Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Hull and Outfitting

Possible Workflow

  • Last UpdatedNov 10, 2025
  • 1 minute read

pmlencrypt.exe, the encryption utility program supplied with this release, is a command-line program designed to be included in your PML software development process.

One possible workflow would be:

  • Make sure that you have a current backup of the source PML

  • No tool is supplied to decrypt an encrypted file, so it is very important that you keep good backups, in case you overwrite the source PML with an encrypted version.

  • Copy the source folders to a new location

  • Not all files within a PML folder hierarchy are always PML. Images, for example, should not be encrypted, but may need to be supplied with the encrypted versions of the PML.

  • Encrypt from the copied location back to the source location. This will overwrite recognized PML files with encrypted versions, and leave other files untouched.

  • Compare the source and copy locations to make sure that all the files you wish to be encrypted are encrypted.

  • Test your new encrypted PML.

Consider writing a batch file, a perl script, or a PML script to automate this procedure for your particular environment, to make it easy to create the encrypted PML environment correctly each time the source PML is updated.

TitleResults for “How to create a CRG?”Also Available in