Pushover is a command-line Windows utility for the Pushover notification service. It is completely self-contained with no additional dependencies and is ideal for sending alerts from scripts or via other actions within Windows. It does require a User Key and Application Token that can be requested from within your account on pushover.net.
Usage: pushover.exe [OPTIONS]
Options:
-m, --message The message to send in quotes (required unless config operation)
-l, --title Message title
-p, --priority <PRIORITY> Message priority [default: normal] [possible values: lowest, low, normal, high, emergency]
-s, --sound <SOUND> Sound to play (optional) [default: none] [possible values: *see below*]
--urltitle <URL_TITLE> URL title to attach to message
--url <URL> URL to attach to message
--retry <SECONDS> Retry interval in seconds (for emergency priority) [default: 30]
--expire <SECONDS> Expire time in seconds (for emergency priority) [default: 3600]
-t, --token <TOKEN> Application token (required if not stored in config)
-u, --user-key <USER_KEY> User key (required if not stored in config)
--save-config Store current token and user_key as defaults
--show-config Show current configuration
-a, --attachment <FILE_PATH> Path to image file to attach (max 5MB)
--ttl <SECONDS> Time to Live in seconds (auto-delete message after this time)
--clear-config Clear stored configuration
-h, --help Print help
-V, --version Print version
Available sound options: pushover, bike, bugle, cashregister, classical, cosmic, falling, gamelan, incoming, intermission, magic, mechanical, pianobar, siren, spacealarm, tugboat, alien, climb, persistent, echo, updown, vibrate, none.
Unpin is a command-line tool to set the required attributes for files, folders and subfolders to free local drive space for your OneDrive synced folders. This performs the same task as right-clicking on a OneDrive folder and selecting "Free up space".
This can be useful for automating archival of OneDrive data on your device or for scripting the cleanup of local data on devices in the enterprise. It is also useful for forcing tiering of data if your company uses Azure File Sync - Note: This will be dependent on your Azure File Sync policies.
Windows will allow you to set unpin attributes on any file or folder, but it will only be useful for software solutions that utilize this facility.
Usage: unpin.exe [OPTIONS]
Arguments:
Specifies the file or directory path of the required OneDrive data
Options:
-v, --verbose Enables verbose output
-s, --silent No additional output including errors
-h, --help Print help
CRC32 is a command-line tool to store integrity information and validate archived data, such as that stored on CD/DVD. Validate your data prior to archival and store the resulting crc32.txt with it so integrity can be confirmed at a later date. Checksums are generated at the file level and each folder level. A master checksum is also generated so you can quicky assure your data is complete.
Usage: crc32.exe [-s] [-i] <folder>
-s recurse subdirectories
-i ignore CRC32.TXT files
-v verbose directory info
-vv verbose dir/file info
Note: Verbose args should only be used with redirection!
Examples: -
Create integrity data within a folder before writing to CD/DVD.
crc -s -i -vv c:\mydata >c:\mydata\crc32.txt
Create a comparison file to confirm data on CD is valid.
crc -s -i -vv d:\ >c:\temp\output.txt
These files can then be compared with a diff tool such as WinMerge to confirm data validity.
winmerge.exe d:\crc32.txt c:\temp\output.txt
FWBlock is a command-line tool for blocking all executables in a given path. This is useful for blocking untrusted software or programs you do not want to communicate via the network. For example, to block unwanted automatic updates.
Usage: fwblock [OPTIONS]
Arguments:
Specifies the file or directory path
Options:
-b, --block Block EXEs in path (default)
-d, --disable Disable but do not remove rules for EXEs in path
-e, --enable Enable disabled rules for EXEs in path
-r, --remove Remove existing rules for EXEs in path
-h, --help Print help
HashCalc is a command-line file hash calculator using common algorithms. This tool currently supports the following hashing algorithms: -
• MD5 - Legacy algorithm (for compatibility purposes)
• SHA1 - Legacy algorithm (for compatibility purposes)
• SHA2 - (sha224, sha256, sha384, sha512)
• SHA3 - (sha3-224, sha3-256, sha3-384, sha3-512)
• BLAKE2 - (blake2b 512, blake2s 256)
Usage: hashcalc.exe [OPTIONS]
Arguments:
Path to file or directory to hash
Options:
-a, --algorithm Hash algorithm to use [default: sha256] [possible values: md5, sha1, sha224, sha256, sha384, sha512, sha3-224, sha3-256, sha3-384, sha3-512, blake2b, blake2s]
-r, --recursive Process directories recursively
-q, --quiet Only output hash values
-h, --help Print help
-V, --version Print version
SyslgCmd is a command-line syslog client for Windows. It can be used in conjunction with redirection for local logging and to suppress output.
E.G. To add the tag for my program "MyProgram" with a priority of "148" (local2.warning) whilst suppressing console output and logging the message to a local file: -
syslogcmd.exe -s -t MyProgram -p 148 This is a message from my program > nul 2>> myprogram.log
Priorities
Combine facility with severity with a "." E.G. "user.notice". You can also use the relevant numeric code.
Facility can be one of: -
kern
user
mail
daemon
auth
syslog
lpr
news
uucp
cron
authpriv
ftp
local0
local1
local2
local3
local4
local5
local6
local7
Severity can be one of: -
emerg
alert
crit
err
warning
notice
info
debug
Usage: syslgcmd [OPTIONS] ...
Arguments:
<message>... Message to send to the syslog server
Options:
-s Log the message to both standard error and the server
-p Set message priority (e.g. local3.info or 158) [default: local3.info]
-t Add a tag to the start of the message [default: ]
-l Log to the specified server (IP address or hostname) [default: localhost]
-u Write to a specified UDP socket [default: 514]
-h, --help Print help
-V, --version Print version
Our 'free software' is free to use without restrictions for both private and commercial use.
Our paid software is licensed to users under specific terms and conditions that outline its permitted use. By purchasing a license, you gain the right to install and use the software in accordance with its licensing agreement. Unauthorized distribution, modification, or use beyond the terms of the license is strictly prohibited. The license may include limitations on the number of devices, users, or instances in which the software can be deployed. For full details on the licensing terms, we recommend reviewing the official agreement provided with the software purchase. If you have any questions or need clarification, please contact us via our support form.
All of our software is digitally signed for integrity and assurance and completely free from viruses, malware, or any malicious code. However, some antivirus programs may flag certain files or applications as potential threats due to heuristic analysis, outdated virus definitions, or overly aggressive security scanning. We may also use Digital Rights Management software in our paid products which increases the potential of false positives. If you are unsure of any security alerts you receive regarding our software, please submit it to your anti-virus vendor for further analysis to confirm it contains no threats or contact us via our support form so we may contact them on your behalf.
Our software is provided as-is, without any warranties or guarantees of any kind. By using our software, you acknowledge that we are not liable for any damages, losses, or issues that may arise from its use. While we strive to ensure reliability, integrity and security, we cannot guarantee that the software will be error-free or function without interruption. Users assume all risks associated with downloading, installing, and using our software.