Drive Browsing Treeview

Environment: VC6, Windows 98

This is an example of browsing the drives and folders on the system. This uses the Treeview control to achive the objective. The project is available for download with sourcecode; hence, fragments of code have not been reproduced here.

Downloads

Download demo project - 27.1 Kb



Comments

  • My comment

    Posted by Legacy on 09/22/2003 12:00am

    Originally posted by: Payam

    its very nice

    Reply
  • Please Send Me Code For This Application

    Posted by Legacy on 03/22/2003 12:00am

    Originally posted by: Malik Sajid Abbas

    I Think that it will be your greatness if u send code alongwith ur project's demo's so that other people may get some knowledge. as for as demo is concern there is lot of stuff available in windows to see.
    PLEASE donot limit knowledge let it expand. make beginners able to get some goof programming skills.

    I m sorry if u find some harsh words by me but it is a reality,

    REGARDS
    SAJID.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Discover how to quickly remediate aggressive security threats. Read this report from Forrester Research and get the facts about new automated compliance processes and how they will reduce your organization's vulnerability and risk. Learn to: Adopt a set of cyber "Rules of Engagement" Define the appropriate response through the "Response Index" Create actionable response metrics Ensure multiple levels of audit and reinforcement Plus, find out how to better align security and operations teams and put the …

  • Live Webinar June 2, 2015 - 11 am PST / 2 pm EST Your organization and brand are increasingly digital today, proliferating across websites, media outlets, social networks, search engines, mobile apps, online marketplaces and more. Each digital touch point not only enhances the value of your brand, but also represents far greater risk for your company. They increase opportunities for brand defamation and data leakage; act as discreet places to conspire and collude; and open the door to new security …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date