Solved

Change HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable

Posted on 2003-11-07
4
1,188 Views
Last Modified: 2010-08-05
Hi,

I need to change this registry key in VBA using a command button? HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable

Any thoughts?

Chris
0
Comment
Question by:archer1050
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 39

Expert Comment

by:stevbe
ID: 9702994
you could shell a .reg file or try this code out ...

http://www.mvps.org/access/api/api0015.htm

Steve
0
 
LVL 4

Expert Comment

by:inox
ID: 9703830

you can use

    Dim objWSH As Object    
    Set objWSH = CreateObject("WScript.Shell")
    objWSH.RegWrite "HKLM\Software\MyApplication\strValue", "Some string value"

you also can use the
GetSetting, SaveSetting functions:
GetSetting(appname, section, key[, default])
but they are linited to the HKEY_CURRENT_USER key, sufficient for your request
0
 

Author Comment

by:archer1050
ID: 9712913
The value is a dword value, will this function still work?
0
 
LVL 4

Accepted Solution

by:
inox earned 125 total points
ID: 9714332

with
objWSH.RegWrite "HKLM\Software\MyApplication\key1", 1234, "REG_DWORD"

you can write integers and read also
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction The Visual Basic for Applications (VBA) language is at the heart of every application that you write. It is your key to taking Access beyond the world of wizards into a world where anything is possible. This article introduces you to…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…
In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question