Evrnet Squishy Header

Welcome to Squishy's documentation page.

Here you'll learn how to effectively use Squishy, from modifying date attributes to using Squishy Execute's macros. If you want to dive into Squishy now, try the getting-started tutorial.

Tutorial

If you're new to Squishy, the tutorial is the best place for getting started; it's concise and aims to get you comfortable.
More advanced topics, not discussed here can be seen in the 'Usage Guidelines' section.

When you're ready, select the section you wish to expand:

General
General Section

General

  • Firstly, thank you for viewing this tutorial.
  •  1. If you double-click on Squishy, you'll be greeted with a prompt asking you to configure or browse for files. Choosing the latter will open the file in Squishy. There are many easier ways to open files with Squishy, but we'll cover them later.
  •  2. Having selected a file, the 'General' tab should be active. If it isn't, please click it. We'll cover this section now.
  •  3. The General area mainly deals with the file's date information and attributes. This is where you can manipulate them.
  •  4. Clicking the 'Browse' button allows you to open another file. The current one will be closed. Dragging and dropping a file into Squishy will also open it.
  •  5. Click the downward-pointing arrow on the Browse button to reveal extended options.
  •  6. Squishy's 'Open with' option works like the one in Windows Explorer, it'll allow you to open the current file with the specified application. However, unlike Windows Explorer, you aren't in danger of overwriting file associations.
  •  7. 'Squishy Execute' is the area where your preferred external applications go. You could think of it as the 'Open with' option, but with greater control over what gets passed to the applications you select.
    For example, a tool that accepts multiple arguments could be stored. When you open an applicable file, you'll have the option to execute that item. Arguments specific to that item will be executed when this happens. Working with Squishy Execute is covered in the 'Squishy Execute' section of 'Usage Guidelines'
  •  8. Both the 'Copy' and 'Move' options allow you to select the destination directory.
  •  9. 'Rename' allows you to change the parts of the file's name. You may change the entire name including the extension or only the extension. This is useful if the 'Hide extensions for known file types' option is enabled, as you won't have to disable / re-enable it.
  • 10. 'Create Shortcut' could be read as 'Create shortcut in…' as with the copy and move options, it allows you to select the destination directory.
  • 11. The 'OK' and 'Apply' buttons close and save modifications made, respectively.
  • 12. 'Reload' will load the file from source, however it will discard all unapplied modifications.
  • Next, we'll be covering 'Integrity', which deals with the actual data of a file, look forward to it!
Integrity
Integrity Section

Integrity

  • 1. Upon entering Integrity, probably the first and most prominent thing you see is the checksum for the file. This is the 'Display' checksum which is shown here. Squishy uses two types of checksums, the 'Display' checksum and the 'Compare' checksum. The method used for the comparison one is recommended to be stronger than the other.
    You may right-click the checksum to select a new checksum method for this file. Both default checksum methods may be changed in 'Preferences'.
  • 2. Let's move onto 'Compare'. This option allows you to compare files to see if they're identical. The comparison checksum is used for this option.
  • 3. Clicking the downward-point arrow on 'Compare' displays an option for the batch comparison option. 'Batch Compare' allows you to compare many files with the one currently open file.
  • 4. 'Verify Checksum' enables you to compare a checksum with file's checksum. For example, you can copy the file's checksum you downloaded from its website. Then open the downloaded file in Squishy and verify it like that.
  • 5. Squishy implements various encodings, for example, you may encode an image as a Data URI and insert it into a webpage.
  • 6. Sensitive documents may be encrypted with AES or Windows Encryption. It's as simple as entering a password when the 'AES' option is selected. Or, if you so choose, you may adjust the settings for the AES encryption option with the 'Custom' option. This allows you to set the key size and salt.
    Clicking the downward arrow in the 'Encrypt' button will display a list of options.
  • 7. Decrypting a file is similarly easy. Frist, select the same option you did when encrypting the file, however, do this with the 'Decrypt' option. You'll be prompted for a password if you chose AES. If it's successful, you'll be prompted to enter a save destination for the decrypted file.
Closing
About Section

About

  • 1. Click 'Update' under the About tab to check for and download updates for Squishy. Regularly check back as various additions and improvements could be made.
Preferences Section

Preferences

  • Remember I mentioned that there were easier ways to open a file? We'll cover the best way now.
  • 1. It's called 'System Integration' and it's located in the miscellaneous section of the preferences tab. Once enabled, Squishy's menu item will appear whenever you right-click a file. Amongst many other convenient shortcuts, an option called 'Manipulate' exists.
    Sound powerful? Anyway, with it, you're granted instant access to nearly any file. Do note that administrator rights are required to activate this feature. On a side note, this is the only time settings are written to the Registry.
  • Naturally, not every aspect of Squishy has been covered in this tutorial. As mentioned previously, please see 'Usage Guidelines' for in-depth documentation of the various features. Once again, thank you for intently following this tutorial and not skimming it at all.
    We hope you enjoy using Squishy as much as we enjoyed building it! Thanks.

Usage Guidelines

Evrnet Squishy Guidelines

Squishy's more advanced features are covered here. Some knowledge of navigating the main interface would be ideal before commencing, however it's not a requirement. As with the tutorial, the usage guidelines are split into several sections.

When you're ready, select the section you wish to expand:

  • General
  • Integrity
    • Checksum:This the file's checksum. Double-click to copy the checksum or right-click to select a new checksum method. Supported methods include: CRC-32 | MD5 | RIPEMD-160 | SHA1 | SHA-256 | SHA-385 | SHA-512
    • File Size:The file's size measured in the selected unit. 'Adaptive' is set by default; it returns the size in most appropriate unit. Other units may be selected by right-clicking, if you prefer.
    • Copy Bytes:Copy the file's size in bytes or in the currently selected unit. Selecting this option doesn't change the calculation unit.
    • Checksum Functions
    • Compare:Compare the file with one selected from a list.
    • Batch Compare:Compare the file with multiple ones.
    • Verify Checksum:Compare the file with a checksum.
    • Save Checksum:Save the file's complete path and display checksum to file.
    • Encoding / Encryption
    • Encode:Encode the file using a specified encoding type; click the arrow to select one.
    • Base64:Converts the file's binary data to text.
    • Base64 w/Gzip:Compress the file with Gzip then encode it with Base64.
    • Gzip:Compress the file with the Gzip compression format.
    • Data URI:Convert the file to the Data URI scheme using Base64 for the data.
    • Copy:Copy the encoded data to the clipboard instead of prompting to save it. The Gzip encoding method is currently not supported for this method.
    • Decode:The reverse of 'Encode' applies. Its copy option only supports text documents.
    • Encryption / Decryption
    • Encrypt:Secure your pictures, documents, and general files.
    • AES:A widely-used encryption method. The default key size is 128. You will be prompted for a password when encrypting or decrypting files.
    • Custom:The same as the 'AES' method, however, you are given control over the key size used as well as the salt.
    • Windows Current User:The file is encrypted with credentials unique to the your profile; you will not have to enter a password for decryption.
    • Windows Local Machine:The file is encrypted with credentials unique to the current computer; you will not have to enter a password for decryption.
    • Decrypt:Decrypt previously encrypted files, the same options are available. Due to certain values being stored in the the file with the 'AES' method, only files encrypted with Squishy may be decrypted.
  • Command Line
    • Rename:Prompt the rename dialog.
      > Squishy.exe "file" --ren Also valid: --rename
    • Created Date:Set the date the file was created.
      > Squishy.exe "file" --created="08/31/2015 23:59"
    • Accessed Date:Set the date the file was last accessed.
      > Squishy.exe "file" --accessed="08/31/2015 23:59"
    • Modified Date:Set the date the file was last modified.
      > Squishy.exe "file" --modified="08/31/2015 23:59"
    • All Dates:Uniformly set all the dates.
      > Squishy.exe "file" --uniform="08/31/2015 23:59"
    • Squishy Execute:Activate a Squishy Execute item by its alias. Note: Squishy Execute Item aliases are case-sensitive. i.e. 'verifyImage' is not the same as 'verifyimage'.
      > Squishy.exe "file" --squishy-execute="verifyImage" Also valid: --sqe
    • Set Checksum:The comparison checksum may be set using the following argument.
      > Squishy.exe "file" --set-checksum="sha-384" Also valid: --setchk
    • Set Display Checksum:The display checksum may be set using the following argument.
      > Squishy.exe "file" --set-display-checksum="sha1" Also valid: --setdchk
    • Show Checksum:Display the file's checksum using the display checksum.
      > Squishy.exe "file" --show-checksum Also valid: --schk
    • Compare with File:Compares the file with the one specified; empty quotes will prompt selection for a file to compare. The result will be displayed upon completion.
      > Squishy.exe "file" --compare-files "file2" Also valid: --cfile | -c
    • Verify Integrity:Compare the file's checksum with another; empty quotes will prompt for the checksum. The result will be displayed upon completion.
      > Squishy.exe "file" --verify "file2" Also valid: --cchk
    • AES Encryption:Encrypt the file with AES encryption. The current encryption key size will be used.
      > Squishy.exe "file" --encrypt-aes
    • AES Decryption:Decrypt a previously AES encrypted file. The current decryption key size will be used.
      > Squishy.exe "file" --decrypt-aes
    • Custom Encryption / Decryption:Display the custom encryption / decryption dialog instead of the simple one. Note: It must be used with '--encrypt-aes' or '--decrypt-aes' arguments.
      > Squishy.exe "file" --encrypt-aes --custom-encryption Also valid: --ex | -x
    • Passive:Exit Squishy once the command has been completed.
      > Squishy.exe "file" --compare-files="" --passive Also valid: -p