Content deleted Content added
leet |
reorg |
||
(9 intermediate revisions by 9 users not shown) | |||
Line 7:
| mime = application/x-ace-compressed
| owner = e-merge GmbH
| released = {{start date and age|1999|7|22}}
| creatorcode =
| genre = [[data compression]]
Line 25 ⟶ 26:
An older version of an Unace 1.2b is [[free software]] and licensed under the [[GNU General Public License|GPL]] by the author Marcel Lemke, but it cannot extract ACE archives from version 2.0 and newer.<ref>{{cite web|url=https://packages.debian.org/stable/utils/unace|title=unace: extract, test and view .ace archives|website=Debian}}</ref>
A newer version of Unace 2.5 that supports ACE 2.0 archives is available under a restrictive
An older, independent [[
Since 2017, there is a [[BSD licenses|BSD licensed]] [[Python_(programming_language)|python]] module and [[Command-line_interface|CLI]] utility by Daniel Roethlisberger, that supports unpacking of ACE 2.0 format archives.<ref>{{cite web|url=https://pypi.python.org/pypi/acefile|title=acefile: Read/test/extract ACE 1.0 and 2.0 archives in pure python|website=PyPI|access-date=2019-03-09}}</ref>
Line 35 ⟶ 36:
==Use for malware distribution==
Since at least 2015, ACE archives have been used to deliver [[malware]] to victims by e-mail. This tactic was viable because popular [[File_archiver|archiving software]] was able to uncompress ACE archives, but support for the ACE format in security products such as [[Email_filtering|mail filters]], [[Content-control_software|web content filters]], and [[Antivirus_software|anti-virus software]] was generally weak.<ref>{{cite web|url=http://blog.frankleonhardt.com/2015/malware-sent-in-ace-format/|title=Malware sent in .ace format|website=Frank Leonhardt's blog|date=5 October 2015 |access-date=2019-03-09}}</ref><ref>{{cite web|url=https://exchange.xforce.ibmcloud.com/collection/Spammers-discover-the-7z-archive-format-for-spreading-ransomware-1b8e1aad140a017769c7eba02f500747|title=Spammers discover the 7z archive format for spreading ransomware|website=IBM X-Force Exchange|access-date=2019-03-09}}</ref><ref>{{cite web|url=https://medium.com/@seifreed/how-to-deal-with-ace-malware-files-592eb52e7135|archive-url=https://archive.today/20191024094243/https://medium.com/@seifreed/how-to-deal-with-ace-malware-files-592eb52e7135|url-status=dead|archive-date=October 24, 2019|title=How to deal with .ACE malware files?|website=Marc Rivero López' blog|date=24 January 2017|access-date=2019-03-09}}</ref>
==Security vulnerabilities==
In February 2019 several major security vulnerabilities were found in the unacev2.dll library which is used by [[WinRAR]] and other archiving products. Since WinACE support is
==See also==
Line 44 ⟶ 45:
*[[Comparison of file archivers]]
*[[List of archive formats]]
==References==▼
{{Reflist}}▼
==External links==
* [https://web.archive.org/web/20170714193504/http://winace.com/ Official Website - Web Archive Snapshot from 14.07.2017] {{
* [https://web.archive.org/web/20110121225116/http://www.winace.net/files/wace269i.exe Download link for last Version 2.69i - Web Archive Snapshot from 21.01.2011]
▲==References==
▲{{Reflist}}
{{Archive formats}}
|