Since the DOS days, batch files have been one of the most convenient and immediate ways to accomplish certain tasks. Even today it's possible to find some remarkably sophisticated utilities written as command-line batch files.
On the downside, batch files are easily hacked, edited, and reverse-engineered, making them problematic to rely on in certain situations.
I've written before about some ways around this, such as using elevated or deprecated privileges, but one of the more interesting tools I've seen for working with batch files is a program called Quick Batch File Compiler (QBFC).
QBFC takes any command-line batch program and compiles it into an encrypted executable or .EXE file. An .EXE file is much harder to casually reverse-engineer, so this could be a way to conceal a particular batch file's operations from an end user. For instance, if you had a network environment where a batch script was run at logon, and you wanted key information in the script hidden, the script could be converted to an .EXE and protected from prying eyes a lot more easily than a conventional batch file. (.EXE files also run faster than batch files, of course.)
QBFC can create two types of applications: a standard console application, which accepts conventional command-line parameters, or a "ghost" application, which opens no windows and provides no feedback. The latter is best for security or for when you want to perform an install or modification silently. QBFC also lets you set various resources in the .EXE file, such as its description, the company name, version information and even the application icon.
QBFC's shareware version is unrestricted, except that all .EXEs produced by the program flash a brief note at startup. The registered version does not have this limitation.
Program's Home Page: www.battoexe.com
Serdar Yegulalp sells multimedia software from www.battoexe.com
quick home cleaning Glenview ..Tip #1 -- Rebates: A rebate is not always a... Read More
Most of the web applications have a lot of images... Read More
Your first step in removing dangerous infections from your computer... Read More
GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More
The United States Of America citizen feels that games is... Read More
It seems like fast never quite rates fast enough.No matter... Read More
When you think of a help desk, what do you... Read More
I do a holiday letter every year and send them... Read More
In my humble opinion nothing makes a long trip easier... Read More
The technological horizon has always got something new to offer,... Read More
Are you frustrated with your PC?Is it feeling sluggish or... Read More
A computer needs a certain amount of information to operate;... Read More
Flow Text Around a GraphicQuestion: I have inserted a photo... Read More
Getting a new computer should be an exciting and gratifying... Read More
Computer related terminology could sometimes be daunting to newcomers. These... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
If you are a building a website or a forum,... Read More
Have you ever tried to remove Spyware off your PC... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More
I have a love-hate relationship with my computer.In fact, often... Read More
IntroductionMac OS X is the most technologically advanced operating system... Read More
Choose Not To ConformPalm pilots and pdas are constantly growing... Read More
1. Empty the Temp directory regularly. To do this, make... Read More
That desk in front of you and everything else around... Read More
scheduled maid service Winnetka ..Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
Digital Video Disc or as it is sometimes referred to... Read More
Spyware is the software that collects information about your online... Read More
Tip #1 -- Rebates: A rebate is not always a... Read More
While most small businesses really do need to find a... Read More
When I first started studying for my CCNP, some of... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
Are you stymied by the vast offerings in cheap mp3... Read More
JVC developed and used a high-performance reflective film to produce... Read More
You probably heard of the new Firefox browser version 1.0... Read More
The DNS (Domain Name System) servers are what your computer... Read More
Get started creating web pages using text files and HTML... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
Do you know how many fonts are currently installed on... Read More
Buying a receiver is one of the most important decisions... Read More
System File Checker is a great utility that is typically... Read More
MP3 players are everywhere! It seems that the number of... Read More
Having two operating systems is not as difficult as many... Read More
In this era of Internet, most people are frequent users... Read More
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More
I recently took a good look at what was keeping... Read More
If you're a computer expert, you'll probably already know about... Read More
I recently got an e-mail asking about virtual memory. The... Read More
JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More
Personal Technology |