installshield engine directory
Posted 16 November 2001 - 00:10
Posted 16 November 2001 - 16:07
Overall it sounds like bad news to me. Though of course everything is possible. For instance you can create a faux setup file (that is not actually installshield based) and rename the InstallShield setup.exe to something like setup2.exe and call your winapp to setup.exe so it does the change if located and replaces the file, then calls setup.exe and the user won't be the wiser(if their access grants them permission to change such files of course).... Again not too sure if this is "legal" and ok with the execs at IS... this could be called a viral propagation method because you are modyfying something that may give unexpected results, and who knows what the liabilities may be...
What is it that you cannot do programmatically?
-=OC
Posted 16 November 2001 - 17:45
thanks!
Posted 19 November 2001 - 13:54
Use
Kernel32.LoadLibrarxEx
with
LOAD_WITH_ALTERED_SEARCH_PATH
this way you can control the search path.