Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah, not only were they split up into multiple files they used a system to verify there is no corruption and if there is to reconstruct the corrupted files.

http://en.wikipedia.org/wiki/Parchive



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: