Just tried using the Modern (Windows 10) Icon set and seeing a few missing icons in both PowerArchiver Burner and PowerArchiver Encryption screens . They are all there in the Minimalistik icon set and the only difference I can see is the former is blue and the latter grey. In version 22.00.9
there were some security issues fixed in 7zip:
As it seems, that PowerArchiver and PACL use the 7zip libraries, could you please update them to the latest version?
I noticed that the version of ZPAQ used is older than the latest released 7.15 https://mattmahoney.net/dc/zpaq.html also there seems to be a newer fork that adds several features https://github.com/fcorbelli/zpaqfranz
It would be useful to implement this latest version (it also maintains the same syntax and behavior as the latest official release if used the -715 flag) and add when opening a zpaq file a choice of the version of the files to show (e.g. as dummy folders represented the various versions present). Since any previous changes are stored with this format, it is possible to extract a snapshot of a certain date/version.
If I open a password-protected zipper file (created with WinRAR but I think that’s irrelevant), open it with PowerArchiver and run “Remove Encryption” on the same file, then reopen it and add a password with “Encrypt Archive,” the resulting archive will be protected with the old ZipCrypto algorithm and not AES as indicated.
(this can be verified, for example, by trying to open the archive files with Windows Explorer, which does not support the AES algorithm)
PA 21.00.18 running on Windows 7 64 bit.
I made a big .PA file and thought I’d check it was made correctly with Menu / Actions / Test.
a) PA always issues a UAC prompt to do this!
b) PA always says there are many errors in PA files.
Self Extracting Encrypted Archive
I was hasty creating a self extracting encrypted archive at one point. I may not be able to get to the original files. The file size is over 4GB and Windows XP indicates that it is not a valid format. Is there a way to manually access this file of course assuming one supplies the correct password?
I did try to rename the extension to .pae but PA gives a message about unknown encryption method.
1st thing you need to do is atempt to fix the file in order for PA to recognise the format/encryption once you have done that then try entering the apparent password.
However, on the chance the algorithm’s have been damaged due to a “hasty” creation or another reason then unfortunatly the bad news is it will be difficult and pritty much impossible to know where to start.
ie… the container code which instructs applications such as pa on how to read the data or the encryption method.
Hope you do find a way and if so let us know.
What do you mean by fix? THe only option i find relating to that is to fix a zip file. This is an encrypted, self extracting executable.
Sometimes you can fix a self extracting file via windows notepad as I have in the past. But most the time if the file is badly currupt then its a no win situation.
Unfortunetely, the fix function in PA wont work on such a file.
we will see - you might be able to strip the .exe header, if that is possible. As you know by now, windows file system limit for executable files is 4GB.
Did you try opening the archive in PowerArchiver?
Tried Hex editing the beginning of the file with some test files but was not successful. These were about 4MB. When I renamed the file from *.exe to *.pae it seems to see the file within PA but gives a message about unknown encryption method. I was going to try adding the name of the encryption method similar to a normal .PAE file.
did you simply try opening .exe file with PA? I am not sure if that was ever added
The way the information is encoded seems different so no go there for now though the SHA-1 hash for the password is the same.
I got it with a smaller test file.
Use the part from a .pae file using the same encryption method and password. The file name matters not. Take the beginning of the .PAE file including the seemingly blank space “0D0A0D0A”. I was leaving this as “00000000” originally. Add the part starting with SHA-1 from the .EXE file and save the combined as a .PAE file and voila. I’ll have to try the larger file later tonight. Heading over to visit family and watch President Bush on Deal or No Deal.
I Heading over to visit family and watch President Bush on Deal or No Deal.
Now that will be good Entertainment! :D
:) He had pre-recorded a message for a soldier that had been on three tours through Iraq. The guy won $78K.
Now back to our regular programming:
What one has to do assuming one knows the password:
1. Create a “.PAE” file with the same encryption method. The password HASH from the executable file matters. Even using the same password, the hashes can differ and PA would think it is the wrong password.
2. Take the header of the “.PAE” file ending at the end of "SHA-1 ". The space is “20” in hex. Copy this into the beginning of the executable file.
3. Cut/Delete the portion after the newly pasted "SHA-1 " up until the end of the "SHA-1 " the was originally in the “.EXE” file.
4. Erase all but 4 bytes of emtpy space “00000000” after the hash in the “.EXE” file.
5. Rewrite the remaining 4 bytes of empty space to “0D0A0D0A”. “0D0A” is used as a separator.
6. Save the file as “something.pae”.
The name indicated in the beginning of the file does not matter though it will become the name of the decrypted file.
I used HxD Hex Editor which can handle files larger than 4GB. Not all hex editors can.
good, good… I am glad you figured it out.
Is it possible to have PA warn the user when the file size may go above 4GB for an executable? That way they will be made aware that there may be an issue for them?