Coderush: this year, coderush is the fifth time that readers of Delphi informant have selected the top three-party plug-ins. The following describes the general usage of this plug-in. (I am too lazy and have a limited level. If this is not correct,
From the perspective of Delphi, Google URL encoding and decoding methodsI searched the internet and there seems to be no detailed information about Google's URL encoding and decoding. Therefore, I would like to write it here to help some useful
When I got off work, I spent my spare time writing "click my network" and got down.
ProgramPut it on. According to the requirements of netizens, the program running process of "click my network" is analyzed and developed using the mshtml component.
when writing an HTML explanation, you need to extract the path of the URL from a complete URL, for example, http://www.515800.cn/blog/index.asp needs to extract http://www.515800.cn/blog/ , this can be easily implemented by using the rev
1 .. NET distributed programming-C #
Content: distributed programming and. the two themes of the NET platform both require a lot of pen and ink to be clearly described, but in this book, the author chooses its best, this article briefly introduces
Recently, the MSHTML component was used to control various elements in the web page in the C # WinForm program and test everything on your computer. However, when the client is released, some of these functions are always unavailable (the most
Code highlighting produced by Actipro CodeHighlighter (freeware)http://www.CodeHighlighter.com/-->Detailed description of netsh commands
Netsh is a command line and script utility for Windows 2000 network components on a local or remote computer. To
CodeSmith is a good. Net development auxiliary tool that can greatly improve work efficiency. Recently, I used it for a project, where multiple files must be automatically saved. I checked it online. All I can find is implemented by inheriting
The following is taken from example:
My decompiler code (for download)Purpose:I like open source and share my experiences and code with others!However, there are a lot of dll in the garden. exe only allows you to use it without providing the
Http://www.tomore.com/4/3764.html
To draw a transparent bitmap, you can use a mask. The so-called mask is a black and white bitmap. It corresponds to the bitmap to be transparent. The mask describes the parts to be transparent in the bitmap, and
Function gbtoutf8 (szinput)Dim wch, uch, szretDim XDim NASC, nasc2, nasc3
'Exit the function if the input parameter is null.If szinput = "" thenGbtoutf8 = szinputExit FunctionEnd if
'Start ConversionFor x = 1 to Len (szinput)Wch = mid (szinput, X,
The Tstrings class is frequently used in the process of DELPHI program development. The following describes a brief introduction and an example of this class in the development environment of DELPHI5 (note: this article only introduces methods and
A new contnrs unit has been added to VCL since Delphi 5, and eight new classes have been defined in the unit, all of which are based on
Standard
.
Tlist class
The tlist class is actually a container class that can store pointers and
Delphi's IDE is a wonderful software. It contains a lot of valuable software knowledge. There is a Form Designer in IDE, where controls can be moved and adjusted at will. If you can implement a Form Designer similar to this, it is really wonderful.
1. Declare a Record class
Code highlighting produced by Actipro CodeHighlighter (freeware)http://www.CodeHighlighter.com/-->Type
MyData = record
Title: pchar;
Str: string;
Num: Integer;
End;
PMyData = ^ MyData;
2. Write thread functions like
To modify the specified address data of a specified program, we need to use two api functions: ReadProcessMemory and WriteProcessMemory.
Download is the definition of the function:
Code highlighting produced by Actipro CodeHighlighter
1. function Overloading is also called the function polymorphism (polymorphism). By changing the function type, you can use the same name for two or more functions and then match them with parameters, you can use the correct method to select the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service