zoukankan      html  css  js  c++  java
  • C# 获取当前路径方法

    //获取模块的完整路径。  
    string path1 = System.Diagnostics.Process.GetCurrentProcess().MainModule.FileName; 
    //获取和设置当前目录(该进程从中启动的目录)的完全限定目录 string path2 = System.Environment.CurrentDirectory;
    //获取应用程序的当前工作目录 string path3 = System.IO.Directory.GetCurrentDirectory();
    //获取程序的基目录 string path4 = System.AppDomain.CurrentDomain.BaseDirectory;
    //获取和设置包括该应用程序的目录的名称 string path5 = System.AppDomain.CurrentDomain.SetupInformation.ApplicationBase;
    //获取启动了应用程序的可执行文件的路径 string path6 = System.Windows.Forms.Application.StartupPath;
    //获取启动了应用程序的可执行文件的路径及文件名 string path7 = System.Windows.Forms.Application.ExecutablePath; StringBuilder str=new StringBuilder(); str.AppendLine("System.Diagnostics.Process.GetCurrentProcess().MainModule.FileName:" + path1); str.AppendLine("System.Environment.CurrentDirectory:" + path2); str.AppendLine("System.IO.Directory.GetCurrentDirectory():" + path3); str.AppendLine("System.AppDomain.CurrentDomain.BaseDirectory:" + path4); str.AppendLine("System.AppDomain.CurrentDomain.SetupInformation.ApplicationBase:" + path5); str.AppendLine("System.Windows.Forms.Application.StartupPath:" + path6); str.AppendLine("System.Windows.Forms.Application.ExecutablePath:" + path7); string allPath = str.ToString();

     输出结果 
        System.Diagnostics.Process.GetCurrentProcess().MainModule.FileName:D:workprjVP-VPlatformXmlAndXsdinReleaseXmlAndXsd.vshost.exe 
        System.Environment.CurrentDirectory:D:workprjVP-VPlatformXmlAndXsdinRelease 
        System.IO.Directory.GetCurrentDirectory():D:workprjVP-VPlatformXmlAndXsdinRelease 
        System.AppDomain.CurrentDomain.BaseDirectory:D:workprjVP-VPlatformXmlAndXsdinRelease 
        System.AppDomain.CurrentDomain.SetupInformation.ApplicationBase:D:workprjVP-VPlatformXmlAndXsdinRelease 
        System.Windows.Forms.Application.StartupPath:D:workprjVP-VPlatformXmlAndXsdinRelease 
        System.Windows.Forms.Application.ExecutablePath:D:workprjVP-VPlatformXmlAndXsdinReleaseXmlAndXsd.EXE     
  • 相关阅读:
    跨站请求伪造CSRF
    XSS危害——session劫持
    跨站脚本攻击XSS
    初识jsonp
    php json与xml序列化/反序列化
    php操作xml
    HTML5 WebStorage
    串口调试助手
    dashboard
    windows定时器编程
  • 原文地址:https://www.cnblogs.com/SuperMetalMax/p/6187133.html
Copyright © 2011-2022 走看看