Feeds

MS Anti-Spyware built on MS Abandonware

The Ghost of VB6

  • alert
  • submit to reddit

Intelligent flash storage arrays

Heck, if a movie that's in Aramaic can top the box-office charts, there must be hope for dead languages everywhere.

And for one in particular, which still has millions of adherents. Released in 1996, Microsoft Visual Basic 6.0 cemented the product as the first choice of buggy front-ends to databases everywhere. In fact, if you wanted a buggy front-end to your corporate database, there was no better choice.

VB6 won plenty of scorn for its eccentricities, which Microsoft attempted to rectify in the dot.nettified VB.net 7. Unfortunately, this broke backward compatibility. No matter how Redmond chivvied and chided, a large part of the VB6 installed base wouldn't let go.

The VB6 fans petitioned without joy, and in March this year Microsoft finally cast these users adrift, and ended support for the tool.

Microsoft's AntiSpyware uses VB6However, sharp-eyed reader Carey Bishop spotted this while investigating Microsoft's Anti-Spyware product using Dependency Walker.

(Which isn't an open position at the Betty Ford clinic, apparently, but a debugging tool).

Yes, it's the beloved VB6 run time. Which means that Microsoft too is now one of the last VB6 hold-outs, and certainly the largest .NET refusenik in the world.

Microsoft acquired Giant, the company that produced the Spyware detection program, in December 2004, and lost no time in making it available to users the following month.

"This whole issue begs the question," writes Carey, "why is Microsoft using an unsupported development environment against their own guidelines? Just another case of' 'Do what I say, not what I do'...

Having shelled out for a state-of-the-art Spyware program, VB6 fans are hoping that the customer is always right. Right? ®

Related stories

Visual Basic's vileness haunts MS .NET
Real cure for the vileness of Visual Basic
Could Bill Gates write code?

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?