In Windows 11 a new explorer context menu is introduced.
The “old” context menu may still be accessed through an additional mouse click, to reach the PowerArchiver context menu functions, but this isn’t comfortable at all.
Could you add PowerArchiver items to the first level (and ideally disable the Windows native ZIP entry)
I’d like to propose an improvement for password protected archives.
Actual behavior is:
If I open an archive, which is password protected and make a typo in the password dialog, I’ll get the message, that the password was wrong and I end up with an empty window. I need to reopen the archive to be able to enter the password again.
Tell me, that the password was wrong and give me the chance to enter the correct password to decrypt the archive.
I know I have been asking for this feature some time ago, but as nothing has changed let me ask again:
The ZIPX-format offers an algorithm, that compresses JPEG-files by about 20-30%. Please add compression (packing) support for this in ZIPX-archives to Powerarchiver. Extraction of JPEGs packed into ZIPX by this algorithm is already supported by Powerarchiver for a long time, so it should not be difficult? Or is it a licensing problem?
I’d like to suggest, that the correct archive type is (always) selected, when adding files by drag & drop to an archive.
This is already happening if the archive has the correct extension. For example, if I’m adding files to test.zip, zip will be selected. If I’m adding files to test.7z, 7z will be selected as format in “Add dialog”.
But this won’t be working, if the archive has not the “right” extension.
So XPI files (Firefox addons) for example are ZIP files. PowerArchiver opens them without any problems, but if I try to add file by drag & drop, PowerArchiver won’t auto select “ZIP”, but use the last selected archive format, while PowerArchiver already knows, that I’m trying to add files to a ZIP.
I love this, only there is one problem. The UAC elevation feature does not extend to Mount Image option in the add-on software PA provided. It is most annoying whenever I am on highest UAC settings and I mount an ISO, every time I open and create a virtual drive UAC appears. I also do not want to completely disable UAC.
Is adding UAC elevation for mount image feature possible?
I noticed that when I want to run the Virtual Drive for the first time inside the PowerArchiver Burner it prompts to download it form the internet.
I was wondering, would it be OK to include this utility straight into the offline installer to be able to set it up locally?
How about recognising a few more (or all) of the file formats that are basically renamed zip files and treating them is if they are zip files.
For instance Android .apk files are just renamed .zip files.
Libreoffice/Openoffice ODF documents are all, as far as I am aware, just renamed .zip files. (.odt, .ott, .ods, .ots, .odp, .otp, .odb, .odf etc.)
Would it be possible at all in some future version perhaps, to have a “find file” function?
Reason I ask is that I was looking for a certain file I knew existed in an archive, but I had to unzip it then use another tool to find the file. It would have saved that extra step if that function existed in PA itself.
Is there a way to enable the user to encrypt the files inside a ZIPX archive that has already been created?
This could save time for large archives that the user may need to encrypt at a later stage or that he/she has forgotten to enable encryption before creating the archive,
I would like to see a new feature implemented: a ‘Fast Extract’ Mode.
Currently PowerArchiver extracts files to a temporary directory and then moves them to the target directory chosen by the user. At least via drag and drop.
This can be both time consuming and needs free space on the system drive for large files.
Is there a way to directly extract files to the target directory with PowerArchiver?
And if not, can a feature like this be considered for future updates?
Thanks very much!
I believe it would be useful to implement Serpent-256 encryption for PAE/PAE2 formats, even though PowerArchiver offers strong encryption ciphers already.
(deleted part advertising other software - admin)
Do you think this will be a useful addition?
Thank you for the consideration!
I think it would be a great option to make the portable version of PowerArchiver compatible with PortableApps (i.e. adding the necessary files and folders to integrate it smoothly into their structure).
I own various other commercial programmes which -when installed in portable mode- offer to make the becessary changes without needing an extra installer or the official PortableApps repos.
Thanks for opinions or perhaps even a realization of this.
Features like StuffIt
I was trying to recover a plesk backup file I ran into the issue that I couldn’t use my super power archive I had to use stuff it deluxe:
Guide that works for stuff it Expander:
you want certain format support for PA? What are these backup files compressed with?
at first glance it seems they are *.gz files….is that correct ?
‘By default Plesk backup is gzipped’ was the info I managed to dig up.
I don’t know exactly what format… All I know is my co-worker came up to me asking if I could help him recover from Plesk backup file. I proceeded to use PowerArchiver which I am a very proud user and then it couldn’t do the job and we had to use Stuff It Expander.
Extracting files from Plesk Backup
The backup file obtained from the Plesk Backup utility is a multi-part mime-encoded file. Each component within the file is for a specific purpose or location. There are individual areas for the configuration files, databases, SSL certificates, mail, and websites. The backup file is useful if you wish to restore an entire site or server. However if you need only a specific directory or a selection of files, the restore functionality with Plesk does not allow this. Instead you will need to follow the instructions below to separate the components and then extract the information you need.
The process is to use a program like ripMime (project page: http://freshmeat.net/projects/ripmime/) to extract out the different mime-encoded components of the backup file.
To download this program into the current directory (I would suggest doing this in /root) use the command
and then extract it with the command
tar -zxvf ripmime-22.214.171.124.tar.gz
Once the program is downloaded and installed, you can then run the command
/path_to_file/ripmime /path_to/backup_file /directory_for_extracted_files
to extract the individual mime-encoded components into the directory you specified.
Once the files are extracted, you’ll be able to use the ‘tar’ command to extract all or only specific files from the backup files present. You’ll need to identify which file contains the information you are looking for, so you will need to run the command
tar -ztvf /directory_for_extracted_files | grep directory_or_filename
Once you know which file contains the information you are searching for, you can then extract the directory or file with the command
tar -zxvpf /directory_for_extracted_files/filename_containing_information directory_or_filename
Once the directory or file is extracted, you can then move it to the proper location. The permissions and file ownership should be correct as long as you use the ‘mv’ command since we preserved ownership and permissions with the ‘p’ flag in the ‘tar’ command.
TBGBe last edited by
If you are going to copy/paste something you should give the accreditation (source)
true but last time i did i was told off for doing so so thought it better to have the information.