During winrar use, decompression of compressed packages is one of the most frequently used operations. WinRAR users often need to use the right-click Compression package, and then select the decompression method to extract. Recently, a user has shared a double-click to unzip the compressed folder to the specified location method, very simple and practical. Let's
Often use WinRAR users are aware that since the upgrade or download winrar the latest version, we open rar, zip, 7z and other compressed format files will appear in the pop screen ads, although the popup window is relatively small, but for the users often use to the compressed package, will inevitably bring some inconvenience, So how do winrar ads get rid of it?
Due to the work of the data packaging, by the way the next WinRAR command line mode, wrote some examples, the basic usage is as follows:Test compressed File Preparation: Folder Test_data, the internal contains subfolders, respectively, stored some *.log and *.txt files.The test code is as follows:1 REMcompress all files, compress by type, zip package2WinRAR.exe a num_all.zip. \test_data3WinRAR.exe a num_txt.zip. \test_data\num*.txt4WinRAR.exe a num_lo
Today, I found a document and downloaded it online. Is a 7z compressed package, more than 70 m. After I decompress the package with WinRAR, I found that there were more than 600 m. I was surprised that the compression ratio was so high. No. I need to know why the 7z format is so compressed. First of all, I use WinRAR to compress it for more than 110 m. It seems that 7z is so powerful that I am ignorant, onl
Sometimes in order to facilitate the transfer of files over the network, or to save storage space, we can use compressed software to compress packaging operations.There are many compression software. More commonly used is WinRAR, 7zip, good pressure and so on. Let's take winrar as an example to introduce.Download the installation winrar first.After downloading, d
Let's look at WinRAR's own support invocation command:
Compression command: a {0} {1}-R ' {0}: Compressed filename | {1}: File physical path to compress
Ex: "A Your sister. rar f:\MM-r" (meaning to compress the folder in MM under F to "your sister. rar" file)
Decompression command: x {0} {1}-y ' {0}: File name to extract | {1}: File physical path to extract
Ex: "x sister. rar f:\ sister-y" (to be compressed file physical path: "F:\ sister, the younger sister. Rar")
Parameter description
Pa
With the improvement of people's security awareness, the survival of Trojans has become increasingly a problem. Of course, Trojan growers are unwilling to detect trojans. Therefore, they have come up with many ways to disguise and hide their own behaviors, bundling Trojans with WinRAR is one of the methods. So how can we identify a trojan in it? This article describes this issue.
Attackers can place Trojans and other executable files, such as flash an
Enhanced security: Exploring the latest WinRAR version
Http://pcedu.pconline.com.cn/soft/gj/zip/0806/1313787.htmlAfter a period of silence, WinRAR, the old compression software, recently launched the New WinRAR v3.80 beta1 version. In the latest version, the biggest change has enhanced security. Detailed changes are described in detail in this article.
Before ta
to copy, select "Add to Compressed File", click "Browse" in the "General" page of the compression parameter setting that pops up, navigate to the target path of the copy (e:), confirm the compression, and when it hits the file that can't be copied, winrar will pop up a "diagnostic message" The dialog box prompts for a file that cannot be accessed, and continues to compress until it finishes (below), bypassing the files that cannot be copied to extrac
WinRAR can be used to back up data, unzip RAR, zip and other types of files, and can create new RAR and zip format, such as compression class files, can be said to be a necessary tool for the installation. But there are a lot of users every time the compressed file will automatically pop up push ads, naturally to the ads have a rejection of the psychological users are inevitably uncomfortable to use, so the
file to treat, effectively save space.
2. Decompression method of the compressed file of the sub-volume
Put all the compressed sub-volumes in one folder, and then unzip one of them with WinRAR, you can generate the file.
Note: The decompression may encounter the prompt "need next compression sub-volume", may be the problem is the compression sub-volume is incomplete, or compressed sub-volume name
WinRAR how to use the registration machine?
WinRAR registration Successful
WinRAR Registration Machine Use method:
First, download winrar registration machine, if your system does not install WinRAR, directly in the following share of the download address to choose a ve
For ease of use, we may make RAR compression packages into self-extracting files. WinRAR self-extracting module, although easy to use, but the uniform appearance looks reallyBoring. In fact, as long as the simple transformation, you can make a unique, sensual and good winrar self-extracting interface, let your friends envy go.Recognize the true colors of self-extracting modulesEnter the
first, pay attention to the risk of self-extracting program
Believe that the use of WinRAR to bundle the Trojan article we have seen a lot. Here, we recommend that you get the executable attachment file, save them first. Then try right-clicking it, selecting the WinRAR menu, and if the "Open with WinRAR" command is available, this program is a self-extracting pr
to unzip the file, but not include the specified file file.-V View the compressed Files directory, but do not press.The-t test file has no damage, but does not understand the pressure.The-D directory unlocks the compressed file to the specified directory.-Z displays only annotations for compressed files.-N does not overwrite files that already exist.-O overwrites files that already exist and does not require user confirmation.-j does not recreate the
Do you know? Three security tactics using WinRAR
1. Reject malicious programs bound with WinRAR
Many Trojans, hard disk bombs, and other malicious programs use WinRAR self-extracting program bundle to disguise themselves. How can we distinguish between normal self-extracting files and self-extracting files bound with malicious programs?
Very easy! As long as you
what function does WinRAR have? WinRAR is a powerful compression package manager, WinRAR can backup our daily data, we can download from the Internet compressed package file to extract, but also can be some of our files to compress, thereby reducing the size of e-mail attachments.
Advantages and Characteristics:
*
Decompression in the JAVA JDK does not seem to decompress our manually compressed RAR files, only the JDK API compressed RAR
So come up with the following WinRAR command line decompression
Package edu.nwpu.vcampus.util; Import Java.io.File; public class Ziputil {public static final String Winrarpath = ' C://program files//winrar//winrar.exe '; public static bool EAN unz
1. Reject malicious programs bound with WinRAR
Many Trojans, hard disk bombs, and other malicious programs use WinRAR self-extracting program bundle to disguise themselves. How can we distinguish between normal self-extracting files and self-extracting files bound with malicious programs?
Very easy! As long as you can find that the self-released file contains multiple hidden files, especially multiple execu
Recent RAR China announced that WinRAR is completely free, that is, after installing the WinRAR free version will not pop up the evaluation version of the window, but more people hate ads come, we installed a free version of RAR will pop up a lot of annoying ads, then winrar how to advertising? I've been in this situation lately, and I've solved it. Do not go to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.