Detecting the version of WinZip from within Access

Posted on 2008-11-11
Last Modified: 2012-05-07
I have a small function in my Access database that allows the client to send me the back end, via a  WinZip file.  It uses the WinZip command line add-on.

I need to find a way through the registry to detect :

1) If Winzip is installed
2) If the command line add-on is installed
3) If it is registered or unregistered

Any help would be appreciated.
Question by:Andy Brown
    LVL 84
    You can read these registry keys:

    My Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Nico Mak Computing\WinZip\WinIni

    There are several values in there you could use:

    SN or SN1 - I presume one of these is the Serial Number, obviously if not present you would have a non-registered version
    win32_version - this would tell you the version

    I'm not sure about the CommandLine utility ... I don't have it installed, so can't tell. You might also contact Nico Mak for this information, and for the legality of using WinZip in this fashion.
    LVL 74

    Expert Comment

    by:Jeffrey Coachman

    Also note that this functionality (Zip, compressed files) is built into Windows XP (as a Compressed Folder)

    So there is less and less need for anyone to buy/install Winzip.


    Author Comment

    by:Andy Brown
    But you can't create a zip file from a command line prompt using XP compression (or can you)?
    LVL 84

    Accepted Solution

    To me, the correct way to do this would be to include some sort of zip utility with your application. Depending on the enduser to have a specific version of a specific program is pretty much a guarantee for failure. Here's a library that can be used with VBA, although the walkthrough here is for VB (should port over directly, however):

    There are others out there as well ... Polar Software has a zip component that works with Access, for example.

    Author Closing Comment

    by:Andy Brown
    That's a great idea.  Thank you everyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    Suggested Solutions

    In the previous article, Using a Critera Form to Filter Records (, the form was basically a data container storing user input, which queries and other database objects could read. The form had to remain op…
    I originally created this report in Crystal Reports 2008 where there is an option to underlay sections. I initially came across the problem in Access Reports where I was unable to run my border lines down through the entire page as I was using the P…
    Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…
    With Microsoft Access, learn how to specify relationships between tables and set various options on the relationship. Add the tables: Create the relationship: Decide if you’re going to set referential integrity: Decide if you want cascade upda…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now