- Microsoft Windows 2000 or higher
- AutoHotkey 1.1.10 or higher (if running bug.n from source as a script)
You may either
download the stable version of bug.n
from the repository, or
download the current development version
as the repository itself. Either way, you will have a zip
file including an
executable (bugn.exe
), the source (src\*
) and documentation (doc\*
)
files.
There is no installation process for bug.n. Unpack the zip
file, and you
should be able to run either the executable as it is or the main script
(src\Main.ahk
) with AutoHotkey.
You may copy bug.n anywhere you like -- at least if you have write access
there -- e.g. C:\Program Files\bugn
or link it to the 'Windows Start Menu'
or the 'Windows Taskbar', for example.
By default bug.n stores the session data (configuration, layout, window states
and log) to the user's APPDATA directory, e.g.
C:\Users\joten\AppData\Roaming\bug.n
.
You may redirect the bug.n data directory by setting the first argument either
to the executable or to the main script (Main.ahk
), when running bug.n,
e.g. C:\Program Files\bugn\bugn.exe D:\bugn
; but you will need to have write
access to this directory.
You can run bug.n manually, either by using the executable and starting it like
any other application, or by using the main script (Main.ahk
) and starting it
with AutoHotkey.
If using the script, the working directory must be the directory, where the
file Main.ahk
is saved; therewith bug.n can find the other script files. One
possibility, to do so, is to install AutoHotkey, open the directory, where
Main.ahk
is saved, and execute the file.
If you are using bug.n on Microsoft Windows Vista or higher you may use
applications, which run with administrator privileges, e.g. 'administrative
tools'. In the case that you are running bug.n in the standard user session,
i.e. without administrator privileges, bug.n will not be able to manage the
associated windows. If you want those application windows to be managed, you
need to run bug.n with administrator privileges, too.
You can set the option Run this program as an administrator
on the
'Compatibility' tab, section 'Privilege level' of the bug.n executable file
properties. But if you also want to run bug.n when Windows starts, you will
have to create a task in 'Task Scheduler'.
In Windows 7 you can create a task following the steps from the Windows website:
- Open Task Scheduler by clicking the Start button, clicking Control Panel, clicking System and Security, clicking Administrative Tools, and then double-clicking Task Scheduler (Administrator permission required). If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
- Click the Action menu, and then click Create Basic Task.
- Type a name for the task and an optional description, and then click Next.
- Click When I log on, and then click Next.
- To schedule a program to start automatically, click Start a program, and then click Next.
- Click Browse to find the program you want to start, and then click Next.
- Select the Open the Properties dialog for this task when I click Finish check box and click Finish.
- In the Properties dialog box, select the following, and then click
OK.
- Run only when user is logged on
- Run with highest privileges
bug.n is compiled to an executable by using ahk2exe resulting in the file bugn.exe
deliverd with a release. The compilation process packages the script files together with the AutoHotkey executable, which are unpacked to RAM and executed from there, when running the compiled script's executable (as it would be, if running bug.n as an AutoHotkey script).
One side effect of this method is that the resulting executable shares a lot of bytes with other compiled AutoHotkey scripts. It may be that an anti-malware tool detects bugn.exe e.g. as described at Virus Total; there you can inspect the detected behaviour i.a. the shell hook, used to find newly opened or closed windows, and the keyboard hook, used for reacting to hotkeys. This is the intended behaviour of bug.n.
You may of course review the code and recompile the executable. It should result in the same file with the same SHA fingerprint. There is a build script in the tools directory; mpress is used to compress the file and the AutHotkey executable is the 32-bit-unicode version.
Of course, bug,n does use the keyboard hook, which comes with AutoHotkey to allow keyboard shortcuts, and it does do some DLL calls, including a shellhook to register newly created and destroyed windows; that could be seen as malicious.