Solved

Points for KeefeJohnson!

Posted on 2004-03-22
4
159 Views
Last Modified: 2010-05-01
Hi KeefeJohnson...this is for your help

( http://www.experts-exchange.com/Programming/Programming_Languages/Visual_Basic/Q_20916940.html )

Please accept!

Krupa
0
Comment
Question by:shankarkrupa
  • 2
  • 2
4 Comments
 
LVL 2

Accepted Solution

by:
KeefeJohnson earned 125 total points
ID: 10650247
After figuring out that solution, I started using it in my own program, and it works very well for me too.

Thanks!
0
 
LVL 3

Author Comment

by:shankarkrupa
ID: 10650772
Really?  Great!

I am trying to do it without loading any files, because the user may involuntarily press Refresh key inside the control or may type something and press the refresh key and lose the data.  Involves lots of concatenation...:-))

Thanks anyway, I am working on it.



krupa
0
 
LVL 2

Expert Comment

by:KeefeJohnson
ID: 10663800
About losing the data in the textbox... Your program could keep track of what is in the textbox so when the DocumentComplete event happens, you can put it back.

And some more information that I found out from working on my program:
If you don't want the user to be able to drop a link on the webbrowser control to change pages, set the RegisterAsDropTarget property to False.
If you don't want the menu to popup when you right click in the control, use this code: <BODY oncontextmenu="window.event.returnValue = false">
You can also use the BeforeNavigate2 event to cancel a navigate (clicking on a link), but you'll have to allow the first navigate (loading the page with the textbox)
0
 
LVL 3

Author Comment

by:shankarkrupa
ID: 10694327
Wow...Keefe...this is really cool!

Good to hear this.  This solves the main problem too, disabling the user intervention (other than typing in the textbox) on the browser control.

Thank you so much!

I feel good to have met you. :-)

Krupa
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

The debugging module of the VB 6 IDE can be accessed by way of the Debug menu item. That menu item can normally be found in the IDE's main menu line as shown in this picture.   There is also a companion Debug Toolbar that looks like the followin…
Background What I'm presenting in this article is the result of 2 conditions in my work area: We have a SQL Server production environment but no development or test environment; andWe have an MS Access front end using tables in SQL Server but we a…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now