Solved

Deploying my application with an icon

Posted on 2008-10-05
4
2,572 Views
Last Modified: 2013-11-17
I have developed a windows mobile application and now I want to deploy it. I am struggling a lot with this probably because I don't understand a few fundamental things. I use VS 2008 and I have created a smart device CAB project which creates the .cab file I can deploy. So fare so good. But I want to do a little more. First of all I have a .jpg file that I would like to use as the application icon. How do I create this .ico file so it will be the icon of my application? Second, should I make some registry keys and why ?(I don't thing I get the concept of Reg Key) and third, I understand that I can add .cab files for CF .NET versions to be installed if the device do not have the necessary framework. Do I do this in the .inf file and how do I find this file for editing?

Hope there is someone who can help me with these issues or maybe tell about some articles/tutorials concerning this. Until now I haven't been able to find anything useful.

Thanks in advance

Brian
0
Comment
Question by:Refshauge
  • 2
4 Comments
 
LVL 5

Expert Comment

by:chops_uk
ID: 22644967
an ico file's actualy a specific file type.. there's ico creation software or snap ins for photoshop etc..  however, I recall just creating a bmp the correct dimentions and finding it worked... however, you ONLY get that dimension then.. i.e. just 16x16px or 32x32px.. the .ico file stores many different icon sizes in one file.
0
 
LVL 5

Accepted Solution

by:
chops_uk earned 500 total points
ID: 22700901
1) i've just realised that Visual Studio allows you to create .ico files natively, but I rfind it easier to use http://www.telegraphics.com.au/sw/ 

2) when you say you don't understand the concept of RegKey, do you mean the syntax or the whole registry concept ;)  ?

3) Ref .NET framework, have a look at this MSDN article: http://msdn.microsoft.com/en-us/library/ms994427.aspx

good luck!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The object model of .Net can be overwhelming at times – so overwhelming that quite trivial tasks often take hours of research. In this case, the task at hand was to populate the datagrid from SQL Server database in Visual Studio 2008 Windows applica…
More often than not, we developers are confronted with a need: a need to make some kind of magic happen via code. Whether it is for a client, for the boss, or for our own personal projects, the need must be satisfied. Most of the time, the Framework…
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now