Results for "Author: ulli"
Analyse Access Database Tables and Fields and optionally alter contents.
This AddIn helps you to explore and document your projects. The documentation is incorporated into the source code and may be printed by the Code Formatter Source Print Facility (updated version soon to follow). Compile the DLL into your VB directory and then use the Add-Ins Manager to load the Explorer Add-In into VB. The Splitterbar.OCX (included in the .zip file) is a Control based on a submission by eidos here at PSC. You should copy it to the Windows System Folder and register it using RegSvr32.
This is my attempt to make a chess program. The AI still needs a lot of cooking but the UI is done and it knows most rules (read the attached F.I.D.E. Laws Of Chess). Don't try yet to play against the computer - you will win :-) or worse - the program may crash. I myself am a below-average chess player, so I cannot say anything about the program's strenght or style of play. Time limit does not work properly, so give it say 6 or 12 seconds thinking time, more will make you wait virtually forever... Problem solving works though, I think. Unfortunately PSC does not let me upload Gradient.OCX or MsgHook.OCX, so you will have to delete all references to them. Also the TTF Amaze is not uploadable, just substitute another nice looking font for it. The piece images were copied from RJSoft's Chess Program, with his permission. Enjoy.
...up to 10,000 digits and more.
Class to encrypt and decrypt a clear text with variable character length encoding. There is no relationship between byte boundaries and encrypted characters, ie an encrypted character may theoretically be anything from 1 to 255 bits long; however this depends on the 'quality' of the key. I am not a cryptoanalyst, but I have a hunch that the variable character length makes this code rather difficult if not impossible to break. One approach may be to scan the encryption for repeating bit-groups and guess the meaning of short groups occuring more frequently than others (like "the", "a", "an" and so forth), or for patterns occuring with a language-specific frequency of vowels and consonants. To forestall that, the encrypting engine uses an initial hash (also derived from the key) and XORs every character with that before encrypting, keeping the result of the XOR for the next character. The decrypting engine of course reverses that process. The encryption engine now features an MD5 message digester which produces a key- and message-dependent binary signature. This signature may be included in the encrypted text to verify it's authenticity. Another advantage of prefixing a message with a signature is the additional scrambling of the encryted text through the previous encrypting of the unpredictable signature (see 'hash' above). This makes the encryption key- and text-dependent, that is, the encryption for a particular character is different when the text is different (apart from being different through hashing). Speed (without debugging) is in excess of 40,000 bytes/sec for encrypting and more than 130,000 bps for decrypting (depending of course on your PC's clock frequency).
This OCX records all mouse and keyboard activities for later playback with original timing. May (but should not) also be used as a stealth keylogger. Try playing back the attached TEST.RCD file :-).
This Add-In creates a Cross Reference Listing for your VB Projects. The X-Ref shows all Public, Global, Friend and Private Data- and Code-Member definitions, where they are defined, their scope (Private / Public / Friend), and what they are: Sub or Function, Property, Event, Variable or Constant. Also shown are all references to these members with ComponentName.MemberName as well as Line and Column numbers. References to Components are also shown. The Cross Reference Listing may be exported to a color-coded RTF file (see screen shot) or to the Clipboard for subsequent pasting into the project or anywhere else. This is the second in the my suite of VB-Add-Ins and goes together with the Code Formatter. It will help you to professionally document your projects in a tidy and consistent way. Compile the DLL into your VB directory and then use the Add-Ins Manager to load the Cross Reference Add-In into VB. Fixed bugs with Resorce Files and Related Documents and added Icons as well as references to Controls, Libraries, and References.
Example to show how to synchronize painting to the Monitor's vertical scan frequency. Painting occurs invisibly during vertical retrace.
Class and exhaustive test rig for FFT and IFFT. See screenshot. Updated for substantial speed improvemnt. Download is 8 kB
This is a 'Finite State Machine' Class to control batch type sequential client programs which fetch records from one or more sequential (normally keyed) data streams and optionally merge them into one stream, and/or exchanges data between matching records. This is done by invoking the discrete procedural steps in a logical sequence (eg FetchNextRecord, GroupHeader, ProcessRecord, GroupFooter etc) which the client program is arranged into. Also supported and invoked are control breaks for outputting subtotals, totals or grand totals; the control breaks are further subdivided into group header and group footer. The class supports a great variety of properties which may come in handy during program execution. Examples for this kind of programs are manifold: Invoicing, batch account-updating from transactions, grouped statistics, budgets and ballances, or report writers with subtotals and totals to name just a few. A comprehensive documentation is included. Compile WinPS 1st, register it if necessary using RegSvr32, and then add a reference to it to TestNewPS (or to any other project that might be using it). Download is 85 kB.
This little gadget creates, plays and optionally saves .wav files. You define duration, frequency and sound characteristics. Update vor visualisation. See screenshot for details. Download ist only 7 kB.