Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $23,194
28%  
Woo hoo!! And we're now over 28%!! Thank you all very much!! God bless.

Keyword: winrar

Brevity: Headers | « Text »
  • After 20 Years, I've Finally Found a Replacement for WinRAR

    07/31/2025 3:15:04 AM PDT · by Cronos · 20 replies
    How to geek ^ | 30th July 2025 | Nick Lewis
    WinRAR has been such a steadfast part of the Windows experience that its payment model—politely nagging users to buy a license—has become a meme. But after more than 20 years, I've finally found an alternative. What's Wrong with WinRAR? WinRAR is packed with great features, and in the decades I've been using it, I could count on one hand the number of times I've encountered a bug. Unfortunately, it has two things working against it for me. WinRAR's User Interface Is Stuck in the Past To WinRAR's credit, it fully integrates with Windows 11's new(ish) right-click context menu, which is...
  • 19-years-old WinRAR vulnerability leads to over 100 malware exploits (Update Now!)

    03/18/2019 6:04:06 AM PDT · by dayglored · 25 replies
    SlashGear ^ | Mar 16, 2019 | Adam Westlake
    After being a staple on PCs for so many years, last month it was discovered that WinRAR, software used to open .zip archive files, has been vulnerable for the last 19 years to a bug that’s easily exploited by hackers and malware distributors. Fortunately, the software has been patched with the recent release of version 5.70, but after being unchecked for so long and installed by so many people, a new wave of malware is taking advantage. Check Point, the security researchers that revealed the WinRAR bug, explain that the software is exploited by giving malicious files a RAR extension,...
  • Up to 500 million exposed by WinRAR remote code execution vulnerability

    10/02/2015 4:22:09 PM PDT · by Utilizer · 9 replies
    iTnews.com (AUS) ^ | Oct 1 2015 6:35AM (AUS) | Juha Saarinen
    ... A researcher has found a way to exploit popular archival utility WinRAR to remotely execute malicious code on users' computers, without any interaction being required. Iranian researcher Mohammad Reza Espargham found that it was possible to use WinRAR SFX 2.51 to add malicious payloads that would execute when users decompress archives. A specially crafted hyper text mark-up language (HTML) text file that is parsed and which attempts to download and run potentially malicious code can be included in WinRAR SFX archives, Espargham noted. The researcher suggested secure parsing of the text file, and encoding of the URL value parameter...