Results for "Volume: C_Volume2"
This is a fully functional daily activity storing Client-Server application, which uses MSSQL Server 2000 as the back-end. We, the developers of VeriPark (One of the leading software companies in Turkey) use this application as our activity logger. Many more features will be added in time. Please report any bugs/comments, so they will be emailed to me.. (The only developer of the application) Tested up to 40 simultaneous client connections, with no problem at all.. Uses the client's NT Domain name as the only authentication method, when creating users on the server application, please give them their NT Name as the user name The Database will be created when first running the server application, the script is in db.sql, you may run it for yourself if you want. If the database exists, no SQL statements will be run on the server. client.cfg is for clients and tells the client application which server to connect, and by which port Clients can get their daily reports by clicking the up arrow, and can get their current activity by clicking the question mark, Other button's functionality is obvious : ) The communication is secured by a custom encryption algorithm : ) Easy to use, enjoy, and please give me some marks or at least a feedback : ) Thanks
Simple fireworks effect, fullscreen. Simple
Checks if string is a valid IP or not. I saw this submitted earlier and made my own better version of it. =) OK there is now an updated version with fixes so go check it out here: http://planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=57999&lngWId=1&txtForceRefresh=123020041845765523
Updated version of IsIP function. Should clear up all the problems in the last one. Here ya go, =)
This is a simple arrow button control with an XP style. It gots 3 different look. It also generates 4 events: Click, MouseDown, MouseIn and MouseOut. I don't want vote, I just wanna share in case it can be usefull to somebody. Any comments are welcome.
This is an example of a VERY simple Client/Server using winsock. For this and more tutorials and example code visit my site http://affordablefreedom.com
This is an another application related to marketing database. but it is different from my previous one. This application is very usefull foe the heavy industries. Where marketing database is very wide. Security wall is very tight in this project. when u login as admin u can access all the application & u see all the menus but when u login as client u see something different menus. its really amazing. & works fine in a company.
This is the standard windows message box modified with hooks - no additional forms or controls. The way this is compiled, when you reference it in a project it becomes part of the Global Namespace of the project, this means you do not need to make any special declares to start. You just enter it as you would any VB function. It is 100% backward compatible with the VB MsgBox function. You can change all existing MsgBox statements to MsgBoxEx statements with no further coding unless you want to make use of additional parameters. This dll gives the added advantage of setting the font for the message box once and then forgetting about it or you can set the font each time you display a message. Have optimized some of the routines and added ability to perform Translucency.
a really great revloving logo made in visual basic it inclued the basic of drawing on a form
to know if a mouse is inside a specfic object
This is the major update of my AWARD WINNING code(now supports all major EXE's-VB, Delphi, VC++,FLASH etc.) this submission has a number of new features, and has almost everything you find in commercial software protectors. Convert your Exe Files into trial versions within few minutes, everything has been taken care of and exe's protected with this open source version is almost uncrakable. There are number of Anti Dumping and Anti Debug measures implemented in the loader like MEMORY ENCRYPTION, MEMORY STRIP, Debugger detection systems and more. If you implement these protection then it becomes very difficult for the cracker to to dump your software from the memory. And there is VARIABLE KEYS- it means that no one can make registry erasing cracks any more, Exe Protector stores data in different locations on each computer. Registration key system is also technically advanced because of MONITORING THREAD running in background so its impossible to load any cracking tools while exe protector is running and registration now supports 15 different hardwarefingerprints like SMART (the most unique number a computer has), BIOS, VOLUME, GEOMETRY, CPU INFO, MEMORY. With four cool trial systems TRIAL BY DAYS, TRIAL BY DATE, TRIAL BY COUNT,TRIAL BY VERSION which you can implement in your protected software. With Language editor you can put your own custom texts in the loader. Loader uses Advanced Tamper detection systems and loader immediately blocks the access to your software if any information is manually modiifed, but still a user can unblock it with UNBLOCK KEY.The loader is extremely fast, it is tested under different conditions and it works pretty well.There are many customisable options like you can choose to give FREE UPDATES for minor versions of your software, reset trial on new versions, add BUY NOW URL's, increase trial count by request, password access to reigstration menu and more. And thats not all Exe Protector now supports SDK from which you can add programatic functions to your software like GetRegstrationName, InstallKey, InitiateCreep. There is a feature in SDK called "Creep" i call it creep because it silently keep cracker away from your software. The "Creeps" should be spread all around your software like in the functions where some serious programming is done, now exe protector will secure all the places where "creep" is implemented. Thanks to Public Key Encryption Module- now your software is uncrackable even in this open source version. The author can store a lot of information in the registration key like Datecreated, Creator, Purchase date, Customer's info, test registration keys with VIRTUAL KEY TESTER which supports hardwarefingerprints, generate keys that can be used only withing certain time. Easily save projects, generate XML based reports and what else do you want?. You are getting a techincally advanced software protection system which is also secure in this open source version so please put some effort and VOTE FOR THIS CODE.
It appears this VB function can easily replace APIs like BitBlt, StretchBlt, DrawIconEx and others. So how do you use this function that no one seems to use? Included are a few ideas and "how to's". Hoping others more knowledgeable will add positive comments so others can learn too. Zip updated to include sample of portion Rendering. No BitBlt API used at all in examples.
This is a picture control that I think most of you will like and (most ;~| ) all of you will appreciate. This picture object least importantly of all, displays a picture. Here are some of its more powerful features: 1)Can display a picture from a file, just like a regular picture control, BUT can also, on the fly, instantly (without winsock or any other control) download a picture off the web and display it..so this control can dynamically display images that dont even reside on your machine 2) The control has a storedPicture object..which allows you to store an unlimited number of pictures for later use. simply call the AddToStoredPictures method. Display any one of the stored pictures, later, as the current picture by a call to oPicFlex.ActivePicture = 2 (or whatever index you specify) 3)The image displayed in this control automatically resizes as the control resizes (like the Image control)..buy only if the stretch property is set to True, like the Image control 4)A single call to this controls DrawFromThisBlt method acts as an internal replacement to the BitBlt, StretchBlt, and TransparentBlt api calls, so any part or all, of the controls current image can be painted to any other DC
Fully commented. This program allows the user to record and playback mouse movements and clicks. When recording, it adds the mouse's coordinates and what the mouse is doing (moving, clicking) to a list. Then the program scrolls through the list and follows the scripts instructions on where to move and what to do.
Learn how to break cyphertext with Frequency Analysis.
Parses the non-anon proxies from cybersyndrome.net/pld.html
Bounce off the Wall! This program is similar to my 'bouncing balls' program; however this one bounces balls off walls of any angles. It is very realistic, and has no errors... I don’t think anyway. If you find one, then contact me! Note that no API commands have been used to keep things simple! You can provide your own map just by replacing the default picture. Enjoy.
Organizes and saves images into a single access database. You can import/export single or multiple images at a time. Handles *.bmp, *.jpeg, *.jpg, *.wmf, *.ico, and *.gif image files. Great tool to keep and organize your image collections into one single access database. This is only a start. I do realize that more polishing and debugging need to be done. I hope someone just learn something from it.
This will make you actually be able to see what's behind you right through your body in real-time! No joke! Read the directions inside the .ZIP to find out how this is done! The directions are simple. You need a webcam to do this obviously. Please leave feedback and suggestions.
Very simple to use, Cross-stitch allows him to realize marvellous creations as his pleasures..Cross Stitch offers him a collection of hardware to realize his own designs. Incomplete. If anybody of you this one interested in helping me to continue with development of this program can connect me to: firstbizsoft@gmail.com Please feedback and vote this code!