资源列表
mouse
- 捕获鼠标,更改鼠标光标,屏幕坐标与窗口坐标的转化-Capture the mouse, change the mouse cursor, the screen coordinates and window coordinates into
VC
- 白乔原创的文章 介绍VC环境下界面编写的问题,右图右真相,很详细的学习资料。 -Please upload the data more carefully written features, including the content descr iption (at least 20 words). Try not to let owners to spend time on your revised instructions. Archive decompression can not ha
Eltima.Application.as.Service.v3.0.0.67.Incl.KeyM
- Application as Service is a cutting edge solution that will let you run any application as a Windows service, benefitting from all the advantages native Windows services have, still providing you with many more functions.Application as Service offers
cyuyan
- c语言的一些学习资料,还不错,供大家参考,共同进步。-c some of the language learning materials, but also good for your reference, and common progress.
Detail-illustration-of-Reg-API
- 注册表编程资料,包括所有读写注册表API,适用于VC也适用于VB,对于每个API都有详细的解释,同时也有详细的示例代码!公注册表编程学习者使用!-Registry program, including all read and write Registry API, for VC also applies to VB, for each API has a detailed explanation, but also a detailed sample code! Public registry
LCD-display-
- 显示菜单内核源代码和说明,跨平台能力强,可用在各种系统中-Kernel source code and display the menu descr iption, cross-platform capability, available in a variety of systems
Visual-C-P-P-from-entry-to-practice
- 本代码是Visual C++从入门到实践这本书的源码-This code is Visual C++ from entry to practice the source of this book
Virtual-host-management
- 虚拟主机管理系统源代码 虚拟主机管理系统源代码--002--可-Virtual host management system source code, source code management system, virtual host- 002- to
How-To-Unistall-Program
- How To Uninstall Setup Automatically : This programm develop in vb6.
PocketLift18180911142004
- A demonstration of coding for the PocketPC. Really it is nice because it shows those new to PocketPC programming that it can be done without too much trouble.
CopyFolders
- Copy root and sub folders from one directory to another
WinIo
- 通过底层各个设备的端口调用系统资源,并附有vc和vb的代码-The WinIo library allows 32-bit Windows applications to directly access I/O ports and physical memory. It bypasses Windows protection mechanisms by using a combination of a kernel-mode device driver and several low-level