Solved

start defrag from my prog

Posted on 2001-09-15
7
138 Views
Last Modified: 2010-05-02
hi, i need to start defrag from my app and then when it finishes for my app to continue processing.\
I think waitforsingleobject is needed but i don';t know much about it.
any help would be appreciated
0
Comment
Question by:moonlightcyber
  • 5
7 Comments
 

Author Comment

by:moonlightcyber
ID: 6484457
ooops..forgot to mention..that this has to work on both win95 and win2k, i think win2k handles defrag diferently.
0
 

Author Comment

by:moonlightcyber
ID: 6484459
oops, win2k disk efragmenter can't take command lines..so how the hell do i get it running from my app?
0
 
LVL 75

Expert Comment

by:Anthony Perkins
ID: 6485286
Please take care of your open questions.  For the record:

Questions Asked 24
Last 10 Grades Given A A A A A A A A A A  
Question Grading Record 16 Answers Graded / 17 Answers Received

Anthony
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:moonlightcyber
ID: 6485361
will do
0
 
LVL 49

Accepted Solution

by:
Ryan Chong earned 100 total points
ID: 6493257
Hi moonlightcyber,

Some useful links here:

Determining the End of a New Process Using WaitForSingleObject

http://www.mvps.org/vbnet/faq/main/waitforsingleobject.htm

Determining the End of a Shelled Application Using GetExitCodeProcess

http://www.mvps.org/vbnet/faq/main/getexitcprocess.htm

'Hope will help.
0
 

Author Comment

by:moonlightcyber
ID: 6494407
thnaks for the info on the process waiting bit but i need defrag to run.. and  don't think his is possible
0
 

Author Comment

by:moonlightcyber
ID: 6511968
although defrag was the main reason for the Q, the info you gave is useful.
therfore i award you the points
thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I’ve seen a number of people looking for examples of how to access web services from VB6.  I’ve been using a test harness I built in VB6 (using many resources I found online) that I use for small projects to work out how to communicate with web serv…
If you have ever used Microsoft Word then you know that it has a good spell checker and it may have occurred to you that the ability to check spelling might be a nice piece of functionality to add to certain applications of yours. Well the code that…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now