Backup files on
regular basis to prevent data loss
order to roll back unwanted changes
or deletion best protection is to keep
a fresh security copy of the data being used, even this feature is
some forms by most content creation and editing programs making a full
copy of the work data is always a good idea - on demand (i.e.
before committing significant changes to the system, or to user's
files) or, better, scheduled on a regular basis.
spare disk usage (and substantially improve download/upload speed of
creating backup with use
of strong compression algorithms - as a
role of thumb ZIP / GZip compression can save 50% of disk space applied
on mixed-type input data, Bzip2 and 7Z compression provides better
result at cost of more computing power/time.
Deduplication of non-unique files before kackup jobs prevents excessive
disk space usage for storing redundant data.
A very common way to
programmatically have the data secured by a backup
copy is to schedule this process
when the machine is not planned to be
used intensively (i.e. during night hours).
While specific backup programs can feature built-in advanced functions
for backup & restore operations (i.e. differential backup which is
the process of
saving only a copy of the data actually changed since the last backup
task, or low level disk copy routines to physically clone the hard
disk, more common in software specifically meant for cloning disk
images), one of the advantages of PeaZip is being able to
save file compression operations (as well as file conversion or
extraction operations) from GUI to a script file, in order to re-use
the job definition with any system scheduler, or in third party
and scripts: Add > Console > Save job definition creates a plain
containing the task definition, saved by default in a "Scripts"
subfolder in PeaZip's configuration path, which is unique for each user.
features strong encryption
protocols to protect information secrecy.
Most commonly supported standards are
WinZip AES256 AE encryption for ZIP files, and 7-Zip AES256 encryption
for 7Z files, which also provides (optional) encryption
of table of content of the archive, allowing to keep private also the
names of the files and folders inside the archive until the correct
password or passphrase is provided - avoiding unwanted leak of
information if non
legitimate, unauthorized user, not knowing the password, try to open
archive table of content (in case the bery name of files and folders
may leak private, sensible information).
For all the supported compression formats, PeaZip provides also
optional two factor authentication,
in which a file is used as key to
improve the security of password based encryption, preventing risks of
password-guessing by brute forcing, dictionary attacks, or social
engineering. Unless the attacker can get the secret key file element,
decryption of the data will not be possible.
The software also
provides an utility to create random
random passwords, sampling entropy from user's system, and an
password manager to help safely handling multiple
passwords, to be used in PeaZip or in other applications, websites and
services - also, use of random passwords avoid risks of
password-guessing by unauthorized users with dictionary attacks or
As good practice,
to avoid data theft, never let leak on de-commissioned supports any
leftover data after end of intended lifecycle of
PeaZip provides integrate utility to wipe files and folders which are
intended to be premanently destoryed, while system's standard file
deletion procedures simply de-references data in the filesystem letting
the actual information intact on the support, where appropriate data
recovery software can be used by an attacker to recover data intended
to be erased.
Same function also allows to sanitize entire partitions in order to
clean free (logical) disk space from remanants of data previously
removed by unsecure deletion procedures - standard disk formatting
procedures, similarily to standard deletion functions, by default does
not take care to securely delete actual data on physical support,
favouring speed over security.
When a memory unit (HDD, SSD, usb-key...) get de-commissioned, it is
always a good practice to permanently erase it before, either files and
free space, so un-authorized users cannot take advantage of abandoned
integrity to detect modification
integrity of files, PeaZip supports
detection algorithms ranging from fast
checksums to cryptographically strong
hashes: Adler32, CRC family
eDonkey/eMule, MD4, MD5,
SHA-2 SHA224/256/384/512), and Whirlpool512, in
order to detect file
corruption or forgery that may occour if the data comes from
unreliable sources, such as disks undergoing failures or unreliable
File check may be automatic, as most archiving format supported by
PeaZip stores advanced error detection information in the archive, or
In example, if the hash of a downloaded file is published by the author
of the file it is possible to re-calculate it with PeaZip to assure it
matches with original one, meaning the originally intended file was
actually downloaded without errors and without being replaced or
corrupted by an attacker in any stage of the communication.
While filesystems and communication protocols implement error detection
and error correction algorithms, usually speed is the primary design
goal, menaning more computing intensive controls are generally not an
Detecting files corruption or forgery (purposely crafted modifications
of data to exploit weakness of some simple error detection mechanisms)
as soon as possible avoids to
work on, or backup, inconsistent data, and prevent wasting disk space
for storing unwanted, unreadable files.
attach, and upload files
PeaZip helps sharing
files with other people and synchronize data with
other computers/devices/services, consolidating
composite input files in a single output archive file so data is more
handy to manage
for any purpose and with
any method (as email, ftp or other protocols such as torrents or p2p). Moreover, supporting high
compression algorithms, output file is
usually significantly smaller than the sum of sizes of input files,
saving bandwidth and time both for uploading and downloading the data
The integrated archive conversion function ensure the ability to change
the type of an existing archive, extracting and effectively
re-compressing its content in the desired file format, in order to, in
example, transform old archives (as backup files) into a more up to
date format either for improved compression or better security, or to
be able to share data with users being able to read only a subset of
the archive formats supported by this software.
If a maximum allowed size is
mandatory, in example when attaching a file to a
can (in a single pass) create multiple split
output file parts
(.001, .002, etc), each one smaller than the
desired limit size.
PeaZip automatically detects local paths containing Dropbox, Google Drive, Microsoft OneDrive (formerly known
as SkyDrive) shared files.
Cloud based synchronization platforms allows users to store data on a
remote location that is mutually accessible by different devices owned
by the user, like multiple PCs, smartphones, tablets/phablets, gadgets
basically any device capable to connect to Internet and run the file
synchronization software, which for this reason is usually
multi-platform and can run on Microsoft Windows, Linux / Google
Android or ChromeOS, and Apple
MacOSX / iOS.
PeaZip shows available shared directories in the navigation area (on
the left) of file browser, so shared files are quickly accessible - and
also in compression/conversion and extraction screens, to allow quick
selecting sync folders as target for archiving and extraction
This is especially useful when sharing archive files with mobile or
ultramobile devices and gadgets not
able to run a full featured file archiver (i.e. because some archive
formats or encryption protocols are not supported, or because not
enough powerful for convenient use of strongest compression algorithms,
especially on very large archives, or because no viable freeware
choices are available, or because locked for some policies), but fully
capable to handle the content of the
archive once it is extracted.
Last but not least, archive file content can be scanned for virus /
malware before starting actual extraction of the content, read more
about in-archive malware
scanning with PeaZip.
Read more about backup, cryptography, checksum
and hash algorithm CRC, MD5, SHA, file