Enumerating CD Devices on Your System

This short code sample shows how to determine all the CDRom drives you have connected to your computer using the WinAPI.

Although this can now be done with the new FileSystemObject that comes with VB6 (and as an extra with VB5), this is how to get the drives through code when the target machine may not have the SSCRUN.DLL.


Screen-Shot

The code is quite simple and uses the GetDriveType and GetLogicalDriveStrings Windows API calls.


'
private Declare Function GetDriveType Lib "kernel32" _
        Alias "GetDriveTypeA" (byval nDrive as string) as Long
private Declare Function GetLogicalDriveStrings Lib "kernel32" _
        Alias "GetLogicalDriveStringsA" (byval nBufferLength as Long, _
        byval lpBuffer as string) as Long
private Const DRIVE_CDROM = 5
'
private Sub ListCDROMs()
    Dim sDrives as string
    Dim sDrive as string

    sDrives = Space(255)
    sDrives = Left$(sDrives, GetLogicalDriveStrings(255, byval sDrives))
    While InStr(sDrives, "\")
        sDrive = Left$(sDrives, InStr(sDrives, "\"))
        If GetDriveType(sDrive) = DRIVE_CDROM then
            List1.AddItem "(CDRom) " & sDrive
        End If
        sDrives = mid$(sDrives, len(sDrive) + 2)
    Wend
End Sub
'

Download Zipped Project File (3k)



Comments

  • More helpful for me

    Posted by Legacy on 07/25/2003 12:00am

    Originally posted by: Mohan

    Thanks lot to provide code. Your e-help is much appreciated.
    

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • There is no understating the impact of security and network connectivity on today's cloud environments. Yes, clouds can scale, expedite processing, and reduce costs, but they also incur risks associated with multi-tenancy, availability, and access control. How users connect to the cloud is vital because not only are security risks non-negotiable, but performance, flexibility, and reliability are critical as well, which leads to a heavy emphasis on combining strong security with private network ecosystems. …

  • Live Event Date: May 13, 2105 @ 1:00 p.m. ET / 10:00 a.m. PT Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information. Join TITUS and a guest speaker from …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date