For example:
Download this ZIP file: http://dslstats.me.uk/files/dslstats32W-6.5.zip
Everything in the ZIP file is in a directory “dslstats32W-6.5”.
However when I extract using right click “Extract Here” the name of the directory created is “2W-6.5” !
I am running PA 22.00.09 on Windows 11. I have seen the same happen with some other kinds of archive too.
Hello!
Is there currently no portable version of PA2023 available?
(When) do you plan to release one?
Thanks!
If I compress a folder to a .pa using right click, Compress to folder.pa and use the new Windows 11 menu then the Options, Configuration, Miscellaneous, Use normal relative path setting is always enabled.
But I like this option disabled so I have to use the old style menu in order to get PA to compress a folder in the way I wish.
Just tried using the Modern (Windows 10) Icon set and seeing a few missing icons in both PowerArchiver Burner and PowerArchiver Encryption screens . They are all there in the Minimalistik icon set and the only difference I can see is the former is blue and the latter grey. In version 22.00.9
powerarc_2023-09-18_17-00-19.png
powerarc_2023-09-18_17-01-05.png
PA 22.00.09
344c6c52-f03f-407b-ad76-8130b31936bb-image.png
PA 22.00.09 shows a nag screen, when I try to open some setting windows. I have already PA 2023 Toolbox and PA shows, that it’s licensed in the info dialog.
a860bd81-3e71-4ce0-9988-74cd4189d43e-image.png
0836bc83-8046-4a91-bc7b-68bd231100a3-image.png
PA 22.00.09
Some labels in the help toolbar are not translated:
b3c1f5c4-b73d-49d8-9ed0-56294840838c-image.png
I’m looking forward to deploying PowerArchiver 2023 to my users. Can you tell us when the MSI will be available for download and distribution?
Thanks.
Hi there,
there were some security issues fixed in 7zip:
https://www.zerodayinitiative.com/advisories/ZDI-23-1165/
https://www.zerodayinitiative.com/advisories/ZDI-23-1164/
As it seems, that PowerArchiver and PACL use the 7zip libraries, could you please update them to the latest version?
Hi,
From where I get PAVD2023.EXE? PowerArchiver 2023 tries to open it.
But it seems, it tries to download PAVD2021.EXE.
Thanks
I noticed that the version of ZPAQ used is older than the latest released 7.15 https://mattmahoney.net/dc/zpaq.html also there seems to be a newer fork that adds several features https://github.com/fcorbelli/zpaqfranz
It would be useful to implement this latest version (it also maintains the same syntax and behavior as the latest official release if used the -715 flag) and add when opening a zpaq file a choice of the version of the files to show (e.g. as dummy folders represented the various versions present). Since any previous changes are stored with this format, it is possible to extract a snapshot of a certain date/version.
If I open a password-protected zipper file (created with WinRAR but I think that’s irrelevant), open it with PowerArchiver and run “Remove Encryption” on the same file, then reopen it and add a password with “Encrypt Archive,” the resulting archive will be protected with the old ZipCrypto algorithm and not AES as indicated.
(this can be verified, for example, by trying to open the archive files with Windows Explorer, which does not support the AES algorithm)
PA 21.00.18 running on Windows 7 64 bit.
I made a big .PA file and thought I’d check it was made correctly with Menu / Actions / Test.
Discovered:
a) PA always issues a UAC prompt to do this!
b) PA always says there are many errors in PA files.
Understanding encryption options in PA
-
My question goes somewhat beyond the functions of PA; but since it directly includes those functions (and it is those functions that prompt this inquiry), I assumed that it is legitimate to ask it here.
The more I read about encryption, the more confused I become. I am not really asking about encryption in general, but about the encryption options within PA (including the soon to be released 2013).
As I recall from earlier posts, Spywolf, you described PAE as an encryption “wrapper.” The impression I draw from that language is that the archive itself is not encrypted, but rather it is contained within what is presumably an impenetrable electronic wall which keep snooping eyes and keyboards out.
At the same time, your 7zip and zipx formats include their own encryption options. These appear to be internal to the archive structure. Hence, these engines not only compress the files, but, at the same time, they encrypt the contents of that compressed file.
Correct so far? If not, where I am going off the rails?
If I am correct, then (a) it seems that internal encryption would be better that encryption of the wrapper (since, for lack of a better phrase, it seems the encryption is through and through), and perhaps (b) the strongest encryption would be to have both through and through encryption AND an encrypted wrapper.
Still correct? Or not?
Finally, it seems that if a user employs double encryption **, then 1) there is a greater chance for the data to become corrupted, and 2) it will also take longer even for the owner to access to the data (since she will have to decrypt it twice — although I thought I once saw—but no longer see—an option to view archives inside a PAE wrapper transparently).
Why do I ask? I am trying to decide which encryption methods to use? In my reading online (which is not always entirely reliable) I seem to find a consensus that AES 256 (SPECIFICALLY Rijndeal AES 256) is the best, although Serpent 256 clearly has its devoted followers.
Direction? Clues about how to decide?**
-
for maximum security use pae, for convenience use zip or 7zip aes.
AES is unbroken standard… it was selected among various different codecs as the best.
-
So PAE’s AES is stronger than ZIPX’s and 7ZIP’s?
I infer, then, I just completely misunderstood the difference: PAE is more than just an encryption wrapper and ZIPX and 7ZIP do not encrypt through and through (the interior of the archive).
One last question. Will PAE be changing in 2013?
FYI. I did find this:
http://www.theregister.co.uk/2011/08/19/aes_crypto_attack/ -
It’s impressive work but there’s no better cipher to use than AES for now.
:-)
If you use proper password (different characers, +10), it is impossible to break AES.
Encryption is always an wrapper, so in that sense, it is the same… for PAE there is no tools that brute force it, and we have made it on purpose very slow to check the password.
For AES encryption, only possible way to crack it is to brute force the password - which means trying every possible combination. So making it slower to check if password is correct, means less combinations can be tried at the same time.
Most important part is the password, something like greece3 is bad, while 9E:,a?_ is much better.
It does depend on what are you trying to encrypt… if it is nothing that some spy agency will want, then it might be better to use some “normal” password or else you might forget it and then damage is ever bigger.
For instance, we have received countless emails from students that encrypted their papers and forgot the password… sorry guys!
-
THANKS.
Remembering complex PW is tough. Years ago I tried RoboForm to help remember hundreds of of complex passwords. But I didn’t care for it. So I tried CP-labs Password Manager XP, and have used it since. (I do not work for them or get a kick back from them.)
You can secure the database with multiple cyphers . . . including more than one at the same time. But some things I have been reading claim that multiple encryption formats at the same time might actually make it easier to break the encryption.
BTW, I did notice PAE was quite slow relative to other forms. Would speeding it up a bit still make it more secure without the loss of time?
-
THANKS.
Remembering complex PW is tough. Years ago I tried RoboForm to help remember hundreds of of complex passwords. But I didn’t care for it. So I tried CP-labs Password Manager XP, and have used it since. (I do not work for them or get a kick back from them.)
You can secure the database with multiple cyphers . . . including more than one at the same time. But some things I have been reading claim that multiple encryption formats at the same time might actually make it easier to break the encryption.
BTW, I did notice PAE was quite slow relative to other forms. Would speeding it up a bit still make it more secure without the loss of time?
new version will be faster, while keeping all the advantages.
Keep in mind that AES itself is a standard, so it is same in every program (or it should be), it is everything else thats different and that may make the difference in speed or cracking or speed of cracking i guess :-).
I think for vast majority of population who simply dont want their docs easily available, some relatively simple yet unassuming password is fine… just dont use dates and names, because thats how dictionary attacks are done and are used for faster crack of the password.
-
I had read (and, of course, we should be skeptical of what we read) indicates that the National Security Agency reviewed a number of AES 256 cyphers, and chose the Rijndeal cypher as the best – and therefore, set it as THEIR standard.
So at least when the process began early this decade, it seems that no all AES 256 cyphers were the same.
I gather from your comment, that the losing candidates just disappeared. Right? A bit surprising, I must confess. But certainly possible.
If not – if there are still some cypher want-to-be’s – , does PA use the Rijndeal 256 cypher in all functions, PAE, and, when selected, for ZIP and 7 ZIP?
-
I had read (and, of course, we should be skeptical of what we read) indicates that the National Security Agency reviewed a number of AES 256 cyphers, and chose the Rijndeal cypher as the best – and therefore, set it as THEIR standard.
So at least when the process began early this decade, it seems that no all AES 256 cyphers were the same.
I gather from your comment, that the losing candidates just disappeared. Right? A bit surprising, I must confess. But certainly possible.
If not – if there are still some cypher want-to-be’s – , does PA use the Rijndeal 256 cypher in all functions, PAE, and, when selected, for ZIP and 7 ZIP?
there were several ciphers submitted to become AES standard… Rijndael won, so Rijndael is AES… no other candidates were called AES at any point in time. So whenever you see AES, it is Rijndael cipher.
-
I just wanted to be sure.
I was thrown off a bit by the fact that some of your encryption drop down options include “Rijndeal” and some didn’t. So I wondered if you were using two different cyphers. Just wanted to make certain.
Sorry to be a pest about this.
-
I just wanted to be sure.
I was thrown off a bit by the fact that some of your encryption drop down options include “Rijndeal” and some didn’t. So I wondered if you were using two different cyphers. Just wanted to make certain.
Sorry to be a pest about this.
they were added at the time when Rijndael was proposed candidate, so everyone was asking about which one it is… however after all this time, now most people dont know what Rijndael is and they just recognize AES… back then, i think maybe 8-9 years ago, it was important to clarify that it is Rijndael.
-
Given that, you might want to just use “Rijndeal” in all instances . . . or none at all. The fact that PA has it listed differently could be confusing.