Single Toobar Simultaneously Used by Multiple Dialog-Based Applications At Once

Environment: VC6 SP3, Windows95/98/NT4/2000

TlbDlg_OK is a sample how to work with common toolbar from several dialog-based applications.

Project TlbDlg_OK (see Downloads demo and source files) creates 2 applications
  • tb.exe (toolbar)
  • TbDlg_OK.exe (dialog application)
  • >

What to run at first - TbDlg_OK.exe or TB.exe is not important.
Click several times exclamation mark in TB.exe to run several instances
of TbDlg_OK.exe.

Move focus to any of them - common toolbar (TB.exe) moves automatically
in its area.

Common toolbar will be closed when a last instance will be closed.

TbDlg_OK.exe sends to TB.exe the following messages (see resource.h) to add and delete connections between two applications and to move tb.exe placement:

ID_CONTROL_ADD_HWND
ID_CONTROL_DELETE_HWND
ID_CONTROL_SET_FOCUS

TB.exe sends to TbDlg_OK.exe the following messages (see resource.h) in accordance with icons, that are set in tb.exe:

ID_CONTROL_NEW_INSTANCE
ID_CONTROL_NEW
ID_CONTROL_OPEN
ID_CONTROL_SAVE
ID_CONTROL_HELP

Their implementation is carried out in TbDlg_OK\TbDlg_OKDlg.cpp as usually:

ON_COMMAND(ID_CONTROL_NEW,OnNew)
ON_COMMAND(ID_CONTROL_OPEN,OnOpen)
ON_COMMAND(ID_CONTROL_SAVE,OnSave)
ON_COMMAND(ID_CONTROL_HELP,OnHelp)

TB.exe is a simple application that contains toolbar only. Its size is equal toolbar size (see tb\mainfrm.cpp variables CONTROL_BAR_WIDTH and CONTROL_BAR_HEIGHT).

Notes

This sample is used in Windows Ini files Editor.

Downloads

Download demo project - 45 Kb


Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • By now, every company has a business continuity (BC) plan, right? Not quite. Many US businesses aren't equipped to deal with major disruptions. The adoption of BC practices remains low, as many a C-suite folks simply have the "it can't happen to us" mentality or they have a subjective notion of risk, assuming that they can withstand disaster. Read this article bundle to learn why your BC plan can't wait, tips on how to get started with your plan and what it should contain, and much more.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date