Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,492 intercept jobs found, pricing in AUD

    I'm looking for c++ DLL which based on one of the following messengers: Microsoft (MSN ver 5.0) Yahoo ICQ AIM Will be able to intercept the chat session between the individual who has the DLL installed on their computer and the individual who their talking to. Two way intercept: messenges sent and received in the messenger window. If you wondering what i want to do with the conversation. For now, just write it out to a log file. We will be testing this out on all messengers. I would also like to interrogate the contact list. I'm looking for port interrogation via each messenger, not a cut/paste via interrogating windows handles. If you feel the price is too low, or have any other questions. Please feel free to ask. I'm a technical guy and understand this stuff ...

    $462 (Avg Bid)
    $462 Avg Bid
    4 bids

    Develop an ActiveX control in Visual C++ 6.0 that can hook into the Microsoft operating system's LSP chain, and intercept and block TCP/UDP packets. After packets have been intercepted, analyze and evaluate packet contents for words that may been deemed inappropriate. Read attached document for more information. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request. 3) Complete ownership and distribution copyrights to all work purchased. ## Platform All 32 Bit Microsoft Windows Variants, Both NT Based and non NT Based. Winsock 2 may need to be installed on Win...

    $222 (Avg Bid)
    $222 Avg Bid
    9 bids

    ...Average all the ratio 1, ratio 2 temp from all the data packets obtained in single serial read. 6. Recurring calculation for water concentration display: 1. Obtain averaged (see collect data no 3) ratio 1 ratio 2 temp and temp. 2. Average ratio 1 and ratio 2 to give Ratio 3. Set T current = temp 4. Calculate ABS = log[ratio] 5. Calculate water concentration = [ABS * slope +Intercept] * [Tcurrent*Tcorr] (the slope and Intercept are obtained in the calibration and are stored in memory, ??" see user interface for more; T corr is a parameter that will be set in the source c ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in re...

    $1569 (Avg Bid)
    $1569 Avg Bid
    13 bids

    ...internet cafes, would like to increase their revenue by inserting advertising into the web pages viewed by their customers. They would also like to divert customers to particular web-pages when their time is up. The internet cafes currently use hardware NAT. We know that we will need to move to a linux-based router which can be customised. This project is for the invisible HTTP proxy required to intercept and modify HTML en route to the customer. Functionality such as billing and ad serving are a separate project. The requirements are: 1. To wrap all web pages the customer views (other than pop-ups) in a frameset, the top frame of which will always point to the same URL and the bottom frame will show the URL requested in the address bar. This must not add significantly to the cus...

    $859 (Avg Bid)
    $859 Avg Bid
    6 bids

    I need a function/component that can stand between an email client and the internet and intercept outgoing emails (there may be a seperate project in the future to support incoming). It needs to be able to return: Mail Header Mail Body Recipient(s) CC BCC Subject Priority and any other relevant properties. It should hold the email until a method is called which either allows it to proceed or cancels the send. Ideally it should work with all email clients, otherwise it should at least support all versions of Outlook and Outlook Express. Please mention in your bid which clients you could support. Ideally it should be self configuring just like Norton AntiVirus - i.e. the user shouldn't have to manually change their email clients settings. Please state in your bid whether or not y...

    $280 (Avg Bid)
    $280 Avg Bid
    10 bids

    I would like a program that attatches a personal message to the bottom of my outgoing email messages. It should work with any email program and sit in the system tray. It will monitor when my email client sends and email via the SMTP port. Once it see's that i am sending a message it should intercept it and put it into its own outgoing que and then add a random personal message that i have pre-setup. once sent then move to sent folder in my app. Much like how Nortan Anti-Virus 2002 scans outgoing messages for viruses. Norton does not have you modify your email clients outgoing SMTP server to localhost or change your email client settings in anyway, i want this also. Except I want to add a footnotes & signatures & quotes to me outgoing mail. Also i want it to be a DLL so...

    $327 (Avg Bid)
    $327 Avg Bid
    9 bids

    Seeking someone to code.... (see addition 3/01/03)below 1). a real time module to intercept incoming internet data and pass it through to my program which will manipulate the information and format an output string. Must also return that output string as if keyboard response was initiated. a.) must be able to accept and respond to multiple URL's b.) must be able to operate real time 24/7 c.) preference is VB 2.) will require source code when complete a.) must contain full documentation 3.) potential for further enhancements after initial version is tested. Include tentative time frame for completion with bid...this will be negotiated prior to acceptance after all questions have been satisfied. ## Deliverables ADDED 3/01/03- To clarify this request, I follow the stock market ...

    $520 (Avg Bid)
    $520 Avg Bid
    5 bids

    ...is just acting normally. EncryptionKey As String A string of up to 256 bits (32 bytes) that controls the key that the encryption code is using. UnlockCode As String An undisclosed code (that we will arrange when coding) that prevents third parties and such from using the control. This will help protect both the control (primary reason) and also the remote chance that someone is attempting to intercept and crack messages with bad keys. If they can't use the control, they won't cause trouble! This should be a fixed variable within the code, that can easily be changed. If this code isn't supplied, or is incorrect, the OCX should simply fail. Also, two new events should be added to the control: RemoteBadPassword Raised when the password is rejected by the remote machin...

    $66 (Avg Bid)
    $66 Avg Bid
    2 bids

    We are working at an internet filter application like cyper patrol and net nanny. We need an interception layer and packets filter module (DLL or ActiveX). this module have to do the follwoings: 1- intercept any packet and return to the applicaiotn to take the decision. ( it's very like the transparent proxy in the unix system) 2- the dll of the avtiveX have to be made by C++ anyway we can discuss the details. thanks ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request. 3) Complete ownership and distribution copyrights to all work purchased. ## Platform windo...

    $127 (Avg Bid)
    $127 Avg Bid
    4 bids

    Requirement modified. Our importance is point 1 below. 1. Read video RAM of a machine with any OS installed . No software will be installed on machine . You can plug the device in a PCI slot or intercept signals running to monitor. Please make clear how you intend to do before bidding. The signal is in nano second range and it might be difficult to capture. 2. Device should have embedded web server. For example, see siteplayer.com. It is AT89c51 based. 3. Ping all machines and modify a register according to reponse. 4. All registers accessible from web interface. 5. Take Some decisions with ping response ,like if TIME > 300ms Then glow a LED or trigger a buzzer etc. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete sourc...

    $4494 (Avg Bid)
    $4494 Avg Bid
    4 bids

    ...opened then the program should intercept the open, check if the file is encrypted, if it is decrypt it, and then resume opening the now decrypted file in the appropriate program. This should work for all associations (except .exe, .ocx, .dll, .sys, etc) and should require no user intervension. The solution should use the Softuarim EdCrypt 3.1 Library, using the Rijndael algorithm with the fixed password "KEY". When the program encrypts a file it should place 9 bytes at the begining of the file, to indicate to the program that the file is encrypted. If the string "ENCRYPTED" exists at the begining of the file then the program should decrypt, otherwise it is to simply send the file to the program associated with the file being opened. The application should i...

    $82 (Avg Bid)
    $82 Avg Bid
    4 bids

    Required - a very simple MS Word add-in to intercept the opening, saving and closing of word documents from the MS Word menus and toolbar buttons. The program will need to get the document password from an existing activex control written by us. It also needs to read and add information to the custom properties. Here is the logic. Before opening any file the properties are checked. If a certain custom property is present (and set to true) a special call is made to our custom active X control that provides the passwords needed to open the file. Before saving a file the user is queried about whether they want to use our custom active X control to manage passwords etc. On closing our custom active X control must receive the correct instructions t terminate cleanly. Follow up projects w...

    $88 (Avg Bid)
    $88 Avg Bid
    5 bids

    I need an HTML code to intercept Yahoo Mail passwords by showing a clone of Yahoo Mail screen, let the operator to enter his username and password, send the info to a pre-defined email account and re-direct the control to the real Yahoo Mail page. Where banners are needed, you can use what you want or use the real banners, simple is better. The application must send the info without asking the user to authorize it. If possible, must show the real address of Yahoo Mail in the browser, but the HTML file will reside on the computer or in other web site. ATTENTION: In order to clear the image of Caribbean Ltd., we need to clarify the position of our client: "This application will be used to track the activities of people who take pornographic photos and have sex with children in Co...

    $19110 (Avg Bid)
    $19110 Avg Bid
    1 bids

    ...is just acting normally. EncryptionKey As String A string of up to 256 bits (32 bytes) that controls the key that the encryption code is using. UnlockCode As String An undisclosed code (that we will arrange when coding) that prevents third parties and such from using the control. This will help protect both the control (primary reason) and also the remote chance that someone is attempting to intercept and crack messages with bad keys. If they can't use the control, they won't cause trouble! This should be a fixed variable within the code, that can easily be changed. If this code isn't supplied, or is incorrect, the OCX should simply fail. Also, two new events should be added to the control: RemoteBadPassword Raised when the password is rejected by the remote machin...

    $43 (Avg Bid)
    $43 Avg Bid
    1 bids

    This project require strong knowleges about SMTP/HTTP protocols. Task at all When user enter any phrase in mail client in TO field either local or web-based program intercept sending and retrives email from web based DB by quering php script, than replace word with received email and sends it. SMTP part 1. Outlook Express, Microsoft Outlook (all versions), Eudora, AOL, MSN (here accepted way when user set their SMTP to localhost, if needed) HTTP part 1. , , and (this part may be updating from server to add new services) Feel free ask me any question if you have. P.S. Sorry for my bad english. Please read attach where I place futher descriptions of this project. Sincerely yours, Yuriy Bukhtiarov ## Deliverables 1) Complete and fully-functional working program(s)

    $604 (Avg Bid)
    $604 Avg Bid
    4 bids

    ...the form fields are hidden. One more thing. I have already created a workaround that writes a new form momentarily to the browser, then immediately POSTs to the target page. Although clever, it is not foolproof, because I do write a new form with the sensitive values in the HTML. This is not an acceptable solution. Also, you can't use CURL. YOUR MISSION: Create an intermediate script that will intercept the POST, read the post variables, change the values in the specified fields, then deliver the submitter and the POSTed variables to the target page using a POST. This last point is important. You cannot use fsockopen() to POST the variables to the page and return the target page output. No, my friends, the page you create must actually navigate the browser to the target page...

    $67 (Avg Bid)
    $67 Avg Bid
    3 bids

    ...onto the page using that search engines style (font, color, etc.) We are starting with 10 major search engines it should 'watch' for, and we'll provide this list to you. Application will more than likely need to intercept the page that would normally be displayed by the search engine, take that data, add in our data,and then display the new page in the browser window. The user will never know that anything different has happened. Application will run as an IE plugin. The application must: Deect when the user goes to one of these search egnines Intercept the keyword(s) being seached for and clicked on. Use that search term to pull results from our custom search database and place the top 5 results from our search engine in with t...

    $6823 (Avg Bid)
    $6823 Avg Bid
    4 bids

    I need a VB.NET or C# DLL that can intercept the windows messenger service. I am looking to intercept messages such as the print spooler or net send command. This should not be that difficult of a program and should be easy for someone to complete in a week or so I would guess. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request. 3) Complete ownership and distribution copyrights to all work purchased. ## Platform Windows NT/Windows 2000/ Windows XP

    $6 (Avg Bid)
    $6 Avg Bid
    1 bids

    Good day, We are a computer firm who has a large client who can not retrieve a password for a trading system they developed. We need someone who can crack a 10 characters (numbers, letters, and symbols) in a short period of time. It is a pop-up window in Tradestation 6.0 (). We have thought that maybe someone can intercept the password verification process in a DLL or API call. Just a thought. A brute force attack will most likely not work due to the length of the password. If you know how to hack/crack we want you to take a look at this. You will NOT be beaking the law as we will give you written permission to hack the system. Please respond with a price and time frame. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as

    $3077 (Avg Bid)
    $3077 Avg Bid
    19 bids

    We need a visual basic program done that can intercept all print jobs and place a selectable header and footer on every page printed without otherwise interfering with the printouts. The application must have a toggle that is password protected to disable the header/footer for the "next" printout. Perhaps the toggle is accessible from a system tray icon?. The selectable options for the header/footer must be default of "DRAFT" with an option "FINAL DRAFT". ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request. 3) Complete intellectual prope...

    $418 (Avg Bid)
    $418 Avg Bid
    7 bids

    ...a background EXE) searches the email and extracts all address details of each received email from the body of the email message - These details(Name, Address, Email, Phone, Fax, WebURL) are then added into a contacts database file. - If duplicate details exist, newer details overwrite older details. - The email address is used as the unique index of the database. If you can prove that you can intercept the "New Email", "Reply", "Reply All" and "Forward Email" commands, then there will be much more work for you after this bid. This bid will allow me to see how you work, how professional you are and how fast you are. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all w...

    $111 (Avg Bid)
    $111 Avg Bid
    11 bids

    I need a program that will intercept print jobs to any windows printer, pop up a box in which the user must enter a password. Only after the user enters the correct password will the print job be passed to the print spooler (or released from the print spooler - which ever is more practical to arrange). ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Complete copyrights to all work purchased. ## Platform win98, win2000, winXP

    $321 (Avg Bid)
    $321 Avg Bid
    18 bids

    Hi Everyone... I have a 3rd party application that under certain circumstances, makes a small "bing" noise to alert the user (me) of a pending task. The audio data is compiled into the .EXE and can not be changed in windows...so, I was hoping... I could intercept the system message that triggers the "bing" and with my own software (what you write)... to set off a louder alarm (multimedia... play a wav file) I want a small application that possibly displays a small button bar on the screen... with which one of the buttons will launch the 3rd party application and when it detects the WM_USER message that triggers the "bing" then, it sets off it's own user defined audio. All of which I know how to do except... detecting events in other programs. ## ...

    $31 (Avg Bid)
    $31 Avg Bid
    6 bids

    Tr...shouldnt need to even see the program. Program can be written in whatever language you like, but it MUST have a Visual Basic front end. Please note: I *DONT* need something to hide folders, or make the folder unaccessable, that is NOT security, just childs-play! Also, I know Windows 2000 / XP allows transparent file encryption, but I dont like it. Why? Because i dont. ;) The program only needs to intercept Opens and Saves and send it to the app for en/decryption. This way I can play around with differnt algorithms using VB. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Complete copyrights to all work purchased. ## Platform Windows NT4 / 2000 / XP ## Deadline information ahh, must ...

    $72 (Avg Bid)
    $72 Avg Bid
    7 bids

    Design a function that will take an array of 2 dimension. The first is an double and the second will a Time val...function that will take an array of 2 dimension. The first is an double and the second will a Time value. Apply least square sum on the array till the points specified. The function call should look like this" LeastSquare(MyArray,StartingIndex,StopIndex) the function should return a array of of the new X & Y coordinates. As well as the slope and the Intercepts along with the errors in the slope and intercept, the last thing it should return is the Correlation Coefficient. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Complete copyrights to all work purchased. ## Platfor...

    $18 (Avg Bid)
    $18 Avg Bid
    13 bids

    I'm using VB6. I wanna know how to intercept when the user click to download a program from IE or Netscape or other explorer, like FlashGet or GetRight do. I need a module or a class with the code and a sample form with a button showing how to implement the feature. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Complete copyrights to all work purchased. ## Platform WindowsXP at least. ## Deadline information Must be completed in 2 days!!!

    $31 (Avg Bid)
    $31 Avg Bid
    4 bids

    We need a HD filter driver for the Linux system. The driver will intercept/filer the HD I/O commands. For example when linux is writing to sector A, the driver intercepts the I/O request,it will first read from sector B and then writes to sector C based on the information on sector B. ## Deliverables The deliverable should be a working sample of the device driver does the functions described above. ## Platform Redhat linux 7.2 ## Deadline information Price is open for discusion

    $7783 (Avg Bid)
    $7783 Avg Bid
    10 bids

    Need Exchange (version 5.5) Rule/programming created to do the following: a) Intercept all inbound emails with the words unsubscribe in the subject line. The recipient of the message should not recieve the message but it should be placed in a shared folder called 'eC_Unsubscribe' for future reference. b) Update a SQL table. The database and name of the SQL table should be configurable (either through command file or visual interface) The SQL table will have the following fields: EMAIL varchar(100) - populate with Email of the person who sent (I.e. replied and unsubscribed) the message RCVD_DATE datetime Time the message was recieved MESSAGE_BODY memo Text of message EC_PROCESSED_DATE datetime For our internal use Every message with unsubscribe in the subject should be appe...

    PHP
    $543 (Avg Bid)
    $543 Avg Bid
    5 bids

    Need Exchange (version 5.5) Rule/programming created to do the following: a) Intercept all inbound emails with the words unsubscribe in the subject line. The recipient of the message shold not recieve the message but it should be placed in a shared folder (for future reference. b) Update a SQL table. The database and name of the SQL table should be configurable (either through command file or visual interface) The SQL table will have the following fields: EMAIL varchar(100) Email of the person who sent the message RCVD_DATE datetime Time the message was recieved MESSAGE_BODY memo Text of message EC_PROCESSED_DATE datetime For our internal use Every message with unsubscribe in the subject should be appended to this table. c) Detailed instructions (with screen shots) of how to install...

    $190 (Avg Bid)
    $190 Avg Bid
    2 bids

    I need to intercept print jobs from any program in in Windows. When a job is intersepted I need to be able to pass focus to my program running in the background, so that a user can input job specific details. Need to pass printer name and number of pages to my program. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Complete copyrights to all work purchased. ## Platform Windows NT/2000

    $358 (Avg Bid)
    $358 Avg Bid
    17 bids

    We are in need of a client that can intercept all incoming e-mail to our domain and check its contents against a database done in Access 2000. It should filter spam thats listed within the database. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Complete copyrights to all work purchased. ## Deadline information Must filter all incoming mail to our server and remove all spam e-mail before releasing the incoming mail to the server.

    $229 (Avg Bid)
    $229 Avg Bid
    4 bids

    ...shot,keyboard, mouse move and clicking are transferred from local to remote computer. programmer can use either Video hook driver technology or GDI (--A GDI (Graphics Device Interface) hook on Win9x/NT machines captures standard Windows video intercepts sent to the video driver and forwards them to control PCs. On Windows 2000, the Mirror Driver technology (dual-monitor support) could be used to intercept video instructions. For added performance, Video Skipping technology that examines video instructions which is already sent to the control PC; if the screen information is the same, the control redraws its screen using previous instructions) to accomplished this. I'm looking for at least 10 screen updates per second and should be able to run on NT,ME,9x,2000,XP, we need the...

    $537 (Avg Bid)
    $537 Avg Bid
    15 bids

    a program that intercept url written in any broswer, check for certain word and if found redirect it to another url transparently to the user, and the ability to erase it self from the computer. it must be as small as possible ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.

    $94 (Avg Bid)
    $94 Avg Bid
    2 bids

    I need Visual Basic source code that will be able to record all activity of Windows trying to copy, move, rename, or delete any files. Like if I go to windows explorer and delete some files, not to the recycle bin, but just delete them, I want the source code to log to the file that was deleted. If it was renamed, then I want it to record the name and the path before and after. If moved, I want it to record the old and new location (filename and path). If copyed, then record the original location and the new location... etc. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.

    $66 (Avg Bid)
    $66 Avg Bid
    7 bids

    ...must be based on a header which checks that person accessing page has login rights. if not just take them to a login page. A facility to send data requests to the site using a url, e.g. The webpage goes to a database and displays in a table all data in the database whose ID begins with SN55 i.e. will display SN55 and SN559. An email intercept daemon facility like majordomo, in that any messages sent to intercept(at) will be redirected to presumably a perl script which will take the email, and extract certain data out of it, and automatically stick that data into the database. E.G. if the email contains a line SN559 200 IN, it will call up the database, find record SN559, and add 200 units to the goods received transaction, and therefore add 200 to stock in hand

    PHP
    $2157 (Avg Bid)
    $2157 Avg Bid
    14 bids

    ...certaines règles basiques de sous-titrage que je vous communiquerai dès notre prise de contact. De préférence, une personne qui aime les documentaires et les séries. Maîtrise de Word et son correcteur grammatical indispensables. Pour la candidature, merci de traduire en français les sous-titres suivants : Extrait 1 : American Patriot missiles during that Gulf War were firing back trying to intercept the Iraqi rockets. I've seen how technology plays an important role. It's been that way throughout history. Extrait 2 : It's springtime. Everything is blooming, the days are getting longer, and a long-planned and highly anticipated trip awaits us. It's a trip to the much-beloved Mediterranean Sea. Extrait...

    $32 (Avg Bid)
    $32 Avg Bid
    30 bids

    Hello freelancers, saya saat ini sedang membutuhkan org yg handal dalam mengintercept API sebuah aplikasi dikarenakan saya ingin membuat versi desktopnya secara unofficial / pemakaian pribadi. Jobdesknya hanya sebatas intercept API saja, jika kalian sudah pernah melakukannya silahkan langsung hub saya. Terimakasih

    $937 (Avg Bid)
    $937 Avg Bid
    2 bids

    ...aime les documentaires et les séries. Maîtrise de Word et son correcteur grammatical indispensables. Avant de s'attaquer au projet, il y aura un test à effectuer sur un court extrait vidéo. Le projet ne sera donc pas immédiat. Et pour la candidature, merci de traduire en français les sous-titres suivants : extrait 1 : American Patriot missiles during that Gulf War were firing back trying to intercept the Iraqi rockets. I've seen how technology plays an important role. It's been that way throughout history. Extrait 2 : It's springtime. Everything is blooming, the days are getting longer, and a long-planned and highly anticipated trip awaits us. It's a trip to the much-beloved Mediterranean Sea. Extrait...

    $42 (Avg Bid)
    $42 Avg Bid
    22 bids

    SPSS: I have an excel file of funds with Index Data and Historical NAV. I need to get different ratios about them such as Sharpe Ratio, Treynor ratio, Jensen Measures (Jensen Alpha, P-Value), Fama Measures, Transformed Sharpe Measures, Pooled and individual Regression for Treynor-Mazury (TM) (t-value, variance inflation factor, tolerance, condition index, intercept, Rm, Rm square, F-Value, P-Value) using SPSS.

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    9 bids

    Intercept information from the current state of the tables

    $1602 (Avg Bid)
    $1602 Avg Bid
    2 bids

    ...les acteurs économiques nationaux, que pour les victimes des cybercriminels. L’agence Intercept-Vérification se donne pour mission de devenir un pont entre les opérateurs économiques, particuliers ou associations étrangers, et leurs interlocuteurs béninois. Cette agence se veut être un outil anti-cybercriminalité efficace et digne de confiance. Ce que nous vous proposons, c’est de vous tenir lieu d’intermédiaire fiable. En procédant à la vérification des informations qui vous sont transmises, en confirmant l’authenticité des documents ou des faits sur la base desquels vous pourrez être conduits à prendre des décisions, et par toutes autres missio...

    $37 (Avg Bid)
    $37 Avg Bid
    1 bids

    Das Flash-Einstellungsfenster (siehe mitgelieferte Datei) soll nachdem der User auf den Button "Schließen" geklickt hat einen Event auslösen, der vom JavaSkript abgefragt werden kann. Zur Zeit haben wir keine Möglichkeit das Schließen des Einstellungsfensters abzufangen. The flash settings window (see enclosed file) is after the user has clicked on...nachdem der User auf den Button "Schließen" geklickt hat einen Event auslösen, der vom JavaSkript abgefragt werden kann. Zur Zeit haben wir keine Möglichkeit das Schließen des Einstellungsfensters abzufangen. The flash settings window (see enclosed file) is after the user has clicked on the "Close" button trigger an event, which can be queried by the Java script....

    $406 (Avg Bid)
    $406 Avg Bid
    1 bids

    Top intercept Community Articles