Solved

Delphi get chrome url

Posted on 2013-12-25
5
1,229 Views
Last Modified: 2014-01-26
Hi,

I'm looking for solution to catch currently visited URL from Google Chrome 30.x version
Older methods no longer worked.

I have no problem with IE and FF (DDE)
But cannot handle Chrome, there was some method some time ago but worked only for 28 version and not for newer

Any advice? Does Google provide any api to make it reliable to catch URL visited?
Or maybe some trick to make it via history to take last visited somehow etc

I need delphi solution

Merry Xmas
0
Comment
Question by:johnnyex
  • 3
  • 2
5 Comments
 
LVL 25

Accepted Solution

by:
Sinisa Vuk earned 500 total points
ID: 39740681
There is Sqlite database named History in these folders:

Windows Vista or later:
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\databases

Windows XP:
C:\Documents and Settings\%USERNAME%\Application Support\Google\Chrome\Default\databases


In table urls there is field url. Use some Sqlite units like mORMot framework and go into database. If you find other solution in another languages post here - maybe solution can be translated to delphi.
0
 
LVL 25

Expert Comment

by:Sinisa Vuk
ID: 39745179
Similar discussion goes here too:
http://www.experts-exchange.com/Programming/Languages/Pascal/Q_28303647.html
I put this to link similar questions.
0
 

Author Comment

by:johnnyex
ID: 39778912
about sqlilite read file chrome browser need exclusive lock on the database file.
Theb there is problem with directly access the history file while browsing with the chrome browser even in read only mode, is there any delphi, or api function to workaround that?
0
 

Author Comment

by:johnnyex
ID: 39783038
?
0
 
LVL 25

Expert Comment

by:Sinisa Vuk
ID: 39784118
My last point in this thread goes to use another (SNSS) files which are not locked.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

This is an explanation of a simple data model to help parse a JSON feed
Entering time in Microsoft Access can be difficult. An input mask often bothers users more than helping them and won't catch all typing errors. This article shows how to create a textbox for 24-hour time input with full validation politely catching …
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now