Solved

Arj decompression

Posted on 1998-04-24
5
516 Views
Last Modified: 2008-02-01
Hi,

I've downloaded  files that are arj compressed -- file.arj, file.a01, file.a02, file.a03 etc.  What is the best way to decompress them? Currently I'm using the following Dos syntax:
arj e file.a*

I'm running into problems since one of them file.a88 doesn't get decompressed and I get an error message about a corrupt CRC header. Basically my question is, is there a "natural" order for decompressing arj files?

Thanks
0
Comment
Question by:anony
  • 3
  • 2
5 Comments
 
LVL 1

Accepted Solution

by:
thedark earned 50 total points
ID: 1009133
For .a* files, use the format...

ARJ x -v firstfileinsequence.arj and it'll progress on its own.

If you continue to get errors, the ARJ #88 is bad and needs to be redownloaded.

Bad files are *very* common in the illicit software industry, which is probably the only place you'll ever see .A(x)(x) files.

Also make sure you scan such illicit files.  Use McAfee Virus Shield at all times.
0
 

Author Comment

by:anony
ID: 1009134
Here's the problem:
I have files named as file.a01,file.a02,......,file.a17.
+
file.arj

How do I know which file to decompress first -- that is, where does "file.arj" fall in the sequence?

Thanks
0
 
LVL 1

Expert Comment

by:thedark
ID: 1009135
file.arj is the first file in the sequence.  Go to DOS and in the directory you have file.arj in, type this:

ARJ x -v file.arj c:\directory-you-want-files-in

This will automatically undo all the a01 and a02's etc files as well.
0
 

Author Comment

by:anony
ID: 1009136
Thanks a lot -- it worked fine.

anony
0
 
LVL 1

Expert Comment

by:thedark
ID: 1009137
Glad to help.
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question