Solved

knowing if BDE is installed

Posted on 2002-03-31
7
229 Views
Last Modified: 2010-04-04
How will i know if the BDE is Installed in the system
coz if i run my program using other computer
it will say "Error initializing BDE..."
0
Comment
Question by:girlswants_me
  • 3
  • 3
7 Comments
 

Author Comment

by:girlswants_me
Comment Utility
help me please
0
 
LVL 1

Expert Comment

by:Alone
Comment Utility
Check HKLM\Software\Borland\Database Engine\DLLPath key. When it does not exists BDE is not installed.
If you want to check for specific BDE drivers installation, use path from that key and check existing of correspoding files. See bdedeploy.txt for details.

Regards...
0
 

Author Comment

by:girlswants_me
Comment Utility
i dont understand what you mean
can you give me a sample code for it?
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 9

Expert Comment

by:ginsonic
Comment Utility
RootKey := HKEY_LOCAL_MACHINE;
 OpenKey('SOFTWARE\Borland\Database Engine', False);
 try
   s := ReadString('CONFIGFILE01');
   //BDE installed
 finally
   CloseKey;
 end;
0
 
LVL 9

Accepted Solution

by:
ginsonic earned 50 total points
Comment Utility
Or better:

Add to uses BDE;
 
function BDEInstalled : boolean;
begin
 result := (dbiInit(nil) = 0)
end;

procedure TForm1.Button1Click(Sender: TObject);
begin
 if  BDEInstalled then
   ShowMessage('BDE is installed.')
 else
   ShowMessage('BDE is not installed.')
end;
0
 

Author Comment

by:girlswants_me
Comment Utility
Thank you for the Excellent Code.

0
 
LVL 9

Expert Comment

by:ginsonic
Comment Utility
Anytime :)
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now