Solved

===>How to use the Windows API CreateWindowStation and CreateDesktop?

Posted on 2004-04-04
9
2,294 Views
1 Endorsement
Last Modified: 2016-06-14
How to use the Windows API CreateWindowStation and CreateDesktop? If can I use them to create a virtual desktop and run my apps on the virtual desktop and capture the virtual screen to image file?

Best regards.
Goomoo
1
Comment
Question by:Goomoo
9 Comments
 
LVL 1

Author Comment

by:Goomoo
ID: 10755031
Can someone help me?
0
 
LVL 1

Author Comment

by:Goomoo
ID: 10755621
NO one would like to help me ?
0
 
LVL 4

Expert Comment

by:tobjectpascal
ID: 10757245
http://www.experts-exchange.com/Programming/Programming_Platforms/Win_Prog/Q_20913170.html

That of any help? i personally still don't know what it does and i read the help files :(
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 1

Author Comment

by:Goomoo
ID: 10762428
Thank you.
I have read the question. But it looks like that question not end with a satisfied result. :(
0
 
LVL 19

Accepted Solution

by:
Melih SARICA earned 125 total points
ID: 10763860
Here is the explanations

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dllproc/base/createdesktop.asp


and examples

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vcsample98/html/vcsmpswitcher.asp

its something like remote desktop .. u create a virtual work station .. and then u create ur desktop.. it has all features like ur desktop
so u can capture it i guess
0
 

Expert Comment

by:Member_2_7965069
ID: 41653714
All links in this thread are now broken.  Would anyone like to revisit the subject?
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now