Engineerix Software Services
Deutsch  English  

Engineer.iX Encodiator


Program: Engineer.iX Encodiator


New Features:


+new: Update Check



All Changes (Change Log)


Autor: Jack (tR)
Copyright and Licence:

© 2011, Engineer.iX Software Services
Freeware Licence (free use, no warranty, commercial distribution requires explicit permission)


Please mind that you use this program at your own risk. We don't take any responsability for damages that result directly or indirectly from the use of this software.


Note: This program is using FAMFAMFAM Silk Icons v1.3

System requirements: .NET Framework 2.0 or later
tested on Windows XP, Windows 2000, Windows Vista, Windows 7

Latest Version [PGP] [MD5] [SHA1]


Get it from CNET!


This program originally was a quick and dirty hack that we made because we did not find an apropriate tool under Windows for generating Hex Dumps from files (Hex Converter). Encodiator supports you converting any binary file into it's hexadecimal byte-by-byte equivalent (hex dump) and helps you later reconverting this hex notation backwards to the original file. So you can simply generate printable versions or send copies of files via e-mail and later rebuild the original binary file from it.


Encodiator main form 

 Encodiator in action


Currently Encodiator only supports encoding and decoding of Hex Dumps and Base64 transformation - normally found in e-mail for encoding the attachments. Furthermore you use this tool in order to create Hashs (MD5 and SHA1) of files and save the result values into a Hash Signature file.

For future versions we plan additional features and conversion capabilities. If you have a special wish or a fancy idea, do not hesitate and best contact us directly.

Important Note:

In some very rare cases it can happen that the application (after installing an update) crashes at the next start. To make the program running again, remove the config folder. This folder is located in your local user profile under C:\Users\USERNAME\AppData\Local\Engineer.iX\Encodiator.exe_...



Typical Use Cases

Case 1 - Generating copies of programs (executable files) that are printable/documentable

For printing or documenting executable files, images, etc. respectively for holding it in a digital form that is reproducable true to original, you need a lossless description of that data. The easiest way is generating Hex Dumps (Hexadecimal Notations of byte-by-byte) and write them into a Hex Dump File. This method has the advantage that "everyone" (without high technical knowledge) could reproduce the original file by using simple tools (for example using a simple hexadecimal editor tool).


Case 2 - Tunneling in information trough a security barrier

Another typical scenario is if you need to send or receive an executable file or a .ZIP archive via e-mail.

Normally every good security managed enterprise has a strict "Content Filter" (normally the Virus Scanner of the e-mail system or a proxy server) that bans executable files. Encrypted .ZIP archives are normally blocked as well, as they could contain malicious code.

Nevertheless there are good practical reasons that can force you to bypass that security barriers (e.g. sending to and fro programs between software developers, or in another case the boss maybe wants receiving e-mails with encrypted .ZIP files). In this case you can encrypt the file to send, than transfer it via e-mail or USB stick, and later decrypt it on the other side. (If you use that program, please make sure that you don't compromise the security policy of your company)


Case 3 - Encoding and decoding of Base64 files

Another way to pack information into a e-mail is to encode it to Base64 text. Base64 is a special transformation method normally used for transfering binary data using "safe" characters. Normally images or attachments in e-mails are encoded via base64.


Case 4 - Hash functions MD5 SHA1 / Create hash files

Very often on download sites you can find a little hash signature file coming along with the download. This file is created in order to give u a possibility to find out if that the file was not modified (manipulated or broken) during or after the download. To create such a hash file you can also use Encodiator. All MD5 and SHA1 Hash files on this site were created with this program.


Last Update on: 08 Nov 2011

Copyright © 2004-2012, Engineer.iX Software Services. All rights reserved. Legal Info, SiteMap