This article expands on our previous exploration of top command-line archive tools, adding five more powerful utilities to your Linux arsenal. We'll cover their features, options, and practical examples.
6. bzip2: Enhanced Compression
bzip2 leverages the Burrows-Wheeler algorithm and Run-Length Encoding (RLE) for superior compression compared to gzip, creating .bz2
files.
Key Options:
-
-d
: Decompression. -
-z
: Compression (default). -
-k
: Preserve the original file. -
-f
: Force overwrite.
Examples:
Compress: bzip2 myfile.txt
Decompress: bzip2 -d myfile.txt.bz2
Compress & Keep Original: bzip2 -k myfile.txt
7. xz: Exceptional Compression for Large Files
xz utilizes the LZMA2 algorithm, excelling at compressing large files with higher ratios than gzip and bzip2, resulting in .xz
archives.
Key Options:
-
-d
: Decompression. -
-k
: Keep original file. -
-z
: Compression (default). -
-f
: Force overwrite.
Examples:
Compress: xz largefile.dat
Decompress: xz -d largefile.dat.xz
Compress & Keep Original: xz -k largefile.dat
8. zip: Cross-Platform Archiving
zip is a ubiquitous archiving tool, creating single .zip
archives for easy cross-platform sharing.
Key Options:
-
-r
: Recursive archiving of directories. -
-u
: Update existing archives. -
-d
: Delete files from the archive. -
-m
: Move files into the archive, deleting originals.
Examples:
Create Archive: zip myarchive.zip file1.txt file2.jpg
Compress Directory Recursively: zip -r myarchive.zip mydirectory/
Extract: unzip myarchive.zip
9. rar: Robust Archiving with Advanced Features
rar, a proprietary utility, is known for its strong compression of large files and supports password protection and multi-volume archives.
Key Options:
-
a
: Add files. -
x
: Extract files. -
v
: Create multi-volume archives. -
p
: Set a password.
Examples:
Create Archive: rar a myarchive.rar document1.pdf image1.png
Extract: rar x myarchive.rar
Create Password-Protected Archive: rar a -p myarchive.rar importantdata.txt
10. 7z (7-Zip): High-Compression Powerhouse
7z employs the LZMA algorithm for superior compression, generating .7z
files.
Key Options:
-
a
: Add files. -
x
: Extract files. -
l
: List archive contents. -
d
: Delete files from the archive.
Examples:
Create Archive: 7z a myarchive.7z datafile1.db config.ini
Extract: 7z x myarchive.7z
Conclusion
This expanded list provides a comprehensive set of command-line archiving and compression tools for Linux. Each tool offers unique strengths; select the best fit for your specific needs. Check back for more Linux tutorials!
The above is the detailed content of 5 Advanced Command Line Archive Tools for Linux - Part 2. For more information, please follow other related articles on the PHP Chinese website!

Linux'scommandlinecanbemoresecurethanWindowsifmanagedcorrectly,butrequiresmoreuserknowledge.1)Linux'sopen-sourcenatureallowsforquicksecurityupdates.2)Misconfigurationcanleadtovulnerabilities.Windows'commandlineismorecontrolledbutlesscustomizable,with

This guide explains how to automatically mount a USB drive on boot in Linux, saving you time and effort. Step 1: Identify Your USB Drive Use the lsblk command to list all block devices. Your USB drive will likely be labeled /dev/sdb1, /dev/sdc1, etc

Cross-platform applications have revolutionized software development, enabling seamless functionality across operating systems like Linux, Windows, and macOS. This eliminates the need to switch apps based on your device, offering consistent experien

Artificial Intelligence (AI) is rapidly transforming numerous sectors, from healthcare and finance to creative fields like art and music. Linux, with its open-source nature, adaptability, and performance capabilities, has emerged as a premier platfo

Looking for a fast, minimal, and efficient Linux distribution without a graphical user interface (GUI)? Lightweight, GUI-less Linux distros are perfect for older hardware or specialized tasks like servers and embedded systems. They consume fewer res

Wine 10.0 stable version release: Running Windows applications on Linux to a higher level Wine, this open source and free application, allows Linux users to run Windows software and games on Unix/Linux operating systems, ushering in the release of the 10.0 stable version! This version has been provided with source code and binary package downloads, and supports various distributions such as Linux, Windows and Mac. This edition embodies a year of hard work and over 8,600 improvements, bringing many exciting improvements. Key highlights include: Enhanced support for Bluetooth devices. Improve support for HID input devices. Optimized performance of 32-bit and 64-bit applications.

This tutorial guides you through installing SQL Server 2022 on RHEL 8.x or 9.x, connecting via the sqlcmd command-line tool, database creation, and basic querying. Prerequisites Before beginning, ensure: A supported RHEL version (RHEL 8 or 9). Sudo

Mozilla Thunderbird 135: Powerful cross-platform mail client Mozilla Thunderbird is a free, open source, cross-platform email, calendar, news, chat and contact management client designed to efficiently handle multiple email accounts and news sources. On February 5, 2025, Mozilla released the Thunderbird 135 version, introducing a number of new features, performance improvements and security fixes. Thunderbird 135 main features: XZ Packaging for Linux Binaries: Smaller files, faster unpacking, and better integration with modern distributions. Cookie storage support: when creating space


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

Dreamweaver CS6
Visual web development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
