TurboZIP Express is a powerful and intuitive, easy to use solution for handling ZIP and CAB files, and file spanning (splitting). In addition to the convenient and colorful toolbar buttons for the most-used operations, the system integrates beautifully with Windows to quickly ZIP, CAB, UnZIP single or multiple files, and more, without even opening up the program. Clear and logical right-mouse menus and drag and drop procedures bring incredible convenience to your fingertips.
Viewing files is a TurboZIP Express forte. A comprehensive list of internal viewing is supported for your favorite word processing, CAD, PDF, image, and multimedia files, including ActiveX, ActiveMovie, DirectX 8.0, and MP3 support, a quick peek is just a click away -- all without ever extracting a single file!
You can open a Zip file, select a text or graphic file inside the Zip, view it, edit it, and then tell TurboZIP Express to automatically save it back to update the contents of the Zip archive for you - all in one action! There are no separate steps to unzip or zip back into the archive. You simply perform your editing in our preview window to update the zipped file.
New features include an enhanced image toolbar, which allows image manipulation right in their zipped state. You can also print images, watch and extract from videos, copy graphics, and open the program that supports the file type. TurboZIP Express also offers advanced features, such as MAPI integration for automatic E-mail attachments, customizable file and disk spanning, password protection, and more, and always keeping in mind of ease of use.
Attention Digital Camera Owners - If you are into Digital Photography, this is the ZIP program that you should use! It not only lets you view, manage and manipulate images from within their zipped state, it also comes with convenient cropping, file spanning and E-mail features. It makes sending and receiving compressed image files as easy as it can be.
Free to try
Windows Server 2008
Efforts to detect fake news are not as advanced as they would appear, given that the best practices so far rely on pattern detection that can itself be exploited by malicious actors, according to new research from MIT.