Solved

Jsweby's points.

Posted on 2001-07-11
4
183 Views
Last Modified: 2010-04-06
Here you go mate.
0
Comment
Question by:MoonCalf
  • 2
  • 2
4 Comments
 
LVL 4

Accepted Solution

by:
jsweby earned 50 total points
ID: 6273407
Cheers MoonCalf, sorry I couldn't be of more help.

J.
0
 
LVL 1

Author Comment

by:MoonCalf
ID: 6273439
It was more your code than epsylons that helped me.  Thanks a lot.

MoonCalf.
0
 
LVL 4

Expert Comment

by:jsweby
ID: 6273461
How did you go about checking for the existence of the data source?

J.
0
 
LVL 1

Author Comment

by:MoonCalf
ID: 6273487
I looked in the registry to see if there was a string value for the DSN description.

After that though, I decided to drop that bit and just create & destroy a DSN as and when required.  (Just used a name that will be unique so the user doesn't even know it was ever there!)
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Wininet read php file from internet issue 6 91
Delphi cmd execution 6 60
Delphi Yen format 3 33
Graphics32 under Delphi 10.1 Berlin 2 62
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Introduction I have seen many questions in this Delphi topic area where queries in threads are needed or suggested. I know bumped into a similar need. This article will address some of the concepts when dealing with a multithreaded delphi database…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question