How can I get the Keyboard Events in IE Mobile?

windows ce

    Next

  • 1. Hosting webservices on CE
    First of all I have to say that im new to developing for CE. I need to know whether it is possible to host webservices on a CE 5.0? I have to CE applications on to seperate units that need to communicate... most of the communication is planned to be through sockets - but I need the opportunity to use webservices... or at least an alternativ... Thanks....
  • 2. Uninstalling Driver
    Hi I have a stream interface driver which I have installed on my Windows Mobile 5.0 device usinng a CAB file. Now I would like to uninstall it. If I remove the entry from program it just removes the files I copied into the folder, but it does not uninstall the driver. If i reset the device I can find the driver getting loaded again. -- Thanks Ambar
  • 3. FATFS Sector size greater than 512 in wince 5.0
    Hai, Is it possible to set sector size greater than 512 in wince 5.0? what FAT does wince 5.0? FAT12 or 16 or 32??? What FAT does the standard SD Memory cards use?? Is there any update available to use sector size greater than 512 in wince 5.0?? and one more question, Does wince 5.0 support LBA addressing? if it supports does it support 48 bit LBA addressing?? Please help me on the above questions. Regards, Prabha.
  • 4. How windows CE implements virtual memory?
    In Windows ce based devices we do not have secondary storage then how can windows ce implement or support 4 GB of virtual address space??? Please kindly reply soon..........

How can I get the Keyboard Events in IE Mobile?

Postby SW5nbyBIZXJybWFubg » Wed, 29 Jun 2005 20:44:03 GMT

Hello,

I can't find a Attribut "onkeydown" in the Documentation of IE Mobile HTML 
Reference.

Thanks for Help

Ingo

Similar Threads:

1.getting canned for finding security breaches

Dear Colleagues:

At the tail end of this post is my original post with regards to this
matter.  Basically, I went and told my superiors that our network was
seriously exposed.

Today I had a meeting and, guess what, it was suggested that I find another
job.  This is great, essentially having the dipshits at work side with a
completely ignorant person who knows nothing about security.

Guess what industry I work in?  Education!

Thats right folks, education.  Maybe the people who are in education need a
bit of it themselves.

And we wonder why our system is so screwed up!

Curious George



Dear Colleagues:

For the life of me I don't know why I have to ask this question since the
answer is so obvious, however, I need to have others tell me that I am not
completely insane.

I work at a place where we have a myriad of wireless access points and NO, I
am not writing from there at present.

NONE of the wireless access points has any form of security on them
whatsoever.  No WEP, no CHAP. . . no nothing.  Everything is open so you
could walk into our joint, grab an IP address and surf the web to your
heart's content.

Here is the problem.  My boss insists that its "no big deal" and that since
the servers are on the inside and protected, we really don't have a thing to
worry about.  Furthermore, my boss is under the impression that since we are
situated in a wide area, that nobody would be able to get into our network
because of this distance.  Needless to say, my boss does not consider
somebody sneaking into a parking lot with a laptop, a good network card and
a directional bazooka antenna a possibility.

So here is what I have to explain to my boss' boss and, perhaps, the board
of directors. . . and here is where I can't help but laugh.  I hope that I
will be able to keep a straight face come Monday when I have to explain
myself to people why its important.

Okay, so I know the analogies.  For example, I understand that not having a
secure wireless network with many Waps and high gain transmission antennas
is the same as putting cables out to anybody within 'x' amount of yards with
a sign that says "free internet access", but since I am going to be asked
these obvious questions, just what type of damage could somebody do?

Yeah, I know about denial of service attacks, yeah I also know about
enumeration and password guessing, but considering that we have an SQL
server on the inside of our network (no, the sa account password is not
null) what are we talking about.

I can envision so many things.  Like somebody just sitting there caputring
packets to get things like usernames, passwords and the like, but come on. .
. what else could they do.

I have read my boss the riot act many times, but this is now going to go in
front of somebody over my boss' head, so, aside from giving them worst case
scenarios, end of the world analogies, etc., how else could people break in.

Creative responses are appreciated and will be rewarded with much praise.

I can't believe that I have to actually explain this to people, and this
entire thing would last about two seconds when it comes to talking with a
computer professional, but you see, my boss is under the impression that
they are a computer professional because they received a Master's degree in
Comp Sci back in the 80's.  I know that this line of thinking is dangerous,
but I really want some creative answers to put my point across strongly, and
yet professionally.

Although I realize that this post will likely be the butt of many jokes
(which I will appreciate immensely) I never the less would appreciate a bit
of useful information in your responses.

I am going to have a serious drink now, and then bang my head against the
wall.

Thanks in advance,

CC


2.Getting canned for brining forth obvious security breaches

Dear Colleagues:

At the tail end of this post is my original post with regards to this
matter.  Basically, I went and told my superiors that our network was
seriously exposed.

Today I had a meeting and, guess what, it was suggested that I find another
job.  This is great, essentially having the dipshits at work side with a
completely ignorant person who knows nothing about security.

Guess what industry I work in?  Education!

Thats right folks, education.  Maybe the people who are in education need a
bit of it themselves.

And we wonder why our system is so screwed up!

Curious George



Dear Colleagues:

For the life of me I don't know why I have to ask this question since the
answer is so obvious, however, I need to have others tell me that I am not
completely insane.

I work at a place where we have a myriad of wireless access points and NO, I
am not writing from there at present.

NONE of the wireless access points has any form of security on them
whatsoever.  No WEP, no CHAP. . . no nothing.  Everything is open so you
could walk into our joint, grab an IP address and surf the web to your
heart's content.

Here is the problem.  My boss insists that its "no big deal" and that since
the servers are on the inside and protected, we really don't have a thing to
worry about.  Furthermore, my boss is under the impression that since we are
situated in a wide area, that nobody would be able to get into our network
because of this distance.  Needless to say, my boss does not consider
somebody sneaking into a parking lot with a laptop, a good network card and
a directional bazooka antenna a possibility.

So here is what I have to explain to my boss' boss and, perhaps, the board
of directors. . . and here is where I can't help but laugh.  I hope that I
will be able to keep a straight face come Monday when I have to explain
myself to people why its important.

Okay, so I know the analogies.  For example, I understand that not having a
secure wireless network with many Waps and high gain transmission antennas
is the same as putting cables out to anybody within 'x' amount of yards with
a sign that says "free internet access", but since I am going to be asked
these obvious questions, just what type of damage could somebody do?

Yeah, I know about denial of service attacks, yeah I also know about
enumeration and password guessing, but considering that we have an SQL
server on the inside of our network (no, the sa account password is not
null) what are we talking about.

I can envision so many things.  Like somebody just sitting there caputring
packets to get things like usernames, passwords and the like, but come on. .
. what else could they do.

I have read my boss the riot act many times, but this is now going to go in
front of somebody over my boss' head, so, aside from giving them worst case
scenarios, end of the world analogies, etc., how else could people break in.

Creative responses are appreciated and will be rewarded with much praise.

I can't believe that I have to actually explain this to people, and this
entire thing would last about two seconds when it comes to talking with a
computer professional, but you see, my boss is under the impression that
they are a computer professional because they received a Master's degree in
Comp Sci back in the 80's.  I know that this line of thinking is dangerous,
but I really want some creative answers to put my point across strongly, and
yet professionally.

Although I realize that this post will likely be the butt of many jokes
(which I will appreciate immensely) I never the less would appreciate a bit
of useful information in your responses.

I am going to have a serious drink now, and then bang my head against the
wall.

Thanks in advance,

CC



3.IE 7 keyboard events

In previous versions of IE we were able to intercept function key events like 
F4 and use them for our own purposes canceling the default F4 action. This 
functionality appears to be missing from IE7 in beta. Is this an intentional 
ommision or is this capability planned for the final release?

4.Binding Event Handlers on IE Mobile using Javascript

5.Getting the IE Script Engine on Windows Mobile 5

Hi,

I'm trying to access IE's JavaScript engine on Windows Mobile 5.

Here's what I've found so far ...
- The desktop SDK provides IDispatch IHTMLDocument::get_Script(), but
this is not available for WinCE.
- The Windows Mobile 2003 SDK provides IDispatch
IBrowser3::get_script(), but IBrowser3 is deprecated in Windows Mobile
5 & 6.
- The Windows Mobile 5 & 6 SDKs provide IDispatch
IShellFolderViewDual::get_script().

I've found scarcely any documentation on IShellFolderViewDual, but it
seems that this interface is used to represent the document object for
a shell folder view, whereas IHTMLDocument is used to represent the
document for a web page. So when I get the document object from IE's
IWebBrowser2 interface as an IDispatch interface, I can't convert this
to IShellFolderViewDual.

My questions are ...
- Is all of the above correct?
- How can I get a reference to IE's script engine on Windows Mobile 5?
- And why was IBrowser3::get_script() deprecated if there's nothing to
replace it?!

Thanks!
Steve

6. ActiveX object not getting created on mobile IE

7. keyboard hook or getting keyboard state

8. Problem Using Float in IE with canned 2col_leftNav.css File



Return to windows ce

 

Who is online

Users browsing this forum: No registered users and 43 guest