Batch file to download and decrypt
You can specify to run a third-party program after processing each file, or after processing all files, providing output file path s as the argument. This is useful if you want to do additional processing on the files that at present cannot be achieved with this program. You can specify additional things that include: backup policy, whether original files should be deleted, should processing stop on errors, etc.
In Normal regular output mode, processed files are not joined, split, or zipped, and remain singular. There's one-to-one correspondence between input and output files.
When processing files you have additional output options. For example, you can set to adjust output files' dates and attributes. You may specify backup settings and whether or not original files should be kept or deleted. You can give processed files any name you desire with the powerful built-in file name designer tool. The tokens may represent either dynamically generated content that can be included as part of the file name, or a command that somehow modifies the part of the filename that has already been generated like changing letter case, or performing replacement operation.
There are close to different tokens that can be used to generate dynamic file names that meet your requirements. Simply include the token in the appropriate place in the file name pattern to have dynamically generated content inserted in the right place if the token generates content , or to affect the generated filename in other ways if the token represents a command or operation.
When it comes to saving processed files, the program really shines, as it comes with built-in professional file renamer tool that lets you easily design file naming pattern simply by drag-dropping different name parts tags onto the text area.
You can even perform search and replace operations on the file name patterns you design! Moreover the program can act solely as bulk file name renamer utility: you do not have to add any actions to the action sequence, and choose to only rename files instead! One of the ways you can add files to the file list for processing is by doing a search for all files that match criteria you specify.
The program will scan selected directories and subdirectories for any valid files and automatically add them to the list. You can find files you need for processing based on file properties like size or creation date, and attributes. This is in addition to basic search by name! What's more is that you can fine tune these and select the exact ranges for all properties, like setting the size to be between 1MB and 5MB for example. With dates, too, you can be as specific as you want: you may, for example, look for files created on any day in May , or on May 10 specifically.
You can search for and add files for processing using not just their names and properties, but actual contents as well. Perhaps you need to process only files that start with a particular text; or only those files that contain a particular phrase specified number of times. The program is very flexible! You can search for and add files for processing using their binary content. Perhaps you need to process only files that start with a particular sequence of bytes; or only those files that contain a particular byte sequence no more than specified number of times.
In all of the processing modes, files for processing can be selected using recursive deep file search, where the program automatically scans specified directories for files matching desired criteria, such as: file name pattern, extension, size, dates, content etc. This has several advantages:. For finding files with file names matching a specific pattern, you can either use extended wildcards with support for positive and negative matches, sub-masks, character ranges, grouping and alternation patterns; or use even more powerful Regular Expressions.
You can easily add files for processing matching a specific file name pattern and having certain extension s with advanced wildcards! Of course, you could use regular Operating System file search, but it is very weak and supports only basic wildcards. On the other hand, Regular Expressions may be too complicated for a trivial task like selecting files matching a give name pattern.
Advanced wildcards, one of Batch File Encrypt's many unique features, is what you would want to use! It is possible to create scheduled or triggered processing jobs that will be automatically performed even if the program is not running. And there is no limit to how many such jobs can be created!
For every job you can specify the files to be processed, actions to be performed, output settings, and other processing options. When the processing job is triggered, depending on the job's setting the program will be automatically launched in either GUI, console, or hidden mode, and the processing will be automatically started.
When done, the program will exit automatically. Processing jobs allow you to setup various batch file processing tasks that will be executed on a specified trigger or on schedule. General properties include: name of the job, general timeframe when the job can be active, operation mode that determines if any UI will be shown, and user account together with security context under which the job will be executed.
There are several ways in which you can specify which files should be processed by a processing job:. Once you have specified which files should be processed by a processing job, the next step is to specify how these files should be processed, which actions and operations should be performed.
This is done by specifying a previously saved Action Sequence. Additionally you can customize a few other processing aspects like the number of processing threads and logging options.
Output settings determine where and how the processed files are saved. All the options that are available in Step 3 in Manual and Automatic processing modes can be customized here as well. These include:. Last step in setting up a processing job is to define a trigger or specify a schedule that will determine when the processing job will actually execute.
Monthly trigger lets you specify that a job should be executed on a monthly basis. You can select specific days of the month or weeks when the job should be run, as well as specify which months should be included and which ones should be excluded. Weekly trigger lets you specify that a job should be executed on a weekly basis. You can select specific days of the week when the job should be run.
Daily trigger lets you specify that a job should be executed on a daily basis. You can specify the daily recurrence pattern as well. Event-based triggers lets you specify that a job should be executed when a particular application or system event occurs. This feature is available only on Windows Vista or higher. Any events that you see in the Windows Event Viewer are supported, and a processing job will be automatically started by Windows Task Scheduler Service when the associated event occurs.
The Command Line Preview tab shows you the exact command line that will be run in order to start the processing job. That way you can launch the program manually with appropriate parameters and have the same processing job be manually started. The program gives you full control when designing the sequence of actions; yet at the same time if you are just starting or want to perform some basic task quickly, the program offers numerous common tasks organized into categories that you can simply click on and see the needed actions be automatically added to the action sequence for you, so you can get started in no time!
Note that with the built-in actions and operations you can do much more than what you can do with common tasks described above! Common tasks by no means represent all of product's functionality, but rather facilitate product's use when it comes to dealing with frequently occurring tasks. One of the most frequent tasks when processing text-based files is working with lines in one way or another.
The program offers multiple common operations relating to lines:. There are several built-in common tasks for copying or moving parts of the file to another position. You can duplicate lines; you can copy lines from the start or end of the file to another position, or relative to their current location; you can copy blocks of bytes to another position; and more!
Program also offers various encoding and conversion -related common tasks that help you change text file encoding, convert text to binary and vice versa, convert HTML to plain text, etc. Not only can you modify file's contents with common tasks, but it's very easy to perform various file system -related operations as well:.
There are various common tasks related to working with binary data and modifying individual bytes as well as performing binary search and replace operations. Batch File Encrypt has full support for command line operation.
It can not only be started from command line with specific options, but it can also run and operate entirely in console window. A typical usage scenario would be to first specify a sequence of actions to be performed and then save that sequence to a template file. Then you can easily process files entirely from command line using a few switches: input directory and input file pattern, path to a saved action sequence template file, and output directory with file naming pattern.
The program can be easily customized to your preferences, thanks to the many options that it has. Various options include:. With Batch File Encrypt we have re-imagined the concept of in-place help for a software product with the goal for it to be readily-accessible, well integrated, useful, and detailed.
No more clumsy external huge help files that would take hours to make sense of and relate to the program! Instead, virtually all elements of the User Interface have very detailed, in some cases multi-paged, informative tooltips that not only explain what a particular button, checkbox, or option does, but also provide valuable insights and helpful tips letting you know how to take advantage of a particular feature.
Multi-paged tooltips can be easily viewed simply by scrolling with your mouse wheel. Certain contextual tooltips can also be moved around and pinned to stay on top of other windows. This may be invaluable if you need to keep certain information in the view while working on something else. Batch File Encrypt features very detailed and helpful tooltips that are available for virtually all user interface elements.
If the text is too long, it is broken up into several pages that you can easily scroll through with your mouse wheel. No need to view external documentation, the help is completely integrated with the product! Some tooltips can be moved around and pinned so they stay visible on top of other windows until closed.
This is useful when a tooltip displays certain technical information that may be needed to configure certain settings, and should therefore remain visible even when the mouse is no longer hovering over its parent element!
There are very detailed tooltips for files in the file list! Such tooltips display not only basic file information like file name, location, size, and attributes, but also show first few dozens of bytes that make up file content! These tooltips also inform you of what actions are possible with the file selected. Action tooltips display detailed information about the actions in the action sequence. When you move your mouse over an action in an action sequence, a tooltip will be displayed, explaining what the action does, what are the current action options, and what things you can do with a given action.
Action tooltips can be pinned so they stay of top and not auto-close, so that as you make changes to action's options, these changes will be automatically reflected in the action options summary displayed on the pinned tooltip.
Various lists in the program that let you select different items like tokens, tags, etc. Certain tooltips not only explain what a particular button or interface element does and how it can be used, but they also explain the underlying concept, as is illustrated by this tooltip displaying information about Regular Expressions language element.
Although optional and can be turned off, the program also offers contextual tooltips that will appear when you move your mouse over distinct parts of text in certain text fields that support syntax highlighting. Such tooltips are featured for all text fields that accept Regular Expression patterns as input; fields that allow character escapes; and in the file name pattern designer. This is very useful, as simply by hovering your mouse over different areas in the text fields, you will instantly know what a particular RegEx element or file name token does.
Upon installation of the software, you have the option to install a Windows Shell extension that integrates a Batch Process context menu into Windows Explorer, making it super easy to simply right-click on a group of files or a folder and launch the program with the selected files and chosen operation already setup, so you can process the files right-away - directly from Windows!
If you install optional Windows integration component, you will be able to launch Batch File Encrypt directly from Windows explorer by selecting the files or a folder containing files that you wish to process, right-clicking on the selection, and choosing Batch Process Files menu. When you launch program from Windows Explorer, it starts in a very compact mode with the files you selected in Windows Explorer already automatically added and ready for processing.
This is done for your convenience so you can process file right away! By default, if the program is started from Windows Explorer, it will automatically quit once the processing has been completed. However there is an option to change this behavior if you want. When the program is started in compact mode, it shows only the primary action you selected in the Windows Explorer's right-click context menu when you launched the program, and additionally crucial output settings that include file naming pattern and destination to save processed files.
If this is not enough for your needs and you need to make some changes and add more actions or files, or adjust other settings, you can always enter Full View by simply maximizing the window. There is also an option for the program to always start in Full View if you want. When processing thousands of files using complex action sequences with multiple conditions and actions, certain things might go wrong occasionally; and that's where program's excellent troubleshooting abilities come in very handy.
Program's advanced logging capabilities make it super easy to diagnose problems and get rid of any processing warnings or errors.
A very detailed log is automatically generated by the program for every processed file that contains details about which actions have been performed, when, with what options, and with what results.
All this information is made available to you in a nicely formatted view once the processing has been completed. File Operation Helpers make it easy to perform certain file-related tasks that do not directly correspond to the built-in actions.
File Operation Helpers automatically setup the proper output settings depending on the operation you choose to perform. Xbox Game Pass Ultimate review. Windows Windows. Most Popular. New Releases. Desktop Enhancements. Networking Software. Trending from CNET. Download Now. Developer's Description By Dreamify. Users will already be familiar with the Microsoft Office layout.
Our program offers time saving batch file processing for handling large numbers of files easily. Full Specifications. What's new in version 1. Date Added June 3, Version 1. YouHack YouHack 1 1 1 silver badge 1 1 bronze badge. Why not just zip them with a password? You cannot use a number as an environmental variable name unless you reference it with delayed expansion. GNUPG is a freely available encryption program. Why not use that? I know thaht batch isn't much appropriate for suck encryption program but I need to give this program to people so i need it a simple as possible.
Squashman can you explain more please i didn't get you! For Anyone Who wants the code contact me in private — YouHack. Add a comment. Active Oldest Votes. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog.
0コメント