of thinking. Usually we use compression or more, but at the beginning did not think of this, it can be seen that each software has its alternative use, as long as you usually more observation, more summary, there will be a new harvest, I hope the method of this article will help you.
X. Automatic shutdown of the computer
First, let's take a look at the WinRAR command mode shutdown command is "-ioff". If
Commonly used WinRAR to compress files of various types of friends know, in addition to compressed files, WinRAR can also be used as a cryptographic software, as long as the compressed file to set a password can achieve the purpose of protecting data. But also because of this, specifically for the WinRAR password cracking software is also everywhere. The length o
Currently, there are a lot of compression software, but WinRAR has won everyone's favor for its small and practical use. However, this software has a lot of practical skills. Using them can make us get twice the result with half the effort.
1. Create a self-extracting File
If you use WinRAR to compress files, and your friends do not use WinRAR, your data must be
Now a lot of compression software, but winrar with its compact, practical win everyone's favorite. However, this software has a lot of practical skills. Using them, we can really do more with less.
1. Make self-extracting file
If you use WinRAR to compress files, and your friends do not use WinRAR, your data must be compressed before you can give it to him. At th
minutes, I tested it three more times and the results were the same. In this evaluation, WinRAR's unzipping speed is less than 7-zip.
Two supported formats for software compression/decompression are provided:
Software/Project
Number of compression formats that can be generated
Number of decompressed formats
7-zip
5 types
15 types
WinRAR
2 types
14 types
Conclusion: After a targeted evaluation of com
WinRAR can also manage my desktop for a long time. There are too many things on the desktop. How should I manage it at ordinary times? If you have installed WinRAR, you can ask it for help and use it to clear useless desktop files or icons.
Take the XP system as an example. The directory where the system is located is "C:/WINDOWS". Assume that the User name is "User", and the icons and files on the desktop
In fact, to modify the need to change the registry, we copy the following code for a corresponding ad and then execute it can be solved.
1. Create a new text document in any place first, and then copy the following code into it:
RAR Registration Data
uid=4b9afb430e269a2a9151
64122122509151305060bd4a8a89c964042551a7be8795bab34276
c06e86503395c505c9d960b733e4f037f0dde6dd64c8a032b5d512
0a746cf17b2c023ef6fc33627a708c376649893511300e4c8dbc7d
0d73155ab4b6f05ca02c0bc07b42706dc9
1, we first create a "Rarreg.key" on the desktop, using Notepad to create a TXT file
2, we first copy and paste the following content into the text and save, and then we change the file into a Rarreg.key file.
RAR Registration Data
The Agency for Education
1000000 PC Usage License
Uid=b621cca9a84bc5deffbf
6412612250ffbf533df6db2dfe8ccc3aae5362c06d54762105357d
5e3b1489e751c76bf6e0640001014be50a52303fed29664b074145
7e567d04159ad8defc3fb6edf32831fd1966f72c21c0c53c0
Now a lot of compression software, but winrar with its compact, practical win everyone's favorite. However, this software has a lot of practical skills. Using them, we can really do more with less.
1. Make self-extracting file
If you use WinRAR to compress files, and your friends do not use WinRAR, your data must be compressed before you can give it to him. At th
Currently, there are a lot of compression software, but WinRAR has won everyone's favor for its small and practical use. However, this software has a lot of practical skills. Using them can make us get twice the result with half the effort.
1. Create a self-extracting File
If you use WinRAR to compress files, and your friends do not use WinRAR, your data must be
Introduction to alternative syntax in PHP and introduction to alternative syntax in PHP. Introduction to alternative syntax in PHP. Introduction to alternative syntax in PHP today I checked the wordpress code, which contains some rare Alternative php syntax. the copied code
OneSFX(self-extractingA self-extracting file is a compressed file, which combines an executable module with a module that runs an extract file from a compressed file. Such a compressed file does not require an external program to decompress the contents of the self-extracting file, and it can run the operation itself. However, WinRAR can still treat self-extracting files as any other compressed file. So if you don't want to run the self-extracting fil
With the improvement of people's security awareness, the survival of Trojans has become increasingly a problem. Of course, Trojan growers are unwilling to detect trojans. Therefore, they have come up with many ways to disguise and hide their own behaviors, bundling Trojans with WinRAR is one of the methods. So how can we identify a trojan in it? This article describes this issue.
Attackers can place Trojans and other executable files, such as flash an
WinRAR how to use the registration machine?
WinRAR registration Successful
WinRAR Registration Machine Use method:
First, download winrar registration machine, if your system does not install WinRAR, directly in the following share of the download address to choose a ve
Enhanced security: Exploring the latest WinRAR version
Http://pcedu.pconline.com.cn/soft/gj/zip/0806/1313787.htmlAfter a period of silence, WinRAR, the old compression software, recently launched the New WinRAR v3.80 beta1 version. In the latest version, the biggest change has enhanced security. Detailed changes are described in detail in this article.
Before ta
Do you know? Three security tactics using WinRAR
1. Reject malicious programs bound with WinRAR
Many Trojans, hard disk bombs, and other malicious programs use WinRAR self-extracting program bundle to disguise themselves. How can we distinguish between normal self-extracting files and self-extracting files bound with malicious programs?
Very easy! As long as you
For ease of use, we may make RAR compression packages into self-extracting files. WinRAR self-extracting module, although easy to use, but the uniform appearance looks reallyBoring. In fact, as long as the simple transformation, you can make a unique, sensual and good winrar self-extracting interface, let your friends envy go.Recognize the true colors of self-extracting modulesEnter the
first, pay attention to the risk of self-extracting program
Believe that the use of WinRAR to bundle the Trojan article we have seen a lot. Here, we recommend that you get the executable attachment file, save them first. Then try right-clicking it, selecting the WinRAR menu, and if the "Open with WinRAR" command is available, this program is a self-extracting pr
1. Reject malicious programs bound with WinRAR
Many Trojans, hard disk bombs, and other malicious programs use WinRAR self-extracting program bundle to disguise themselves. How can we distinguish between normal self-extracting files and self-extracting files bound with malicious programs?
Very easy! As long as you can find that the self-released file contains multiple hidden files, especially multiple execu
Recently, WinRAR has a 0-day extension defect, which can be used for phishing and other purposes. Original Author: An7i, translated by Exploit, moderator of the XI Science Forum. WinRAR is a very powerful compression and decompression software developed by RARLAB. It is well known in Windows, and its File compression and decompression functions are widely praised. RAR files can be compressed into ZIP or RAR
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.