Creating a Transparent Hole Region in Different Shapes on Any Window

Environment: Visual C++ 6.0 Windows 9x, Windows NT 4.0 and Windows 2000

With this class you can make transparant (full access through hole) region in different shape on the most type of windows. Basically it is only one significant function in the class. This is most a funny way to use region like ellipse, rectangle, roundrect, circles and polygon. But i am sure that some of you can find a way to use it, for example in a screen saver. If you find another way to use it, please let me know!

Links

MagicHole Homepage

Downloads

Download demo project - 74 Kb
Download a CDialog based screensaver demo project that use the CMagicHole class - 152 Kb
Download source - 4 Kb


Comments

  • :-)

    Posted by Legacy on 11/08/2002 12:00am

    Originally posted by: Vitaly Tomilov

    funny, but useless.

    Reply
  • How does it work in Button Windows

    Posted by Legacy on 11/05/2002 12:00am

    Originally posted by: Limou

    when I use the MagicHole class with the m_hDestWnd a button's hwnd, the first time, it does not appear to transparent. In your Dialog demo, I add a big button with id IDC_BUTTON1, and add the following statements:
    CMagicHole mag(GetDlgItem(IDC_BUTTON1)->GetSafeHwnd());
    mag.MakeHoleArea(CRect(4,4,100,60));
    the first time,the hole in the button is not transparent and we cannot see the word of "button1". why? even I add the UpdateWindow(), it does not take effect.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • At present, the most commonly deployed parallel file system is Lustre, and its adoption is growing across the HPC industry. According to Intersect 360 Research, "Through its leadership and involvement with OpenSFS, Cray advocates for the development of features that drive efficient performance at scale." Moreover, with help from Cray and OpenSFS, Lustre is gaining greater adoption across broader commercial application categories. As data and I/O requirements grow in commercial markets, technology vendors -- …

  • Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date