Single Toobar Simultaneously Used by Multiple Dialog-Based Applications At Once

Environment: VC6 SP3, Windows95/98/NT4/2000

TlbDlg_OK is a sample how to work with common toolbar from several dialog-based applications.

Project TlbDlg_OK (see Downloads demo and source files) creates 2 applications
  • tb.exe (toolbar)
  • TbDlg_OK.exe (dialog application)
  • >

What to run at first - TbDlg_OK.exe or TB.exe is not important.
Click several times exclamation mark in TB.exe to run several instances
of TbDlg_OK.exe.

Move focus to any of them - common toolbar (TB.exe) moves automatically
in its area.

Common toolbar will be closed when a last instance will be closed.

TbDlg_OK.exe sends to TB.exe the following messages (see resource.h) to add and delete connections between two applications and to move tb.exe placement:

ID_CONTROL_ADD_HWND
ID_CONTROL_DELETE_HWND
ID_CONTROL_SET_FOCUS

TB.exe sends to TbDlg_OK.exe the following messages (see resource.h) in accordance with icons, that are set in tb.exe:

ID_CONTROL_NEW_INSTANCE
ID_CONTROL_NEW
ID_CONTROL_OPEN
ID_CONTROL_SAVE
ID_CONTROL_HELP

Their implementation is carried out in TbDlg_OK\TbDlg_OKDlg.cpp as usually:

ON_COMMAND(ID_CONTROL_NEW,OnNew)
ON_COMMAND(ID_CONTROL_OPEN,OnOpen)
ON_COMMAND(ID_CONTROL_SAVE,OnSave)
ON_COMMAND(ID_CONTROL_HELP,OnHelp)

TB.exe is a simple application that contains toolbar only. Its size is equal toolbar size (see tb\mainfrm.cpp variables CONTROL_BAR_WIDTH and CONTROL_BAR_HEIGHT).

Notes

This sample is used in Windows Ini files Editor.

Downloads

Download demo project - 45 Kb


Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Today, users, applications, and data exist in more places than ever before, creating an unprecedented challenge for IT. How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? To better serve business demands for information everywhere, enterprises must develop new strategies for optimizing multiple kinds of networks. Read this white paper to learn how hybrid networks provide an unprecedented level of network dynamism, enterprise agility, and the …

  • Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be "the most devastating" due to the amount of damage privileged users can inflict and the type of data they can …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date