I noticed that the option to add the optimize archive function to the context menu is missing on Windows 10.
Opening each archive with the interface in order to click it becomes tedious with many files.
Same for others functions like Remove Archive Encryption
Features like StuffIt
I was trying to recover a plesk backup file I ran into the issue that I couldn’t use my super power archive I had to use stuff it deluxe:
Guide that works for stuff it Expander:
you want certain format support for PA? What are these backup files compressed with?
at first glance it seems they are *.gz files….is that correct ?
‘By default Plesk backup is gzipped’ was the info I managed to dig up.
I don’t know exactly what format… All I know is my co-worker came up to me asking if I could help him recover from Plesk backup file. I proceeded to use PowerArchiver which I am a very proud user and then it couldn’t do the job and we had to use Stuff It Expander.
Extracting files from Plesk Backup
The backup file obtained from the Plesk Backup utility is a multi-part mime-encoded file. Each component within the file is for a specific purpose or location. There are individual areas for the configuration files, databases, SSL certificates, mail, and websites. The backup file is useful if you wish to restore an entire site or server. However if you need only a specific directory or a selection of files, the restore functionality with Plesk does not allow this. Instead you will need to follow the instructions below to separate the components and then extract the information you need.
The process is to use a program like ripMime (project page: http://freshmeat.net/projects/ripmime/) to extract out the different mime-encoded components of the backup file.
To download this program into the current directory (I would suggest doing this in /root) use the command
and then extract it with the command
tar -zxvf ripmime-184.108.40.206.tar.gz
Once the program is downloaded and installed, you can then run the command
/path_to_file/ripmime /path_to/backup_file /directory_for_extracted_files
to extract the individual mime-encoded components into the directory you specified.
Once the files are extracted, you’ll be able to use the ‘tar’ command to extract all or only specific files from the backup files present. You’ll need to identify which file contains the information you are looking for, so you will need to run the command
tar -ztvf /directory_for_extracted_files | grep directory_or_filename
Once you know which file contains the information you are searching for, you can then extract the directory or file with the command
tar -zxvpf /directory_for_extracted_files/filename_containing_information directory_or_filename
Once the directory or file is extracted, you can then move it to the proper location. The permissions and file ownership should be correct as long as you use the ‘mv’ command since we preserved ownership and permissions with the ‘p’ flag in the ‘tar’ command.
If you are going to copy/paste something you should give the accreditation (source)
true but last time i did i was told off for doing so so thought it better to have the information.