- Version 0.5.0.04210
- Download 11
- File Size 1.56 MB
- Create Date April 22, 2018
- Download Limit Exceeded!
Since a newer version was released, Please do not download this version from this page. Please refer app page.
This page is download for File Package App 0.5.0.
You can download it from "DOWNLOAD" link in "Verify CAPTCHA to Download" above. In the "Verify CAPTCHA to Download", if "I am not a robot" is displayed, please check and select the image with instructions. You can download it by selecting the image correctly.
About this version
This is the first release of this application. In this version, we implemented the basic functions as an application to create a self-extracting format EXE file.
Functions as package creation application
- Ability to create a self-extracting EXE file
- One group (root folder) can be specified for files to be packaged
- In addition to temporary folders, you can also specify user folder (such as desktops and document folders) as a place to extract a group item
- Ability to allow the user to select an extracting destination folder at the time of extracting (Displays the folder selection dialog)
It can be used when you specify a folder other than temporary folder as the place to extract. It can be used when you want the user to select the actual deployment place. - Ability to execute file extracted after extraction
When packaging as a self-extracting installer, specify the installer body executed after extraction. You can also specify the document file, so you can also display ReadMe.txt etc. You can also forcibly elevate privileges when executing file. If the executed file, such as the installer, elevates privileges by itself as necessary, you do not need to set "Forced privilege elevation".
Functions of the self-extracting format EXE file created
- Standard functions (It always works regardless of setting at creation time)
- Ability to extract files according to the settings specified at package creation time
- Ability to verify that the package file has not been tampered with and to extract the files if it has not been tampered with
This tamper detection algorithm is simple. Please use digital signature verification function for authentic tamper detection using hash algorithm. - DLL hijacking vulnerability has been addressed in all support OS
- Option functions (They function only when it is enabled with setting at creation time)
- Ability to execute file extracted after file extraction
When packaging as a self-extracting installer, specify the installer body executed after extraction. You can also forcibly elevate privileges when executing file. - Ability to verify digital signature of package file and to extract only if signature is valid
If the package file is in the state "digital signature does not exist", "digital signature is invalid", "file has been tampered with", it will not extract the files. In order to use this function, it is necessary to make a valid digital signature on the created package. - Ability to restrict extraction depending on Windows platform
It is possible to limit the extraction of "extract on 64-bit Windows only" or "extract on 32-bit Windows only". It is usually deployed on both 32-bit Windows and 64-bit Windows platforms if it is not to limit the extraction.
- Ability to execute file extracted after file extraction
- Extended functions (currently available only as an evaluation version)
- When the extended function was used, a message as evaluation version is displayed at startup.
Finally
About the basic functions and option functions, it is verified using long time, but please report us if you find a problem.
In addition to basic functions and optional functions, extended functions are also implemented. Extended functions can be tried as evaluation version. However, the extension function is not so much verified, there is a possibility that there is a bug. We will be saved if you find a bug and report it.
Return to the top page of this app