Download this ZIP file: http://dslstats.me.uk/files/dslstats32W-6.5.zip
Everything in the ZIP file is in a directory “dslstats32W-6.5”.
However when I extract using right click “Extract Here” the name of the directory created is “2W-6.5” !
I am running PA 22.00.09 on Windows 11. I have seen the same happen with some other kinds of archive too.
If I compress a folder to a .pa using right click, Compress to folder.pa and use the new Windows 11 menu then the Options, Configuration, Miscellaneous, Use normal relative path setting is always enabled.
But I like this option disabled so I have to use the old style menu in order to get PA to compress a folder in the way I wish.
Just tried using the Modern (Windows 10) Icon set and seeing a few missing icons in both PowerArchiver Burner and PowerArchiver Encryption screens . They are all there in the Minimalistik icon set and the only difference I can see is the former is blue and the latter grey. In version 22.00.9
there were some security issues fixed in 7zip:
As it seems, that PowerArchiver and PACL use the 7zip libraries, could you please update them to the latest version?
I noticed that the version of ZPAQ used is older than the latest released 7.15 https://mattmahoney.net/dc/zpaq.html also there seems to be a newer fork that adds several features https://github.com/fcorbelli/zpaqfranz
It would be useful to implement this latest version (it also maintains the same syntax and behavior as the latest official release if used the -715 flag) and add when opening a zpaq file a choice of the version of the files to show (e.g. as dummy folders represented the various versions present). Since any previous changes are stored with this format, it is possible to extract a snapshot of a certain date/version.
If I open a password-protected zipper file (created with WinRAR but I think that’s irrelevant), open it with PowerArchiver and run “Remove Encryption” on the same file, then reopen it and add a password with “Encrypt Archive,” the resulting archive will be protected with the old ZipCrypto algorithm and not AES as indicated.
(this can be verified, for example, by trying to open the archive files with Windows Explorer, which does not support the AES algorithm)
PA 21.00.18 running on Windows 7 64 bit.
I made a big .PA file and thought I’d check it was made correctly with Menu / Actions / Test.
a) PA always issues a UAC prompt to do this!
b) PA always says there are many errors in PA files.
PA's file access routine
I want to know how PA access a .zip file, does it temporarily decompress the file somewhere?
Imagine I have a zip file called A, that contains important information but also contains an executable VIRUS (.exe), by opening A in PA does it provoke the Virus?!?
simply opening or extracting the file does not start the virus but clicking on virus file itself - will of course.
So is it correct for me to say that
- a .zip file has a file-listing of all its compressed files and PA simply displays this list without extracting anything?
- PA scans through .zip file’s contents and build up a list of compressed files dynamically?
If option 2 is correct then there is a possibility where a virus can be activated, doesn’t it?
When you open the file, only zip header is read, not actual files (thats why it takes much longer to extract files than to simply open them).
Even if you extract files, they are not activated, just extracted so virus can not be simply activated by extracting the file.
Of course if you doubleclick on the .exe file, it will be “activated”, no matter what it is.
Of course by doudle-clicking any executable will result in :eek:
But I was assuming that: if using “dir” command in a terminal can activate the virus, I read this somewhere, is true then it could surely happen with extraction.
Anyway, thank you for clearing up the issue.
Executing “dir” can activate virus that is already in memory (memory resistant virus).
But nor “dir” or “extract” can activate virus - on a clean computer virus can be activated only by executing - not any other action.
So don’t worry about it.