Solved

Convert Icon to bitmap

Posted on 2002-07-16
10
247 Views
Last Modified: 2013-12-03
Hi,

I am looking for a way to load an Icon from an ICO file or from an icon library (.dll or .icl), and then convert the HICON handle to a valid HBITMAP.

I know how to load an .ICO file, but don't know how to load one from an library (BTW, how do you get the icon library dialog, the one that allows you to pick one from the library?).

How to display the Icon pick dialog box ?
How to load an certin icon from a library ?
How to covert an HICON to HBITMAP and allow bitmap functions to work on it (while preserving the icon 32-bit data) ?


thanks for your help!


Mike
0
Comment
Question by:moshem
  • 5
  • 2
10 Comments
 
LVL 23

Expert Comment

by:Roshan Davis
ID: 7157500
You can use ExtractIconEx to load icons from executables or from the DLLs...

Need Sample...?

Roshmon
0
 
LVL 23

Accepted Solution

by:
Roshan Davis earned 150 total points
ID: 7157508
0
 
LVL 1

Author Comment

by:moshem
ID: 7157509
Yes, a sample would be great!

How about the two other parts of my question ?

thanks
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 23

Expert Comment

by:Roshan Davis
ID: 7157515
I will try ....

What about your other question (Bitmap Resize)...?

Roshmon
0
 
LVL 1

Author Comment

by:moshem
ID: 7316787
roshmon, please answer in order to get the points
0
 
LVL 23

Expert Comment

by:Roshan Davis
ID: 9018806
Hi, R u still searching for the answer?
Roshmon
0
 
LVL 23

Expert Comment

by:Roshan Davis
ID: 9546631
Hi, R u still searching for the answer?
Roshmon
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Table Size and Indexes in SQL Server 6 21
C#: need to import an entire CSV file 4 51
Build VS2015 project in bat command 3 80
Best book to learn C++ 4 70
zlib is a free compression library (a DLL) on which the popular gzip utility is built.  In this article, we'll see how to use the zlib functions to compress and decompress data in memory; that is, without needing to use a temporary file.  We'll be c…
Whether you've completed a degree in computer sciences or you're a self-taught programmer, writing your first lines of code in the real world is always a challenge. Here are some of the most common pitfalls for new programmers.
This is Part 3 in a 3-part series on Experts Exchange to discuss error handling in VBA code written for Excel. Part 1 of this series discussed basic error handling code using VBA. http://www.experts-exchange.com/videos/1478/Excel-Error-Handlin…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now