Remapping resource script ID's

This is code which a lot of people on the WinDev list keep requesting from me. It resequences the define's in a resource.h file. I use it primarily for DLL's when I don't want the resource id's to overlap with id's used in other DLL's or in the main program. The program simply renumbers all ID_?, IDC_? And IDS_? starting at a given value. A .inf file is written which retains the settings for future use. IDS_?'s are maintained at their offset within each 16 string table (ie "IDS_ % 16" is unchanged). This is the source and a build (VC 5) for the RCRemap utility. I developed it from source from an individual whose name I've forgotten. The code has worked well for me [disclaimer on] but I make no claims as to its fitness for any particular purpose. Use at your own risk [disclaimer off]. The code is public domain as far as I'm concerned.

Download source - 21KB



Comments

  • DLL REBUILDER

    Posted by Legacy on 06/13/1999 12:00am

    Originally posted by: Terence Owens

    1. Is there a program that can "rebuild" or "fix" a dll once it has been corrupted or "blown-out"? I distorted my winsock.dll which caused major havoc when attempting to reach the Internet. When I replaced this file, my internet connection returned.

    2. In Win98 on a Netware 5 server-client base, there have been many errors with internet connection to certain sites. In Win95, there is a winsock2.dll but there is none for Win98 and there seems to be no way in hell that Novell or Microsoft is going to make a patch of the equivalent Win95 winsock2.dll. Is there a way I can create my own Winsock2.dll for Win98?


    Thank you,
    Terence

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • As everyone scrambles to protect customers and consumers from the Heartbleed virus, there will be a variety of mitigating solutions offered up to address this pesky bug. There are a variety of points within the data path where solutions could be put into place to mitigate this (and similar) vulnerabilities and customers must choose the most strategic point in the network at which to deploy their selected mitigation. Read this white paper to learn the ins and outs of mitigating the risk of Heartbleed and the …

  • A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. With many high profile breaches in 2013 occurring on endpoints, interest in improving endpoint security is top-of-mind for many information security professionals. The full results of the inaugural SANS Endpoint Security Survey are summarized in this white paper to help information security professionals track trends in endpoint …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds