?
Solved

open pocket ie to a specified url

Posted on 2003-02-19
2
Medium Priority
?
327 Views
Last Modified: 2013-12-27
Hi,
I am creating a new pocket internet explorer window using the following code...

PROCESS_INFORMATION pi;

if (!::CreateProcess(TEXT("\\windows\\iexplore.exe"),
   NULL, NULL, NULL, FALSE, 0, NULL, NULL, NULL, &pi))
{
  MessageBox(NULL, _T("test"), _T("test"), MB_OK);
}

Is is possible to open internet explorer to a specific url??


thanks a lot

Cathal
0
Comment
Question by:cathalc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Accepted Solution

by:
chensu earned 200 total points
ID: 7983944
Try this.

SHELLEXECUTEINFO ExecInfo =
{
    sizeof(SHELLEXECUTEINFO),
    0,
    NULL,
    NULL,
    _T(""),
    NULL,
    NULL,
    SW_SHOW
};

::ShellExecuteEx(&ExecInfo);
0
 

Author Comment

by:cathalc
ID: 7987218
Perfect:)
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we will discuss all things related to StageFright bug, the most vulnerable bug of android devices.
In this post we will learn how to connect and configure Android Device (Smartphone etc.) with Android Studio. After that we will run a simple Hello World Program.
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month10 days, 23 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question