Possible Workflow
- Last UpdatedNov 10, 2025
- 1 minute read
pmlencrypt.exe, the encryption utility program supplied with this release, is a command-line program designed to be included in your PML software development process.
One possible workflow would be:
-
Make sure that you have a current backup of the source PML
-
No tool is supplied to decrypt an encrypted file, so it is very important that you keep good backups, in case you overwrite the source PML with an encrypted version.
-
Copy the source folders to a new location
-
Not all files within a PML folder hierarchy are always PML. Images, for example, should not be encrypted, but may need to be supplied with the encrypted versions of the PML.
-
Encrypt from the copied location back to the source location. This will overwrite recognized PML files with encrypted versions, and leave other files untouched.
-
Compare the source and copy locations to make sure that all the files you wish to be encrypted are encrypted.
-
Test your new encrypted PML.
Consider writing a batch file, a perl script, or a PML script to automate this procedure for your particular environment, to make it easy to create the encrypted PML environment correctly each time the source PML is updated.