logo
  • Home
  • Software
    • アタッシェケースアイコン
      AttachéCase

      File encryption tool (Windows)

    • アタッシェケースアイコン
      RhymingTool

      Creating lyrics & rhyming in Japanese (Windows)

    • MarkDown#Editorアイコン
      MarkDown#Editor

      Markdown dual editor (Windows)

    • OutlineTextアイコン
      BossComing

      Replace by a fake desktop in an instant(Windows)

    • たまさぼアイコン
      "Tamasabo" Growth Simulation Game

      Smart phone app(iOS)

  • Web App
    • AttacheCase.NETアイコン
      AttacheCase.NET

      Secure key exchange and encryption support services

    • i18n.pageアイコン
      i18n.page

      Easy website translation tool(Web service)

  • Development tools
    • Png2WinIco

      PNG to Windows ICO file generation(Windows)

    • SHCode-JP-Zen-Haku

      Monospaced font for programming(Windows, macOS, Linux)

    • Hidemaru Editor Date Insert Macro

      A macro for the "Hidemaru Editor" that allows flexible date insertion.

    • Hidemaru Editor Markdown highlighting definition file

      Highlighting definition file for the "Hidemaru Editor"

  • About

Index   ( ja / en )

  • Getting Started
    • Setup
    • Limitation
    • If you forgot your password
  • How to use
    • Encrypt a file/folder
    • Decrypt a file
    • Self-executable format output
    • Public key cryptography
  • Settings
    • General
    • Window
    • Password
    • Save
    • Encryption
    • Decryption
    • Delete
    • Compress
    • System Option
    • Import/Export
    • How to use INI files
    • Password File
    • Camouflage extension
    • Password input limitation
    • Data salvage
  • Command line
    option
    • Basic Option
    • Save Option
    • Delete Option
    • Compress Option
    • Advanced Option
    • Other Option
  • Technical Information
    • Safety through open source
    • To begin with, encryption algorithm is open
    • More transparency
    • Concerns that a backdoor may have been installed
    • Conclusion
    • Cryptographic algorithms
    • Cryptographic mode
    • Key derivation according to RFC2898
    • SHA-1 to SHA-256
    • Compression algorithms
  • Support
    • Commercial Use
    • Copyright
    • License
    • FAQ
  • Other
    • Not Att"she"Case
    • The reason for development, open sourcing

Settings

General

General option panel
 Exit AttachéCase after process

When checked, the application will automatically terminate unless there is an error after the encryption or decryption processing is finished.

 After decryption open the associated files or folders

When checked, the decrypted file is opened with the associated application. If there are many encrypted files, they all will be activated, so be careful.

 Show dialog when containing the executable file

When encrypting, when an executable file is included in that file, show a warning dialog. If this option is ON, it is recommended to check this because the EXE file is executed directly.

 Show dialog when more than multiple files

Similarly, if the above "After decryption open the associated files or folders" is checked and a large number of files are included, all the associated applications will be launched and will be opened. So by setting the upper limit of the number of files, application will show a warning dialog beforehand.

 Ask to encrypt or decrypt regardless of contents

Normally the AttachéCase will process the file by determining its type automatically, but if you always want to select encryption or decryption it, you can check it beforehand by checking it here.

 Input password without masking

When input password window, you can input without masking (hiding) the password. This prevents incorrect character input in advance.

 Color

You can choose the appearance color of the AttachéCase. If you select "Auto", it will change according to the Windows 10 theme.

 Language

In the AttachéCase, English notation is also possible besides Japanese. Those who want to use the AttachéCase in English even in the Japanese environment ( OS ), can be set to the English version here.

Window

Window option panel
 Always minimize when running

During the encryption / decryption process, the AttachéCase is minimized and operates.

 Minimizing a window without displying in the taskbar

During the process, the AttachéCase icon is not displayed on the task bar, and it is minimized and operates.

The reason to minimize application window and not to delete the icon from the task bar is that there will be no place to stop processing.
 Display in the task tray

I always display an icon on the task bar when I activate the AttachéCase.

 Bring AttachéCase window in front of Desktop

On the desktop, it is displayed in front of all other windows (other applications). This makes dragging and dropping of files easier.

 Not allow multiple instance of AttachéCase

It always operates in one window. If this setting is ON and you double start up, the first activated AttachéCase takes precedence (no new window is displayed).

 Turn on IMEs in all text box for password entry

If checked, the IME will be automatically turned on when the focus is on the text box for entering the password.

Password

Passwords option panel
 Remember password for encryption

If you check it and specify a password, it will be used automatically as a password for encryption.

 Remember decryption password

As above, if you specify a password, it will be used automatically as the password for decryption.

If you use the same password for encryption and decryption, set the same for both. Why it is divided between encryption and decryption is because there is a case where passwords for encrypting each other and passwords for decryption are operated separately by exchanging encrypted files with people other than themselves.
This setting is not a highly recommended setting because the password is recorded in the PC. The storage password is encrypted, but the key is inside the application, it is easy to decipher if it flows out. Keep in mind this point, please operate.
 Encrypt / Decrypt by memorized password without confirming

When checked, it immediately shifts to encryption / decryption processing without checking the storage password.

 Enable password strength meter display

When checked, it displays the strength of the entered password in real time. The algorithm of the strength meter is based on that of Dropbox.

Save

Save option panel
 Encryption will be the same file type always

Select the encrypted file type that you always output. If you do not have automatic processing settings such as omitting the password, you can re-select the file type in the main window.

 Save same encryption type that was used to before

It remembers the type of encrypted file created before and encrypts it with the same file type in the next process.

 Output self-executable files so that they can be decrypted on older OS

Older OS (Windows7, Vista, XP, etc) that .NET Framework 4.6.2 is not applied can also be decrypted.

Specifically, if this checkbox is turned on, output a self-executable file that can be executed on .NET Framework 4.0.

.NET Framework 4.0 is no longer supported by Microsoft, so please note that self-executing files output with this enabled are no longer supported as same.

Encrypt

Encryption option panel

 Save the encryption files to the same folder

The encrypted files will always be saved in the specified folder.

 Confirm overwriting when the same name file exists

If checked, the file with the same name will display a confirmation dialog for overwriting. If it is not checked, the file will be overwritten as it is.

 In case of multiple files

  • Normal
    The contents and hierarchy of the folder to be encrypted will be retained and encrypted.
  • Create one encrypted file from files
    If multiple files or folders are thrown together, they will be combined into one and encrypted.
  • Encrypt files in directory one by one
    Multiple files or folders that are thrown in will be encrypted one by one.

 Set the timestamp to original files or directories

If checked, the timestamp of the file or folder will be retained in the encryption. If not checked, the timestamp at the time of encryption will be set.

 Create encrypted file including extension

The extension of an encrypted file is usually (*.atc), but for example, all files with the same name but different types (e.g., proposal.docx, proposal.xlsx, etc.) will have the same name as "proposal.atc" so to avoid this, the file extension is included in the output, such as "proposal.docx.atc" or "proposal.xlsx.atc".

 Set encrypted file name automatically

Specify the format of the encrypted file name. You can add dates, sequential numbers, etc. For more information on custom date/time format strings, please refer to Microsoft's page.

Decrypt

Decryption option panel

 Save to the same folder in decryption

Specify the folder where you want to decrypt the encrypted files and return the original files.

 Confirm overwriting when same filename exists

When checked, if there is a file with the same name in the decrypted destination, a confirmation dialog for the superscription will be displayed asking for confirmation.

 Create no parent folder in decryption

When decrypting, it does not create a parent (root) folder, but extracts the contents directly into the destination folder.

 Set the timestamp of files or directories to decryption time

Regardless of the timestamp at the time of encryption, it will match the timestamp at the time of decryption (if there are many files, there will be some discrepancy between each file).

Delete

Delete option panel

 Delete original files or directories after encryption

After encryption is complete, delete the original file or folder. The specific method of deletion is determined by the "Advanced Delete Option" below.

 Show the check box in main form window

Display the checkboxes for the above deletion options in the main window. This means that you can decide whether or not to delete the file during the encryption process.

 Show confirmation dialog to delete files or directories

Before deleting the file, a dialog will appear to confirm that you want to delete it.

 Delete encrypted file after decryption

After decryption, delete the original encrypted file. The specific method of deletion is determined by the "Advanced Delete Option" below.

 Show the check box in main form window

Display the checkboxes for the above deletion options in the main window. This means that you can decide whether or not to delete the file during the decryption process.

 Show confirmation dialog to delete encryption files

Before deleting the file, a dialog will appear to confirm that you want to delete it.

 Advanced Delete Option

 Normal delete

Delete a file or folder without going through the Trash. It is the same as the shortcut key "Shift + Delete".

 Send to Trash folder

Send it to the trash. A dialog is not brought up, but it is the same as the shortcut key "Delete".

 Complete Erase

The "Set the times to overwrite and completely delete" specifies the number of times the data will be overwritten in the file before it is erased. Normal deletion only simply erases the entry information on the hard disk. This setting enables complete deletion, which is difficult to recover from, after either writing by "Random numbers" or writing by "Zero" before deleting.

The greater the number of times, the more difficult it will be to recover from the hard disk, but the more processing time it will take.

By default, there are zero writes of Random numbers and one write of Zero.

Compress

Compress option panel

 Enable compression

When checked, data compression is performed at the time of encryption.

You can also set the compression ratio by adjusting the slider bar.

By default it is << 2 > [ Optimal ]>.

This compression operation should be optimally compressed, even if the operation takes a longer time to complete.

If you select < 1 > [ fastest ] , the compression operation should complete as quickly as possible, even if the resulting file is not optimally compressed.

Also, if you select < 0 > [ no compress ] , The checkbox will be automatically turned off and no compression should be performed on the file.

System Option

System option panel

 Associate encrypted files[*.atc] with AttachéCase

Administrator authority is required for execution. In addition, the application (AtcSetup.exe) included in the AttachéCase launches the association. If the association is successful, the * .atc file should have been changed to the selected icon below it.

 Disassociate encrypted files[*.atc] with AttachéCase

Disassociate the * .atc file from the AttachéCase. Use this when you want to manually uninstall. This also requires administrator privileges, another application will work.

 Add short cut to "Send to" folder

Add AttachéCase to "Send To" in the context menu. Likewise, press this button to cancel after adding.

 Change icon file of AttachéCase data

As an encrypted file icon, you can change it to a preset icon or an icon created by the user.

Import / Export

Settings import / export option panel
 Always read the setting file "_AtcCase.ini"

By checking the box, it will always try to read the configuration file "_AtcCase.ini" in the directory where the AttachéCase executable is located or the encryption file is located.

Turning on this setting may cause unintentional loading of configuration files created by third parties. Great care should be taken to enable this setting.

 Show a dialog box to confirm always

By checking the box, if the configuration file "_AtcCase.ini" is found, a confirmation dialog box will be displayed asking if you want to load it.

 Export this current configuration to INI file

Current operation settings can be output as command line options to INI file, batch file, text file, etc. and saved. It can be used as a base for creating other script files etc.

By outputting it as an INI file, placing it in the executable file or current directory, you can activate the Attache case with temporary settings. -> For details, refer to the next section "How to use .INI file".

 Import INI file to this current configuration

By importing the INI file outputted above, it is possible to replace the setting items of AttachéCase.

 Replace the current configuration by this temporary configuration

Replace the temporary setting when starting from the command line option with the main setting and save.

However, the timing of saving is when the AttachéCase exits.

By the way, the button is disabled (can not be pressed) when it is normally loaded.

How to use the INI file

In the AttachéCase, you can save the settings as an .INI file separately from the registry. Also, by reading the created .INI file separately, it is possible to switch the operation setting at startup.

It is useful for those who always wish to activate the AttachéCase with their preferred same settings, such as when decrypting encrypted files on different PCs in different places or bringing them to USB flash memory etc. into an environment where AttachéCase is not installed.。

 What is an INI file?

INIファイルアイコン

It is text information to write application setting information.

The extension is ".ini", but the contents are text files.

Therefore, it is possible for users to edit themselves with an editor etc. However, if you change them accidentally, you can not guarantee the operation, so you need to be careful about it.

In the AttachéCase, since the setting information is saved in the Windows system (registry) instead of the ".INI file", this file is unnecessary in the first place, but when you want to bring the setting information to another PC or change the setting for each processing It is convenient to save it as an ".INI file" when you want to cut out it.

 How to create an INI file

INIファイルの出力

Open the "Import / Export" and press the "Export this current configuration to INI file" button.

Select INI file format and output with file name "_AtcCase.ini". All the current settings are exported here.

 How to read the INI file

If you want to start with the setting contents of the .INI file output in the previous item, you need to start AttachéCase by placing the "_AtcCase.ini" file in the following location.

  1. Current directory
  2. Directory where the main body of AttachéCase (AtchCase.exe) is located
  3. Directory containing files and encrypted files you want to process

Since it will be read when searching for "_AtcCase.ini" file in the above order, if an INI file is placed in several places, it may become unexpected setting operation.

Normally, if you start the Attache Case without doing anything (without placing the INI file of the setting anywhere), it starts with the setting contents in the registry.

Place the .INI file in the location of the AttachéCase body (AttacheCase.exe) as follows.

INI file in executable file directory

Alternatively, place the .INI file next to the file or encrypted file you want to process.

INI file in encypted file directory

In the latter case, you need to drag and drop the files or encrypted file directly to the AttachéCase icon or launch association with it (since you do not refer to the .INI file in that directory even if you drop the file after starting it).

In doing so, the settings are temporarily set with the contents of the INI file, and the AttachéCase starts.

The file name of "_AtcCase.ini" is fixed name. Please do not change the name. The Attache case is reading the setting file by determining it by its file name, not the contents.

 When you want to reflect the contents of the INI file to the current setting

Please read the set .INI file in the above method, open the "Import / Export" item, and press the "Replace the current configuration by this temporary configuration" button.

The INI file is being read

In doing so, the contents of the .INI file are read into the registry and overwritten as the main setting.

Advanced

Password file

Password file option panel

 Allow Drag and Drop file instead of password

By checking, it becomes possible to substitute "password" by dragging and dropping an arbitrary file instead of entering a character string when it becomes the password input window.

Example of a password file

In this example, the file "desert.jpg" serves as the password file.

Internally, it generates a small unique data (256bit) that is a contraction of the file thrown in, and uses it as a password.

Note that SHA-256 is used as the message digest algorithm to shrink the file.

For example, when encrypting a Word document, you can specify a photo image (*.jpg) in the Picrues folder as the password to increase the hiding effect. In addition, you can avoid the password file in another location (e.g. external media) to further increase the security effect.

However, if the file specified as the password file is deleted, edited, or overwritten, the password will be lost. It is necessary to be very careful about this.

Even if you change even a single character (or a single byte), the condensed data has the property of changing drastically (see "SHA-1 to SHA-256" for details). Think of the file you specify as your password as the "whole" file being the key itself.

It is a very dangerous function that can cause data loss if used incorrectly, so please be very careful and set it at your own risk. It is recommended to set the attribute of the file you want to use as a password to "Read Only" in advance.

 Check password file for Encryption

 Check password file for Decryption

If you check here, it reads the specified password file and automatically encrypts / decrypts it as it is.

If you want to use the same password for both encryption and decryption, specify the same file path for both.

USBフラッシュメモリー

When using the same password for both encryption and decryption, specify the same file path for both.

If you save the password file to external media (SD card, USB flash memory etc), it will also function as a pseudo physical key.

Save the specified password file in the USB flash memory, when encrypting / decrypting, it will also function as a pseudo physical key. It reads the file directly and sets it as a password.

However, the password file name itself will be displayed here. If other people activate the AttachéCase without permission and watching this setting panel, the location of the password file is revealed. If you want to maintain security on the PC, care must be taken in handling.

Password file visibility

Everyone can see the location of the password file and even the file name...

In any case, it is not recommended for security reasons to specify files that are local, rather than external media that are always plug and unplug.

 It's not issued an error message when password file doesn't exists

If checked, the error message will not be displayed even if there is no password file in the specified location.

 Encrypt/Decrypt by the password of Password file without confirming

If checked, the encryption/decryption process will be executed immediately without going through the password input window.

Password input limit

Password limit option panel

 Set number of times to input password in encrypt files

Set a limit on the number of times a password can be entered for an encrypted file.

Note that this setting is not set in the AttachéCase itself, but in the encryption file (both "*.atc" and "*.exe") that is created.

 If input wrong password to the limit of times, DESTROY IT.

If the number of times set in the above section is wrong, the encrypted file will self-destroy so that it cannot be decrypted again.

If you do this setting, you will lose your important data. Please exercise caution and do so at your own risk.

The specific method of destruction is to destroy the IV data stored near the top of the encrypted file, as shown in the figure below.

In other words, it destroys the first block of the cryptographic section, which makes it difficult to recover the consecutive data necessary for decryption.

IVの破壊

Salvage data

Salvage data option panel

This is an emergency option to be used in case the encryption is done with an invalid file path structure and all the files are difficult to recover.

 Decrypt one by one while creating the parent folder

It takes time to decrypt the files as it checks and generates the parent folders one by one. Suppresses aborting the process due to errors caused by inconsistencies in the file list inside the encrypted file.

 Decrypt all files into the directory of the same hierarchy

It decrypts all files except directories, so you can be sure of salvaging them. If the same file name exists, it will automatically assign a number to it to avoid duplication.

 Ignore file hash value check

It prevents the decryption process from stopping at the message "The hash value of the file is invalid" and finishes the decryption process. However, since it is a so-called check sum error of file, there is no guarantee that all the files are decrypted correctly.

Camouflage extension

Camouflage extension option panel

Keep the contents of the encrypted file, but use the specified extension instead of "*.atc" or "*.exe". This will make it impossible to tell at a glance that the file has been encrypted by "AttachéCase". You will not be able to launch the attaché case by association, but you will be able to recognize the encrypted file by dragging and dropping it into the launched AttachéCase.

Development mode

Developer option panel

 Open developer console window

If checked, a separate development console window will open when encrypting and decrypting. You can extract and view information necessary for development, such as header information including file lists. This is mainly used to analyze the data in the attaché case and develop another application.

Command line option

If you don't know what "command line options at startup" means, this is completely irrelevant. Please skip this chapter.

This page explains how to customize the AttachéCase for those who want to use it in a more advanced way.

In the AttachéCase, it is possible to perform encryption/decryption operations by passing arguments at startup. It can be handled by other applications or operated from batch files. For example, it may be useful to create a shortcut for AttachéCase and write it to "link to" to encrypt and decrypt using different passwords.

In the command line argument, the password string and other information will be recorded and displayed without being hidden, so please be very careful with the settings. Please do this at your own risk.
Notes on command line options at startup
  • If you do not specify any particular argument, the AttachéCase will start with the settings that have already been configured. For example, if you usually set "After decryption open the associated files or folders" to ON, the program will open the folder after decryption unless you specify OFF as an argument.
  • The arguments are not case-sensitive. However, the contents of the configuration, such as passwords, are case sensitive.
  • If you put a space or a control character such as Tab between the argument and "=" (equal), it will not be recognized correctly.
  • If the password in the configuration contains spaces, or if the file path contains spaces, enclose the entire argument in "" (double-cotation) for proper recognition.
  • If you run the program with command line arguments, the settings will not be saved when you exit. When the process is canceled by the user, the settings will not be reflected even if the operation is set again.
  • It is not possible to use the command line to specify an encrypted file in the executable (*.exe) file output by AttachéCase. This can only be done to the main unit (AttacheCase.exe).
  • Not all configuration items of the AttachéCase can be specified in the command line options (some of them cannot be set).

General Option

/p=[PASSWORD]
Password
e.g.) /p=opensesame *When the path contains spaces... e.g.) "/p=open sesame"

/mempexe=[0,1]
Execute without confirmation with memory password.
e.g.) /mempexe=1 *When you want to confirm without doing it... e.g.) /mempexe=0

/psm=[0,1]
Display the password strength meter
ex). /psm=0 ※If you want to display the password strength meter... ex). /psm=1

/wmin=[0,1]
Always process windows minimized
e.g.) /wmin=1 *If you do not want to minimize and always perform... e.g.) /wmin=0

/tskb=[0,1]
Do not display on the task bar when window is minimized.
e.g.) /tskb=1 *When you want to display... e.g.) /tskb=0

/tsktr=[0,1]
Display icon in task tray
e.g.) /tsktr=1 *When you do not want to display icons... e.g.) /tsktr=0

Notice
It is not possible to turn off (= 0) both "Do not show on taskbar when window is minimized" option (/ tskb) and "Display icon on task tray" option (/ tsktr) becouse you could not operate the AttachéCase. However, if both options are set, "Force icon on task tray" is forced ON.

/opd=[0,1]
For folders, open after decryption.
e.g.) /opd=1 *If you do not want to open the folder... e.g.) /opd=0

/opf=[0,1]
Open the decrypted file with the associated software.
e.g.) /opf=1 *If you do not need to open the file... e.g.) /opf=0

/exit=[0,1]
After processing, exit the AttachéCase
e.g.) /exit=1 *If you do not want to exit... e.g.) /exit=0

/front=[0,1]
Display the window at the front of the desktop.
e.g.) /front=1 *If you do not want it to be the frontmost... e.g.) /front=0

/nohide=[0,1]
Enter the password without hiding it with "*" or "●"
e.g.) /nohide=1 *If you want to hide and enter... e.g.) /nohide=0

/theme=[light, dark, auto]
Select a color theme for the attaché case. These are "Light", "Dark", and "Automatic" respectively. e.g.) /theme=dark *If you want to start with a "light" theme... e.g.) /theme=light

/exeout=[0,1]
Always output in self-executable file.
e.g.) /exeout=1 ※When you do not want to output in executable file... e.g.) /exeout=0

/chkexeout=[0,1]
Display the checkbox on the main form.
e.g.) /chkexeout=1 *If you do not want to display a check box... e.g.) /chkexeout=0

/askende=[0,1]
Query for encryption / decryption processing.
e.g.) /askende=1 *When I do not want to query... e.g.) /askende=0

/en=1
Explicitly specify encryption.
*When this option is specified, it shifts to "encryption" processing at startup.
Even if query option is specified, it is ignored.

/de=1
Explicitly specify decryption.
*When this option is specified, it shifts to "decryption" processing at startup.
Even if query option is specified, it is ignored.

/nomulti=[0,1]
Do not start multiple.
e.g.) /nomulti=1 *When starting multiple... e.g.) /nomulti=0

/imeon=[0,1]
Turn on IME in all text boxes to input a password.
ex). /imeon=1 *If turned off... ex). /imeon=0

/notmaximized=[0,1]
Does not launch in maximized window when PC is running in tablet mode.
ex). /notmaximized=1 *If you want to maximize while following the tablet mode... ex). /notmaximized=0

Save Option

/exeolder=[0,1]
Output self-executable files so that they can be decrypted on older OS
Specifically, it outputs a self-executing file based on .NET Framework 4.0.
ex). /exeolder=1 *.NET Framework 4.6.2 is ex). /exeolder=0

/saveto=[PATH]
Always save the encrypted file in the same place.
e.g.) /saveto=MyDirPath
*If the path contains spaces...
"/saveto=C:\Documents and Settings\User1\My Documents"

/dsaveto=[PATH]
Always decrypt the file to the same place.
e.g.) /dsaveto=MyDirPath
*If the path contains spaces...
"/saveto=C:\Documents and Settings\User1\My Documents"

/ow=[0,1]
Confirm to overwrite in case of a file with the same name.
e.g.) /ow=1 *If you do not confirm overwrite... e.g.) /ow=0

/orgdt=[0,1]
Adjust the time stamp of the encrypted file to the original file.
e.g.) /orgdt=1 *When keeping the time stamp as it was at the time of generation... e.g.) /orgdt=0

/now=[0,1]
Set the timestamp of the decrypted file to the creation date.
e.g.) /now=1 *If you do not change the original timestamp... e.g.) /now=0

/allpack=[0,1]
Multiple files are combined into one encrypted file.
e.g.) /allpack=1 ※If you do not combine into one... e.g.) /allpack=0

/oneby=[0,1]
Encrypt / decrypt files individually in folders.
e.g.) /oneby=1 ※When not processing individually... e.g.) /oneby=0

/nopfldr=[0,1]
Do not generate parent folder when decrypting.
e.g.) /nopfldr=1 *When generating a parent folder when decrypting... e.g.) /oneby=0

/withext=[0,1]
暗号化ファイル名に拡張子を含める
ex). /withext=1 ※含めない場合は、ex). /withext=0

/autoname=[FORMAT]
Automatically add name to encrypted file name.

e.g.) /autoname=<filename>_<date:yymmdd><ext>
*If "/autoname" is not specified, this function is turned off.
*If the path contains spaces...
ex). "/autoname=<filename>_<date:yymmdd><ext>"

Delete Option

/del=[0,1,2,3]
After encrypting, delete the original file.
0: Do not delete
1: Normal deletion
2: Delete to trash box
3: Complete deletion
e.g.) /del=1 *If you do not want to delete the original file,... e.g.) /del=0

/delenc=[0,1,2,3]
After decrypting, delete the encrypted file.
0: Do not delete
1: Normal deletion
2: Delete to trash box
3: Complete deletion
e.g.) /delenc=1 *If you do not want to delete the encrypted file,... e.g.) /delenc=0

/chkdel=[0,1]
Display the checkbox on the main form.
e.g.) /chkdel=1 ※If you do not want to display a check box,... e.g.) /chkdel=0

/delrand=[0-99] How many times to erase a random number.
0-99: Specify the number of write operations.
e.g.) /delrand=3 ※If you do not write random numbers,... e.g.) /delrand=0

/delnull=[0-99] How many times to erase NULL.
0-99: Specify the number of write operations.
e.g.) /delnull=3 ※If you do not write NULL,... e.g.) /delnull=0

Compress Option

/comprate=[0-9]Deprecated
Compression Option(Compression ratio)
0-9: Specify the compression ratio.
e.g.) /comprate=6 *When not compressing,... e.g.) /comprate=0
Since ver. 4.0.2.0, the "compression" setting has been set to three levels: "/comprate=6" and above is "Optimal", "/comprate=0" is "NoCompression". The other "1 to 5" are recognized as "Fastest". Therefore, to specify "compression", use the following parameters.

/complv=[0-2]
Compression Option
e.g.) /complv=2 *When not compressing,... e.g.) /complv=0
"/complv=0" is "NoCompression", so no compression should be performed on the file.
"/complv=1" is "Fastest", so the compression operation should complete as quickly as possible, even if the resulting file is not optimally compressed.
"/complv=2" is "Optimal", so the compression operation should be optimally compressed, even if the operation takes a longer time to complete.

Advanced Option

/pf=[0,1]
Allow password to use file
e.g.) /pf=1 ※If you do not allow,... e.g.) /pf=0

/pfile=[PATH]
Password file path for encryption
e.g.) /pfile=C:\Temp\pass.txt
*If the path contains spaces...
"/pfile=C:\Documents and Settings\User1\My Documents\pass.txt"

/dpfile=[PATH]
Password file path for decryption
e.g.) /dpfile=C:\Temp\pass.txt
*If the path contains spaces...
"/dpfile=C:\Documents and Settings\User1\My Documents\pass.txt"

/nomsgp=[0,1]
Do not display an error if there is no password file.
e.g.) /nomsgp=1 *When you display an error,... e.g.) /nomsgp=0

/camoext=[EXT] Camouflage in extension of encrypted file.
e.g.) /camoext=.jpg *If you do not camouflage,... e.g.) /camoext=null

Other(from the command line only)

/4gbok=[0,1]
Do not display a warning message even if the output file exceeds 4 GB in self-executable format.
*This option is ignored except for self-executable output.
e.g.) /4gbok=1 *When displaying,... e.g.) /4gbok=0

/ws=[0,1,2]
Specify the state of the window at startup.
0: Normal
1: Minimize
2: Maximize
e.g.) /ws=1 *In this case, the window is activated in the "minimized" state.

/list=[PATH]
Specify file list to be encrypted / decrypted with different text file.
e.g.) /list=C:\Temp\list.txt
*If the path contains spaces...
"/list=C:\Documents and Settings\User1\My Documents\list.txt"

The format of the specified file list is 1 line per file path.

e.g.) The contents of "list.txt" specified in the above path↓
hogehoge.bmp
hogehoge1.bmp
hogehoge2.bmp
hogehoge3.bmp
tmp\temporary.htm
C:\Documents and Settings\User1\My Documents\test.doc

  • Even if you put the file path directly into the execution argument separately, you can use it together.
    (Rather than, it will be processed together.)
  • Naturally, if there are unexistent paths, an error will occur during processing.

/lc=[PATH]
Specify the text file path containing the registration code.
ex). /lc=C:\Users\user1\Desktop\license.txt
Relative paths can also be written.
ex). /lc=..\license.txt
*If the path contains spaces...
"/list=C:\Documents and Settings\User1\My Documents\license.txt"

If multiple registration codes are written in a text file, the topmost registration code is retrieved. In the meantime, characters other than those related to the hexadecimal system (0123456789abcdef) are ignored, so they are recognized even if they contain delimiters or comments.


Looking at this way, argument specification is quite complicated, but I think that it is convenient to use the existing setting as it is, just thinking to designate the argument temporarily just want to change.

For example,
"C:\Program Files\アタッシェケース\AtchCase.exe" Project1.doc /p=foobar /ow=1 /exit=1 /saveto=encrypt
とすれば、

For encrypting "Project1.doc", the password is "foobar", no confirmation of overwriting, end after processing, save destination is "encrypt" folder. For any other unspecified behavior settings, the existing settings are applied.

© 2011-2025 M.Hibara

Facebook icon
Twitter icon
GitHub icon
Qiita icon