Valid codes: ----------------------------------------------- 1. zwma’s code for modifying screen mode 2. Blade11’s code for “making the control unresponsive/responsive to events” 3. Code of Darkiss’s SafePtr object 3. l_x_yuan’s code for using text data sets to create login logs 5. Netup’s code for batch deletion of files 6. Code of creation_zy’s random number generator 6. Aizb program for drawing polygons with the mouse 8. Brave’s sample program to implement a circular involute form 9. A sample program for implementing text templates by JJams_King 10.luyear’s example of operating the Windows system desktop 11. A program of progsoft that writes itself 12. A program from qiubole used to demonstrate the concept of "polymorphism" in object-oriented design 13. A program from SINGLBOY that uses recursion to draw pictures on TCanvas 14. A program from wolf_cyj that tests whether the port is opened with UDP protocol 15.yhjvc is a program that operates the registry to modify the homepage and title bar settings of IE. 16.yyanghhong’s sample program for displaying database and related records on TTreeview 17.HubDog's "Minimum prototype example of parent-child control nesting" 18.zjlcc modifies the code of IE Home Page 19.creation_zy’s PackSrc() function is used to count valid characters in the source code 20.wheel's program for calculating the number of characters in Delphi source code 21.aizb’s program for counting characters
Obsolete code: ----------------------------------------------- 22.yyanghhong’s two codes for deleting the file itself 24.5145 Code to detect whether ADO is installed 25.aizb shared disk code code 26. dafuwen’s code for detecting mouse movement away from the picture 27. Code for Oldtiger’s hidden mission 28. Code of YB_unique’s hidden task 29. Sample code for ShellExecuteHook on HubDog’s shared disk
Notes on obsolete code: ----------------------------------------------- 1. The fact that these codes are obsolete does not mean that they do not have corresponding functions. In fact, some codes are very functional and very readable. 2. In addition, the fact that these codes are invalid does not mean that the provider is cheating. It is just that I can find the information online, but I cannot determine the true source of the information. Just because the code has been made public, I will not participate in these reviews.
Regarding the directory structure in the file: ----------------------------------------------- 650664 Haha, this is the ID number of the post | |--650664.mht Save the posts made by this project in DelphiBBS |--1019143.mht Save the evaluation and result posts of this project in DelphiBBS |--650664_xxxxxxxx.zip The previously released versions of the code package. xxxxxxxx is the release date. | |--Killed This is the directory of the obsolete code, put together | |--UserName This is the name of the corresponding submitter | | |--Description.txt This file specifically explains the reason why the corresponding code is invalidated. | | --... Obsolete code and related files | --OtherUserName.... | |--UserName This is the name of the submitter of the code that passed the review | |--Evaluation.txt This file is the specific evaluation results | |--... Submitted code and sample program | --Fixed This directory stores my modified code | --... Correct code | --TotalChar The three codes that count the number of valid characters in the statistical code are placed here.
Note: This resource comes from Aimingoo’s homepage: http://www.doany.net/org/index.htm