Advanced Search
Search Results
91 total results found
Moving files to another folder
ReNamer can move files and folders to a different location as part of the renaming process. You can move everything to a single target folder, or distribute files into multiple folders based on their properties. Moving to a folder To move items to a different ...
Command line
ReNamer supports several command line parameters for launching the program with files pre-loaded, applying presets automatically, and performing unattended renaming operations. The general format is: "ReNamer.exe" /parameter [arguments] Note that multiple par...
Long paths
Introduction The maximum length of paths and file/folder names is limited in every mainstream operating system and file system. The exact limits can vary significantly between systems. For example, in Windows 10 and earlier versions the maximum path length is ...
Failed renaming
The renaming operation can fail for a variety of reasons. The built-in validation process attempts to identify common problems before renaming by raising warnings during the preview stage, but it cannot catch every possible issue. The most common reasons for a...
Validation
Validation is a process that analyzes the list of files and their target destinations to identify common problems before renaming begins. When a potential problem is detected, a warning is raised so it can be resolved during the preview stage rather than resul...
Wildcard masks
Wildcard masks (also called filename masks) are a simple pattern-matching syntax that uses special placeholder characters to match filenames. Masks can be used in several places in ReNamer, including the Replace rule and Remove rule, Filter settings, and the C...
Overview
Hasher is a file checksum and verification utility. It computes cryptographic hash values for files and text, so you can confirm that files have not been corrupted or tampered with during transfer or storage. Hashing files is as simple as dropping them into t...
Overview
RandPass is a random password generator built for both everyday use and security-conscious workflows. Passwords can be built from a configurable set of characters, or generated as sequences of random words, an approach that tends to be both more memorable and...
Generating passwords
RandPass supports two password generation mechanisms, each suited to different needs. The Characters tab builds passwords by drawing from a configurable pool of individual characters. The Words tab assembles passphrases from randomly selected words — an approa...
Command line
RandPass supports command line parameters for unattended password generation. Passwords are generated using the settings last configured in the application, and written one per line to a file or to the clipboard. The examples do not include the full path to Ra...
Hashing files
Files can be added for hashing by drag and drop, by typing or pasting a path directly into the file path field at the top, or using the Add Files and Add Folder toolbar buttons. Once hashing is complete, file metadata (size, attributes, creation and modificati...
Comparing hashes
Hasher provides two ways to compare hash values: verifying a file against a known hash string, and comparing two files directly against each other. Once files have been hashed, the comparison tools are accessible directly from the main window. Verify against a...
Main menu
This article describes the options available in the main menu. File menu Option Shortcut Description Add Files Open a file browser to select one or more files for hashing. Add Folder Open a folder browser to select a folder. All files in the folder ...
Settings
The Settings dialog allows you to configure the behaviour and appearance of Hasher. It is accessible via File » Settings from the main menu. Stay on top of other windows — Keep the main window above all other windows on the desktop. Use upper case hashes — D...
Log Viewer
The Log Viewer keeps a running record of all files hashed in the current session, along with their metadata and computed hash values. It is the primary way to review and export results after hashing a batch of files. Open it via Log » View Log from the main me...
Hash Text
The Hash Text dialog computes hash values for an arbitrary text string rather than a file. This is useful for verifying that a piece of text has not changed, matching a hash published alongside a text snippet, or testing how a particular algorithm behaves. Ope...
Main window
The main window is the single workspace for selecting, entering, adjusting, and converting colors. TODO: Insert main window screenshot. Color palette and slider The large gradient square and the narrow vertical slider to its right work together as a unified co...
Picking colors from screen
The built-in eyedropper lets you sample any color visible on your screen, regardless of which application is displaying it. When activated, a screenshot of the desktop is taken immediately and used as the source for picking, so the captured colors remain stabl...