Drive Browsing Treeview

Environment: VC6, Windows 98

This is an example of browsing the drives and folders on the system. This uses the Treeview control to achive the objective. The project is available for download with sourcecode; hence, fragments of code have not been reproduced here.

Downloads

Download demo project - 27.1 Kb



Comments

  • My comment

    Posted by Legacy on 09/22/2003 12:00am

    Originally posted by: Payam

    its very nice

    Reply
  • Please Send Me Code For This Application

    Posted by Legacy on 03/22/2003 12:00am

    Originally posted by: Malik Sajid Abbas

    I Think that it will be your greatness if u send code alongwith ur project's demo's so that other people may get some knowledge. as for as demo is concern there is lot of stuff available in windows to see.
    PLEASE donot limit knowledge let it expand. make beginners able to get some goof programming skills.

    I m sorry if u find some harsh words by me but it is a reality,

    REGARDS
    SAJID.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • You may already know about some of the benefits of Bluemix, IBM's open platform for developing and deploying mobile and web applications. Check out this webcast that focuses on building an Android application using the MobileData service, with a walk-through of the real process and workflow used to build and link the MobileData service within your application. Join IBM's subject matter experts as they show you the way to build a base application that will jumpstart you into building your own more complex app …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds