Free Essay

Rar - What's New in the Latest Version

In:

Submitted By vickyyy
Words 2468
Pages 10
Version 5.01 beta 1

1. RAR 5.0 archives can include an optional quick open information controlled with -qo[-|+] switch. It allows to open the archive contents in graphical interface faster.

This version provides better update peformance for archives containing both quick open information and service records, such as NTFS file security. Also default parameters of quick open information are optimized to achieve faster open time for such archives.

2. Bugs fixed:

a) "Test" command could erroneously report damaged data in valid recovery record if only a part of files in RAR 5.0 archive was tested. It did not happen if entire archive contents was tested;

b) "Test" command erroneously reported errors when verifying RAR 4.x Unix symbolic links.

Version 5.00

1. New RAR 5.0 archiving format. You can use -ma command line switch to create RAR 5.0 archives. By default RAR creates archives in 4.x format.

2. Changes in RAR 5.0 compression algorithm:

a) maximum compression dictionary size is increased up to 1 GB in 64 bit RAR. 32 bit RAR version can use up to 256 MB dictionary when creating an archive. Both 32 bit and 64 bit versions can unpack archives with any dictionary size, including 1 GB;

b) default dictionary size for RAR 5.0 is 32 MB, typically resulting in higher compression ratio and lower speed than RAR 4.x 4 MB. You can use -md switch to change this value;

c) -md switch syntax is modified to support larger dictionary sizes. Append 'k', 'm' and 'g' modifiers to specify the size in kilo-, mega- and gigabytes, like -md64m for 64 MB dictionary. If modifiers are not present, megabytes are assumed, so -md64m is equal to -md64;

d) RAR 5.0 format includes Intel IA-32 executable and delta compression algorithms, but RAR 4.x text, audio, true color and Itanium algorithms are not supported. These excluded algorithms are not efficient for modern data types and hardware configurations;

e) RAR 5.0 decompression can utilize several CPU cores. Though not to same extent as in compression algorithm, it improves the decompression speed on large files with poorly compressible data or when using BLAKE2 checksums.

3. Changes in RAR 5.0 archive format:

a) file times are stored as Coordinated Universal Time (UTC) instead of former local time, making file exchange among several time zones more straightforward;

b) file names and archive comments use UTF-8 encoding. 4. RAR 5.0 recovery record is based on Reed-Solomon error correction codes. If recovery record size is large enough, 5% and more, the new error correction scheme provides much higher resistance to multiple damages comparing to RAR 4.x recovery record. Smaller record, such as 1 - 2%, or less random damage type would result in less difference between 4.x and 5.0. For single continuous damage 4.x and 5.0 efficiency is about the same.

Additionally to usual data erasures, the new recovery record is able to detect deletions and insertions of much larger size than in previous RAR versions. Maximum insertion size is several megabytes. Maximum deletion size depends on the damage type and in some cases can be as large as the recovery record size. Still, the best recovery performance and efficiency is achieved if no deletions and insertions are present, so all data including damaged sectors preserve their original positions. Thus, if you use some special software to copy an archive from damaged media, it is better to choose the mode, when damaged sectors are filled by zeroes or any other data instead of cutting them out completely from resulting file.

RAR 5.0 recovery record is more resistant to damage of recovery record itself and can utilize a partially corrupt recovery record data. Note, though, that "Repair" command does not fix broken blocks in recovery record. Only file data are corrected. After successful archive repair, you may need to create a new recovery record for saved files.

New recovery record is not based on 512 byte sectors anymore and incorporates more complicated data structures. So it is impossible to specify its size in sectors. For RAR 5.0 archives the parameter of -rr[N] switch and rr[N] command is always treated as a percent of archive size regardless of presence of % character. Typically N% recovery record can repair up to N% of continuously damaged data and increases the archive size by only slightly more than N%. Ability to fix multiple damages is proportional to N.

We used "Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions" paper by James S. Plank, Kevin M. Greenan and Ethan L. Miller to improve Reed-Solomon coding performance. Also we are grateful to Artem Drobanov and Bulat Ziganshin for samples and ideas allowed to make Reed-Solomon coding more efficient.

5. "Test" command verifies validity of RAR 5.0 recovery record. Recovery record is tested after processing all archived files.

If corrupt archive contains the recovery record, it might be possible to repair it even if recovery record validity test is failed. "Repair" command attempts to utilize even a partially damaged recovery record. So treat the negative recovery record test result as a reason to re-create the archive if original files are still available, but not as a reason to avoid "Repair" command.

6. Changes in RAR 5.0 encryption algorithm:

a) encryption algorithm is changed from AES-128 to AES-256 in CBC mode. Key derivation function is based on PBKDF2 using HMAC-SHA256;

b) special password verification value allows to detect most of wrong passwords without necessity to unpack the entire file;

c) if archive headers are not encrypted ("Encrypt file names" option is off), file checksums for encrypted RAR 5.0 files are modified using a special password dependent algorithm, to make impossible guessing file contents based on checksums. Do not expect such encrypted file checksums to match usual CRC32 and BLAKE2 values. 7. Switch -htb allows to utilize 256 bit length BLAKE2sp hash ( https://blake2.net ) instead of 32 bit CRC32 as a file checksum.

While producing slightly larger archives, BLAKE2 can be used for file contents identification. If two files have the same BLAKE2 value, it practically guarantees that file contents is the same. BLAKE2 error detection property is also stronger than in much shorter CRC32.

8. Features removed:

a) authenticity verification feature did not provide the required level of reliability and was removed; b) switch -en (do not add "end of archive" block) is not supported by RAR 5.0 archives, which always have the end of archive block. This block helps RAR to safely skip external data like digital signatures appended to archive;

c) old style extension based arcname.rNN volume names are not supported by RAR 5.0 archives, which use only arcname.partN.rar volume names; d) file comments are not supported anymore both in RAR 4.x and RAR 5.0 archives. Console RAR 'cf' command is removed. It does not affect the archive comment support, which is present in both versions of archive format and is not planned for removal.

9. Switch -oh stores hard links as link instead of file. It is available only for RAR 5.0 archive format. 10. Changes in recovery volume processing in RAR 5.0 archive format:

a) maximum number of RAR+REV volumes in RAR 5.0 format is 65535 instead of 255;

b) recovery volume operations are faster than in RAR 4.x;

c) additionally to recovery data, RAR 5.0 REV files also store service information such as checksums of protected RAR files. So they are slightly larger than RAR volumes which they protect. If you plan to copy individual RAR and REV files to some removable media, you need to take it into account and specify RAR volume size by a few kilobytes smaller than media size. 11. Command line RAR returns the exit code 11 if it can detect that user entered a wrong password. This code can be returned only for RAR 5.0 archives. It is impossible to distinguish a wrong password and data damage for RAR 4.x archives.

12. 'v' and 'l' commands display archived file names in the end of line, not in that beginning as before. Also some fields previously available in 'l' and 'v' output are now shown only by 'lt' and 'vt'. 'vt' and 'lt' commands provide the detailed multiline information for every archived file.

'vta' and 'lta' also include service headers into list.

13. UTF-16 little endian encoding is used in RAR log file rar.log, so Unicode file names are stored in the log correctly.

You can use -scg switch to change the default log file encoding, such as -scag for native single byte encoding.

14. Command line 'r' (repair) command can include an optional destpath\ parameter defining the destination folder for repaired archive:

rar r archive.rar destpath\

Version 4.20

1. Changes in RAR compression:

a) Multithreaded RAR compression is enabled by default. You can disable it with -mt1 switch.

Comparing to RAR 4.11, some speed gain is possible in single processor mode as well.

Speed gain depends on data type and average file size. Several cores are utilized more efficiently when compressing large files.

b) we had to increase memory requirements to achieve higher compression speed. General RAR compression algorithm allocates about 120 MB comparing to 40 MB in RAR 4.11;

c) RAR text compression algorithm cannot utilize several CPU cores efficiently, so its performance in multiprocessor environment is much lower than for general algorithm. Also its decompression speed is much lower than in general algorithm regardless of CPU number. So we decided to disable the text algorithm by default.

If you need maximum possible compression ratio for plain text data regardless of speed, you can enable the text compression with -mct switch.

2. RAR general decompression algorithm speed is slightly improved, though not to same extent as RAR compression. RAR decompression is not able to use several processor cores, so its performance does not depend on a number of cores.

Version 4.11

1. Bugs fixed:

a) if -x*\somedir\* exclusion mask was specified when archiving and if name of current directory contained 'somedir', RAR could exclude all files and stop creating an archive.

Version 4.10

1. Modifications of switch -ag behavior:

a) -ag can be used with all RAR commands, not just with archiving only;

b) 'N' format character behavior differs in archiving and non-archiving operations. When archiving, it is incremented until the first unused name is found. In non-archiving operations like extracting it selects the existing archive preceding the first unused name;

c) 'I' format character allows to specify minutes regardless of presence and position of 'H' (hours) in format string. It can be used instead of 'M' (minutes), when you wish to place minutes before hours or do not need hours at all.

2. New -log[fmt][=name] switch allows to write archive and file names to log file in archiving, extracting, deleting and listing commands. This switch is especially useful, when you need to further process an archive created with -ag or -v switches, because -log provides the archive name generated by RAR. 3. New -@[+] switch allows to process all parameters starting from '@' character either as file names (-@) or as file lists (-@+).

4. Volume size in -v switch can be specified as a decimal fraction. Dot (.) is used as the decimal mark. For example, -v1.5g means 1.5 gigabytes.

Version 4.01

1. Bugs fixed:

a) "Repair" command failed to properly reconstruct structure of RAR archives, which contained at least one file with packed size exceeding 4 GB.

This bug did not affect the recovery record based repair. It happened only if recovery record was not found and RAR performed reconstruction of archive structure;

b) RAR could crash when creating a new archive with -agNNNN switch if archive number in generated name was very large, like a thousand or more.

Version 4.00

1. RAR decompression speed is improved. Depending on data type, decompression can be up to 30% faster than in previous versions.

Both the general RAR algorithm and most of special RAR multimedia methods benefit from this improvement. The only module of RAR algorithm, which is not affected, is "Text compression" method. 2. Changes in -x switch syntax. Now you can specify a wildcard exclusion mask for folders. Such mask must have the trailing '\' character, like -x*tmp*\ or -x*\temp\

3. Recovery volume processing involves less disk seek operations resulting in higher performance.

4. New error code 10 ("no files") is added to list of error codes. This new code can be returned by archive, extract, delete and repair commands. It means that RAR did not find any files matched the specified file or archive mask.

Version 3.93

1. Bugs fixed:

a) in RAR 3.92 -xd:\path\dir switch could also exclude directories, which path does not match the path specified in the switch and only the directory name is the same as specified; b) switches -y -or did not work correctly together. Switch -or was ignored in presence of -y.

Version 3.92

1. In RAR 3.91 -x switch could also exclude directories from archiving even if mask contained wilcard characters and did not contain a path. For example, -x*. excluded all those directories, which do not have the extension in the name. Now -x switch uses RAR 3.80 approach for masks without path, excluding directories only if mask does not contain wildcards and matches the directory name exactly

2. If file matched two different masks in RarFiles.lst, RAR could select the last match. Normally, if neither of masks is a subset of another, the first match must be chosen.

Version 3.91

1. Bugs fixed:

a) hexadecimal search in "ih" command failed to find matches if first byte in search string was greater than 127.

Version 3.90

1. New command line switch -r- disables recursion completely. So 'rar a -r- arc dirname' command will add only the empty dirname folder and ignore its contents. By default, if dirname does not include wildcards, RAR adds its contents even if -r switch is not specified.

2. If used when extracting, the new command line switch -ai forces RAR to ignore file attributes. When using this switch, extracted files will always have attributes assigned by operating system to a newly created file by default.

3. If output file name is not specified in "cw" command, RAR will send comment data to stdout.

4. When compressing stdin data with -si[name] switch, RAR sets modification time of archived entry to current system time. Previous RAR versions did not fill this field, resulting in meaningless modification time for stdin.

Similar Documents

Free Essay

Blah

...NOS 120 Journal Ubuntu 10.04 This document is a periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 NOS 120 Journal Ubuntu 10.04 This document is a periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 ------------------------------------------------- Table of Contents: Table of Contents ………………………………………………………………………………………………………………………………… 2 Table of Contents (cont.) …………………………………………………………………………………………………………………….. 3 Course Syllabus ……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………...

Words: 17866 - Pages: 72

Free Essay

Hacking

...By : Anurag Dwivedi [[Lets Hack The Universe]] Note: Only For Eductional Propose…xD xD !! Legal Disclaimer Any proceedings and or activities related to the material contained within this volume are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. Neither writer of this book, review analyzers, the publisher, nor anyone else affiliated in any way, is going to admit any responsibility for your proceedings, actions or trials. About The Author Anurag Dwivedi is a 13 year old computer geek. Who likes to find vulnerabilities Doing Hacking , Programming , editing , cracking , web designing and writing books He Wants To Be An Software Designer..!!!! Join His Blog: Computer...

Words: 20358 - Pages: 82

Premium Essay

Computer Tricks

...short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification designed to immerse the learner in an interactive environment where they will learn how to scan, test, hack and secure information systems. Ideal candidates for the C|EH program are security professionals, site administrators, security officers, auditors or anyone who is concerned with the integrity of a network infrastructure. The goal of the Ethical Hacker is to help the organization take...

Words: 61838 - Pages: 248

Free Essay

Dfdgfg

...Build Your Report | Symantec http://www.symantec.com/threatreport/print.jsp?id=highlights... BOOKMARK THIS PAGE | PRINT THIS PAGE | CLOSE Internet Security Threat Report Volume 17 Custom Report SHARE THIS PAGE Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010. Web based attacks increased by 36% with over 4,500 new attacks each day. 403 million new variants of malware were created in 2011, a 41% increase of 2010. SPAM volumes dropped by 34% in 2011 over rates in 2010. 39% of malware attacks via email used a link to a web page. Mobile vulnerabilities continued to rise, with 315 discovered in 2011. Only 8 zero-day vulnerabilities were discovered in 2011 compared with 14 in 2010. 50% of targeted attacks were aimed at companies with less than 2500 employees. Overall the number of vulnerabilities discovered in 2011 dropped 20%. Only 42% of targeted attacks are aimed at CEOs, Senior Managers and Knowledge Workers. In 2011 232 million identities were exposed. An average of 82 targeted attacks take place each day. Mobile threats are collecting data, tracking users and sending premium text messages. You are more likely to be infected by malware placed on a legitimate web site than one created by a hacker. Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and...

Words: 44470 - Pages: 178

Free Essay

A Hands on Intro to Hacking

...Penetration testing Penetration testing A Hands-On Introduction to Hacking by Georgia Weidman San Francisco Penetration testing. Copyright © 2014 by Georgia Weidman. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in USA First printing 18 17 16 15 14   123456789 ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066...

Words: 117203 - Pages: 469

Free Essay

Hello

...Scan / Edit Notes About The Author Illustrations Author's Note Preface 1. Freud, Penfield, and Berne 2. Parent, Adult, and Child 3. The Four Life Positions 4. We Can Change 5. Analysing the Transaction 6. How We Differ 7. How We Use Time 8. P-A-C and Marriage 9. P-A-C and Children 10. P-A-C and Adolescents 11. When Is Treatment Necessary? 12. P-A-C and Moral Values 13. Social Implications of P-A-C References Index (Removed) Scan / Edit Notes Versions available and duly posted: Format: v1.0 (Text) Format: v1.0 (PDB - open format) Format: v1.5 (HTML) Format: v1.5 (Ubook-HTML) Genera: Self-Help Extra's: Pictures Included Copyright: 1969 Scanned: November 8 2003 Posted to: alt.binaries.e-book (HTML-PIC-TEXT-PDB Bundle) alt.binaries.e-book (HTML-UBook) Note: The U-Book version is viewable on PC and PPC (Pocket PC). Occasionally a PDF file will be produced in the case of an extremely difficult book. 1. The Html, Text and Pdb versions are bundled together in one rar file. (a.b.e) 2. The Ubook version is in zip (html) format (instead of rar). (a.b.e) ~~~~ Structure: (Folder and Sub Folders) {Main Folder} - HTML Files | |- {PDB} | |- {Pic} - Graphic files | |- {Text} - Text File -Salmun About The Author Thomas A. Harris is a practising psychiatrist in Sacramento, California. Born in Texas, he received his B.S. degree in 1938 from the University of Arkansas Medical School and his M.D. in 1940 from Temple University Medical School. In 1942 he began training in psychiatry at St Elizabeth's...

Words: 92067 - Pages: 369

Free Essay

Rewarding Relationships: a Study of the Interaction of Employment Relationships and Employee Rewards Systems in Two Unionised Private Sector Organisations

...Citation: Creaby-Attwood, Nick (2010) Rewarding Relationships: A Study of the Interaction of Employment Relationships and Employee Rewards Systems in Two Unionised Private Sector Organisations. Doctoral thesis, Northumbria University. This version was downloaded from Northumbria Research Link: ht tp://nrl.northumbria.ac.uk/4415/ Northumbria University has developed Northumbria Research Link (NRL) to enable users to access the University’s research output. Copyright © and moral r ights for i tems on NRL are retained by the individual author(s) and/or other copyright owners. Single copies of full i tems can be reproduced, displayed or performed, and given to third parties in any format or medium for personal research or study, educational, or not-for-profit purposes without prior permission or charge, provided the authors, ti t le and full bibliographic details are given, as well as a hyperlink and/or URL to the original metadata page. The content must not be changed in any way. Full i tems must not be sold commercially in any format or medium without formal permission of the copyright holder. The full policy is available online: http://nrl.northumbria.ac.uk/policies.html REWARDING RELATIONSHIPS: A STUDY OF THE INTERACTION OF EMPLOYMENT RELATIONSHIPS AND EMPLOYEE REWARDS SYSTEMS IN TWO UNIONISED PRIVATE SECTOR ORGANISATIONS NICK CREABY-ATTWOOD PhD 2010 REWARDING RELATIONSHIPS: A STUDY OF THE INTERACTION OF EMPLOYMENT RELATIONSHIPS AND EMPLOYEE REWARDS...

Words: 103288 - Pages: 414

Premium Essay

Computer Organization and Architecture Designing for Performance 8th Edition

...Cataloging-in-Publication Data On File Vice President and Editorial Director: Marcia J. Horton Editor-in-Chief: Michael Hirsch Executive Editor: Tracy Dunkelberger Associate Editor: Melinda Haggerty Marketing Manager: Erin Davis Senior Managing Editor: Scott Disanno Production Editor: Rose Kernan Operations Specialist: Lisa McDowell Art Director: Kenny Beck Cover Design: Kristine Carney Director, Image Resource Center: Melinda Patelli Manager, Rights and Permissions: Zina Arabia Manager, Visual Research: Beth Brenzel Manager, Cover Visual Research & Permissions: Karen Sanatar Composition: Rakesh Poddar, Aptara®, Inc. Cover Image: Picturegarden /Image Bank /Getty Images, Inc. Copyright © 2010, 2006 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of Pearson plc Prentice Hall® is a registered trademark of Pearson Education, Inc. Pearson Education LTD. London Pearson Education Singapore, Pte. Ltd Pearson Education, Canada, Ltd Pearson...

Words: 239771 - Pages: 960