Menu:
Preview |
Features |
How to Run |
About
The Updater with Blake hash algorithm has been carefully designed to ensure a smooth and efficient update process for GunBound GitzWC. The updater is written in Pascal and compiled with Delphi, and it has been extensively tested on over 3,000 computers worldwide.
One of the key features of this updater is its support for threads, which allows for smooth file downloads without freezing the user interface. This means that users can continue to use their computers without interruption while the updater does its work.
The Delphi Updater also supports compressed ZIP files with passwords, which can be particularly useful in avoiding antivirus software issues during the download process. The extraction process is fast, but users may be able to achieve even better results by changing the compression algorithm.
The Updater also extract the ZIP sucessfully (all with progress bars!)
To ensure that only the necessary files are updated, the Delphi Updater uses a file called "filelist.dat" which contains the names, sizes, and Blake-256 hashes of all the files required for the update. The updater compares the hashes of the files in the client folder with those in the filelist.dat file to ensure that the files are up-to-date and unmodified. This feature ensures that the update process is not only efficient but also secure.
In order to ensure that files are up-to-date, the Delphi Updater uses the fast and accurate Blake-256 algorithm to calculate hashes.
The Blake-256 hash algorithm is a cryptographic hash function that produces a 256-bit hash value. It was created by Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian Winnerlein. The algorithm is named after one of the creators, Jean-Philippe Aumasson's, newborn son Blake.
The Blake-256 algorithm is known for its speed and security. It has been extensively analyzed and tested, and is widely regarded as a secure and reliable hash function. The algorithm uses a combination of cryptographic techniques, including keying, message padding, and data compression, to produce its hash values.
In the context of the Updater, the Blake-256 hash algorithm is used to ensure the integrity and authenticity of the downloaded files. When a file is downloaded, the Delphi Updater calculates the hash value of the file using the Blake-256 algorithm. The calculated hash value is then compared to the expected hash value stored in the filelist.dat file. If the calculated hash value matches the expected hash value, the file is deemed to be authentic and can be installed. If the hash values do not match, the file is considered to be corrupt or tampered with, and the updater will not install it.
Overall, the Blake-256 hash algorithm is an excellent choice for ensuring the security and integrity of downloaded files. Its speed and reliability make it a popular choice in a variety of applications, including the Delphi Updater used in GunBound GitzWC.
In summary, the Delphi Updater with Blake hash algorithm is a powerful tool for updating files efficiently and quickly. Its support for threads and compressed ZIP files with passwords make it an excellent choice for anyone who wants to avoid issues that may arise during the download process, such as antivirus software problems.
The Delphi Updater supports a custom background image for the updater interface. If the image file exists in the same folder as the updater executable, it will be loaded and displayed as the background. This feature adds a nice touch of customization to the updater.
The updater is able to kill specific processes before updating, which helps to ensure that there are no conflicts or issues with running programs. The following processes are targeted: "GitzGame.exe," "NyxLauncher.exe," "UpdaterReplacer.exe," and "GbSet.exe." Killing these processes helps to ensure a smooth update process.
The updater have support in English, Portugues and Spanish languages and it's very easy to add more languages.
The updater also has the ability to delete files before updating, which can be useful in ensuring that old files are not left behind. The following files are deleted: ".tmp," ".bak," "*.gp," "replacelist.dat," and "filelist.dat."
If the updater.ini file does not exist in the same folder as the updater executable, the updater will create it and save it. This file is used to configure the updater settings, such as the FTP host, user credentials, and update files.
To run this applications, you must have Delphi 7 installed in your computer.
Read more about how to Install Delphi here: https://www.embarcadero.com/br/products/delphi/starter/free-download
Additionally, this program requires the installation of the ABBREVIA component package to use the AbUnzipper.
This package is provided in the repository and can be found at
..\Abbrevia\packages\Delphi 7\Abbrevia.dpk.
To install ABBREVIA in Delphi, follow these steps:
-
Open ALL ABBREVIA packages (dpks) located in
..\Abbrevia\packages\Delphi 7\
folder in Delphi and to each one do the following steps:
Once the ABBREVIA package is installed, you should be able to run the program without issue. If you encounter any problems, please open an issue.
The filelist.dat file is used to store the names, sizes, and hashes of all the files required for the update. The filelist.dat file is used by the updater to ensure that only the necessary files are updated. The filelist.dat file is a text file that contains the following information:
- File name
- File size
- File Hash
Using the following format: Name#Size;Hash
The separator is the # for the name and size, and the ; for the hash.
The Size must be specified in bytes.
If size is not correct, the file will not be successfully updated.
Example (GITZWC):
UpdaterReplacer.exe#206025;aQ5c7aoRuH/Y3wbH8eepu1mbwAYt9XMAA+/zdkw7at8=
Updater.exe#1372200;/d1A0D9llGbUuFdlt5VpPMiX9048fI56FiajD0jyxf4=
launcher.dll#1084968;mGgy0cRVemVRbI5q6GeosLXunFslIa/cRDELAJXMuWk=
npqcrypt.dll#300266;7SSGRTvrHRJbE7u6mpevsXvai4xp13ggHRmXcHE5fwg=
NyxLauncher.exe#1168473;Whxr1xlRJpvo9IgOuNC2DQ9YLB0gaBRVc7AQwiL1IDY=
GunProtect.exe#435400;DRb4QED52OFnjRmG1oKT24E6/uRb9zdO39a3+9bKvYQ=
gitzgame.gme#5247528;rV9ls13yodoW/tr8XnaewuHK23o3v28j1CpwHnV2QJU=
GProtect.dll#9594160;0+NWuL+n9FZUJVyihReGs0WWL0Uqf9E9mRonA5/3Ujo=
GunProtectBG.png#342269;hyW4NFN02XvQ1Ts6L+CMT1WW0JB0BZM4zoQ4f6NmkW8=
NyxLauncher.dll#1168473;XmH6pfh8NMam0Vt8V3yyF+Orf1O2uw9h4cJlv/RvS28=
GitzWindowMode.dll#67624;TTSzyi2y9w0/ItH7lkjSSzvPlE4wHJurcyvp24yhKqA=
wndmode.ini#429;SwX5jdT8uCSiYh6cc2Kqd9sTZDVqNSzBdGysHDVM7yg=
dxwnd.dll#1164930;WUErEP6e5NiM1CUVhhO4VkDcVb51QwnyvhuwLPREfKw=
GbSet.exe#2821936;rUrguiZfQIv6iXMHHXtDkT3dna14EBSb19deLkUQVgw=
I included the official Blake-256 hash generator in the repository(filelist Hash Generator, inside bin folder), but you can use any other hash generator to generate the hashes.
To generate the hashes, you need to use the Blake-256 algorithm and encode the hash in base64.
There's probably tons of other online file hash generators you can use, such as this one: https://toolkitbay.com/tkb/tool/BLAKE2s_256
I'm a Lifelong learner, software developer, I study economy, blockchains, tech, astronomy and history. Intelectually generalist, I have interests in many fields of science.