
6
148 Views
Last Modified: 2010-05-02
Dear friends,
I have a set of my vb backoffice application.
i have included all dlls and rest and made the package.
Fine .but i want to automate the process of creating
database tables..DSN etc automatically as the same vb setup is run.After i make scripts of database how configure it with orginal setup.
regards
Martin
0
Comment
Question by:mpaul4u
  • 3
  • 3
6 Comments
 
LVL 49

Accepted Solution

by:
Ryan Chong earned 50 total points
ID: 6212960
Hi, run a program in setup process that create DSN entry:

To create DSN:

http://www.vbcode.com/asp/showsn.asp?theID=406

'Hope will help.
0
 
LVL 49

Expert Comment

by:Ryan Chong
ID: 6212975
0
 

Author Comment

by:mpaul4u
ID: 6212998
Hi ryancys,
But how to include this program into setup.
regards
Martin
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:mpaul4u
ID: 6213003
hi ryan,
What about program for creating tables in databse.
regards
Martin
0
 
LVL 49

Expert Comment

by:Ryan Chong
ID: 6213605
Hi Paul, sorry for late reply,

> How to include this program into setup?

I think it's possible add it bcos as many setup file allow the program itself run just after setup completed. Maybe you can try Install Shield or any other setup programs. I'm really lack experiences in this area. Sorry.

> What about program for creating tables in databse?

You can use many method to do that, include DAO, ADO technology. I don't got the source codes, but you can get it easily through internet. Here are some usefel vb website:

www.vbcode.com

http://www.mvps.org/vbnet/index.html

Cheers!

0
 

Author Comment

by:mpaul4u
ID: 6213749
Thanks Ryan
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Introduction I needed to skip over some file processing within a For...Next loop in some old production code and wished that VB (classic) had a statement that would drop down to the end of the current iteration, bypassing the statements that were c…
Introduction While answering a recent question about filtering a custom class collection, I realized that this could be accomplished with very little code by using the ScriptControl (SC) library.  This article will introduce you to the SC library a…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now