Making Windows Forms Pop Under

Figure 1

Pop-under windows are windows that, when created, are immediately shuttled behind all other windows in the z-order. In fact, many times you don't notice them until you've closed or minimized all other open windows. Basically, they're seen as a less obtrusive means of advertising than pop-ups that require immediate (and usually resentful) attention from the user. With the lines between browser-based Web applications and traditional Windows applications being blurred every day, it should come as no surprise that Windows programmers are looking for ways to emulate the (infamous) pop-under effect utilized by Web marketers. Therefore, in this week's article, we'll look at the steps required to pull of this stunt...er...task.

Note: If you also would like to see how pop-under windows are created in JavaScript, you can read about that in an article by Joe Burns on one of our sister sites—HTMLGoodies.com.
  1. The function that's used to modify the window position is the Win32 API SetWindowPos. Therefore, the first thing you'll need to do is to include the following using statement to import and use this native function from your C# application:
  2. using System.Runtime.InteropServices;
  3. To import the native SetWindowPos function, use the DllImport attribute and define the function's signature as follows where I'm also specifying a few of the constants defined in the Platform SDK C++ header file WinUser.h. (Note that while I've chosen to define these types within a class called Win32, that is purely a subjective choice. You can name the class anything you like or simply include these type definitions in an already-existing class.)
  4. class Win32
    {
       [DllImport("user32.dll", EntryPoint = "SetWindowPos")]
       public static extern bool SetWindowPos(
          int hWnd,               // window handle
          int hWndInsertAfter,    // placement-order handle
          int X,                  // horizontal position
          int Y,                  // vertical position
          int cx,                 // width
          int cy,                 // height
          uint uFlags);           // window positioning flags
       public const int HWND_BOTTOM     = 0x1;
       public const uint SWP_NOSIZE     = 0x1;
       public const uint SWP_NOMOVE     = 0x2;
       public const uint SWP_SHOWWINDOW = 0x40;
    }
    
  5. Implement a helper method (ShoveToBackground) to call the SetWindowPos function at the appropriate times.
  6.    private void ShoveToBackground()
       {
          Win32.SetWindowPos((int)this.Handle,
             Win32.HWND_BOTTOM,
             0, 0, 0, 0,
             Win32.SWP_NOMOVE | Win32.SWP_NOSIZE |
             Win32.SWP_SHOWWINDOW);
       }
    
  7. Finally, implement handlers for the form's Activate and Resize events and have them both simply call the helper ShoveToBackground method.
  8. private void Form1_Activated(object sender, System.EventArgs e)
    {
       ShoveToBackground();
    }
    
    private void Form1_Resize(object sender, System.EventArgs e)
    {
       ShoveToBackground();
    }
    

Now, when the form is first executed or activated from the task bar or task list, it will always flicker and then immediately get "pushed" to the background as you see in Figure 1.



About the Author

Tom Archer - MSFT

I am a Program Manager and Content Strategist for the Microsoft MSDN Online team managing the Windows Vista and Visual C++ developer centers. Before being employed at Microsoft, I was awarded MVP status for the Visual C++ product. A 20+ year veteran of programming with various languages - C++, C, Assembler, RPG III/400, PL/I, etc. - I've also written many technical books (Inside C#, Extending MFC Applications with the .NET Framework, Visual C++.NET Bible, etc.) and 100+ online articles.

Downloads

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • You know that visibility is critical to security. You simply can't secure what you can't see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization's cloud services, mobile endpoints, and digital ecosystems.

  • IT is in a continual battle to simplify and "do more with the same, or less," but the continued growth of data has drastically increased the complexity and cost of deploying, managing, and processing data using traditional IT infrastructure components. One key component — enterprise storage and the underlying software that controls the storage — is fortunately evolving nearly as fast as the data is growing. This ESG Lab Review documents the results of hands-on testing of the WekaIO Matrix …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date