Solved

Handling text input fields & buttons in IE using VB

Posted on 2002-04-20
7
124 Views
Last Modified: 2010-05-02
Hi

I want to handle multiple internet explorer forms within an application and dynamically 'drive' these SSL forms. For example (and this isn't the application) Load 5 instances of www.hotmail.com, populate the log-in and password fields and press the log-on button. Is there a way of doing this ?

The actual reason is to have a program spend all day loading and capturing information from a banks online broking pages.

Cheers

Stewart
0
Comment
Question by:nvms
  • 3
  • 2
  • 2
7 Comments
 
LVL 69

Expert Comment

by:Éric Moreau
Comment Utility
0
 
LVL 69

Expert Comment

by:Éric Moreau
Comment Utility
oops! i have pasted the url to the wrong question sorry.
0
 
LVL 16

Accepted Solution

by:
Richie_Simonetti earned 100 total points
Comment Utility
Take a look at www.angelfire.com/realm/vb-shared/index.html
where there are tips on how to do it for hotmail.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:nvms
Comment Utility
Thanks, this gave me the references to learn about automation, cheers !
0
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
Basically, to get things to work you need the names for test boxes that collects information about user and password, populate them and submit with the button. At link, there are tips to doing it programatically.
There is a simplest way also.
If you need more help, just ask.
0
 

Author Comment

by:nvms
Comment Utility
Thanks again....
0
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
You are welcome.
Thanks to you for "A" grade.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

You can of course define an array to hold data that is of a particular type like an array of Strings to hold customer names or an array of Doubles to hold customer sales, but what do you do if you want to coordinate that data? This article describes…
If you need to start windows update installation remotely or as a scheduled task you will find this very helpful.
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now