Lossless Compression: State of the Art Many More Variants

Total Page:16

File Type:pdf, Size:1020Kb

Lossless Compression: State of the Art Many More Variants Lossless compression: state of the art Many more variants In our lessons we’ve seen some of the most common algorithms for lossless compression Literature and applications present some other algorithms and many more variants Popular applications have proprietary encoding schemes Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 2 State of the art (2005) Windows .zip .Cab .RAR .ACE .7z (7-Zip) Linux .gz (gzip) .bz2 (bzip2) .Z (Compress) Mac .zip .sit (Stuffit) Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 3 zip format - I The ZIP file format was originally created by Phil Katz, founder of PKWARE Katz publicly released technical documentation on the ZIP file format, along with the first version of his PKZIP archiver, in January 1989. Katz had converted compression routines of a previously available archival program, ARC, from C to optimized assembler code He has been processed for for copyright infringement and condemned Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 4 zip format - II Then he created his own file format, and the .zip format he designed was a much more efficient compression format than .ARC In the mid 1990s, as more new computers included graphical user interfaces, some authors proposed shareware compression programs with a GUI The most famous, in Windows environment, is Winzip (www.winzip.com) zip format uses a a combination of the LZ77 algorithm and Huffman coding Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 5 zip format - III In the late 1990s, various file manager software started integrating support for the zip format into the file manager user interface Windows Explorer (Windows Me, Windows XP) Finder (Mac OS X) Nautilus file manager used with GNOME Konqueror file manager used with KDE Today all major desktop environments included zip file support in their file managers Typically, a zip file may be treated as a directory or folder, so that files are copied into and out of it in the same manner as any other folder compression is handled in a way that is largely transparent to the end user 6 RAR format developed by the russian Eugene Roshal proprietary the creator has released source code for decoding RAR archives, under a licence that allows free distribution and modification, but forbids its use to build a compatible encoder (WinRAR - www.rarlab.com) usually slower than zip, but with better compression encription solid archives extra redundancy for archive recovery Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 7 CAB format Microsoft Windows native compressed archive format Allows various compression methods, the most common is based on Lempel-Ziv compression and is very similar to zip format Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 8 ACE format compression performance are generally better than zip, but compression is slower www.winace.com it has some interesting features possibility of encription solid archives ... Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 9 7-zip format - I 7-Zip is an open source file archiver predominantly for the Microsoft Windows operating system, but also for Linux command line program or graphical user interface 7-Zip is free software, distributed under the GNU LGPL license (www.7-zip.org) Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 10 7-zip format - II By default, the program creates files in the 7z archive format (with the file extension .7z) using the LZMA algorithm for compression LZMA is a variant of LZ77 that used Markov chains As all the other archiver seen, it supports a great variety of different formats Uses optimized zip routines that increase compression ratio at cost of some compression speed it is highly customizable Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 11 gzip - format We’ve seen it with some details Gzip (GNU zip) was created by Jean-loup Gailly and Mark Adler, and first released in 1992 Gzip is based on the deflate algorithm, which is a combination of LZ77 and Huffman coding the deflate algorithm and the Gzip file format were standardized respectively as RFC 1951 and RFC 1952 Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 12 bzip2 - format open source data compression algorithm and developed by Julian Seward in 1996 compression is better than gzip, even if considerably slower bzip2 uses the Burrows-Wheeler transform When a character string is transformed by the BWT, the order of the characters are rearranged in a way that make compression easier Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 13 Z format Files that are compressed by the Unix command compress receive the file extension .Z It uses an implementation of LZW compress has fallen out of favor because of the UNISYS and IBM patents covering the LZW algorithm used by it For this reason gzip and bzip2 became more popular Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 14 StuffIt Raymond Lau wrote StuffIt in the 1980s as a high school student Files compressed by StuffIt typically have the filename extension .sitx or .sit StuffIt format is proprietary Quite common in Macintosh environment Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2004-2005 15.
Recommended publications
  • Administrator's Guide
    Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/enterprise/scanmail-for-microsoft- exchange.aspx Trend Micro, the Trend Micro t-ball logo, Apex Central, eManager, and ScanMail are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2020. Trend Micro Incorporated. All rights reserved. Document Part No.: SMEM149028/200709 Release Date: November 2020 Protected by U.S. Patent No.: 5,951,698 This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site: https://www.trendmicro.com/download/documentation/rating.asp Privacy and Personal Data Collection Disclosure Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations.
    [Show full text]
  • ACS – the Archival Cytometry Standard
    http://flowcyt.sf.net/acs/latest.pdf ACS – the Archival Cytometry Standard Archival Cytometry Standard ACS International Society for Advancement of Cytometry Candidate Recommendation DRAFT Document Status The Archival Cytometry Standard (ACS) has undergone several revisions since its initial development in June 2007. The current proposal is an ISAC Candidate Recommendation Draft. It is assumed, however not guaranteed, that significant features and design aspects will remain unchanged for the final version of the Recommendation. This specification has been formally tested to comply with the W3C XML schema version 1.0 specification but no position is taken with respect to whether a particular software implementing this specification performs according to medical or other valid regulations. The work may be used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license. You are free to share (copy, distribute and transmit), and adapt the work under the conditions specified at http://creativecommons.org/licenses/by-sa/3.0/legalcode. Disclaimer of Liability The International Society for Advancement of Cytometry (ISAC) disclaims liability for any injury, harm, or other damage of any nature whatsoever, to persons or property, whether direct, indirect, consequential or compensatory, directly or indirectly resulting from publication, use of, or reliance on this Specification, and users of this Specification, as a condition of use, forever release ISAC from such liability and waive all claims against ISAC that may in any manner arise out of such liability. ISAC further disclaims all warranties, whether express, implied or statutory, and makes no assurances as to the accuracy or completeness of any information published in the Specification.
    [Show full text]
  • Guida-Comprimere-I-Documenti.Pdf
    Guida Comprimere i documenti alvare spazio e gestire me- Questione di spazio Guida glio i file. In sintesi, è questo Per capire bene il funzionamento ai programmi Sil principale vantaggio che di questi programmi e quale sia deriva dall’utilizzo dei program- ancora oggi la loro utilità, bisogna che permettono mi per creare archivi compressi, tenere conto di come si è evolu- ovvero quei software che ci con- ta nel tempo la gestione dei file: di creare archivi sentono di “impacchettare” i file vent’anni fa la memoria di massa compressi che abbiamo sui nostri computer e più economica e diffusa era il flop- ridurre così lo spazio occupato sui py disk (il cosiddetto “dischetto”) salvando spazio dispositivi di archiviazione (cioè, da 1.4 megabyte. Attualmente, la le cosiddette memorie di massa e dimensione dei dischi ottici, del- sul pc. simili). le chiavette usb e degli hard disk N° 39 SETTEMBRE 2013 13 Guida QUATTRO SOFTWARE A CONFRONTO WinAce v2.69 PUNTI FORTI Versione standard 29$ (circa 22 €) Indispensabile per aprire i file in formato Valido Navigando online non è raro imbattersi .ace. in archivi compressi distribuiti in formato anche PUNTI DEBOLI se meno .ace. WinAce non si discosta molto, come funzionalità, dagli altri programmi: legge e L’Interfaccia utente è un po’ più ostica ri- conosciuto crea anche file .zip e legge (ma non crea) spetto agli altri programmi. file in formato .rar. Winrar v4.20 PUNTI FORTI Singola licenza 36 € Interfaccia semplice e immediata; sup- Winrar è la versione per Windows del pro- porta un buon numero formati in lettura È un altro gramma, ma esistono anche versioni per e scrittura.
    [Show full text]
  • Les Extensions Des Fichiers
    OUVRIR TOUS TYPES DE DOCUMENTS Quels logiciels pour quels fichiers? Fichiers_Audio Fichiers_Images Fichiers_Compressés Fichiers_De_Données Fichiers_Exécutables Fichiers_Encodés Fichiers_Exécutables Fichiers_Paramètres Fichiers_Polices Fichiers_Systèmes Fichiers_Texte Fichiers_Web Fichiers_Vidéos Famille de fichiers Fichiers_Audio Extension Programmes associés .aac iTunes/VLC Media Player .acm Ouvert directement par Windows .aif Windows media player/Quick Time/iTunes .asf Windows media player/VLC Media Player .au Windows media player/Quick Time/Real Player .cdr Windows media player/iTune .iff Quick Time .m3u iTunes/VLC Media Player/Real Player/WinAmp .mid ou .midi Quick Time .mp3 iTunes/VLC Media Player/Real Player/WinAmp Windows media player .mpa iTunes/Windows media player/Quick Time .ra Real Player .ram Real Player .Wav iTunes/Windows media player/VLC Media Player .wma Windows media player/navigateur internet/WinAmp Famille de fichiers Fichiers_Images Extension Programmes associés .3dmf Qick Time .ai Adobe Illustrator .bmp Ouverture par Windows .drw Paint shop pro/Picture it .eps GIMP/Irfanview .gif Paint/Irfanview/la plus part des logiciels multimédia .jpg/jpeg La plus part des logiciels multimédia .pdf Acrobat Reader .png Paint/Vista/Acdsee... .psd Adobe Photoshop/ logiciels de traitement image .psp Paint shop pro/divers traitement image .tiff Paint/Irfanview/divers traitement image .svg Flash player/navigateur internet Famille de fichiers Fichiers_Compressés Extension Programmes associés .ace Izarc/Winace/Winrar .arc Izarc/Winace/Winzip
    [Show full text]
  • Installation and Configuration
    6 Jun 2007 Drupal Handbook Table of Contents Installation and configuration . 1 System requirements . 2 Client System Requirements . 3 Javascript . 3 CSS . 4 RSS . 4 Browser Specifics . 4 Browser Popularity . 4 Known Problems . 4 Validation . 4 Caveats . 4 HOWTO: Server requirement recommendations for your consulting clients .. 5 Message to the Client . 5 Benchmark . 6 What Drupal.org runs on . 6 Requirements - older versions . 6 Installing Drupal, modules and themes . 8 Installing Drupal . 8 Formatted Drupal 5.x Installation instructions for better readability .. 13 Installation . 13 Changes . 14 Requirements . 14 Optional Requirements . 14 Installation . 14 Drupal Administration . 16 Customizing your theme(s) . 16 Multi-site configuration . 16 More Information . 17 Formatted Drupal 4.7.x Installation instructions for better readability .. 17 Installation . 17 REQUIREMENTS . 18 SERVER CONFIGURATION . 18 OPTIONAL COMPONENTS . 18 INSTALLATION . 19 1. DOWNLOAD DRUPAL . 19 2. CREATE THE DRUPAL DATABASE . 19 3. LOAD THE DRUPAL DATABASE SCHEME . 20 4. CONNECTING DRUPAL . 20 5. CONFIGURE DRUPAL . 21 6. CRON TASKS . 22 DRUPAL ADMINISTRATION . 22 CUSTOMIZING YOUR THEME(S) . 22 UPGRADING . 23 MORE INFORMATION . 23 i Drupal Handbook 6 Jun 2007 10 minute install using PuTTY SSH/Telnet client .. 23. How I installed Drupal: The Eightfold Way . 24. Installing virtual hosts for Drupal sites and subsites .. 25. Mac OS X-specific guidelines . 26. Important notes for MySQL install: . 27. HOWTO: Create a local server environment for drupal using MAMP .. 28. HOWTO: Installing PostgreSQL and MySQL on the same Mac OS X machine .. 29. Installing Drupal on Mac OS X 10.4 Tiger . 30. Installing and Configuring MySQL . 30. Sending mail . 32.
    [Show full text]
  • Rule Base with Frequent Bit Pattern and Enhanced K-Medoid Algorithm for the Evaluation of Lossless Data Compression
    Volume 3, No. 1, Jan-Feb 2012 ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info Rule Base with Frequent Bit Pattern and Enhanced k-Medoid Algorithm for the Evaluation of Lossless Data Compression. Nishad P.M.* Dr. N. Nalayini Ph.D Scholar, Department Of Computer Science Associate professor, Department of computer science NGM NGM College, Pollachi, India College Pollachi, Coimbatore, India [email protected] [email protected] Abstract: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression ratios of each algorithm on different parameters are processed. To classify the algorithms based on the compression ratio, rule base is constructed to mine with frequent bit pattern to analyze the variations in various compression algorithms. Also, enhanced K- Medoid clustering is used to cluster the various data compression algorithms based on various parameters. The cluster falls dissentingly high to low after the enhancement. The framed rule base consists of 1,048,576 rules, which is used to evaluate the compression algorithm. Two hundred and eleven Compression algorithms are used for this study. The experimental result shows only few algorithm satisfies the range “High” for more number of parameters. Keywords: Lossless compression, parameters, compression ratio, rule mining, frequent bit pattern, K–Medoid, clustering. I. INTRODUCTION the maximum shows the peek compression ratio of algorithms on various parameters, for example 19.43 is the Data compression is a method of encoding rules that minimum compression ratio and the 76.84 is the maximum allows substantial reduction in the total number of bits to compression ratio for the parameter EXE shown in table-1 store or transmit a file.
    [Show full text]
  • Extracting a 19-Year-Old Code Execution from Winrar Introduction | Who Am I?
    Extracting a 19-Year-Old Code Execution From WinRAR Introduction | Who Am I? • I am a vulnerability researcher @ Check Point Research • Worked @ Akamai as a security researcher • Worked @ IBM as a malware researcher • Twitter: @NadavGrossman Introduction | Agenda • Fuzzing 101 • Step-by-Step explanation about the fuzzing process we did • the evolution of our harness / fuzzing process until finding the critical vulnerability • Root cause Analysis • Exploitation process • PoC • Conclusions • Aftermath Introduction | What is WinRAR? • WinRAR is a trialware file archiver utility for Windows • closed source • Developed by RARLAB and first released in 1995 Introduction | What is WinRAR? Introduction | Motivation for the research • Good results from fuzzing Adobe Reader with WinAFL fuzzer Research conducted by @yoavalon and @NetanelBenSimon https://research.checkpoint.com/50-adobe-cves-in-50-days/ Introduction | Motivation for the research • Good results from fuzzing Adobe Reader with WinAFL fuzzer Research conducted by @yoavalon and @NetanelBenSimon https://research.checkpoint.com/50-adobe-cves-in-50-days/ • AFL intended for fuzzing file formats, WinRAR support 17 archive types • WinRAR is popular program and has more than 500M users worldwide • Attractive target, Zerodium offered $100K for an RCE exploit in WinRAR Introduction | Motivation for the research Fuzzing 101 | What Does Fuzzing Mean? • Automated software testing technique that provides to a computer program: • Invalid data • Unexpected data • Random data • The program is monitored for exceptions such as: • Crashes • memory leaks • Failing built-in code assertions Fuzzing 101 | Dumb Fuzzing VS Smart Fuzzing • There are 2 major types of fuzzing: • Dumb Fuzzing = no feedback from the fuzzed program. • Smart Fuzzing = getting feedback on the fuzzed program Fuzzing 101 | Dumb Fuzzing VS Smart Fuzzing • There are 2 major types of fuzzing: • Dumb Fuzzing = no feedback from the fuzzed program.
    [Show full text]
  • Open Rar Free
    Open rar free click here to download 7-Zip is free software with open source. The most of the code is under the GNU LGPL license. Some parts of the code are under the BSD 3- clause License. WinRAR, free and safe download. WinRAR latest WinRAR is a file compression program that can be used to open, create and decompress RAR, ZIP and. Open any RAR file in seconds, for free! New update: Now in addition to RAR, it handles dozens of popular archives, like 7Z, Zip, TAR, LZH, etc. RAR Opener is a . Free RAR files opener, extractor utility. How to open, extract RAR format free, unzip. Work with WinRar archives extraction. Windows, Linux unrar software. Zip, unzip, rar files online. Extract files from archive online, no installation, safe and free. Unzip, unrar decompression in cloud. Uncompress, unzipping tool. Archive Extractor is a small and easy online tool that can extract over 70 types of compressed files, such as 7z, zipx, rar, tar, exe, dmg and much more. WinZip opens RAR files. Use WinZip, the world's most popular zip file utility, to open and extract content from RAR files and other compressed file formats. You cannot put RAR File Open Knife on a portable or flash drive and have it function correctly. However, there is an alternative tool called “RarZille Free Unrar. If you want to create RAR files, WinRAR is your best bet. However, if you just need to extract a RAR file, the free and open source 7-Zip app is a. UnRarX is a free WinRAR- style tool for Mac which allows you to unzip RAR files.
    [Show full text]
  • MULTI-LEVEL ADAPTIVE COMPRESSION TECHNIQUE for PAYLOAD ENCODING in STEGANOGRAPHY ALGORITHMS 1 2 3 Jagan Raj Jayapandiyan , Dr
    MULTI-LEVEL ADAPTIVE COMPRESSION TECHNIQUE FOR PAYLOAD ENCODING IN STEGANOGRAPHY ALGORITHMS 1 2 3 Jagan Raj Jayapandiyan , Dr. C. Kavitha , Dr. K. Sakthivel 1Research Scholar, Dept. of Comp. Science, Periyar University, Salem, T.N, India 2Asst Prof, Dept. of Comp. Science, Thiruvalluvar Govt. Arts College, T.N, India, 3Professor, Dept of CSE, K. S. Rangasamy College of Technology, TN, India Abstract— This research work recommends a method that adaptively chooses the strongest II. STEGANOGRAPHY AND compression algorithms for steganography COMPRESSION encoding amongst several compression methods. A. Steganography Selection of the best method for every secret file type is always based on several factors such as the Steganography can be done in various media type of cover image being used for formats. The method and approach are different communication, size of the secret message being depending on the secret data that are concealed in the transferred, message file type, compression ratio stego-media or cover image. As mentioned in Fig.1, of the shared secret message file, the compression the Steganography type may differ and the same ratio of the secret message to the stego medium, process for encoding and decoding the hidden etc. This proposal provides a holistic solution to message may follow based upon the steganographic handle compression techniques for all the secret data and stego image. message file types. Keywords—Steganography, Compression, ranking, dynamic selection, Information Security I. INTRODUCTION The term Steganography derives from the Greek words "stegos" and "grayfia," meaning "covered writing" or "writing secretly" Steganography is an art and science to camouflage a secret text or data by embedding it in a media file.
    [Show full text]
  • List Software Pengganti Windows Ke Linux
    Tabel Padanan Aplikasi Windows di Linux Untuk Migrasi Selasa, 18-08-2009 Kesulitan besar dalam melakukan migrasi dari Windows ke Linux adalah mencari software pengganti yang berkesesuaian. Berikut ini adalah tabel padanan aplikasi Windows di Linux yang disusun dalam beberapa kategori. Nama Program Windows Linux 1) Networking. 1) Netscape / Mozilla. 2) Galeon. 3) Konqueror. 4) Opera. [Prop] Internet Explorer, 5) Firefox. Web browser Netscape / Mozilla, Opera 6) Nautilus. [Prop], Firefox, ... 7) Epiphany. 8) Links. (with "-g" key). 9) Dillo. 10) Encompass. 1) Links. 1) Links 2) ELinks. Console web browser 2) Lynx 3) Lynx. 3) Xemacs + w3. 4) w3m. 5) Xemacs + w3. 1) Evolution. 2) Netscape / Mozilla/Thunderbird messenger. 3) Sylpheed / Claws Mail. 4) Kmail. Outlook Express, 5) Gnus. Netscape / Mozilla, 6) Balsa. Thunderbird, The Bat, 7) Bynari Insight GroupWare Suite. Email client Eudora, Becky, Datula, [Prop] Sylpheed / Claws Mail, 8) Arrow. Opera 9) Gnumail. 10) Althea. 11) Liamail. 12) Aethera. 13) MailWarrior. 14) Opera. 1) Evolution. Email client / PIM in MS 2) Bynari Insight GroupWare Suite. Outlook Outlook style [Prop] 3) Aethera. 4) Sylpheed. 5) Claws Mail 1) Sylpheed. 2) Claws Mail Email client in The Bat The Bat 3) Kmail. style 4) Gnus. 5) Balsa. 1) Pine. [NF] 2) Mutt. Mutt [de], Pine, Pegasus, Console email client 3) Gnus. Emacs 4) Elm. 5) Emacs. 1) Knode. 2) Pan. 1) Agent [Prop] 3) NewsReader. 2) Free Agent 4) Netscape / Mozilla Thunderbird. 3) Xnews 5) Opera [Prop] 4) Outlook 6) Sylpheed / Claws Mail. 5) Netscape / Mozilla Console: News reader 6) Opera [Prop] 7) Pine. [NF] 7) Sylpheed / Claws Mail 8) Mutt.
    [Show full text]
  • Winhex Manual
    X-Ways Software Technology AG WinHex/ X-Ways Forensics Integrated Computer Forensics Environment. Data Recovery & IT Security Tool. Hexadecimal Editor for Files, Disks & RAM. Manual Copyright © 1995-2007 Stefan Fleischmann, X-Ways Software Technology AG. All rights reserved. Contents 1 Preface ..................................................................................................................................................1 1.1 About WinHex and X-Ways Forensics.........................................................................................1 1.2 Legalities.......................................................................................................................................2 1.3 License Types ...............................................................................................................................3 1.4 Differences between WinHex and X-Ways Forensics..................................................................4 1.5 Getting Started with X-Ways Forensics........................................................................................5 2 Technical Background ........................................................................................................................5 2.1 Using a Hex Editor........................................................................................................................5 2.2 Endian-ness...................................................................................................................................6 2.3
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 7,844,579 B2 Peterson Et Al
    US007844579B2 (12) United States Patent (10) Patent No.: US 7,844,579 B2 Peterson et al. (45) Date of Patent: Nov.30, 2010 (54) SYSTEMAND METHOD FOR (56) References Cited MANIPULATING AND MANAGING 4,041,284 A 8, 1977 Bond (75) Inventors: James C. Peterson, Menomonee Falls, WI (US); Karen L. Peterson, (Continued) Menomonee Falls, WI (US); Yuri Basin, Thiensville, WI (US); Michael J. OTHER PUBLICATIONS Beirne, Chicago, IL (US) Randal C Burns: “Differential Compression: A Generalized Solution (73) Assignee: PKWare, Inc., Milwaukee, WI (US) for Binary Files”, THESIS, Dec. 1996, XP00221 1282. (Continued) (*) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 Primary Examiner John E. Breene U.S.C. 154(b) by 349 days. Assistant Examiner—Thu-Nguyet Le (74) Attorney, Agent, or Firm McAndrews, Held & Malloy, (21) Appl. No.: 11/358,533 Ltd. (22) Filed: Feb. 21, 2006 (57) ABSTRACT (65) Prior Publication Data Certain embodiments of the present invention provide an archive management application that operates within a host US 2006/O143251A1 Jun. 29, 2006 application to provide access to an archive and/or allow access to and/or modification of files in an archive using the Related U.S. Application Data host applications interface, instead of operating as a separate (63) Continuation-in-part of application No. 10/970,897, standalone archive management application. In an embodi filed on Oct. 21, 2004, now abandoned, which is a ment of the present invention, a file archiving system may continuation-in-part of application No. 10/620.960, include a user interface component, a file management com filed on Jul.
    [Show full text]