obj = (TClass) asm2.CreateInstance ("net. tclass ", true); // true: Case Insensitive obj. fun (); // *** call the method in the Dynamically Loaded dll ***
This provides very powerful functions. If we do not reference an assembly, we can also use an assembly outside the program. We can also reference different assemblies based on different situations. We can even directly configure the dll to be loaded duri
The callback function is written by yourself. You need to call another function. One of the parameters of this function isIt is your callback function name. In this way, the system will call the callback function you write when necessary, so that you canTo complete what you want to do in the callback function.
Module A has a function Foo, which transmits the foo
The callback function is written by yourself. You need to call another function. One of the parameters of this function isIt is your callback function name. In this way, the system will call the callback function you write when necessary, so that you canTo complete what you want to do in the callback function.
Module A has a function Foo, which transmits the foo
programs. They are loaded into the memory together with the system and can be found through the interrupt vector table. What about Windows APIs? To understand this problem, we have to introduce this concept-DLL.
DLL (also an abbreviation, I feel that there are many acronyms in the IT industry), that is, Dynamic Link L
There are a lot of online about svchost.exe what the process is, svchost.exe is what virus, Svchost.exe occupy cpu100% or occupy a lot of memory, Svchost.exe has more than 10, Svchost.exe secretly network very much like the problem of Trojans, this article provides information on the Svchost.exe process and the use of
| Registry Key Value -- Delete the specific value or the entire key.
I have just read the book "COM technology insider" and compiled a FAQ for your reference when learning this book.
This is the first part, including the content of the first three chapters.
Faq1: What is a COM component? Chapter 1 〗
Answer:
COM components are executable code published i
technology insider" and compiled a FAQ for your reference when learning this book.
This is the first part, including the content of the first three chapters.
Faq1: What is a COM component? Chapter 1 〗
Answer:
COM components are executable code published in the format of Win32 dynamic link library (DLL) or exec
enables the operating system to execute commands (Actions) of the application ). In fact, as early as the DOS era, there was an API concept, but at that time the API was provided in the form of Interrupt calls (INT 21 h, all applications running under DOS use the operating system functions directly or indirectly through interrupt calls, for example, if you set Ah to 30 h and call int 21 h, you can get the dos OS version number. In Windows, system APIs are provided through function calls. In Win
is an interface? Chapter 2 〗Faq4: What is the function of the interface? Chapter 2 〗Faq5: What is iunknown? Chapter 3 〗Faq6: What is the function of QueryInterface? Chapter 3 〗Faq7:
What is the most popular technology now? Is it Java, is. Net, or what? I think it should be the Web service technology.
Web Service provides a simple, flexible programming model, and uses the current standard on the Internet to avoid the problems and disputes that developer
registered to GAC)
--------------------------------------------------------------------------------
Body:(1) Now we start to write the first component.Its version is 1.0.0.0. There is a class that contains a simple method. This method returns a stringThe Code is as follows. I have made annotations.// Generate a strong name in the fileSn-k c: \ version. SNK//
Well, for everyone's convenience, I will describe it as simple as possible.
[Symptom]The Research on this problem originated from the following phenomenon: When you use VC ++ 2005 (or other. net) after writing a program, you can run the program without any problem on your computer. However, when you copy the EXE file to another computer, you cannot run the program. The general error message is as follows: the application configuration
What's Rundll32.exe?
What happened to the Rundll32.exe error? How to fix the Rundll32.exe of the virus infection? The RUNDLL32 process is a process that we often see, and this process is often exploited by viruses, "executing 32-bit DLL files." Its function is to execute th
bindingredirect NodeOldversion = "1.0.0.0" newversion = "2.0.0.0" is clear. If testversion.exe uses an earlier version of v1.dll and the assembly version is 1.0.0.0, a new version of 2.0.0.0 is used.It should be noted that oldversion can be defined by range, such as oldversion = "1.0-1.9". However, if range notation
If you had asked me what virtual memory was severalYears ago, I 'd have given you some hand-wave explanation about makingIt appear as if your computerHas much more RAM than it actually does. Which is only sort of correctAnd fairly imprecise. Sometimes people will get stuck on the ideaWriting dataTo the file system, which is not quite correct either.
First,A thoug
). After reading this article, you will be able to learn how to use the built-in components in the Windows operating system and the COM objects provided by third parties.This document assumes that you are proficient in the C ++ language. In the example code, we use a bit of MFC and ATL. If you are not familiar with MFC and ATL, this article will thoroughly explain these codes. This article includes the following parts:
Com -- what
Original: Http://www.codeproject.com/Articles/633/Introduction-to-COM-What-It-Is-and-How-to-Use-ItThe purpose of this article is to provide programming guidance to programmers who have just contacted COM and to help them understand the basic concepts of COM. The content includes a description of the COM specification , important COM terminology , and How to reuse
Windows APIs. [2]
Microsoft has placed particular emphasis on maintaining software backward compatibility. In order to achieve this goal, sometimes Microsoft is even willing to support the use of unofficial even (programming) illegal API software. Raymond Chen, a Windows developer dedicated to Windows API, has mentioned him: [3]
“
Could probably write for months solely about bad things apps doing and
end, which is the first to gain control after joining. zdwork.cn
Windows does not require the order of the hooks to be unloaded in the same order as the installation sequence. Whenever a hook is unloaded, Windows releases its memory footprint and updates the entire hook list. If the program has a hook installed, but it finishes before uninstalling the hook, the system will automatically uninstall the hook
What is the Web application developer framework?
// What is an applicationProgramDevelopment Framework
the ArcGIS web application developer framework (ADF) for the Microsoft. NET framework enables you to integrate GIS data and capabilities into your web applications. the ADF shortdes a set of Web controls, cl
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.