Solved

How to implement the "Mouseover" function in a Dialog base software?

Posted on 2002-04-08
6
271 Views
Last Modified: 2013-11-20
i need to implement the "mouseover" function in my dialog base software (i.e a small rectangle box will popup and display a short message when you leave the mouse cursor over a button/textbox/whatever)

I wonder if there is any easy way to do that? i've tried search the MSDN document but was confused and can't get it work... so anyone can show me how to do that??
0
Comment
Question by:rw8
  • 3
  • 2
6 Comments
 
LVL 2

Expert Comment

by:kamarey
ID: 6929333
What problem with WM_MOUSEOVER?
0
 

Author Comment

by:rw8
ID: 6929652
WM_MOUSEOVER? i can't find this from MSDN?
i can only find WM_MOUSEMOVE,WM_MOUSEWHEEL....etc
0
 
LVL 1

Expert Comment

by:Pavlik
ID: 6934766
probably kamarey meant WM_MOUSEHOVER
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:rw8
ID: 6935391
ok yes that seems like something i needed but how can i actually  implement the mouseover funciton? i.e. pops up a small rectangle that displays some short notes/descriptions...?
is there any example somewhere that i can look at??
0
 
LVL 1

Accepted Solution

by:
Pavlik earned 100 total points
ID: 6935457
I'm not familiar with it at all. But try to use ToolTip control associated with rectangular area of the window. And read about TTF_SUBCLASS flag. It will help you to have tooltips for free (i mean without processing mouse events).
Search for "ToolTip controls" in MSDN. They have couple of interesting examples in the "Using ToolTip Controls" section.

Best regards,
Pavlik.
0
 

Author Comment

by:rw8
ID: 6940761
Excellent! Thanks!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Host to IP 7 77
Separate into files by filename 12 76
has77  challenge 9 73
changeXy challenge 13 67
If you use Adobe Reader X it is possible you can't open OLE PDF documents in the standard. The reason is the 'save box mode' in adobe reader X. Many people think the protected Mode of adobe reader x is only to stop the write access. But this fe…
Have you tried to learn about Unicode, UTF-8, and multibyte text encoding and all the articles are just too "academic" or too technical? This article aims to make the whole topic easy for just about anyone to understand.
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now