BinHex is a utility for converting (encoding) Macintosh files into files that will travel well on networks either as files or e-mail attachments. Like Uuencode , BinHex encodes a file from its 8-bit binary or bit-stream representation into a 7-bit ASCII set of text characters. The recipient must decode it at the other end. Older e-mail utilities sometimes can't handle binary transmissions so text encoding ensures that a tranmission will get to an older system. BinHex specifically handles both resource and data forks in Macintosh files (which Uuencode doesn't). BinHex files have a suffix of ".hqx". (Earlier versions have the suffix ".hex".)

Next Steps

Netscape and possibly other Web browsers as well as some popular e-mail applications (including Eudora) include BinHex encoding and decoding capability. Otherwise, you can download a BinHex utility for use in either the Macintosh, Windows, or other systems. (In Eudora, when writing a note you want to be transmitted in BinHex, look for the little box set to a default of "MIME" and change it to "BinHex.")

This was last updated in September 2005
Contributor(s): Bernard Pietch
Posted by: Margaret Rouse

Related Terms

Definitions

  • encoding and decoding

    - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer. Decoding i... (SearchNetworking.com)

Glossaries

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

Dig Deeper

People Who Read This Also Read...

Ask a Question About BinHexPowered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.