This package also includes new versions of some plugins and a new one - clandestine files. If you are upgrading, be sure to also replace dictionaries folder wit a new one.
NEW SPELLING TOOLS
- Hunspell - new spelling engine which uses native Open Office / Mozilla
- Hunspell is state of the art spell checker for languages with complex word
compounding and rich morphology. It is based on older MySpell standard and can
also be used with original MySpell dictionaries. Hunspell is the default spell
checker for OpenOffice, Mozilla Thunderbird and Firefox, Google Chrome and Apple
- Support for virtually all languages.
- New spelling UI.
- You can spell check whole doc or only a selection.
- Skips internet addresses, emails, comments, tabbed paragraphs (markdown
- CTRL+Click word or hit SHIFT+7 to get thesaurus entries. If word is
misspelled, spelling suggestions are shown.
Each installed language needs 3 files in the wm/dictionaries folder.
Those 3 files must have the same base name.
Spell checker needs two files:
- Dictionary file with .DIC extension (e.g. en_us.dic)
- Affix file with .AFF extension (e.g. en_us.aff)
Thesaurus needs one file:
- Data file with .DAT extension (e.g. en_us.dat)
Thesaurus file is optional as not all language packs include
Old dic files won't work with Writemonkey 2.7!
If dictionary for your language is not available on Writemonkey's web site,
you can get it from one of the following addresses:
Dictionaries are distributed as Open Office Extension (.OXT). In fact the
Open Office extension files are Zip files. To get the dictionaries you must
download, rename to .zip and open that renamed file. You'll find dic, aff and
dat files in there.
The Mozilla add-ons (.XPI) are are also Zip files. The same procedure as for
OO dictionaries applies.
CLANDESTINE FILES FOR WRITEMONKEY
Save and open password protected files using powerful AES-256
Unzip the "Clandestine files" directory into the plugins
This plugin is initialized at start-up. Use CTRL+E,L to lock
currently opened file.
How it works:
Clandestine files plugin uses regular zip file format to
save locked writemonkey file. Zip files can be encrypted using strong AES-256
encryption which is unbreakable by today's standards. That is as long you use
passwords that cannot be guessed or brute forced easily.
To lock a file, first open or create normal text file, for example
"some_file.md". Then hit CTRL+E,L to bring up password dialog. Enter your
password (twice), hit Enter and that's it. The plugin will create new file -
"some_file.md.LCKD". This file is now encrypted but you can use it as any
ordinary writemonkey file. You'll be asked for a password when you attempt to
CAUTION! Use good passwords, but do not forget them. Forgotten password
cannot be recovered by any means except by your remembrance. If that fails, your
words are lost!
- Nice side effect of using zip standard is that clandestine files are not
only encrypted, but also compressed.
- Passwords are never stored anywhere, except implicitly into the locked file
- After you lock the file, unlocked version is never written anywhere, not
even as a temporary file.
- LCKD extension is mandatory for writemonkey clandestine files but you can
use some other extension if you need to - see _config.incl file, setting
- Clandestine files can be unlocked using many regular zip clients --> just
rename "name.ext.LCKD" file to "name.ext.zip" and open it as any other zip file.
You'll be asked for password, of course.
- When you create locked file from an ordinary file, the original file is
deleted by default. You can prevent that by changing the DELETE_ORIGINAL_FILE
setting in _config.incl file.
- You can choose how often you'll be asked for a password (ASK_FOR_PASSWORD
setting in _config.incl file). Clandestine files plugin can remember provided
passwords for the duration of current session - until wm is closed. The options
- 1 = always / will ask for the password every time you attempt to open the
- 2 = per session / will ask for a password the first time and then remember
it until wm is closed
- 3 = assume the same / like "per session" but will also assume other files
are encrypted with the last successfully used password and will attempt to use
it to open previously unopened locked files