Solved

How to install and desinstall fonts

Posted on 2001-08-14
5
166 Views
Last Modified: 2013-12-02
I'm making an app that install some fonts and desinstall some fonts, how can I do this?
0
Comment
Question by:matrix717
5 Comments
 
LVL 19

Expert Comment

by:DreamMaster
ID: 6385717
As far as I know...all it takes is that you place them in the Windows/Fonts directory...at least for regular fonts that is.....

Max.
0
 
LVL 4

Accepted Solution

by:
PBuck earned 100 total points
ID: 6385749
Give this a try for the font installation - not sure if it also covers uninstalling of fonts:

http://www.planet-source-code.com/xq/ASP/txtCodeId.255/lngWId.1/qx/vb/scripts/ShowCode.htm

There is also: http://www.planet-source-code.com/xq/ASP/txtCodeId.23120/lngWId.1/qx/vb/scripts/ShowCode.htm

I think when you uninstall it mostly has to do with the registry settings (deletion of keys).  I could be wrong - but this code above should get you started in the right direction.

Hope this helps!@
0
 

Author Comment

by:matrix717
ID: 6386101
I need to install principally this type of fonts: .PFM, .TTF, .PFB ,.....
0
 
LVL 49

Expert Comment

by:DanRollins
ID: 7199955
Hi matrix717,
It appears that you have forgotten this question. I will ask Community Support to close it unless you finalize it within 7 days. I will ask a Community Support Moderator to:

    Accept PBuck's comment(s) as an answer.

matrix717, if you think your question was not answered at all or if you need help, just post a new comment here; Community Support will help you.  DO NOT accept this comment as an answer.

EXPERTS: If you disagree with that recommendation, please post an explanatory comment.
==========
DanRollins -- EE database cleanup volunteer
0
 
LVL 5

Expert Comment

by:Netminder
ID: 7213367
Per recommendation, force-accepted.

Netminder
CS Moderator
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I’ve seen a number of people looking for examples of how to access web services from VB6.  I’ve been using a test harness I built in VB6 (using many resources I found online) that I use for small projects to work out how to communicate with web serv…
When designing a form there are several BorderStyles to choose from, all of which can be classified as either 'Fixed' or 'Sizable' and I'd guess that 'Fixed Single' or one of the other fixed types is the most popular choice. I assume it's the most p…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now