Encrypt a batch file content


















Forum only search News:. Home Help Login Register. Pages: [ 1 ] Go Down. You could use a batch compiler I have seen one project that wraps up a batch in an exe, then expands it on the fly - it all depends how secure you want to make it, if it is just keeping it hidden from prying eyes, that might work for you Graham.

It's not amazingly secure but it does make it harder to see what's going on and reverse engineer the code. On the other hand, Regular Expressions may be too complicated for a trivial task like selecting files matching a give name pattern. Advanced wildcards, one of Batch File Encrypt's many unique features, is what you would want to use!

It is possible to create scheduled or triggered processing jobs that will be automatically performed even if the program is not running. And there is no limit to how many such jobs can be created! For every job you can specify the files to be processed, actions to be performed, output settings, and other processing options.

When the processing job is triggered, depending on the job's setting the program will be automatically launched in either GUI, console, or hidden mode, and the processing will be automatically started.

When done, the program will exit automatically. Processing jobs allow you to setup various batch file processing tasks that will be executed on a specified trigger or on schedule. General properties include: name of the job, general timeframe when the job can be active, operation mode that determines if any UI will be shown, and user account together with security context under which the job will be executed.

There are several ways in which you can specify which files should be processed by a processing job:. Once you have specified which files should be processed by a processing job, the next step is to specify how these files should be processed, which actions and operations should be performed. This is done by specifying a previously saved Action Sequence. Additionally you can customize a few other processing aspects like the number of processing threads and logging options.

Output settings determine where and how the processed files are saved. All the options that are available in Step 3 in Manual and Automatic processing modes can be customized here as well. These include:. Last step in setting up a processing job is to define a trigger or specify a schedule that will determine when the processing job will actually execute. Monthly trigger lets you specify that a job should be executed on a monthly basis.

You can select specific days of the month or weeks when the job should be run, as well as specify which months should be included and which ones should be excluded. Weekly trigger lets you specify that a job should be executed on a weekly basis. You can select specific days of the week when the job should be run. Daily trigger lets you specify that a job should be executed on a daily basis.

You can specify the daily recurrence pattern as well. Event-based triggers lets you specify that a job should be executed when a particular application or system event occurs. This feature is available only on Windows Vista or higher. Any events that you see in the Windows Event Viewer are supported, and a processing job will be automatically started by Windows Task Scheduler Service when the associated event occurs. The Command Line Preview tab shows you the exact command line that will be run in order to start the processing job.

That way you can launch the program manually with appropriate parameters and have the same processing job be manually started. The program gives you full control when designing the sequence of actions; yet at the same time if you are just starting or want to perform some basic task quickly, the program offers numerous common tasks organized into categories that you can simply click on and see the needed actions be automatically added to the action sequence for you, so you can get started in no time!

Note that with the built-in actions and operations you can do much more than what you can do with common tasks described above! Common tasks by no means represent all of product's functionality, but rather facilitate product's use when it comes to dealing with frequently occurring tasks.

One of the most frequent tasks when processing text-based files is working with lines in one way or another. The program offers multiple common operations relating to lines:. There are several built-in common tasks for copying or moving parts of the file to another position.

You can duplicate lines; you can copy lines from the start or end of the file to another position, or relative to their current location; you can copy blocks of bytes to another position; and more! Program also offers various encoding and conversion -related common tasks that help you change text file encoding, convert text to binary and vice versa, convert HTML to plain text, etc.

Not only can you modify file's contents with common tasks, but it's very easy to perform various file system -related operations as well:. There are various common tasks related to working with binary data and modifying individual bytes as well as performing binary search and replace operations. Batch File Encrypt has full support for command line operation. It can not only be started from command line with specific options, but it can also run and operate entirely in console window.

A typical usage scenario would be to first specify a sequence of actions to be performed and then save that sequence to a template file. Then you can easily process files entirely from command line using a few switches: input directory and input file pattern, path to a saved action sequence template file, and output directory with file naming pattern.

The program can be easily customized to your preferences, thanks to the many options that it has. Various options include:. With Batch File Encrypt we have re-imagined the concept of in-place help for a software product with the goal for it to be readily-accessible, well integrated, useful, and detailed.

No more clumsy external huge help files that would take hours to make sense of and relate to the program! Instead, virtually all elements of the User Interface have very detailed, in some cases multi-paged, informative tooltips that not only explain what a particular button, checkbox, or option does, but also provide valuable insights and helpful tips letting you know how to take advantage of a particular feature.

Multi-paged tooltips can be easily viewed simply by scrolling with your mouse wheel. Certain contextual tooltips can also be moved around and pinned to stay on top of other windows.

This may be invaluable if you need to keep certain information in the view while working on something else. Batch File Encrypt features very detailed and helpful tooltips that are available for virtually all user interface elements. If the text is too long, it is broken up into several pages that you can easily scroll through with your mouse wheel. No need to view external documentation, the help is completely integrated with the product! Some tooltips can be moved around and pinned so they stay visible on top of other windows until closed.

This is useful when a tooltip displays certain technical information that may be needed to configure certain settings, and should therefore remain visible even when the mouse is no longer hovering over its parent element! There are very detailed tooltips for files in the file list!

Such tooltips display not only basic file information like file name, location, size, and attributes, but also show first few dozens of bytes that make up file content!

These tooltips also inform you of what actions are possible with the file selected. Action tooltips display detailed information about the actions in the action sequence. When you move your mouse over an action in an action sequence, a tooltip will be displayed, explaining what the action does, what are the current action options, and what things you can do with a given action.

Action tooltips can be pinned so they stay of top and not auto-close, so that as you make changes to action's options, these changes will be automatically reflected in the action options summary displayed on the pinned tooltip. Various lists in the program that let you select different items like tokens, tags, etc. Certain tooltips not only explain what a particular button or interface element does and how it can be used, but they also explain the underlying concept, as is illustrated by this tooltip displaying information about Regular Expressions language element.

Although optional and can be turned off, the program also offers contextual tooltips that will appear when you move your mouse over distinct parts of text in certain text fields that support syntax highlighting. Such tooltips are featured for all text fields that accept Regular Expression patterns as input; fields that allow character escapes; and in the file name pattern designer. This is very useful, as simply by hovering your mouse over different areas in the text fields, you will instantly know what a particular RegEx element or file name token does.

Upon installation of the software, you have the option to install a Windows Shell extension that integrates a Batch Process context menu into Windows Explorer, making it super easy to simply right-click on a group of files or a folder and launch the program with the selected files and chosen operation already setup, so you can process the files right-away - directly from Windows!

If you install optional Windows integration component, you will be able to launch Batch File Encrypt directly from Windows explorer by selecting the files or a folder containing files that you wish to process, right-clicking on the selection, and choosing Batch Process Files menu. When you launch program from Windows Explorer, it starts in a very compact mode with the files you selected in Windows Explorer already automatically added and ready for processing. This is done for your convenience so you can process file right away!

By default, if the program is started from Windows Explorer, it will automatically quit once the processing has been completed. However there is an option to change this behavior if you want. When the program is started in compact mode, it shows only the primary action you selected in the Windows Explorer's right-click context menu when you launched the program, and additionally crucial output settings that include file naming pattern and destination to save processed files.

If this is not enough for your needs and you need to make some changes and add more actions or files, or adjust other settings, you can always enter Full View by simply maximizing the window.

There is also an option for the program to always start in Full View if you want. When processing thousands of files using complex action sequences with multiple conditions and actions, certain things might go wrong occasionally; and that's where program's excellent troubleshooting abilities come in very handy.

Program's advanced logging capabilities make it super easy to diagnose problems and get rid of any processing warnings or errors. A very detailed log is automatically generated by the program for every processed file that contains details about which actions have been performed, when, with what options, and with what results.

All this information is made available to you in a nicely formatted view once the processing has been completed. File Operation Helpers make it easy to perform certain file-related tasks that do not directly correspond to the built-in actions.

File Operation Helpers automatically setup the proper output settings depending on the operation you choose to perform. Note different file operation helpers are available depending on the product you are using.

This dialog helps you rename multiple files matching criteria you specify according to the specified pattern. This dialog walks you through the process of combining multiple files into one using specified options and merge mode. Magoo Magoo PanosJr PanosJr 11 2 2 bronze badges. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown.

The Overflow Blog. Podcast Making Agile work for data science. Stack Gives Back Bat encryption script save as. Echo can encrypt any batch file successfully at one time, which is more convenient echo. Echo can automatically judge the wrong input, which is more humanized echo.



0コメント

  • 1000 / 1000