Just tried using the Modern (Windows 10) Icon set and seeing a few missing icons in both PowerArchiver Burner and PowerArchiver Encryption screens . They are all there in the Minimalistik icon set and the only difference I can see is the former is blue and the latter grey. In version 22.00.9
powerarc_2023-09-18_17-00-19.png
powerarc_2023-09-18_17-01-05.png
Hi there,
there were some security issues fixed in 7zip:
https://www.zerodayinitiative.com/advisories/ZDI-23-1165/
https://www.zerodayinitiative.com/advisories/ZDI-23-1164/
As it seems, that PowerArchiver and PACL use the 7zip libraries, could you please update them to the latest version?
Hi,
From where I get PAVD2023.EXE? PowerArchiver 2023 tries to open it.
But it seems, it tries to download PAVD2021.EXE.
Thanks
I noticed that the version of ZPAQ used is older than the latest released 7.15 https://mattmahoney.net/dc/zpaq.html also there seems to be a newer fork that adds several features https://github.com/fcorbelli/zpaqfranz
It would be useful to implement this latest version (it also maintains the same syntax and behavior as the latest official release if used the -715 flag) and add when opening a zpaq file a choice of the version of the files to show (e.g. as dummy folders represented the various versions present). Since any previous changes are stored with this format, it is possible to extract a snapshot of a certain date/version.
If I open a password-protected zipper file (created with WinRAR but I think that’s irrelevant), open it with PowerArchiver and run “Remove Encryption” on the same file, then reopen it and add a password with “Encrypt Archive,” the resulting archive will be protected with the old ZipCrypto algorithm and not AES as indicated.
(this can be verified, for example, by trying to open the archive files with Windows Explorer, which does not support the AES algorithm)
PA 21.00.18 running on Windows 7 64 bit.
I made a big .PA file and thought I’d check it was made correctly with Menu / Actions / Test.
Discovered:
a) PA always issues a UAC prompt to do this!
b) PA always says there are many errors in PA files.
Pae password not working
-
i typed a password for a pae file and it worked. Tested it out and i can enter any password and it will extact the file
-
Please explain what exactly did you do and where… I checked it out and it works as it should - I dont see how could any password work in protected pae file…
-
The File Is Over 154 Mb I Encrypted It Wit The Password Test And I Can Extract It With Help Why
-
The File Is Over 154 Mb I Encrypted It Wit The Password Test And I Can Extract It With Help Why
David, please write in understandable sentences :-).
You probably typed help instead of test… I am sure if you try again you will see it works fine.It is impossible for encrypted file to be opened with wrong password.
-
it was an avi file i encrypted and yes it opened with wrong passwd. but its the only one thats done it so far
-
Well, I tried with an avi file - using shell compress and encrypt - PA compressed to zip and then gave password prompt. I entered one and pae file was created.
Then still in same explorer window, I selected shell extract to {filename as folder}
PA asked for password, I entered an incorrect password.
PA then “appeared” to extract the file (progress displayed and even creating folder) but on completing gave the message “incorrect password” and deleted the destination folder.
Didn’t have chance to check if (temporary) file was extracted into the folder before deletion.Is this false extraction process necessary, or should it be immediately cancelled with incorrect password?
-
it does extract tfile to the folder.
it should snot even atrt the process of extractimng if its the wrong password
-
it does extract tfile to the folder.
it should snot even atrt the process of extractimng if its the wrong password
Eh, its checking the password by extracting the file. Since password is wrong, extracted file is garbage and it gets deleted.
While we could have done password checking via stored hash of the password which would be still considered secure and very fast, this way dictionary based attacks are much, much slower and raise passive security of the pae files up a notch.
It also might help in the future because if some hashing algorithm gets cracked completly, it can not be used to recover the data.