Re: GUI app design questions

2005-04-08 Thread Vinod Joseph
Hi David Does the graphing package have any special modules for network performance analysis ? Something like TraceGraph .. Thank you Joe On Apr 1, 2005 3:16 PM, Richard Gipps <[EMAIL PROTECTED]> wrote: > David, > There is also a very good graphing package lumped in with some > oth

Re: How to search through all entries in a column in GtkList

2005-01-26 Thread Vinod Joseph
Dear Gus > > > I have a column for password and obviously as name suggests..it > > cannot be displayed..I have solved this problem by having a duplicate > > entry private_password that does not have a column in the GtkList and > > i compare with this private_pwd entry... > > If I understand

Re: How to search through all entries in a column in GtkList

2005-01-26 Thread Vinod Joseph
Hi Gus On Wed, 26 Jan 2005 10:42:18 +0100, Gus Koppel <[EMAIL PROTECTED]> wrote: > Vinod Joseph wrote: > > > Sorry for the confusion > > Yes, I'm afraid your description was confusing to some people. $$$ Yes... i could not be explicit to discuss in clear > &

Re: compare entry with list

2005-01-25 Thread Vinod Joseph
AIL PROTECTED]> wrote: > Vinod Joseph wrote: > > >Hello Members > > > >Please guide me why this operation fails logically for some values at > >some times > > > >Dosent give a consistent behavior... > > > >Please help... > > > &

Re: compare entry with list

2005-01-25 Thread Vinod Joseph
Hi On Tue, 25 Jan 2005 23:10:15 +, Peter Bloomfield <[EMAIL PROTECTED]> wrote: > On 01/25/2005 07:24:51 AM, Vinod Joseph wrote: > > Hello Members > > > > Please guide me why this operation fails logically for some > > values at some times >

compare entry with list

2005-01-25 Thread Vinod Joseph
Hello Members Please guide me why this operation fails logically for some values at some times Dosent give a consistent behavior... Please help... Callback_Function_on_userid_entry(GtkWidget *entry) { const gchar *entry_text; entry_text = gtk_entry_get_text (GTK_ENTRY (entry)); g_pri

Re: How to search through all entries in a column in GtkList

2005-01-25 Thread Vinod Joseph
actual password and comparing with thatthat too seg faults on anjuta.. anywaysif u could help me..i would be grateful to you Thanks Vinod On Tue, 25 Jan 2005 16:50:14 +0900, Vinod Joseph <[EMAIL PROTECTED]> wrote: > Hello > > Sorry...in case i was not clear >

Re: How to search through all entries in a column in GtkList

2005-01-24 Thread Vinod Joseph
rrectly However when i do memcmp a gtk_entry retrieved value with the list array i sometimes get error_message_box for correct entries Sorry for not able to be very clear But, I hope you understand my problem Thank you very much Vinod -- Forwarded message ------ Fr

How to search through all entries in a column in GtkList

2005-01-24 Thread Vinod Joseph
Dear All I have a GtkEntry I read the keyed value inside the GtkEntry. I compare this value with all the values of a particular column in my GtkList. How do i write this code Currently I am comparing entry_text code using memcmp with g_array_sized_new( Articles, User, i).column_one a

Re: GtkListStore - play with the list entries

2005-01-24 Thread Vinod Joseph
t, > strlen is going to have a tough time. > > The code to replace password characters should probably read: > > gchar *my_text; > > my_text = g_strnfill(strlen(new_text),'*'); > > After you insert the my_text string into the GtkListStore, > be sure to delete

Re: GtkListStore - play with the list entries

2005-01-23 Thread Vinod Joseph
space in some cases How do i write code to correct this fault in my system Please guide me thanks Vinod On Sat, 22 Jan 2005 16:51:46 +0900, Vinod Joseph <[EMAIL PROTECTED]> wrote: > Dear All > > How do i mask the characters of a GtkListStore entry to be invisible >

Fwd: Please help me with GtkListStore

2005-01-23 Thread Vinod Joseph
Dear All I am using the GtkListStore -> EditableCells for user id, password and information list. The access to the program is based on the entry in the GtkEntry id and password. The list is then browsed through for all valid entries and user is provided with access or rejected access. The probl