Icon2002/2003

Environment: Windows 98, Microsoft Visual Basic 6

This projects provides three main functions, each with its own window, as you can see in the image above.

  1. Ico, Exe, Dll—you can consider this window as a icon browser/extractor.
  2. Make Icon Group—enables you to create icons, with different versions of an icon (small/large, 16/256 colors, ...) in one file.
  3. Simple Icon Cursor editor—here you can create new icons or edit existing ones.

Your first point of interest could be to use the program, just as it is. It works and it's free, so if you need to make icons or cursors for your newest project, here's one possibility.

Although the program is 'complete', it's kept as simple as possible and maybe you'll need some other not-yet provided functionalities. Of course, the more you want to change or add, the more you'll have to dig into the project's code.

You could be interested in the code as a source of information on different subjects. You can learn something about:

  • Extracting icons directly from EXEs and DLLs using the shell32 API function ExtractIconEx.
  • Enumerating resources in 32bit EXEs and DLLs using an API callback function.
  • How to create new icons or cursors.
  • How to group icons into one file.
  • Drag & drop operations (a little bit).
  • Using the ListView, TreeView, and ImageList controls (all MS Common Controls).
  • How to use the shell32 API function SHBrowseForFolder,
  • ...

Downloads

Download demo executable - 156 Kb
Download source - 119 Kb


Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Are you truly leading your team or simply managing them? Organizations need leaders and your team needs someone to follow. With some ongoing development, you could become that leader. Learn the top leadership qualities that inspire others to want to follow you and the direction of your company.

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date