NanaZip 2.0 Preview 1 for download

NanaZip 2.0 Preview 1 for download
NanaZip 2.0 Preview 1 for download

Kenji Mouri‬, the developer of NanaZip, released another updated NanaZip to the public. This time, it’s version NanaZip 2.0 Preview 1.

It’s a good compression tool you can use on Windows 10 or Windows 11, and it’s even showing up on the good side of the context menu in Windows 11.

NanaZip 2.0 Preview 1 is an open-source file archiver intended for the modern Windows experience, forked from the source code of the well-known open-source file archiver 7-Zip.

You can find the NanaZip file-archiver in the Microsoft Store or on the developer’s GitHub page down below. It’s free to use.

Microsoft Award
Microsoft Award

Changelog for NanaZip 2.0 Preview 1

  • Fix the shell extension issue which cause Everything crashed. (Thanks to No5972, startkkkkkk, SakuraNeko, bfgxp and riverar.)
  • Allow NanaZip to be associated with any file type. (Contributed by manfromarce.)
  • Update 7-Zip to 22.00. (Thanks to Igor Pavlov. Noticed by HylianSteel.)
  • Integrate the following HASH algorithms to NanaZip from RHash and xxHash.
    • AICH
    • BLAKE2b
    • BTIH
    • ED2K
    • EDON-R 224, EDON-R 256, EDON-R 384, EDON-R 512
    • GOST R 34.11-94, GOST R 34.11-94 CryptoPro
    • GOST R 34.11-2012 256, GOST R 34.11-2012 512
    • HAS-160, RIPEMD-160
    • SHA-224
    • SHA3-224, SHA3-256, SHA3-384, SHA3-512
    • Snefru-128, Snefru-256
    • Tiger, Tiger2
    • TTH
    • Whirlpool
    • XXH3_64bits, XXH3_128bits
  • Update Zstandard to 1.5.2.
  • Update BLAKE3 to 1.3.1.
  • Improve the Per-Monitor DPI Awareness support in Windows 10 Version 1607 for Self Extracting Executable stubs.
  • Fix line break issue for i18n resource files. (Thanks to ygjsz.)
  • Enable several security mitigations. (Contributed by dinhngtu.)
    • Enable Control Flow Guard (CFG) to all target binaries for mitigating ROP attacks.
    • Mark all x86 and x64 target binaries as compatible with Control-flow Enforcement Technology (CET) Shadow Stack.
    • Strict handle checks at runtime to block the use of invalid handles.
    • Disable dynamic code generation prevents generating malicious code at runtime.
    • Block loading unexpected libraries from remote sources at runtime.