For the Developer
Security features in previous versions of Outlook that were meant to prevent the spread of viruses actually complicated Outlook development. Without getting into the nuts and bolts of the conflict, it suffices to say that it was difficult to run code behind an Outlook form that sends messages without setting off a cascading event of prompts to which the user had to respond.
Outlook 2003 is less restrictive in that any COM add-in you install in Outlook is automatically trusted. Consequently, Outlook 2003 bypasses all those security prompts. That means any code written in Outlook's VBA editor is also trusted. The object model supports the new properties, methods, and events listed in Table 2.1.
Table 2.1 Supported Properties, Methods, and Events
Object |
Name |
Property or Method |
Description |
MailItem |
FlagIcon |
Property |
Sets a quick flag for a mail or meeting item. |
MeetingItem |
FlagIcon |
Property |
Select from the following constants: olNoFlagIcon, olPurpleFlagIcon, olOrangeFlagIcon, olGreenFlagIcon, olYellowFlagIcon, olBlueFlagIcon, and olRedFlagIcon |
AppointmentItem; MeetingItem |
MeetingWorkspaceURL |
Property |
Returns the URL of the meeting workspace currently attached to the item. |
ContactItem |
HasPicture |
Property |
Determines whether a contact item has a picture (Boolean). |
ContactItem |
AddPicture(ByVal PicturePath As String) |
Method |
Adds a picture to the contact, replacing an existing picture (if any). |
ContactItem |
RemovePicture |
Method |
Removes an existing picture from a contact item. |
MailItem; MeetingItem; PostItem |
SenderEMailAddress |
Property |
Returns an email address from a mail message, meeting item, or post. |
Namespace |
ConnectionMode |
Property |
Indicates the current connection mode: olOffline, olLowBandwidth, or olOnline. |
MAPIFolder |
ShowItemCount |
Method |
Displays the total number of items for a folder instead of the number of unread items. |
This is certainly good news for the Outlook developer because the process is much simpler, without violating the system's security measures.