Personal Technology Information |
Compile .BAT Files into Native Windows Applications (.EXE)
Since the DOS days, batch files have been one of the most convenient and immediate ways to accomplish certain tasks. Even today it's possible to find some remarkably sophisticated utilities written as command-line batch files. On the downside, batch files are easily hacked, edited, and reverse-engineered, making them problematic to rely on in certain situations. I've written before about some ways around this, such as using elevated or deprecated privileges, but one of the more interesting tools I've seen for working with batch files is a program called Quick Batch File Compiler (QBFC). QBFC takes any command-line batch program and compiles it into an encrypted executable or .EXE file. An .EXE file is much harder to casually reverse-engineer, so this could be a way to conceal a particular batch file's operations from an end user. For instance, if you had a network environment where a batch script was run at logon, and you wanted key information in the script hidden, the script could be converted to an .EXE and protected from prying eyes a lot more easily than a conventional batch file. (.EXE files also run faster than batch files, of course.) QBFC can create two types of applications: a standard console application, which accepts conventional command-line parameters, or a "ghost" application, which opens no windows and provides no feedback. The latter is best for security or for when you want to perform an install or modification silently. QBFC also lets you set various resources in the .EXE file, such as its description, the company name, version information and even the application icon. QBFC's shareware version is unrestricted, except that all .EXEs produced by the program flash a brief note at startup. The registered version does not have this limitation. Program's Home Page: www.battoexe.com Serdar Yegulalp sells multimedia software from http://www.abyssmedia.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 403, exiting |
RELATED ARTICLES
How To Become A True CCNA I've worked my way from the CCNA to the CCIE, and along the way I've conducted job interviews and casual conversations with dozens of CCNAs and CCNA candidates. Believe me, people who "sneak by" the CCNA exam by braindumps, memorization, and never touching a router or switch are QUICKLY found out in job interviews and on the job. Image Conversion In Computers JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used formats for storing still image files such as photographs, graphics, and drawings.JPEG stands for Joint Photographic Experts Group and is a standard for image compression. Computer Consulting 101 PC Troubleshooting Advice While most small businesses really do need to find a good local computer consulting business to take care of their computer problems, there are some computer problems that are simple enough for even a technophobe to handle. At Computer Consulting 101, we've found there's one very simple piece of advice that often doesn't get communicated to non-technical small business end users: When in doubt, reboot first. Home Video? Bring it On So you got yourself a digital camcorder. If you want to be able to edit and produce awesome home videos, you'll need some tools. Classification of Computers Computers are available in different shapes, sizes and weights, due to these different shapes and sizes they perform different sorts of jobs from one another.They can also be classified in different ways. Is Your Web Browser Putting You At Risk? It's free, it comes with Windows and it's used by approximately 94% of the Internet population. It also poses an unacceptable security risk. Desktop Security Software Risks - Part 2 This is the third in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. Help, I Need a New HDTV! (Part 3 of 5) Feeling overwhelmed in selecting a new TV? With all the choices these days, you may feel like, "Where do I start?!"In part 3 of our 5 part article, we the discuss what HDTV is.HDTV stands for High Definition TV. Flash Memory, Part I: MMC and SD MMC and SDFlash memory is available in so many formats that it can be difficult to know what will work with any particular device. Devices such as MP3 players, PDAs, mobile phones, digital cameras, and personal computers can take advantage of flash memory to bolster their storage capacity, but selecting the right format may be easier said than done. Spyware Remover Your first step in removing dangerous infections from your computer should be downloading a free program called Hijack This. Make sure you download the file and extract it to a directory on your hard drive, you can call it HijackThis. New Computer? Steps to Protect Your Computer Before Connecting to the Internet Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back. Temporary Fixes to Spyware, Ad-ware, and Virus Infections So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner. Faster Browsing Tips IF WE say that it was mainly because of the Windows operating system that a Computer could become a personal computer it would not be an exaggeration. The revolution is still on. Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment MP3 players are Hot! Playing music has come a long way since the transistor radio, portable tape and CD player days. Most players are no larger than a deck of cards. Does Microsoft Show Hackers How To Attack? After another security hole recently surfaced in Microsoft's Windows operating system, the software giant released a patch this past Friday to plug the possibly devastating "back door" which allows hackers to potentially seize control of any pc running Windows.The latest threat, "Download. The Benefits of Open Source If you are a building a website or a forum, chances are you are using a web editor or paying for message board services. The costs of using these "out of the box" products can add up, especially if you are trying to grow your business. MCSE 70-290 Certification Primer Microsoft Certifications are one of the most widely acclaimed, pursued, and achieved technical certifications in the IT industry. The demand for Microsoft Certified Professionals in the job market is increasing every year. Basic Computer Maintenance One of the most common questions computer users ask is, "How do I maintain my computer and keep it running great?" A computer is a lot like a car?it costs more than you think it should, it starts going down in value as soon as you bring it home and it requires regular maintenance to keep it running smoothly. Here are a few basic guidelines required to help keep your PC out of the shop:?Always use a surge protector! Power surges, spikes, lightning and brown-outs are all things that can literally burn up your computer & its peripherals. Cut Through the Hype and Make the Right Digital Camera Comparisons There are soooo many choices. With all the styles and features, and prices are all over the map, digital camera comparisons can be mind-boggling. FTP - File Transfer Protocol Explained File Transfer Protocol (FTP) is a protocol that is part of the TCP/IP suite. It is the standard for transferring large amounts of data from server to server and from servers to clients. |
home | site map | contact us |