Add-In Express for Office and .Net Add-In Express™ for Microsoft® Office and .Net

Total Page:16

File Type:pdf, Size:1020Kb

Add-In Express for Office and .Net Add-In Express™ for Microsoft® Office and .Net Add -in Express™ for Microsoft® Office and .net Add-in Express for Office and .net Add-in Express™ for Microsoft® Office and .net Add-in Express™ for Microsoft® Office and .net Developer's Guide Revised on 1-Jul-20 Copyright © Add-in Express Ltd. All rights reserved. Add-in Express, ADX Extensions, ADX Toolbar Controls, Afalina, AfalinaSoft and Afalina Software are trademarks or registered trademarks of Add-in Express Ltd. in the United States and/or other countries. Microsoft, Outlook, and the Office logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Borland and the Delphi logo are trademarks or registered trademarks of Borland Corporation in the United States and/or other countries. THIS SOFTWARE IS PROVIDED "AS IS" AND ADD-IN EXPRESS LTD. MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, ADD-IN EXPRESS LTD. MAKES NO REPRESENTATIONS OR WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE LICENSED SOFTWARE, DATABASE OR DOCUMENTATION WILL NOT INFRINGE ANY THIRD-PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS Add-in Express™ 2 www.add-in-express.com Add-in Express for Office and .net Add-in Express™ for Microsoft® Office and .net Table of contents Add-in Express™ for Microsoft® Office and .net ................................ 2 Table of contents ................................................................................ 3 Introduction ....................................................................................... 11 Add-in Express in seven lines ................................................................................................... 12 Installing and activating ............................................................................................................. 13 Activation basics ........................................................................................................................................ 13 Setup package contents ............................................................................................................................ 14 Redistributables ......................................................................................................................................... 14 Solving installation problems ..................................................................................................................... 15 Creating Add-in Express projects ............................................................................................. 15 Preconditions ............................................................................................................................................. 15 Developer permissions .............................................................................................................................. 16 Add-in Express projects............................................................................................................................. 16 Add-in Express project structure ............................................................................................................... 17 Add-in Express modules............................................................................................................................ 19 Registering the project, registering the add-in, the registrar ..................................................................... 21 Using .config files with Office extensions .................................................................................................. 21 Office extensibility technologies supported ............................................................................. 22 System requirements ................................................................................................................. 22 Technical support....................................................................................................................... 23 What's new in Add-in Express version 9 .................................................................................. 24 Getting Started .................................................................................. 25 Your first Microsoft Office COM add-in ..................................................................................... 26 Download the example .............................................................................................................................. 26 A bit of theory ............................................................................................................................................ 26 Step #1 – Creating COM add-in project .................................................................................................... 27 Step #2 – Add-in module ........................................................................................................................... 31 Step #3 – Add-in module designer ............................................................................................................ 31 Step #4 – Office applications that your add-in supports ............................................................................ 32 Step #5 – Office application that loads your add-in ................................................................................... 33 Step #6 – Handling errors and logging debug messages ......................................................................... 34 Step #7 – Designing custom Ribbon UI .................................................................................................... 34 Step #8 – Advanced Task Panes in Excel 2000-2019/365 ....................................................................... 36 Step #9 – Advanced Task Panes in Word and PowerPoint 2000-2019/365............................................. 39 Add-in Express™ 3 www.add-in-express.com Add-in Express for Office and .net Add-in Express™ for Microsoft® Office and .net Step #10 – Accessing host application's object model ............................................................................. 40 Step #11 – Handling host application events ............................................................................................ 42 Step #12 – Programming the Ribbon UI ................................................................................................... 43 Step #13 – Programming Add-in Express regions .................................................................................... 46 Step #14 – Running the COM add-in ........................................................................................................ 47 Step #15 – Debugging the COM add-in .................................................................................................... 50 Step #16 – Deploying the COM add-in ...................................................................................................... 50 What's next? .............................................................................................................................................. 51 Your first Microsoft Outlook COM add-in ................................................................................. 52 Download the example .............................................................................................................................. 52 A bit of theory ............................................................................................................................................ 52 Step #1 – Creating COM add-in project .................................................................................................... 53 Step #2 – Add-in module ........................................................................................................................... 57 Step #3 – Add-in module designer ............................................................................................................ 57 Step #4 – Outlook versions that your add-in supports .............................................................................. 58 Step #5 – What Outlook version loads your add-in ................................................................................... 59 Step #6 – Handling errors and logging debug messages ......................................................................... 60 Step #7 – Designing custom Ribbon UI in Outlook ................................................................................... 60 Step #8 – Advanced Outlook Region in Outlook 2000-2019/365 ............................................................. 61 Step #9 – Accessing Outlook objects ........................................................................................................ 64 Step #10 – Handling Outlook events ......................................................................................................... 66 Step #11 – Programming the Outlook Ribbon UI ...................................................................................... 68 Step #12 – Programming Add-in Express regions .................................................................................... 71 Step #13 – Running COM add-in project .................................................................................................. 72 Step #14 – Debugging COM add-in .......................................................................................................... 75 Step #15
Recommended publications
  • Symantec Report on Rogue Security Software July 08 – June 09
    REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software July 08 – June 09 Contents Introduction . 1 Overview of Rogue Security Software. 2 Risks . 4 Advertising methods . 7 Installation techniques . 9 Legal actions and noteworthy scam convictions . 14 Prevalence of Rogue Security Software . 17 Top reported rogue security software. 17 Additional noteworthy rogue security software samples . 25 Top rogue security software by region . 28 Top rogue security software installation methods . 29 Top rogue security software advertising methods . 30 Analysis of Rogue Security Software Distribution . 32 Analysis of Rogue Security Software Servers . 36 Appendix A: Protection and Mitigation. 45 Appendix B: Methodologies. 48 Credits . 50 Symantec Report on Rogue Security Software July 08 – June 09 Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. This includes an overview of how these programs work and how they affect users, including their risk implications, various distribution methods, and innovative attack vectors. It includes a brief discussion of some of the more noteworthy scams, as well as an analysis of the prevalence of rogue security software globally. It also includes a discussion on a number of servers that Symantec observed hosting these misleading applications. Except where otherwise noted, the period of observation for this report was from July 1, 2008, to June 30, 2009. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network.
    [Show full text]
  • Gedownloade Software
    KIJK SOMS UIT MET UPDATEN !!! 2 e CD zie onderaan! GEDOWNLOADE SOFTWARE Ace Utilities 5 TROJAN!!!!!!!! Advanced System Care Pro 3.4.0 Advanced System Optimizer 3.0.6 Any Video Converter 2.7.7 Pro Ashampoo Internet Accelerator 3 Ashampoo Winoptimizer 6.24 Auslogics Boost Speed 4.5.1.4 Clean My PC 4.2.3 Error Repair Pro 4.0.5 Glary Soft Utilities Pro 2.17 Lavasoft Ad-Aware 2009 Pro Limewire Pro 5.1.4 Final Microsoft Windows XP Pro with SP 3 MS Office 2007 PC Washer 2.2.1 Power Video Converter 2.2.15 Ramsaver Raxco Perfect Disk 10 Raxco Perfect Speed PC Optimizer 2.0.0.104 Registry Booster 2010 Registry First Aid Platinum 7.1.1.1 Registry Winner 5.5.9.4 Speedconnect 7.5 Tune-Up 2010 Winzip Pro Final CD 3 PC Optimizer Pro 4.5.44 PC Tools Registry Mechanic 9.0 RamSaver Pro Registry Ace 1.0 Probleem met Patch Registry Clean Expert 4.7.6 Registry Easy 4.6 GOED PROGRAMMA! RegistryFix 7.1 Registry Tidy 2009 Registry Vac 5.0.1.26 UITSTEKEND !!! Serials Grabber 1.1 Softflyers Speed Video Converter Trojan Remover 30 dagen geldig wel update mogelijk! (SCANT ELKE DAG) Ultra Optimizer 2.0.0 UITSTEKEND!!! Ultra Video Converter 44.0827 Uniblue Driver Scanner 2009 (hoort bij Powersuite) Uniblue Registry Booster 2010 versie 4.5.0.17 Uniblue Speed Up My PC! Versie 3.5 Very PDF to Word Converter versie 3jkkkjk Webroot Windows Washer 6.5.5.155 RETAILVERSION!!! Wintools Pro 10.0.1 Winutilities 9.1 YL Computing Winutilities Wise Registry Cleaner Pro 4.83 YL Computing Winutilities 9.1 XP Antispy CD 4 1 Million Serial Keys Advanced System Care Pro 3.2.0 Any Video
    [Show full text]
  • Comodo Cloud Scanner User Guide
    Comodo Cloud Scanner Software Version 2.0 User Guide Guide Version 2.0.092611 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo Cloud Scanner - User Guide Table of Contents 1.Comodo Cloud Scanner - Introduction.................................................................................................................................... 3 1.1.System Requirements ........................................................................................................................................................ 4 1.2.Installing Comodo Cloud Scanner....................................................................................................................................... 5 1.3.Starting Comodo Cloud Scanner......................................................................................................................................... 9 1.4.The Main Interface.............................................................................................................................................................. 9 2.Scanning Your System............................................................................................................................................................ 11 2.1.Summary of the Scanning Process................................................................................................................................... 11 2.2.Scanning Full System.......................................................................................................................................................
    [Show full text]
  • December 8.2006 Ari Schwartz Alissa Cooper Center for Democracy
    CORR CRONIN MICHELSON BAUMGARDNER & PREECE LLP PAUL R. RASKIN Attorney at Law December 8.2006 Via Facsimile to (202) 637-0968 and First Class Mail Ari Schwartz Alissa Cooper Center For Democracy & Technology 634 Eve Street N W # 1 100 Washington DC, 20006 Re: Sol'twireOnli~ie.coni Dear Mr. Scliwariz and Ms. Cooper We represent SoftwareOt~liiie.com.We write to bring to your attention misleading characterizations of certain litigation published on the Center For Democracy & Technology's website. The litigation is State of Washington v. Software0nline.com. It is discussed on the "Spyware Enforcement - State" portion of your website under the "Consumer Privacy" Section (located at: http://~v~vw.cdt.or.~privacy/sp~are/20060626spvware-e1iSorcciiici~t-state.pl~p).Your website's niiscategorization of this matter as a "spyware case" and "spyware enforcement" creates the potential for serious damage to SoftwareOnli~ie.coi~i'sbrand, goodwill. and business prospects. SoftwarcOnl~nevoluntarily settled Consumer Protection Act claims brought by the Washington Attorney General's Office on April 1 1, 2006 The complaint filed by the State of Washington against Sott\\areO~iIinecon1 and the judgment voluntarily entered by S~ft~~~~~reOiiIiiiecoiii clo not co11ta111 cla~nisunder anti-spyware statiites or laws If yoii go to the Washington Stale Attorney General's website (located at ww w.atr.wa.yov) and type the word 'spyware" in the sciirchbox, you will not find any references to Sof'twarcOnlinc corn Further. if you search through press releases on the WSAG website, you will see that the Attorney General reports the Secure Computer action filed on January 25, 2006 as the "first lawsuit under the btate-s new conipiitcr sppvarc act" (m hup ww 'ity \\ '1 ~ov/ielcases/2006!rcl Spyware Lawsuit 0 12506 html) and the Movie Land Art Schwart7 Al issa Cooper December 8.
    [Show full text]
  • This Month ————— the Library Online-What You Never New Was
    The New Orleans Personal Computer Club Newsletter MotherBoard Volume 28, Issue 4 April 7, 2010 This Month Things, Thinglets & Thingassoes ————— By Jack Lewtschuk, Columnist, Monterey Bay Users Group, PC (MBUG-PC), Califor- The nia mbug-pc newsletter, January 2010 http://www.mbug.org/ Library Blacklion (at) royal.net Online: What You Never The Bad Guys are after Your Money New was There! Well, that’s nothing new. Speaker Just as knowing the “computer language” is good to assist communica- tion when seeking help or offering help to others, so is knowing the Ricardo G. Mesa definition of words to describe cybercrime. Just to better understand the nomenclature of cyber assaults, one has to be able to understand the lingo. I researched the Internet (some (Continued on page 2) Inside this issue: This Month at the NOPCC Things, Thinglets & The Library Online-What You Never Thingassoes 1 New was There! This month at NOPCc 1 5 Advertisements Ricardo G. Mesa, IT Network Administrator for the Jef- ferson Parish Library, will discuss internet resources Calendar of Events 6 available to library card holders, including Library NOPCC Directory Technology, Library Services, Google Scholar, Library Databases, Ancestry, Learning Express, EBSCO, Gale Group and Home Help (Brainfuse) PAGE 2 MOTHERBOARD Volume 28, Issue 4 (Continued from page 1) very helpful “e-letters”) and came up with this handy list: “Adware” A piece of software that displays advertisements on a computer after the software is installed. Adware can be benign, as in the case of a free program that displays ads in a manner that is This column left blank.
    [Show full text]
  • Datasheets Datasheet
    PROFESSIONAL DATASHEETSDATASHEET Get that fresh ‘new PC’ feeling back with CCleaner Professional If your PC is slow, crashing or running out of hard drive space, CCleaner Professional is the solution. Its patented cleaner clears the clutter from your hard drive, removes junk from the Windows Registry, and protects your privacy by removing tracking cookies and browser history. All without touching your documents, music, videos and other files. If you have more than one person using your PC, CCleaner Professional can clean multiple user profiles. With system monitoring it keeps an eye on your system in the background and cleans when needed. It updates itself automatically, so you’ve always got the latest version. And if you have any questions, our priority technical support team has answers. Regain your PC’s speed, stability and privacy with CCleaner Professional. CCLEANER PROFESSIONAL HIGHLIGHTS 1. CCleaner Professional analyzes PCs to see what can be cleaned. You decide when and what to clean. 2. The patented Registry cleaner locates and fixes problems in the Windows Registry so that Windows remains stable on your PC. 3. CCleaner Professional removes tracking cookies, while keeping the cookies you need to access web-based applications like Gmail and Facebook. MADE BY For more information contact [email protected] www.piriform.com PROFESSIONAL DATASHEET CCLEANER PROFESSIONAL: A FASTER, MORE RELIABLE PC – INSTANTLY Make your PC last longer CCleaner Professional speeds up your PC and recovers hard drive space. It’s like getting a brand-new PC for a fraction of the cost. Easy to use If you can use email, you can use CCleaner Professional.
    [Show full text]
  • How to Clean My Pc Completely Free
    How to clean my pc completely free click here to download Sadly, it's become increasingly common to advertise that a registry or other PC cleaner program is free to "download" even though the all important "cleaning" part will cost you. Fortunately, among the hundreds you'll find in a search, there are several very good, completely free PC cleaner tools available. The other tools in Free Windows Cleanup Tool let you clean up computer usage traces in popular programs, remove temporary files, empty recent document lists (all of which will help you recover valuable disk space), and also check start-up programs and fix Registry errors – creating a full backup beforehand just in case. When I set my computer options for best performance it really did speed up. Amazing. Maybe it doesn't look. www.doorway.ru - How To Make Your Computer Run Faster For Free Sick of all those. Essential PC cleaning software. Keep your PC clean and running like new with CleanMyPC. It scans your whole computer to clean up junk files, speed up your PC, and boost its performance. CleanMyPC is more than a PC cleaner — it's an essential tool that cares for your computer. Free Download Buy Now. Auslogics Registry Cleaner is one of the best free computer registry cleaners available on the market. It will clean and Absolutely FREE. This program is totally free with no term limitations for home or commercial use. Free regular updates included. Is Registry Cleaner enough to get my computer performing at its best? 5 ways to spring clean your PC or laptop.
    [Show full text]
  • Freeware Software Tools
    FIVE POWERFUL PROGRAMS FOR EVERY REAL ESTATE APPRAISER The right tools are critical to keeping an appraisal business up and running efficiently. Here are five programs that deliver significant functionality to an appraiser’s daily practice. These programs can secure and shrink files, clean your OS to keep your system running efficiently, and save you from horrible mistakes when files are accidentally deleted. They can also manage password access to your OS and programs, and provide you with a sophisticated real- time backup of all of your important programs and data. Any one of these five programs are a problem solver on a multitude of levels, and together they help to fill your tool box with the five solutions that will help keep your computer up and running efficiently every day. ZIP ARCHIVER ZIP Archiver is a powerful and modern archival program that allows users to easily compress and open files from any archive. Users can use cloud technologies to conveniently create copies of important files, quickly send reports to their clients, or share data with colleagues. Figure 1: Zip Archiver CCLEANER CCleaner may be the most popular system maintenance tool ever. Is your computer running slow? As it gets older it collects unused files and settings which take up hard drive space making it slower and slower. CCleaner cleans up these files and remedies this problem in seconds. Advertisers and websites track your behavior online with cookies that are placed on your computer. CCleaner erases your browser search history and cookies so any Internet browsing you do stays confidential and your identity remains anonymous.
    [Show full text]
  • Symantec Report on Rogue Security Software July 08 – June 09
    EXECUTIVE SUMMARY: SYMANTEC ENTERPRISE SECURITY SYMANTEC SUMMARY: EXECUTIVE Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software Executive Summary Contents Introduction . 1 Overview of Rogue Security Software. 1 Conclusion. 9 Highlights . 10 Credits . 11 Symantec Report on Rogue Security Software Executive Summary Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. A rogue security software program is a type of misleading application that pretends to be legitimate security software, such as an antivirus scanner or registry cleaner, but which actually provides a user with little or no protection and, in some cases, can actually facilitate the installation of malicious code that it purports to protect against. The perpetrators of these rogue security software scams are well-equipped to prey on Internet users. Many of these scams are very lucrative and appear to be run by highly organized groups or individuals who maintain an effective distribution network bolstered by multi-level marketing efforts. These scams employ a full range of advertising and distribution techniques to ensnare potential victims, while offering substantial profit for scam distributors, given that advertised costs for these products range from $30 to $100.1 In total, Symantec has detected over 250 distinct rogue security software programs. During the period of this report, from July 1, 2008, to June 30, 2009,2 Symantec received reports of 43 million rogue security software installation attempts from the over 250 distinct samples.
    [Show full text]
  • Clean Slow Windows PC / Laptop from Spyware, Malware, Viruses, Worms and Trojans - Anti-Malware Program Arsenal
    Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog Clean slow Windows PC / Laptop from Spyware, Malware, Viruses, Worms and Trojans - Anti-Malware Program Arsenal Author : admin Malware Bytes is a great tool to clean a PC in a quick and efficient way from Malware / Spyware that wormed while browsing infectious site on the internet. But sometimes PCs that has to be fixed are so badly infected with Spyware, Malware and Viruses that even after running Malware Bytes on boot time, left Work or Viruses do automatically download from the Internet or have been polymorphically renamed to a newer one that escapes Malware Bytes badware database and heroistics. Such problematic PCs are usually unmaintained user PCs whose Anti-Virus procetion with Nod32 or Kaspersky licensing has long expired leaving the PC without any mean of protection / PCs with removed Firewall / AV Program (due to Virus or Malware Infection) or on Computers which were used actively to download Cracked Programs, Games - by small kids or PCs used for watching heavily Porn (by teenagers). Here is a List of Top Iseful FreeWare anti-Malware softwares, you can use in combination with MalwareBytes to (Clean) / Fix a Windows PC that is in almost unsolvable state (and obviously needs re-install) but contains too much software either obsolete or hard (time wasting) to configure: Below anti-malware goodies helps in "Resurrecting" even the worst infected PC, so I believe every Win Admin should know them well and in computer clubs and university Windows computer networks with Internet it is recommended to check computers at least once a year ..
    [Show full text]
  • Free Registry Cleaner Download Do I Need a Registry Cleaner? Occasionally, Yes
    free registry cleaner download Do I Need a Registry Cleaner? Occasionally, yes. Although messing with your computer’s registry is a somewhat dangerous process and you should use it in only in case of dire emergency , doing so every once in a while can indeed be useful. Using a registry cleaner will allow you to assess the state of your registry , as well as other crucial parts of your system in minutes. Whenever you start experiencing major performance issues on your computer such as the programs taking too long to respond, apps crashing, general freezing etc., it is most likely that your registry may need a hand. Furthermore, anytime you get a virus or malware you should always run a registry scan too . After those threats are removed, the major damage caused by them will be located precisely in the registry. Formatting your computer may seem a more viable solution as it eliminates all files, and consequently all the errors , leading to a fresh clean computer; however, performing such a task should only be considered a last resource . Since your system will return to a blank point, reformatting your computer can be a very exasperating process. If you don’t have a backup of your complete system and all the programs you had, you have to manually reinstall them once again. Whenever a strong virus blocks your computer, the Blue Screen of Death appears or a black screen doesn’t let the computer start at all, formatting your PC is indeed your only option. Believe it or not, the biggest menace to computers is us, ordinary users.
    [Show full text]
  • Paul Collins Status Name/Startup Item Command Comments X System32
    SYSINFO.ORG STARTUP LIST : 11th June 2006 (c) Paul Collins Status Name/Startup Item Command Comments X system32.exe Added by the AGOBOT-KU WORM! Note - has a blank entry under the Startup Item/Name field X pathex.exe Added by the MKMOOSE-A WORM! X svchost.exe Added by the DELF-UX TROJAN! Note - this is not the legitimate svchost.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder X SystemBoot services.exe Added by the SOBER-Q TROJAN! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a HelpHelp subfolder of the Windows or Winnt folder X WinCheck services.exe Added by the SOBER-S WORM! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "ConnectionStatusMicrosoft" subfolder of the Windows or Winnt folder X Windows services.exe Added by the SOBER.X WORM! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "WinSecurity" subfolder of the Windows or Winnt folder X WinStart services.exe Added by the SOBER.O WORM! Note - this is not the legitimate
    [Show full text]