Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 12/21/2012 in all areas

  1. Nice example. Dim is indeed more complicated than it at first appears. In view of this I believe the depreciation of this keyword perhaps ought to be revised.
    2 points
  2. There are many uses of Global variables in most of the included UDFs, definitely not a no-no to the devs. Every XXconstants.au3 file is nothing but global variables. It all depends on what you need the variable for that decides its scope.
    2 points
  3. This one is Pure RegEx without Replacements#include <Array.au3> $s = "?t1=toto&t2=titi&t3=tyty&t4=tutu" $s = StringRegExp($s, "(?:t[13]=)(\w*)(?:&|)", 3) If Not IsArray($s) Then Exit -1 ;The value of the first and third is displayed in this example _ArrayDisplay( $s )
    1 point
  4. Example #include <Array.au3> $s = "?t1=toto&t2=titi&t3=tyty&t4=tutu" $s = StringRegExp($s, "(?:t[13]=)(\w*&?)", 3) If Not IsArray($s) Then Exit -1 ;The value of the first and third is displayed in this example ;Strip Ending ampersand [comes across when for example 2 and 4 is deleted] For $i = 0 To UBound($s) - 1 $s[$i] = StringRegExpReplace($s[$i], '(?m)(&)(r|n|$)', '\2') Next _ArrayDisplay( $s ) Thumbs up if it helps
    1 point
  5. OK?! So there was no need for me to respond then? This is easier to read. #include <Array.au3> Global $g_aArray[2] = [1, 2] SomeFunc() Func SomeFunc() ReDim $g_aArray[3] ; Re-size the array and keep its content. _ArrayDisplay($g_aArray) Local $aArrayN[2] ; Create a new array. $g_aArray = $aArrayN ; Assign to the Global variable. $aArrayN = 0 ; Destroy array contents. _ArrayDisplay($g_aArray) EndFunc ;==>SomeFunc
    1 point
  6. Yes, well I think we are talking about a whole different animal now, as much as they would share similarities. It's not a matter of me making a version of your script/udf, as it will serve a different purpose. I don't see a scenario for minimize or show, hide, etc. I just see it as - 1) Report to user that the program is already running, and maybe give an option to run another instance or not. 2) Don't report to the user, and don't allow another instance. 3) Don't report to the user, and allow another instance (possibly with determining criteria). 4) Don't report to the user, don't allow another instance, and restore the first instance to prominence. That's pretty much it as i see it. 4 flags if you like. The difficulties I envisage, and where perhaps our main difference lies, is where each program needs a unique marker automatically ... md5 hash perhaps?
    1 point
  7. As is repackaging it, otherwise I would give my usual spiel about taking the time to properly package the features you want in an MSI I would not install from the executable you post, personally (I'm one of the less than smart people Jos alluded to ). The executable reaches out to the internet and pulls down an executable (Northstar.exe) along with a dll file, and throws them into the temp directory. Everything I see regarding Northstar.exe looks to be malicious. I would highly suggest you get each of the applications you want to install from the vendor's website (as I did in post #4 to test the silent switches). This executable you have in your OP was created by Solimba Aplicaciones S.L., so my virus meter is well into the red
    1 point
  8. Just don't forget to add in checks to make sure those programs exist and a backup plan if they've been removed by the person who stole your machine.
    1 point
  9. The '\' are missing in 'C:\Windows\System32\baspscfg.exe'
    1 point
×
×
  • Create New...