Solved

SQZ file

Posted on 2010-09-04
5
1,006 Views
Last Modified: 2013-12-09
The file appears to be a compressed file with an sqz extension.  Does anyone know what utility could be used to open this file?
0
Comment
Question by:charismatic100
  • 3
  • 2
5 Comments
 
LVL 28

Expert Comment

by:sunnyc7
ID: 33603498
How large is the file ?
If its a big one - trying opening by media player

SQZ can be a squeeze extension
http://www.cs.arizona.edu/projects/squeeze/

I usually do this for unknown file types
Save the file on desktop.

start > run > notepad
drag and drop the file in notepad
Go through the file of characters and try to spot something familiar / app-ext

0
 

Author Comment

by:charismatic100
ID: 33603793
It is only 178kb.
I am able ot open using notepad.  First line says foxsqz compressed file.
0
 
LVL 28

Accepted Solution

by:
sunnyc7 earned 500 total points
ID: 33603801
these are 16 bit foxpro compressed files.
Might be some old application ?

How did you get it ?
0
 

Author Comment

by:charismatic100
ID: 33604692
File was on client's floppy drive.  She does not remember how she got it.  Timeframe sometime early 2004 maybe.  However, it appears that she knew how to extract the information at the time.

"Might be some old application?"  Dead on!
 
I have been reviewing this file and have discovered that at the time, the information contained within the file was exported into Ultimate Family Tree 3.0.  She does not have that program anymore, but did still have the old hard drive that Ultimate Family Tree 3.0 was installed on.  After correcting a hard drive recognition issue, I was able to access the old hard drive and run the program.  Imported the data file into Ultimate Family Tree 3.0.  Then converted to GEDCOM format to be exported to the current Family Tree Maker program that she is using.
0
 

Author Closing Comment

by:charismatic100
ID: 33604693
Thank you sunnyc7!
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
To show how to create a transport rule in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Rules tab.:  To cr…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now