Latest Visual Basic Articles - Page 102

A Class for Easy INI File Handling

This class module wraps all the complicated functionality involved in using ini files. You can read/write entire sections of the INI file at once. (Originally posted May 14, 1999.)

A Color Combo Control

This code sample shows how to subclass a combobox to paint each item a different colour. (Originally posted: October 31, 2000.)

AddIn - ObjectDev. A Class Building Addin

This is an excellent VB6 (5?) addin replacement for the Microsoft Class builder utility. Supports Implemented Interfaces classes and all VB DataTypes. (Originally posted July 30, 2000.)

Search Listboxes as you Type

This small code sample shows how you can search a listbox while typing into a textbox - similar to the way that Windows Help works. (Originally posted May 3, 1999.)

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • On-demand Event Event Date: September 10, 2014 Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …

  • One of the most foolproof ways for an online system to confirm, "Is it really you?" is by adding two-factor authentication. Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and bring-your-own-device (BYOD). However, not all two-factor authentication solutions are created equal. This guide walks through some of the key area of differentiation between two-factor authentication solutions and provides some concrete criteria …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds