Solved

Retrieve Scheduled Tasks

Posted on 2006-11-18
9
293 Views
Last Modified: 2012-06-22
Is there a way to see what tasks are scheduled in Windows ME/200/XP that are in the "Scheduled Tasks" portion of the control panel? Thanks
0
Comment
Question by:orangutang
  • 5
  • 4
9 Comments
 
LVL 76

Expert Comment

by:David Lee
ID: 17976446
0
 
LVL 22

Author Comment

by:orangutang
ID: 18010098
Is there an example that uses APIs?
0
 
LVL 76

Accepted Solution

by:
David Lee earned 250 total points
ID: 18010162
Go to the link below, then scroll down the page until you find "Using the Task Scheduler" (it's near the bottom).  Download it and have a look.

http://www.mvps.org/emorcillo/en/code/vb6/index.shtml
0
 
LVL 22

Author Comment

by:orangutang
ID: 18010239
But is that pure VB?
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 76

Expert Comment

by:David Lee
ID: 18010242
What do you consider to be "pure VB"?
0
 
LVL 22

Author Comment

by:orangutang
ID: 18010379
Not having to use any other DLLs or OCXs besides the ones already provided my Microsoft.
0
 
LVL 76

Expert Comment

by:David Lee
ID: 18011639
That example is creating a DLL to make life easy, but it doesn't use anything that's not part of Windows.  I suppose it'd be possible to use the code and not build a DLL, but I don't really see the point.  What difference does it make if the code is built directly into your program or if your program comes with an extra DLL that contains the code?
0
 
LVL 22

Author Comment

by:orangutang
ID: 18025209
Sorry, I just don't like having to use any other file other than what's already on Windows.
0
 
LVL 76

Expert Comment

by:David Lee
ID: 18026664
I understand.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Introduction In a recent article (http://www.experts-exchange.com/A_7811-A-Better-Concatenate-Function.html) for the Excel community, I showed an improved version of the Excel Concatenate() function.  While writing that article I realized that no o…
Most everyone who has done any programming in VB6 knows that you can do something in code like Debug.Print MyVar and that when the program runs from the IDE, the value of MyVar will be displayed in the Immediate Window. Less well known is Debug.Asse…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now