Solved

need a example of  system hook {-- if  anyone press the enter key , then the program send a message to another program

Posted on 2002-03-07
8
135 Views
Last Modified: 2010-05-18
can you give me souce code ?

when the client program run , if the 'enter key' be pressed down , the client program send a message
to
the server program in another pc .

thank you in advance . very thank you
0
Comment
Question by:escaper
  • 5
  • 3
8 Comments
 

Author Comment

by:escaper
ID: 6849069
push
0
 

Author Comment

by:escaper
ID: 6849549
push
0
 
LVL 9

Accepted Solution

by:
ginsonic earned 50 total points
ID: 6849711
Here is a good article about keyboard hooks :
http://www.delphi3000.com/articles/article_883.asp
0
 

Author Comment

by:escaper
ID: 6850183
push
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:escaper
ID: 6850227
push
0
 
LVL 9

Expert Comment

by:ginsonic
ID: 6850480
What mean that?
0
 

Author Comment

by:escaper
ID: 6850756
oh, sorry.

when my client program run in back-end, if 'enter' key be pressed,
the program will send a message to my server program which
in an another pc
0
 
LVL 9

Expert Comment

by:ginsonic
ID: 6850809
The tip show you how can make a hook for keyboard .
The hook will detect when the user press a key ( in your case choise action just for enter key ) and send ( I don't know how you communicate between client and server ) then the message .

I think you know how to send the message . If not I can send you a project to see how can send messages between server and client ( is a chat project ) .
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
QRReport  TQrmemo vertical stretching 1 42
Multiple image collision 13 69
creating threads in delphi 1 82
Performance of SQL statement 37 97
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now