is a free cross-platform file archiver that provides an unified
portable GUI for many Open Source
technologies like 7-Zip, FreeArc, PAQ, UPX...
ARC, BZ2, GZ, *PAQ, PEA,
QUAD/BALZ, TAR, UPX, WIM, XZ, ZIP files
Open and extract
ARJ, CAB, DMG, ISO, LHA, RAR, UDF, ZIPX files and more...
includes extract, create and convert multiple
archives at once, create self-extracting archives, split/join files,
strong encryption with two factor authentication, encrypted password
manager, secure deletion, find duplicate files, calculate hashes,
export job definition as script.
FAQ / DATA SECURITY
> PROTECT FILES FROM LOSS,
UNAUTHORIZED MODIFICATION AND THEFT
Backup files on
regular basis to prevent data loss
order to roll back unwanted changes
or deletion is useful to keep
a fresh security copy of the data being used, even this feature is
some forms by most content creation and editing programs making a full
copy of the work data is always a good idea - on demand (i.e.
before committing significant changes to the system, or to user's
files) or, better, scheduled on a regular basis.
spare disk usage (and substantially improve download/upload speed of
creating backup with use
of strong compression algorithms - as a
role of thumb ZIP / GZip compression can save 50% of disk space applied
on mixed-type input data, Bzip2 and 7Z compression provides better
result at cost of more computing power/time.
A very common way to programmatically have the data secured by a backup
copy is to schedule this process
when the machine is not planned to be
used intensively (i.e. during night hours).
While specific backup programs can feature built-in advanced functions
for backup operations (i.e. differential backup which is the process of
saving only a copy of the data actually changed since the last backup
task, or low level disk copy routines to physically clone the hard
disk, more common in software specifically meant for cloning disk
images), one of the advantages of PeaZip is being able to
save file compression operations (as well as file conversion or
extraction operations) from GUI to a script file, in order to re-use
the job definition with any system scheduler, or in third party
and scripts: Add > Console > Save job definition creates a plain
containing the task definition, saved by default in a "Scripts"
subfolder in PeaZip's configuration path, which is unique for each user.
PeaZip features strong encryption
protocols, most common ones are
WinZip AES256 AE encryption for ZIP files, and 7-Zip AES256 encryption
for 7Z files, which also provides (optional) encryption
of table of content of the archive, allowing to keep private also the
names of the files and folders inside the archive until the correct
password is provided.
For all the supported compression formats, PeaZip provides also
optional two factor authentication, in which a file is used as key to
improve the security of password based encryption.
The software also provides an utility to create random keyfiles and
random passwords, sampling entropy from user's system, and an
password manager to help safely handling multiple
passwords, to be used in PeaZip or in other applications, websites and
As good practice, never let leftover data after intended lifecycle of
PeaZip provides integrate utility to wipe files and folders which are
intended to be premanently destoryed, while system's standard file
deletion procedures simply de-references data in the filesystem letting
the actual information intact on the support, where appropriate data
recovery software can be used by an attacker to recover data intended
to be erased.
Same function also allows to sanitize entire partitions in order to
clean free (logical) disk space from remanants of data previously
removed by unsecure deletion procedures - standard disk formatting
procedures, similarily to standard deletion functions, by default does
not take care to securely delete actual data on physical support,
favouring speed over security.
When a memory unit (HDD, SSD, usb-key...) get de-commissioned, it is
always a good practice to permanently erase it before, either files and
Verify data integrity to detect modification
PeaZip supports multiple error
detection algorithms ranging from fast
checksums to cryptographically strong
hashes: Adler32, CRC family
eDonkey/eMule, MD4, MD5,
SHA-2 SHA224/256/384/512), and Whirlpool512, in
order to detect file
corruption or forgery that may occour if the data comes from
unreliable sources, such as disks undergoing failures or unreliable
File check may be automatic, as most archiving format supported by
PeaZip stores advanced error detection information in the archive, or
In example, if the hash of a downloaded file is published by the author
of the file it is possible to re-calculate it with PeaZip to assure it
matches with original one, meaning the originally intended file was
actually downloaded without errors and without being replaced or
corrupted by an attacker in any stage of the communication.
While filesystems and communication protocols implement error detection
and error correction algorithms, usually speed is the primary design
goal, menaning more computing intensive controls are generally not an
Detecting files corruption or forgery as soon as possible avoids to
work on, or backup, inconsistent data.
Share, synchronize, attach, and upload files
PeaZip helps sharing files with other people and synchronize data with
other computers/devices/services, consolidating
composite input files in a single output archive file so data is more
handy to manage
for any purpose and with
any method (as email, ftp or other protocols such as torrents or p2p). Moreover, supporting high
compression algorithms, output file is
usually significantly smaller than the sum of sizes of input files,
saving bandwidth and time both for uploading and downloading the data
The integrated archive conversion function ensure the ability to change
the type of an existing archive, extracting and effectively
re-compressing its content in the desired file format, in order to, in
example, transform old archives (as backup files) into a more up to
date format either for improved compression or better security, or to
be able to share data with users being able to read only a subset of
the archive formats supported by this software.
If a maximum allowed size is
mandatory, in example when attaching a file to a
can (in a single pass) create multiple split
output file parts
(.001, .002, etc), each one smaller than the
desired limit size.
PeaZip automatically detects local paths containing
Dropbox, Google Drive, Microsoft OneDrive (formerly known as SkyDrive),
and Ubuntu One shared files.
Cloud based synchronization platforms allows users to store data on a
remote location that is mutually accessible by different devices owned
by the user, like multiple PCs, smartphones, tablets/phablets, gadgets
basically any device capable to connect to Internet and run the file
synchronization software, which for this reason is usually
multi-platform and can run on Microsoft Windows, Linux / Google
Android or ChromeOS, and Apple
MacOSX / iOS.
PeaZip shows available shared directories in the navigation area (on
the left) of file browser, so shared files are quickly accessible - and
also in compression/conversion and extraction screens, to allow quick
selecting sync folders as target for archiving and extraction
This is especially useful when sharing archive files with mobile or
ultramobile devices and gadgets not
able to run a full featured file archiver (i.e. because some archive
formats or encryption protocols are not supported, or because not
enough powerful for convenient use of strongest compression algorithms,
especially on very large archives, or because no viable freeware
choices are available, or because locked for some policies), but fully
capable to handle the content of the
archive once it is extracted.
External online resources: Wikipedia pages about backup, cryptography, checksum
and hash algorithm CRC, MD5, SHA, file
Topics and search suggetsions: protect files from being deleted,
encrypt files to avoid unauthorized access and modification, backup and
restore files to prevent data loss, privacy, stolen data, file theft,
AES, CRC, MD5, SHA, error
detection, error correction, encrypt filenames and TOC, two factor
authentication, work with keyfile, random password generation,
manager, password protection, share and protect files, integrity check,