************************************************************* * * * Mikhail Tchervonenko * * CopyMik Url: http://www.superbasis.de/copymik/ * * * ************************************************************ *************************************************** Version 2.28b release 9: New opportunities: The final statistics displays the total amount of processed files before and after processing, the size difference before and after processing, the size of the moved files from the source folder, the size of the deleted files in the target folder during synchronization, the size of the backup files when deleting or replacing files. BagFix. *************************************************** Version 2.28b release 8: New opportunities: In date and time variables: {DATE}, {YEAR}, {MONTHNAME}, {DAYNAME}, {DATETIME}, {MONTHOFYEAR}, {WEEKOFYEAR}, {WEEKOFMONTH}, {DAYOFMONTH}, {DAYOFWEEK}, {DAYOFYEAR}, {HOUR}, {MIN}, {SEC}, {MSEC} it is possible to use the simplest arithmetic operations + and -. For example {DAYOFMONTH-1}. If today 29 you get 28. *************************************************** Version 2.28b release 7: BagFix. *************************************************** Version 2.28b release 6: New key: [/CS[ FileMask1[ FileMask2[ ....]]]] Copy file und folder security attributes. Only files with the specified mask and folder mit mask *. The /CS key is equivalent to a key combination /CSF[ FileMask1[ FileMask2[ ....]]]] and /CSD *. (default mask *) *************************************************** Version 2.28b release 5: New: Parallelization of encryption and/or compression and/or copying streams. New key: [/TH[ MaximumNumberOfParallelStreams]] Maximum number of concurrent file processing threads (default is the number of processors minus 1. Min = 1 and Max = 100)' [/STH] Display on the screen or in the log the number of active threads at the moment. For example: (3) - means - three streams are active at the moment. [/USR] Show current user name [/CSFO[ FileMask1[ FileMask2[ ....]]]] - Copy the part of the security descriptor responsible for the owner of the file. (Default Mask *) [/CSFG[ FileMask1[ FileMask2[ ....]]]] - Copy the part of the security descriptor responsible for the group policy file. (Default Mask *) [/CSFD[ FileMask1[ FileMask2[ ....]]]] - Copy part of the security descriptor responsible for the selective access control list, controlled by the owner of the file and regulating the rights of users and groups to actions with the file (read, write, delete, etc.). (Default Mask *) [/CSFS[ FileMask1[ FileMask2[ ....]]]] - Copy the part of the security descriptor responsible for the audit file. (Default Mask *) Note: The /CSF key is equivalent to a key combination /CSFO, /CSFG, /CSFD, /CSFS [/CSDO[ DirMask1[ DirMask2[ ....]]]] - Copy the part of the security descriptor responsible for the owner of the folder. (Default Mask *) [/CSDG[ DirMask1[ DirMask2[ ....]]]] - Copy the part of the security descriptor responsible for the group policy. (Default Mask *) [/CSDD[ DirMask1[ DirMask2[ ....]]]] - Copy part of the security descriptor responsible for the selective access control list, controlled by the owner of the folder and regulating the rights of users and groups to actions with the folder (read, write, delete, etc.). (Default Mask *) [/CSDS[ DirMask1[ DirMask2[ ....]]]] - Copy the part of the security descriptor responsible for the audit folder. (Default Mask *) Note: The /CSD key is equivalent to the simultaneous combination of keys /CSDO, /CSDG, /CSDD, /CSDS Documented: [/ADM] Run with administrator privileges (if any). Bagfix. *************************************************** Version 2.27b release 3: New key: [/TP] Passing all source folders to the full depth of the nest regardless of whether the copy condition for the current folder is fulfilled or not. Note: The key allows you to go through all folders to the full depth of their nesting and check the conditions for copying/renaming/compressing/encrypting subfolders and files in them. I'll remind you that by default the input to the source folder is not performed if it does not satisfy the copy condition. Example 1: Copy/overwrite files txt, doc and xls (key /MF ...) from the Desktop and Documents folders in f:\Backup\Users located in user profiles C:\Users\ ....\.... The folder tree before files will also be created. Files in the original root folder of C:\Users are excluded from copying (key /XCF ...). copymik c:\Users f:\Backup\Users /OF /TP /MD "{R=^C:\\USERS\\[^\\]+\\((DESKTOP|DOCUMENTS)(\\|$))}" /XCF "{R=^C:\\(USERS)\\(\w|[-.])+$}" /MF *.txt *.doc *.xls *************************************************** Version 2.26b Release 4: 1. Added support for regular expressions (perl compatible) in checking the conditions for copying files and folders: a. the full path to the file or folder when checking the regular expression is contained, not case sensitive compare - {R=Regular expression} or case sensitive compare - {r=Regular expression}',nCodePageNr); b. the full path to the file or folder in the regular expression check is not contained, not case sensitive compare - {E=Regular expression} or case sensitive compare - {e=Regular expression}',nCodePageNr); Example 1: Copy all doc files and folders from c:\Documents to c:\Backup excluding files and folders starting with the underscore character. In comparison, the full path to files and folders does not participate. copymik c:\Documents c:\Backup /MF *.doc /XCF {E=^(_)} /XCD {E=^(_)} Example2: Copy all doc files and folders from c:\Documents to c:\Backup excluding files and folders containing digits in any position or beginning with the underscore character. In comparison, the full path to files and folders does not participate. copymik c:\Documents c:\Backup /MF *.doc /XCF {E=[0-9]} _*.* /XCD {E=[0-9]} _* Important! In key, you can combine masks and regular expressions by separating them with a space character.',nCodePageNr); 2. In the /STRF and /STRD keys, it is possible to use regular expressions (perl compatible), case-insensitive {E=Regular Expression}, or case-sensitive {e=Regular Expression} comparison Important: The regular expression must always be on the left side of the equation. Example: Copy all doc files and folders from c:\Documents to c:\Backup and will replace the initial underscore in the name for the current date. copymik c:\Documents c:\Backup /STRF {E=^(_)}={DATE} Read more about regular expressions here: https://en.wikipedia.org/wiki/Regular_expression *************************************************** Version 2.25b Release 4: Bagfix *************************************************** Version 2.25b Release 3: Added the ability to use relative paths (folder down ..\ or .\ Current folder) The rule also applies to paths in keys. Example: copymik ..\..\Folder1 ..\..\Folder2 /XCD ..\..\Folder1\Temp *************************************************** Version 2.24b Release 3: Bagfix *************************************************** Version 2.24b Release 2: Bagfix *************************************************** Version 2.24b Release 1: Bagfix To improve the cryptographic stability, the algorithm for processing the encryption key entered using the /B /R /PASS /CRPASS /DECRPASS keys has been changed New key: [/C223] Encryption and decryption compatibility mode with CopyMik version below 2.24 for keys /B /R /PASS /CRPASS /DECRPASS (where the password was entered in the command line) *************************************************** Version 2.23b Release 1: Bagfix *************************************************** Version 2.22b Release 3: In order to increase the cryptographic strength of encryption, the algorithm for processing the encryption key in the form of an external file has been changed. New keys: [/COMP] The encryption compatibility mode with program versions is below 2.22 when using an external file as an encryption key. Important!!! Starting with the version 2.22, in order to improve the cryptographic strength, the processing of the external encryption key in the form of an external file has been changed. Files encrypted in the program version 2.21 and below should be decrypted with the /COMP key The changes occurred only when the encryption key was used as an external file. If you use only the password or password + key file, for compatibility with older versions of CopyMik (from 2.21 and below), the /COMP key is not required. New Version - VsToolkit ( http://www.rathlev-home.de/tools/progtools.html#language ) Version 2.21b Release 2: There was an opportunity to use in the file keys links to masks files. Fixed some bugs and shortcomings. New keys: [/PASS password] - encryption and decryption password (replaces /CRPASS and /DECRPASS at the same time) [/WPASS] - visible interactive input of the encryption and decryption password (replaces /CRPASS and /DECRPASS at the same time), the password symbols are displayed in the console [/HPASS] - the hidden interactive input of the encryption and decryption password at the same time (replaces /CRPASS and /DECRPASS at the same time), the password symbols are replaced by * [/ODT[ MaskeTargetDir1[ MaskeTargetDir2[ ....]]]] Copy only if the destination folder exists, all other folders are excluded from copying. (Default mask *) IMPORTANT! If you rename the folders then the folder mask check occurs with the new name [/NODT[ MaskeTargetDir1[ MaskeTargetDir2[ ....]]]] Copy only if the destination folder does not exist, all other folders are excluded from copying. (Default mask *) IMPORTANT! If you rename the folders then the folder mask check occurs with the new name [/OFT[ MaskeTargetFile1[ MaskeTargetFile2[ ....]]]] Copying is performed only if the target file exists. All other files will be skipped. It only makes sense in conjunction with the key /OF. (Default mask *) IMPORTANT! If you rename a file, then the file mask check takes place with the new name [/NOFT[ MaskeTargetFile1[ MaskeTargetFile2[ ....]]]] Copying is performed only if the target file does not exist. All other files will be skipped. (Default mask *) IMPORTANT! If you rename a file, then the file mask check takes place with the new name [/NODELT] Do not delete files and folders in the destination folder by copying errors (for example, by using /MIR key) [/DSKIP] Do not show information about the created folders (in combination with the key /NSKIP will leave in the output only information about the copied files and errors) [/RFT [Mask]] Mask for renaming files (if there is a target file with the same name). (Only in conjunction with the /RF key). The default mask is "{FNAMEEXT} - Copy ({NR})" where {NR} is the copy number. Can use predefined variables: {SP} - space symbol, {DATE} - current date, {DATETIME} - the current date and time, {YEAR} - year number, {MONTHNAME} - name of the month, {DAYNAME} - weekday name, {MONTHOFYEAR} - month number of the year, {WEEKOFYEAR} - week number of the year, {WEEK OF MONTH} - week number of the month, {DAYOFYEAR} - day number of the year, {DAYOFMONTH} - day number of the month, {DAYOFWEEK} - day number of the week, {HOUR} - hour, {MIN} - minutes, {SEC} - seconds, {MSEC} - millisecond {FNAMEEXT} - file name and extension, {FNAME} - file name, {FEXT} - file extension, {FEEXT} - file extension without a point, {QUOTE} - double quotation mark, {EQUAL} - symbol = [/CAF Attribute1[ Attribute2[....]] Include or exclude files with attributes from copying. Attributes that begin with a plus sign - allow copying of files and from a minus - forbid. The default sign is +. Priority in write order.          Possible attributes: R - read only, H - hidden, S - system, A - archive, D - file of windows device, F - normal file, T - temporary, G - low density file (usually containing many zeros),          C - compressed, O - not attached (file content not available)          N - not indexed, E - encrypted, V - Virtual [/CAD Attribute1[ Attribute2[....]] Include or exclude folders with attributes from copying. Attributes that begin with a plus sign - allow copying folders a from minus - forbid. The default sign is +. Priority in write order.          Possible attributes: R - read only, H - hidden, S - system, A - archive, C - compressed, N - not indexed, E - encrypted          P - entry point (is a block of user-defined data associated with a real directory) IMPORTANT! In recent versions of windows to copy or create entry points/links requires running copymik with administrator rights [/GL] follow the link when copying a link/entry point (copy real data and not the link/entry point itself) [/BDEL[ FolderForBackups]] Specifies the destination folder for the backup of the target files to be deleted (eg with /MIR key). If the folder is not specified then the main target folder with the postfix _BDEL and the subfolder based on {DATETIME} Before deleting, the file will be copied to the specified folder, the folder tree to the file will also be recreated. Can use predefined variables: {SP} - space symbol, {DATE} - current date, {DATETIME} - the current date and time, {YEAR} - year number, {MONTHNAME} - name of the month, {DAYNAME} - weekday name, {MONTHOFYEAR} - month number of the year, {WEEKOFYEAR} - week number of the year, {WEEK OF MONTH} - week number of the month, {DAYOFYEAR} - day number of the year, {DAYOFMONTH} - day number of the month, {DAYOFWEEK} - day number of the week, {HOUR} - hour, {MIN} - minutes, {SEC} - seconds, {MSEC} - millisecond ATTENTION! If the /BDEL and /MDEL and /EXMDEL keys are absent then the backup of the deleted files is not performed! ATTENTION! The backup folder must not be the same as the target folder or any of the target subfolders. ATTENTION! To back up the deleted target files with the default parameters, one of the keys /BDEL or /MDEL or /EXMDEL is sufficient. ATTENTION! If there was an error during the backup process, copying the linked file and replacing/deleting the target file will not be performed! [/MDEL[ MaskFile1[ MaskFile2[....]]]] Mask of the target files to be deleted for which you should make backup copies before deleting. (If the key is not specified and the default mask * is all). ATTENTION! The mask should take into account the renaming of files, since the check is made by file names from the target folder! ATTENTION! If the /BDEL and /MDEL and /EXMDEL keys are absent then the backup of the deleted files is not performed! ATTENTION! To back up the deleted target files with the default parameters, one of the keys /BDEL or /MDEL or /EXMDEL is sufficient. ATTENTION! If there was an error during the backup process, copying the linked file and replacing/deleting the target file will not be performed! [/EXMDEL[ MaskFile1[ MaskFile2[....]]]] Mask of deleted target files for which you should NOT make backup copies before deleting. (The default mask is *.tmp). ATTENTION! The mask should take into account the renaming of files, since the check is made by file names from the target folder! ATTENTION! If the /BDEL and /MDEL and /EXMDEL keys are absent then the backup of the deleted files is not performed! ATTENTION! To back up the deleted target files with the default parameters, one of the keys /BDEL or /MDEL or /EXMDEL is sufficient. ATTENTION! If there was an error during the backup process, copying the linked file and replacing/deleting the target file will not be performed! [/BREPL] Specifies the folder for the backup of the target files to be replaced (eg with /MIR or /OF ...). If the folder is not specified then the main target folder with the postfix _BREPL and the subfolder based on {DATETIME} Before deleting, the file will be copied to the specified folder, the folder tree to the file will also be recreated. Can use predefined variables: {SP} - space symbol, {DATE} - current date, {DATETIME} - the current date and time, {YEAR} - year number, {MONTHNAME} - name of the month, {DAYNAME} - weekday name, {MONTHOFYEAR} - month number of the year, {WEEKOFYEAR} - week number of the year, {WEEK OF MONTH} - week number of the month, {DAYOFYEAR} - day number of the year, {DAYOFMONTH} - day number of the month, {DAYOFWEEK} - day number of the week, {HOUR} - hour, {MIN} - minutes, {SEC} - seconds, {MSEC} - millisecond ATTENTION! If the /BREPL and /MREPL keys are not present then the backup of the replaced files is not performed! ATTENTION! The backup folder must not be the same as the target folder or any of the target subfolders. ATTENTION! If there was an error during the backup process, copying the linked file and replacing/deleting the target file will not be performed! [/MREPL[ MaskFile1[ MaskFile2[....]]]] Mask of the replaced target files for which you should make backup copies before replacing. (If the key is not specified and the default mask * is all). ATTENTION! The mask should take into account the renaming of files, since the check is made by file names from the target folder! ATTENTION! If the /BREPL and /MREPL and /EXMREPL keys are not present then the backup of the replaced files is not performed! ATTENTION! To back up the replaced target files with the default parameters, one of the /BREPL or /MREPL or /EXMREPL keys is sufficient. ATTENTION! If there was an error during the backup process, copying the linked file and replacing/deleting the target file will not be performed! [/EXMREPL[ MaskFile1[ MaskFile2[....]]]] Mask of replaceable target files for which you should NOT make backup copies before deleting. (The default mask is *.tmp). ATTENTION! The mask should take into account the renaming of files, since the check is made by file names from the target folder! ATTENTION! If the /BREPL and /MREPL and /EXMREPL keys are not present then the backup of the replaced files is not performed! ATTENTION! To back up the replaced target files with the default parameters, one of the keys /BREPL or /MREPL or /EXMREPL is sufficient ATTENTION! If there was an error during the backup process, copying the linked file and replacing/deleting the target file will not be performed! [/BEMPTY] Make a backup of the empty deleted folders. (Only in conjunction with the /BDEL and/or /MDEL and/or /EXMDEL keys) Changes in the keys: ----- /STRF The following variables appeared: {BEGIN..} - the first N characters from the full file name (including the extension). For example - the first 5 {BEGIN5} {MIDDLE..-..} characters between .. to .. from the full file name (including extension). For example {MIDDLE2-4} characters between 2 and 4 (inclusive) {END..} - last N characters from the full file name (including extension). For example - the last 3 {END3} {MIN..} - the minimum length of the full file name (including the extension) at which the key is replaced {BEGIN..} {MIDDLE..-..} {END..} {FBEGIN..} - the first N characters from the file name without the extension. For example - the first 5 {BEGIN5} {FMIDDLE..-..} characters between .. to .. from the file name without extension. For example {MIDDLE2-4} characters between 2 and 4 (inclusive) {FEND..} - last N characters from the file name without an extension. For example - the last 3 {END3} {FMIN..} - the minimum length of the file name without an extension under which the key exchange {FBEGIN..} {FMIDDLE..- ..} {FEND..} {EBEGIN..} - the first N characters from the file extension (including the dot). For example - the first 5 {BEGIN5} {EMIDDLE..-..} characters between .. to . from the file extension (including the dot). For example {MIDDLE2-4} characters between 2 and 4 (inclusive) {EEND..} - last N characters from the file extension (including the dot). For example - the last 3 {END3} {EMIN..} - the minimum length of the file extension (including the dot) at which the key exchange is {EBEGIN ..} {EMIDDLE ..- ..} {EEND ..} Example: Which makes: for all files with a length of more than 8 characters (without an extension) forms a new file name consisting of the first 3 symbols plus the symbol ~ plus symbols from 4 to 5 plus the symbol ~ plus 2a of the last character. If the file extension (including the dot) is longer than 3 characters, it forms a new file extension consisting of the first 1 character plus the character ~ plus the 3 character plus the character ~ plus 1 the last character. Fail with the name 123456789123456789.123456789 will receive the name 123~45~89.1~3~9 Copymik c:\Documents d:\Backup /STRF {FNAME}={FBEGIN3}~{FMIDDLE4-5}~{END2}{MIN9} {FEXT}={EBEGIN1}~{EMIDDLE3-3}~{EEND1}{EMIN4} ----- /STRD The following variables appeared: {BEGIN..} - the first N characters from the full folder name. For example - the first 5 {BEGIN5} {MIDDLE..-..} characters between .. to .. from the full folder name. For example {MIDDLE2-4} characters between 2 and 4 (inclusive) {END..} - last N characters from the full file name (including extension). For example - the last 3 {END3} {MIN..} - the minimum length of the full folder name at which the key is replaced {BEGIN..}{MIDDLE..-..}{END..} Example: Which makes: for all folders with a length of more than 8 characters, forms a new folder name consisting of the first 3 symbols plus the symbol ~ plus symbols from 4 to 6 plus the symbol ~ plus 3 of the last character. The folder named 123456789123456789 will receive the name 123~456~789 Copymik c:\Documents d:\Backup /STRD {DNAME}={BEGIN3}~{MIDDLE4-6}~{END3}{MIN9} *************************************************** Version 2.19b Release 9: New keys: [/REPEAT [RepeatNambe]] The number of repetitions with the access error. By default 3 repeat. 0 - repeated endlessly. (if the key /SE or /TEST then repeats are not made) [/WAIT [sec]] Pause between repetitions when the access error. Default 15 seconds [/TEST] Test mode. The actual copying, compressing, encrypting and removal are not made. In the absence of a network connection to the target folder it is assumed that the target folder does not exist. (Repeat connection will not be made). In test mode, check the target folders and files is carried out to a limited extent. Error connection, sharing, set permissions, dates and attributes, lack of disk space will not be revealed. [/TDELTA Seconds[ Seconds2]] Accuracy in seconds from the target file by comparing the date in the key /SDTSF. The accuracy can be with a minus sign, plus and unsigned. If a minus sign minus this accuracy from the date of the target file if a plus plus. If the sign is not specified, the accuracy and the pros and cons at the same time. Accuracy default 0 seconds. [/BEEP] - make a sound when an error occurs or a warning [/SBEEP] - make a sound when the program starts [/EBEEP] - make a sound at the end of the program [/WBEEP] - make a sound while waiting/repeat Now you can read the masks of files and folders from a text file (UTF-8 encoding). To do this, instead of a mask, enter ::PathAndFileName that contains the masks. Each mask must begin on a new line, space characters are taken into account. Masks files can contain links to other masks files. The ability to use an absolute path in masks. Fix small defects. *************************************************** Version 2.18b Release 5: There was a fine-tuning attributes of files and folder settings for copying. New keys: [/AF [FileMask1=]FileAtributy1[ [FileMask2=]FileAtributy2[....]]] Set or clear attributes for files with the specified mask. Attributes beginning with a plus sign and a minus added are removed. Possible attributes R - Read only, A - Archive, S - System, H - Hidden, C - Compressed, N - Not indexed, O - Offline, E - Encrypted, T - Temporary. Key /AF has a lower priority than the key /RFA. Allowed truncated form - without a mask file and the equals sign, in this case, the mask will default *. For example /AF -H-S *.doc=+A *.tmp=-A [/AD [MaskeDir=]Atributy1[[ MaskeDir2=]Atributy2[....]]] Set or reset the attributes for files matching the mask. Attributes beginning with a plus sign - add to a minus - are removed. Possible attributes R - Read only, A - Archive, S - System, H - Hidden, C - Compressed, N - Not indexed, O - Offline, E - Encrypted, T - Temporary. Key /AD has a lower priority than the key /RDA. Allowed truncated form - without a mask file and the equals sign, in this case, the mask will default *. For example /AD -H-S doc*=+A tmp=-A+H temp=-A+H Fix small defects. *************************************************** Version 2.17b Release 15: New keys: [/CRPF KeyFileToEncrypt] key file to encrypt. The maximum size - 2Gb minus the password size (if a password is set). Perhaps the combination of the key file and password. [/DECRPF KeyFileToDecrypt] key file to decrypt. The maximum size - 2Gb minus the password size (if a password is set). Perhaps the combination of the key file and password. *************************************************** Version 2.16b Release 16: Error reset attributes of files and folders on a mask is removed. *************************************************** Version 2.16b Release 15: In this version the ability to read keys from files. At the same time, you can use several key files. Keys will be added and recurring overwritten. New keys: [/KF KeyFile1[ KeyFile2[ ....]]] Text Files with keys in the UTF8 encoding. Each key begins a new line. If there are duplicate keys of the key works of the last file. If there are duplicate keys of the key works of the last file. The keys of the files have a higher priority than the keys from the command line. If the string does not begin with symbol "/" it is assumed that this is the path to the source or target folder (the folder is always the order of 1st row => source, 2nd row => target folder) Comments may be used in the key file. The comment starts with //. The text in the line located after the comment character is ignored by the program. Fixed some bugs. *************************************************** Version 2.15b Release 11: New keys: [/VF[ MaskeFile1[ MaskeFile2[ ....]]]] Files after copy verification (by file mask). Not compatible with compression and encryption (ignored). Caution! Very slowly! In limit the scope of key /VD (if specified). (default mask *) [/VD[ MaskeDir1[ MaskeDir2[ ....]]]] Files after copy verification (by folder mask). Not compatible with compression and encryption (ignored). Caution! Very slowly! In limit the scope of key /VF (if specified). (default mask *) [/NVF MaskeFile1[ MaskeFile2[ ....]]] Do not verify files with these masks. Works within the keys /VF and/or /VD [/NVD MaskeDir1[ MaskeDir2[ ....]]] Do not verify the folder with these masks. Works within the keys /VF and/or /VD [/MVS NSizeInByte] Maximum file size for verification in bytes (default: -1 unlimited). Works within the keys /VF and/or /VD *************************************************** Version 2.14b Release 22: When you add text to the name of the file mit keys /COADD and /CRADD disabled automatically translated to uppercase, and in the keys /DECODEL and /DECRDEL enabled case-insensitive mode. *************************************************** Version 2.14b Release 21: New key: /CMF - Compatible file copy mode (It allows you to copy from shadow copy of volume. For example created by the program VsToolkit.exe). See Example 22. Note, in most cases, the program will automatically recognize that the copy comes from the shadow copy, and switch to compatible mode. Compatible mode is slightly slower than a normal copy mode. New variables are available when creating and renaming files and folders: {HOUR} - hour {MIN} - minutes {SEC} - seconds {MSEC} - millisecond Fixed bug when copying attributes automatically rename files (if the target file exists). Fixed bug with file overwrite attribute "read only", while encryption and compression (if the target file exists and by copy from shadow volume). Fixed header operations when outputting to a log while encryption and compression, and vice versa. Auto rename algorithm changed (if the target file exists). Fixed bag in end Report (Statistic: Start and end time and duration) Added leading zeros in variable dates and times: {YEAR} - number of the year {MONTHOFYEAR} - number myasyatsa vgodu {WEEKOFYEAR} - week number of the year {DAYOFYEAR} - day of the year number {DAYOFMONTH} - number of days in the month The optimization to increase the speed of copying. If rename or overwrite files in all cases, the mask control is applied and the name of the source file (before renaming). From the log and display output the password of encryption and decryption and encryption and decryption algorithm removed. Plus other minor improvements to the code. *************************************************** Version 2.13b Release 12: By default, in the log and on screen, written expiry date of the current operation. New key: /NOLOGTIME - do not display completion date and time of the current operation on the screen and in the log (for compatibility with old log) New variables are available when creating and renaming files and folders: {YEAR} - year number {MONTHNAME} - name of the month {DAYNAME} - weekday name {MONTHOFYEAR} - month number of the year {WEEKOFYEAR} - week number of the year {WEEK OF MONTH} - week number of the month {DAYOFYEAR} - day number of the year {DAYOFMONTH} - day number of the month {DAYOFWEEK} - day number of the week *************************************************** Version 2.12b Release 14: New keys: [/REPF StartingPosition[ EndPosition[ TheExchangeString]]] in file names replaced with TheExchangeString from StartingPosition bis EndPosition. The new text can contain predefined variables in key /STRF. The numbering starts at position 1. Position number 0 corresponds befor the first character of the file name. Position number greater than the length of file name corresponds to the first position after the last letter of the file name. At equality of the initial and final positions of the replacement is performed for a single character file name. Key /REPF first starts (in combination with other keys replacement). The default positions = 1, the text is empty. [/INSF InsertsPosition[ InsertText]] File names inserts the text into the specified position shifted to the right. The new text can contain predefined variables in vein /STRF. The numbering starts at position 1. Position number 0 corresponds befor the first character of the file name. Position number greater than the length of file name corresponds to the first position after the last letter of the file name. Key /INSF starts first (when combined with other replacement keys) and a second in combination with a key /REPF. Position 1 = default, the text is empty. [/REPD StartingPosition[ EndPosition[ TheExchangeText]]] in folder names replaces the text with TheExchangeText from StartingPosition to EndPosition. The new text can contain predefined variables in key /STRD. The numbering starts at position 1. Position number 0 corresponds befor first character of the folder name. Position number greater than the length of the folder name corresponds to the first position after the last letter of the folder name. At equality of the initial and final positions of the replacement is performed for a single character name folder. Key /REPD fulfills the first (in combination with other keys replacement). The default positions = 1, the text is empty. [/INSD InsertsPosition[ WhatInsert]] in folder names inserts the text into the specified position shifted to the right. The new text can contain predefined variables in vein / STRD. The numbering starts at position 1. Position number 0 corresponds befor first character of the folder name. Position number greater than the length of the folder name corresponds to the first position after the last letter of the folder name. Key /INSD starts first (when combined with other replacement keys) and a second in combination with a key /REPD. Position 1 = default, the text is empty. *************************************************** Version 2.11b Release 12: New key: [/SETEXITCODE] The use of the number of copied files (from 0 to N) and if the number of errors encountered an error with a minus sign (from -1 to -N) as the return code of the program. (Eg. For use in batch files. See Example 20 http://www.superbasis.de/copymik/). *************************************************** Version 2.10b Release 30: Fixed Bag by /ENDEXECPARAM and /ENDERREXECPARAM *************************************************** Version 2.10b Release 29: Added an important note to the key /MD5 description *************************************************** Version 2.10b Release 28: New keys: [/CTF[ MaskeFile1 [MaskeFile2 [....]]]] Copy the last record date of creation, last access and change files. Only files matching the mask. (Default mask * - All) [/CTD[ MaskeDir1[ MaskeDir2[ ....]]]] Copy the last record date of creation, last access and change folders. Only folders matching the mask. (Default mask * - All) The key /MIR includes keys /CFT and /CTD with a mask on the key /MIR Fixed a bug when copying files attributes and access rights while file und dir renaming. *************************************************** Version 2.9b Release 3: New keys: [/SOLDF [MaskeFile1 [MaskeFile2 [....]]]] Do not overwrite files with a later date of any change (overwrite the old files only). Only checked soostv files. masks. (Default mask * - all). It used only in conjunction with the key /OF Example: copymik.exe c:\source d:\dist /OF /SOLDF overwrite older files with newer (later altered). The rest of the files if they already exist miss. [/PRIORITY [name Priority]] Change the priority of the program. Name of priority can be set to SUPER_LOW (or LOW-), LOW, BELOW_NORMAL (or NORMAL-), NORMAL, ABOVE_NORMAL (or NORMAL +), HIGEST (or MAX). Default - NORMAL Example: copymik.exe c:\source d:\dist /PRIORITY LOW- copy files with minimal priority of copymik (background, without loading the system resources) *************************************************** Version 2.8b Release 5: Added new key: [/NHP] Disable paged help (without pause) *************************************************** Version 2.8b Release 3: Fixed a bug where it was possible to script execution by key /EXEC if the file not successfully copied/compressed/encrypted. Added new keys: [/DELF [MaskeFile1 [MaskeFile2 [....]]]] After a successful backup/compression/encryption to delete files in the source folder specified by the mask, [/DELFD [MaskeDir1 [MaskeDir2 [....]]]] Limits the action key /DELF to source folders with specified masks, [/SZF NSizeBytes] Copy/compress/encrypt only files larger than or equal to NSizeBytes bytes, [/SZT NSizeBytes] Copy/compress/encrypt only files of less than or equal NSizeBytes bytes. *************************************************** Version 2.7b Release 16: When you set the root source and target folders, the ability to use predefined variables {DATE} and {DATETIME}. Removed the restriction to a single folder on the establishment of the initial depth of the target folder. Added new key [/ TM [seconds]] to copy only files with the date change within seconds from the current time (default is 3600, or one hour). At key /XCF and /XCF exhibited default mask of * (all). *************************************************** Version 2.7a: Added the /LOG, and /ADDLOG /DCSV /LCSV allowing output to a predetermined log data and format (csv) for output to a log on the screen. Key /NSKIP allows you to suppress information about the missing files. Also added keys /PAUSEBYERROR - After the program does not close the output window if an error occurred and keys /ENDEXEC, /ENDEXECPARAM, /ENDERREXEC, /ENDERREXECPARAM allowing to run third-party program finishing up in cases where the error has occurred or there is at least one error, respectively. Refactoring messages are displayed and their format. In output of the first row added output parameters of the program starts. ************************************************************* Version 2.6a: added keys /EXEC and /EXECPARM allowing to execute a program or batch file for each successfully copied file or source file. ************************************************************* Version 2.5a: add keys to rename, and transliteration of filenames when copying /NOF, /NOD, /LANG, /STRF, /ICF, /STRD, /ICD Improved control of input keys. ************************************************************* Version 2.4a: added key /CP to change the code page in the console output (eg ... /CP 866). Fixed some minor shortcomings. ************************************************************* Version 2.3a: Fixed bug encryption super-large files. Key /DT now allows the value 0 (ie today), and uses 0 for umolcheniyu. ************************************************************* Version 2.2a: Fixed bug when deshifrofke by ICE ************************************************************* Version 2.1a: Fixed bug when changing the decryption algorithm when deciphering ************************************************************* Version 2.0a: in addition to the added encryption and compression decompression file (/CO mask /DECO mask resp. Compression and decompression), the keys for backup and recovery (/ B password, / R password - acc. Backup and Restore the password), keys filtering by date of last modification of the file (/ DT days, / DTS DD.MM.YYY, / DTE DD.MM.YYY). It is now possible to simultaneously backup compression and encryption of files. Fixed problem with compression and encryption super-large files. Fixed some flaws and so forth. ************************************************************* Version 1.06a: Fixed a problem with the recognition of compressed and encrypted folders (if you delete mode /MIR). ************************************************************* Version 1.05a: Fixed problem stop when an error opening the file encryption. Improved speed encryption and backup. Fixed some minor bugs. ************************************************************* Version 1.04a, with a view to backing up, added encryption and decryption of files. Implemented 13 different encryption algorithms. All this works in conjunction with masks copying. Perhaps the direct and inverse renaming when encryption and decryption. It has become possible to create encrypted mirrored folders and so forth.