Retro video games delivered to your door every month!
Click above to get retro games delivered to your door ever month!
X-Hacker.org- dBsee 4.6 - The Library - Norton Guide http://www.X-Hacker.org [<<Previous Entry] [^^Up^^] [Next Entry>>] [Menu] [About The Guide]

   The configuration file is read by dBsee and by the application at
   start-up. This file contains a set of options that are used for setting
   the VGA character font, the dBsee Table file's name, the printers, the
   ASCII character codes used for creating the CUA elements, the color
   palette, etc. All parameters are grouped in sections identified by a label
   (Additional information can be found in chapter The generated
   application).

   The configuration file is a plain ASCII file (like the Windows .INI files)
   and can be consulted and edited with any text editor.

   At start-up, the configuration file

     . is searched for in the EXE sub-directory of the application.
        The programmer can customise this file, assigning it a new name,
       therefore creating a different initialisation for the project or even
       sub-project. The new initialisation file's name must then be passed as
       a parameter to the application:

       Menu MYCONFIG.INI

     . is searched for using a DOS environment variable indicating
       the path and the file name:

       SET DBSTART=C:\WAYBILLS\MYCONFIG.INI

     . It is also possible to define specific initialisation files,
       that have the name of the section in DBSTART.INI as the file name, and
       have a .INI extension:

        Example:

        The configuration file for a particular set of printers will be named
       PRINTER.INI, because printer is the section name in
       DBSTART.INI.

     . If the Start-up with dBstart parameter in the
       sub-project's properties environment is set to No, the application
       will start with internal settings, and ignore any external
       configuration files. Of course, these settings represent the bare
       minimum for running the application. On the other hand, no manual
       intervention is allowed, making the executable protected.

Online resources provided by: http://www.X-Hacker.org --- NG 2 HTML conversion by Dave Pearson