Search Results

Search found 22427 results on 898 pages for 'opn program'.

Page 458/898 | < Previous Page | 454 455 456 457 458 459 460 461 462 463 464 465  | Next Page >

  • Delphi & Access

    - by rebel_UA
    Hi all! Please, write small Delphi-program which working woth DB Access For example, in Access will create customer-base(nickname & password), but in Delphi simple autorization form. Thanks

    Read the article

  • Application closes on Nokia E71 when using urllib.urlopen

    - by sammr
    Hello, Im running the following code on my Nokia E71. But after the text input, the program closes abruptly. I have a GPRS connection on my phone,but i still seem to be having some problem with urllib.urlopen The code is as follows : import appuifw,urllib amountInDollars = appuifw.query(u"Enter amount in Dollars","text") data=urllib.urlopen("http://www.google.com").read() appuifw.note(u"Hey","info") Any way to fix this problem ? Thank You

    Read the article

  • Can Microsoft Visual C++ 2008 Redistributable Package be freely redistributed

    - by luc
    I am planning to use py2exe to make an application developped with Python 2.6. It seems that my app need the VC redistribuables : http://www.py2exe.org/index.cgi/Tutorial#Step5 I've read this tutorial and the redistribuables license agreement and I am not sure if I can freely redistribute these files with my program. (I don't have VS2008 license) Can I bundle the redistribs into an installer and make the installation transparent for the user or do they have to download the files by their own from Microsoft website? Thanks in advance

    Read the article

  • Cocoa Touch best practice for capturing/logging/diagnosing crashes

    - by Dylan
    As I get closer to releasing my first public iPhone app I'm concerned about catching crashes in the field. I'm curious to hear how others have gone about this. I'm not sure what's possible outside of the debugger. Is all lost with an EXC_BAD_ACCESS or can I still catch it and get something useful into a log? Is the program main() the spot to put a @try/@catch?

    Read the article

  • Bash: How to flush output to a file while running

    - by noam
    I have a small script, which is called daily by crontab using the following command: /homedir/MyScript &> some_log.log The problem with this method is that some_log.log is only created after MyScript finishes. I would like to flush the output of the program into the file while it's running so I could do things like tail -f some_log.log and keep track of the progress, etc.

    Read the article

  • Mimic Windows' 'Run' window in .NET

    - by chaiguy
    I would like to mimic the Run command in Windows in my program. In other words, I would like to give the user the ability to "run" an arbitrary piece of text exactly as would happen if they typed it into the run box. While System.Diagnostics.Process.Start() gets me close, I can't seem to get certain things like environment variables such as %AppData% working. I just keep getting the message "Windows cannot find '%AppData%'..."

    Read the article

  • Shell loops using non-integers?

    - by mary
    I wrote a .sh file to compile and run a few programs for a homework assignment. I have a "for" loop in the script, but it won't work unless I use only integers: #!/bin/bash for (( i=10; i<=100000; i+=100)) do ./hw3_2_2 $i done The variable $i is an input for the program hw3_2_2, and I have non-integer values I'd like to use. How could I loop through running the code with a list of decimal numbers?

    Read the article

  • How many times can you randomly generate a GUID before you risk duplicates? (.NET)

    - by SLC
    Mathematically I suppose it's possible that even two random GUIDs generated using the built in method in the .NET framework are identical, but roughly how likely are they to clash if you generate hundreds or thousands? If you generated one for every copy of Windows in the world, would they clash? The reason I ask is because I have a program that creates a lot of objects, and destroys some too, and I am wondering about the likelihood of any of those objects (including the destroyed ones) having identical GUIDs.

    Read the article

  • IE6 turns jar into zip

    - by Sean Martin
    Using windows server, I have a path to a file that, when you click the button, executes the jar file and runs the program. At least in firefox. The problem occurs with IE6. It takes my file.jar and turns it into file.zip. Any suggestions here?

    Read the article

  • automate operations within a Virtualbox machine

    - by samb
    Hi, I'm Having some trouble in a vm that seems to occur only once in a hundred during shutdown/reboot. To help the debug, I'm thinking to write a script that runs on my desktop, which starts the vm and automate operations for a huge number of times (keyboard key pressed) whithin it. (VirtualBox preferred). It's just exactly how a script using the expect lib would do with a program in command line. I'm not sure it's possible, but anyway, if anyone has an idea... Cheers

    Read the article

  • Variable popen calls in C

    - by Bushman
    I'm trying to execute MS-DOS DEL commands inside a Win32 C program, and I already know that system and popen can be used for this. However, the problem is that both require string literals (type const char) for the commands, and I need something like the DOS equivalent of dir ~ | grep -P '/\d{7,8}\.exe$/' | rm, which obviously can't use string literals. Is there some other subprocess function in C that allows for char arrays as arguments for process names?

    Read the article

  • How to make a text box in a command line window?

    - by The.Anti.9
    I'm working with .NET (specifically Boo, but answers would work in C# too) and I want to know how I could create an editable box inside the command line, such that I could display a section of output in the top part of the command line, and have a one line box at the bottom for input, much like the program irssi (the IRC client) does. I assume this is possible with .NET, how would I approach this?

    Read the article

  • Create java sandbox based on security policies

    - by argos
    I need to create environment to run potentially untrusted code. Program allowed to connect to preconfigured address:port and nothing else (even read the system time). I have compiled the class whitelist. I'd searched similar questions, but found only template that based on SecurityManager which AFAIK is deprecated. Can anybody give me a simple sample how to run code in sandbox based on security policies and AccessController?

    Read the article

  • is it safe to call "plink.exe" in an application

    - by EBAGHAKI
    i want to use "plink.exe -u username -pw securepassword" on my windows visual c++ program. will username and password remain safe while calling this command? I mean can a hacker steal or sniff the username and password? (consider hacker can't get to the password directly from the exe file)

    Read the article

  • Create Excel files from C# without office

    - by tbischel
    I am writing a program that generates excel reports, currently using the Microsoft.Interop.Excel reference. My dev computer has Excel on it, but the end user may or may not have Office installed. Will this tool fail if Office isn't installed on the end users computer, or is this interop service separate from the actual application?

    Read the article

< Previous Page | 454 455 456 457 458 459 460 461 462 463 464 465  | Next Page >