Frequently Asked Questions
Q01: What is RAR?
A: RAR is the native format of the WinRAR archive. Like other archives, RAR files are data containers. They store one or several files in the compressed form. After you download a RAR file from the Internet, you need to unpack its contents in order to use them.
A: The number of files, which can be added to an archive, depends upon the amount of available memory and the length of the file names. Roughly 128 bytes of memory are required per archived file for a RAR archive. For example, it is recommended to have 128 MB if you are going to archive millions of files.
Q02: How many files can I add to an archive?
Q03: Is there any limitation to the maximum file and archive size?
A: The size of a RAR or ZIP archive, as well as the size of any single file within a RAR archive, is limited to 8,589,934,591 GB (9,223,372,036,854,775,807 bytes). Note that to create archives larger than 4 GB, you need to use NTFS, as older file systems do not support such large files. In general the RAR archive format is optimal for heavy tasks involving huge number of files and gigabytes of disk space.
Q04: What's the difference between RAR and ZIP files?
A: Compared to the ZIP file format, RAR provides a number of advanced features: more convenient multipart (multivolume) archives, tight compression including special solid, multimedia and text modes, strong AES-256 encryption, recovery records helping to repair an archive even in the case of physical data damage, Unicode support to process non-English file names and a lot more.
Q05: What is a corrupted RAR file?
A: The damaged RAR document is really a regular RAR document, the multipart RAR document or perhaps a guarded RAR document, which was harmed intentionally or even accidentally and it has dropped a few of it can information. The damaged RAR document is ineffective and may not possible be decompressed.
Q06: Is there a way to fix a corrupted RAR file?
A: There is absolutely no program that may open up damaged RAR documents. They may be damaged, ruined and junk. Remedy: Quit and obtain yourself fresh as well as unbroken duplicates of these RAR documents.
Q07: Can encrypted RAR file be extracted by Free RAR Extractor Elite?
A: Actually it can't extract RAR files which are protected by password unless you enter the correct password first before extracting.
Q08: Can I define the specific files to extract?
A: Free RAR Extractor Elite allows you to input the excluded file extensions and these types of files will be excluded from extraction.
Q09: What can I do with extracted bin and cue files?
A: Those files can be read by a program called ISO buster that is available on the internet. You will need that program in order to turn those files into something useful. Bin and Cue files are not files used by RAR or WinRAR.
Q10: What is a phishing RAR file?
A: A phishing RAR file is a password protected RAR file that has a notice in it, telling you, that you will get the right password after visiting a webpage... On that webpage you usually have to enter some personal pieces of information or sign up for something.
Q11: What are Zip files and archives?
A: Zip files (.zip and .zipx) have been referred to as compressed folders, packages, containers, and archives. Zip files are the most common type of archive files that also compress data.
Q12: What is brute force attack?
A: It attempts to determine a secret by trying every possible combination. The number of attempts is limited by the maximum length and the number of characters to try per position (or byte if considering Unicode passwords) The time to complete is greater, but there is greater coverage of likely cleartext value.
Q13: What the "Dictionary Attack" exactly is?
A: It is an effective attack for you to recover lost password with a default dictionary in the program. The program will try every password in the dictionary. Besides, you can add your own dictionary to the program for saving the recovery time. The dictionary is just a text file with one word at a line; lines are separated with line breaks.
Q14: Does this program support 64-bit Windows 8?
A: Yes, it supports not only 64-bit Windows 8 but also Windows 7/Vista/XP/2008/2003/2000(32-bit or 64-bit).
Q15: If I close the Free ZIP Password Cracker carelessly, what should I do?
A: Free ZIP Password Cracker has automatically saved the process when you close the program and restore the last state. Therefore, you don't need to do anything.
Q16: What are the advantages of zipping files?
A: Zipping files is for the purpose of storage and organization. If you have a great number of files that you don't plan on using any time soon, you can "zip" all of them into a single archive. What's more, you can more easily transfer them like to something like a blank CD or a USB flash drive.
Q17: Can you give me an explanation of "Character Set"?
A: Character Set instructs the program what characters have been used in the password and restrict the search area.
Q18: Why is GPU preferred to crack passwords?
A: GPU achieves great performance by using heavy parallelism, with hundreds (if not thousands) of cores. This is made possible by pipelining (each individual operation takes many cycles to run, but successive operations can be launched like trucks on a highway) and sharing instruction decoding (since many cores will run the same instructions at the same time).
Q19: What does "Starting Password" mean in Brute-force attack?
A: Starting Password is provided to define your own character set which has been used in the password. For example, if you can remember the first three characters of the lost password, but are not sure about the remaining password, you can input the first three characters like "a2D", then the cracker will start to hit the first character from a to z, the second from 2 to 9, and the third from D to Z.
Q20: Can I create my own dictionary in any language I want?
A: Of course, you can. The Dictionary attack in this program allows you to create your own dictionary using various languages including Chinese, English, French, Japanese, etc.