#62 Re: Off-Topic » Funny Videos and Pics... » 2019-11-07 15:34:13

Look at that first picture, with the guy laying his cables on the carpet like a chump!

Where are his US$8000/each Tahitian Volcanic Clay Cord Elevation Bowls?!??

Literally unlistenable, whatever must be coming out of his speakers...

#63 Re: BF1942 Discussion » List of BF1942 Clans, Communities, Modding Websites and more » 2019-11-04 10:21:01

It seems to let me post the link.  The characters that require Unicode encoding are URL-encoded, but I think that's intentional and expected.  i.e. "%E6%88%98%E5%9C%B0" is in the link instead of "战地", but that still means the correct URL.

https://tieba.baidu.com/f?kw=%E6%88%98% … 2&fr=index

Oh, maybe you have a post count or other "new user" designation on the forum which prevents "posting links" (of any kind).  As a way to prevent spam bots from getting past the registration checks and posting junk.  I'm not sure what Tuia might have setup here for that.

#64 Re: Technical Help » DC+EoD Mods » 2019-10-31 17:20:49

Same on both counts here, Bud.  Sometimes I can ALT-TAB to start up TeamSpeak and get back to the game without it crashing, but it's 50/50 odds.  The desktop remaining at 800x600 upon exit happens less frequently for me.

Unfortunately its a Windows partition I only use for playing games, so upon exit I'm rebooting anyway and haven't cared to investigate.  I do run with DPI set to 150% in that Windows 10 partition, for what it's worth.  It has Tuia's BF1942.EXE installed, for which the installer already sets Windows XP compatibility mode for you.

#65 Re: Technical Help » DC+EoD Mods » 2019-10-30 19:04:33

-=PhaSe3=- wrote:

Thanks guys, I have it running reasonably stable at the moment, the only issue is if I try to press ESC during a game to return to the main menu - it just switches back to desktop and I have to close 1942. I can live with that though, but does anyone else have this problem?

We're also assuming you did everything in the post Tuia linked to, which started with applying Tuia's modified BF1942.EXE.  Indeed, "if I press ESC there is a long hang" was a known symptom of the GameSpy shutdown and the original BF1942.EXE code, which we're assuming is eliminated as a possibility for you by having ensured this updated file is applied.

#66 Re: Technical Help » DC+EoD Mods » 2019-10-29 02:42:04

-=PhaSe3=- wrote:

I'm having trouble remembering the correct method to install DC. Do I need to install 0.7full>DC_Final?

For that one, yes, you want to install .7 first and then the .8 / DC_Final version also.  Downloads and installation screen confirmations in Step 5 & Step 6 of http://ea117.com/dcinstall if helpful.

#67 Re: Technical Help » High Ping - 400/500 » 2019-10-05 00:57:07

I was wrongly thinking of the scoreboard when you said "in-game browser".  Yes, having such a significant ping difference between the multiplayer server browser and the actual in-game ping is additionally unusual.

One thing I can't rule out from the screen shots is that the in-game ping was actually 450 rather than 45.  The ping being 450ms would be more consistent with the 350 shown prior to connecting, and would also be consistent with "it plays very poorly."  Unfortunately I think the only way to definitely know the actual ping is from server tools.

It definitely can be something in your ISP or further out into the network which is slowing this traffic down.  Ping and traceroute give us a sense of "how fast is the communication to a particular physical box over ICMP ports", but doesn't actually exercise "how fast will communication be over port 23000 or 14568 to those same physical hosts."

Does AX allow VPNs?  Just thinking that could be a an alternative to test and see whether bypassing having port 23000 and 14568 traffic directly to and from your computer (and instead having the firewalls and ISP networks only see VPN traffic instead of port 23000 and 14568 traffic) changes anything about what you're seeing.

#68 Re: Technical Help » High Ping - 400/500 » 2019-10-04 22:07:56

Lecter wrote:

Abas, the issue is that the ingame browser it says 450 ping on those servers before I try to connect and in game its 45 (feeling alot of lag, like moving in a swamp) but on tracert all seems well besides that 3rd hop...

That does seem to be the unusual part... your ISP service and network connection "look fine" and otherwise suggests you would indeed have only a 45ms ping.

If the ping is truly going up to 450ms once you're connected and trying to play, my first suspicion is that it's actually your computer which has suddenly become slow upon entering the game; and the network latency measurement is just one of multiple symptoms of this.  If the game itself is not causing some kind of 100% CPU usage on your system, maybe something else like the problems related to GameUX.dll.

Leaving a Command Prompt open ready to traceroute before you start the game, and then ALT-TAB out of game to check traceroute when the game is showing 450ms (without intentionally closing game) could help confirm this.  If the problem is "your computer", all the traceroute hops will now show 350ms+ latency, because the latency measure will already be slow "even on the very first hop outside your own computer."

Lecter wrote:

3  177ms  8ms   7ms   10.137.200.17

I wouldn't read too much into that.  It's saying out of three samples taken from this route (i.e. three separate ICMP Time To Live Expiration messages), the first one took 177ms but the subsequent ones were blazingly fast as expected for only being three hops away from your home.

Because the subsequent hops after this one are "fast" (12ms, 24ms, 25ms, 26ms), this is proof "the hop 3 router isn't actually slow."  Because the traffic to test all of those subsequent hops has to pass through the hop 3 router.  If the hop 3 router was truly sick and adding 170ms+ ping, every subsequent hop would have been shown with a ping over 170ms.  But they don't.

#70 Re: Off-Topic » Name this machine and win a price » 2019-08-10 20:19:56

iCQ wrote:
Sunshine wrote:

It's a water tanker that's pulled behind a truck or a tractor.

Sunshine is VERY close... but missing the weapon part.

Fine.  A weaponized water tanker that's pulled behind a truck or a tractor.  wink

I want to say it's fuel trailer pulled behind a tank to give it extra range, with the hand pump and extra spigots for filling other vehicles and fuel cans.  But none of those connections or spigots appear pointed towards the towing vehicle.

edit: Guess I should say none of the ones we can see in these pictures appear to be for the towing vehicle.  Might just be on the opposite side.

#71 Re: BF1942 Discussion » BF1942 Playable on Website » 2019-08-08 19:13:25

{Phantom} wrote:

Does anyone know how i can get 1942 to run on the server version of windows ( game opens than shuts )

I've never tried to run the game, just the dedicated server.  But I do have Server 2019 setup to run the dedicated server; I've simply never bothered to attempt launching the full game instead.

Even for running the dedicated server, I enable DirectPlay from the legacy features menu, same as you would on a Windows 10 desktop machine.  (Since that's the platform that Server 2016 and 2019 are based on; Windows 10.)  There may still be some assumption that DirectPlay is present, even though dedicated server probably ultimately doesn't utilize it.

I went ahead and tried launching the full game just now; I was able to launch and join the Team-SiMPLE server just fine.  No exit, no hang.

The XP SP3 compatibility mode is set, but simply as one of multiple things that Tuia's battlefield_1942_gamespy_patch_v1.61.exe installer already does for you; whether you manually tried to make those same configuration changes or not.

You probably already did, but it comes to mind that if you hadn't installed Tuia's update yet, you're also still operating with the old DRM protection that Windows intentionally disables.  So you need the no-CD aspect of Tuia's update as well, to eliminate the DRM dependency.

For what it's worth, I'm installing with real Battlefield 1942 CDs.  (And then the 1.6.19 patch, and then 1.61b patch.)   I suppose another possibility, if you're using some unofficial download source, is that the unofficial installer may or may not have planned on successfully handling the Windows Server platform.

But the first two things I would check are: DirectPlay enabled (Windows programs & features control panel; although for Windows Server, that's actually buried in Server Manager add roles & features wizard), and having Tuia's updated BF1942.EXE installed.

#72 Re: Technical Help » Server search causes freezes, aX hosts patch not working » 2019-07-25 22:42:36

bud wrote:

Always worth a try, but i wouldnt hold my breath hmm

Gah... of course you're right, sir.  I didn't think that script was running on the same server as his game servers, but I see I am wrong.  I was like "IP-banned from the master server?  I mean sure, he can do that, by why would he?"

So wow, if nothing else, there's a reason not to get IP-banned from playing on -=Ax=-....

#73 Re: Technical Help » Server search causes freezes, aX hosts patch not working » 2019-07-25 17:29:24

Thundr_pry_brd wrote:
bud wrote:

Sry but it seems that your IP is banned.

Oh well, at least I still have gametracker.

If you try and click on http://94.23.196.155/ in your web browser, do you get to a page that says "It works! This is the default web page for this server."

As opposed to getting a message from your web browser as though the site could not be reached or connection was reset.

Just trying to confirm whether it's truly an IP blocked situation (which I agree with bud it could be), versus some DNS or local HOSTS file issue that is unable to resolve or is taking you to the wrong Ax IP address.

#75 Re: Technical Help » up/down speed per user » 2019-06-04 05:31:05

Same as bud observed, here is our server's throughput when 20 players are on:

ethernet.png

Sending about 2.5x as compared to receiving, and not even close to taxing the throughput cap.

#76 Re: Technical Help » Battlefield 1942 + Expansions » 2019-05-02 06:59:45

Sunndae wrote:

...they wont work unless you have put a REAL bf1942 cd-key for the original bf1942 as the expansions seem to check if the original game also has a valid cdkey.

Hmm, I wonder what they're checking?  There are easily things I wasn't aware of, but the only key verification I was aware of was the now-shutdown Gamespy service.  Wonder if they have check digits like a credit card number or similar, where you can tell whether "the number agrees with itself."

#77 Re: Technical Help » auto kick on AX » 2019-02-23 22:27:47

tuia wrote:

Your internet connection has a very poor routing to SiMPLE server, packets go from Denmark to New York, USA and then to Paris, France.

Jesus.  Sounds like the NSA filed a tracking request with his name on it....  wink

#78 Re: Off-Topic » How old are you? » 2019-02-21 08:35:23

Sunshine wrote:

4.6 billion years old.

You're looking very young for your millennium.  I wouldn't have guessed a day over 3.87.

#79 Re: News and Announcements » Pwned Passwords » 2019-02-10 17:57:00

iCQ wrote:

I personally not see any reason why to encrypt everything. Other than apps like Chrome and such demand you to do it.

It certainly does open up some additional challenges, for seemingly low amounts of benefit in our particular context.  For example, once team-simple.org is being served as HTTPS, now those same user agents like Chrome will decline to show all of the non-HTTPS-linked images and videos that members have included in their messages over the years, because they're being referenced from a "secure" site.

The change would make your username be sent as encrypted from here on out, in addition to the password which was already being weakly encrypted before sending.  And it will make your Private Message content encrypted when posting and reading them.

But "everything else" on the site was already open to the public, and doesn't obviously benefit from "oh good, now prying eyes cannot capture this information unencrypted in transit."  They can simply browse the site as guest to see that same information, encrypted or not.

#80 Re: News and Announcements » Pwned Passwords » 2019-02-08 19:48:18

tuia wrote:

I think it is a very good service by Troy Hunt and I may add this to the forum registration and login pages, with a very simple method:

I thought Google might have picked up on this, too.  But it appears their implementation is separate.  (And in Google fashion, based on even bigger data.)  But they do appear to use a variation of the same "k-anonymity" approach to check your credentials against the list without actually sending even a complete hash.

Google released an extension to check the username and passwords you're entering on any site:
https://support.google.com/accounts?p=password-checkup

Their blog announcement states "If we detect that a username and password on a site you use is one of over 4 billion credentials that we know have been compromised."  To recall, as of January 2019, haveibeenpwned.com currently says it checks against 551 million.
https://blog.google/technology/safety-s … rotection/

Google's Security Blog appears to confirm they do use a similar "send only the prefix" approach which we've been discussing, as confirmed in their included infographic.
https://security.googleblog.com/2019/02 … -data.html

#81 Re: News and Announcements » Pwned Passwords » 2019-01-31 16:04:52

Arkos wrote:

Just add some special symbols to your PW and the hack would take ~5 years or so.

And to the point and topic of this thread, "Not if it exists in this list."

What would have been a brute force effort will be short-circuited by trying a bunch of real-word, known-compromised passwords.  i.e. You might have thought "maG18w@tm3m3" was the most secure password you've been able to remember.  But if someone else thought so too, and their info got compromised, it's in this list of password hackers may be "trying first" rather than taking the normal amount of time to reach that particular combination.

This is not a list of "weak passwords."  It's a list of compromised passwords, as strong or as weak as they may have been.

tuia wrote:

There are passwords: https://api.pwnedpasswords.com/range/4BC4A. But, the rest of the hash is not in that list.

Agreed, and every "bad possibility" is contingent upon "because my password actually is in this list."  If someone in a position to see the Cloudflare logs, or pwnedpasswords.com's own Apache logs, or (what we don't think is happening) pwnedpasswords.com itself was malicious, the issue would be "the user at telcomuser3092.vodaphone.es just looked up the hash 4BC4A.  If we know or can figure out who that is and start looking at his accounts, definitely start with the passwords which had generated the 528 SHA-1 hashes represented by https://api.pwnedpasswords.com/range/4BC4A."

In your case, no harm: Because your password isn't actually in that list that generated these 528 SHA-1 hashes.  Someone who's password is in that list just potentially gave away a hint as to which passwords should be attempted against their accounts first.  A set even smaller and more optimal than "the entire list of compromised passwords."

So maybe that's the end-game here: If you do decide to look up your password here -- either on the web site or using the 5-prefix API -- "commit to it."  Meaning if there is a match, don't ignore or rationalize anything trying to keep your favorite password.  Don't wait.  Immediately change every instance where you had used that password.  Meaning, mitigate the small risk of having shown "a hint" to someone, by making sure that hint will be 100% useless going forward.  The risk only exists by not following through.

Whatever small risk might exist in the technology in play here, the real point is "people are entering their current passwords because a web site asked them to."  This is, literally, the only case I'm aware of where such a prompt wasn't malicious.  The alarm bells in everyone's head should have been deafening; and in terms of social engineering, it would be better if the web site didn't exist.

Having to justify "in this case, there actually is a site into which you should enter all your current passwords" is a terrible, terrible precedent that will be exploited later.

#82 Re: News and Announcements » Pwned Passwords » 2019-01-29 07:11:12

seventy wrote:

Should I change my password now that I have entered it on that website?

Nah, "chances are" everything is fine, same as the normal gambles we take with our identity and financial data every day.

It was just a bit ironic to have a premise of "Hey, we know a bunch of passwords that folks have been tricked into entering into phishing sites or otherwise compromised....  So check whether your important passwords are on this list, by entering your current passwords into this unknown web site."

Even the guy who designed the site said in his v1 implementation,

https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#queryingthedataonline wrote:

...being conscious of not wanting to send the wrong message to people, immediately before the search box I put a very clear, very bold message:

"Do not send any password you actively use to a third-party service - even this one!"

But people don't always read these things. The service got a heap of press and millions of people descended on the site to check their passwords.

All the steps for checking your password locally are for anyone who doesn't want to take the risk, and was not because "we know there is an issue with haveibeenpwned.com."  Everyone should just have a very health skepticism about being asked "please enter your passwords into this site you never heard of before two minutes ago."

#83 Re: News and Announcements » Pwned Passwords » 2019-01-29 03:29:48

Sunshine wrote:

Is that 1password something to look into?

In my opinion, that's simply a sponsor who is helping him pay for the site, and not some assertion that "clearly this is the best way to solve password security."  Presumably they would just like the opportunity to keep their hand in your wallet under the pretense of helping you pick better passwords & having a "secure" place to save passwords that are so strong you can't possibly remember them all.

1Password does claim to be providing other services, such as alerting you when Amazon has had a data breach and guiding you to change your saved Amazon password.  Kind of a "credit monitoring, but for passwords" service.

The end-game of searching this haveibeenpwned.com list is to determine "has someone who is using the same password that I am using had their information captured and compromised before."  It's not really any kind of assertion of whether the password itself was "poor" or "strong", because it could have been compromised by a poor system used for storing or verifying the password.  Which has nothing to do with how strong the password itself was, and means an exceedingly strong password can still be present in this list; not just "bad passwords".

You want to pick exceedingly strong passwords.  After picking an exceedingly strong password, the reason you would search this haveibeenpwned.com list is to make sure you didn't pick an exceedingly strong password which just happens to be a password that is known to have been compromised as part of someone else's data.  ...or maybe even as part of your own data!  smile

#84 Re: News and Announcements » Pwned Passwords » 2019-01-28 22:00:53

YoMama wrote:

That's one long ass message and I'm too lazy to read it

Yeah, we know.  This is how we have been hiding information from you all along. wink

Trench wrote:

So you could download the entire 11GB list from them...

Edit: I was wrong; the list is 22.6GB.  11GB is the 7-Zip archive size.  Notepad++ won't touch anything that size, but Microsoft Windows' built-in findstr.exe utility was able to do it, as was HxD for what it's worth.

#85 Re: News and Announcements » Pwned Passwords » 2019-01-28 21:42:52

I feel like one of those 1960's movie robots with smoke coming out of their ears while repeating "does. not. compute." when trying to reconcile "check whether your current live password has been compromised or not" by asking people to "please enter your password into this web site you've never seen before."

Yes, I have read the process, and understand the math, the API, and how we've been promised that our clear text passwords are "not going to be submitted or logged."  So I should trust what's written on this web site I've never seen before and give it my current passwords?  Cue ear smoke and robotic arm spinning.

So you could download the entire 11GB list from them, generate an SHA1 hash the password yourself (LOCALLY -- not using an online SHA1 hash generator, or else you might as well have gone ahead and entered your password into this site), and search that 11GB list entirely locally without anyone knowing what you did.

If downloading or searching an 11GB list of hashes doesn't sound like fun, the API haveibeenpwned.com provides isn't that bad to use manually, and the k-anonymity approach of sending only a prefix of your SHA1 hash gives "some" sense of not being totally compromised.  You're still providing "an unknown external entity" some hints about what your passwords might be, though.

Regardless of which approach you want to use, the first step is to create an SHA-1 hash of your password, without sending your password to anyone.   If you're on a current version of Windows 10, you can open up a PowerShell command prompt and enter the following two PowerShell commands to generate an SHA1 hash of your password:

[Reflection.Assembly]::LoadWithPartialName("System.Web")
[System.Web.Security.FormsAuthentication]::HashPasswordForStoringInConfigFile("ThisIsMyPassword", "SHA1")

This creates an SHA-1 hash of a UTF-8 representation of your password string.  (Which, troyhunt.com doesn't currently appear to confirm what exact form the passwords were in when he hashed them, but we're assuming UTF-8.)

For example in my case the entry and output of these commands was:

PS C:\Files> [Reflection.Assembly]::LoadWithPartialName("System.Web")

GAC    Version        Location
---    -------        --------
True   v4.0.30319     C:\WINDOWS\Microsoft.Net\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll

PS C:\Files> [System.Web.Security.FormsAuthentication]::HashPasswordForStoringInConfigFile("ThisIsMyPassword", "SHA1")
30B8BD5829888900D15D2BBE6270D9BC65B0702F

So now you have the SHA1 hash, "30B8BD5829888900D15D2BBE6270D9BC65B0702F", that represents the password, "ThisIsMyPassword".

If you downloaded the 11GB offline file, now you can go search the file for that entire hash.

To instead use the k-anonymity approach to invoking the online API, take the first five characters of that SHA1 hash, and add it to the URL https://api.pwnedpasswords.com/range/.  Such as in the case of the "ThisIsMyPassword" example, this would be 30B8B, and the resulting URL is:

https://api.pwnedpasswords.com/range/30B8B

This returns you a list of 527 password hashes that exist in the list, and share these same first five characters in the SHA1 hash.  By searching for the remaining 35 characters in your SHA-1 hash value, you end up seeing that this password exists in the list and has been encountered in the black market data twenty-seven times:

D5829888900D15D2BBE6270D9BC65B0702F:27

So there, that's one way you could check for your passwords in the list, without "entering your password into an unknown third-party web site."  It's still not 100% safe, since even using this approach, if the haveibeenpwned.com site itself -- or someone in a position to know the URLs you have entered -- was actually malicious, you've now narrowed down the list of passwords they should try for your accounts to a list of only 527.

The only way to prevent that is to download the 11GB list yourself and search 100% locally for your SHA-1 hashes.

#86 Re: Off-Topic » Gaming on a Mining Graficcard without Output » 2019-01-18 14:14:33

bud wrote:

I´ve seen they sell mining motherboards cheap to (brand new)

edit: https://www.asrock.com/MB/Intel/H110%20Pro%20BTC+/

Sweet.  Time to build a Plex video streaming server with enough hardware-based transcoding bandwidth to serve my entire neighborhood simultaneously.  Welcome to TrenchFlix.

#87 Re: Technical Help » problems when logging in » 2019-01-13 07:54:53

Arkos wrote:

...
Yes, you need the last Gamespypatch from Oktober 2014. (Depends which version he has, Retail or Origin).

Possibly.  But at least according to tuia, that's why I was pointing to the .EXE patcher instead of the individual .ZIP files.  Because the .EXE patcher contains both the logic and the needed files to detect and patch either a retail (CD) installation or an Origin installation.  The caveat being if you have both installed, it's only going to patch retail (CD) and not the Origin install.

#88 Re: Technical Help » problems when logging in » 2019-01-12 15:34:26

RaketenHorst wrote:

Step one: multiplayer
Step two: internet
Step three: stand still

This does sound like the point in time at which BF1942 would hang when the master server isn't accessible.  i.e. What used to be master.gamespy.com out of the box, and what people now set to master.bf1942.sk now by one of various methods.

So the most likely answer is maybe they just don't have tuia's updated BF1942.EXE applied (which includes switching over to master.bf1942.sk, among other things).  Have them run through applying  http://team-simple.org/download/battlef … _v1.61.exe again.

The other possibility is that they do already have the fix (or one of the other workarounds, like changing their HOSTS file instead of applying a fixed BF1942.EXE), but the symptom is happening because not even master.bf1942.sk is accessible to them right now for some reason.  The hang symptom is going to occur "whenever the master server is inaccessible", which isn't limited to "because they're still trying to talk to the default master.gamespy.com server that shut down years ago."

#89 Re: Technical Help » Internet is "slow" on gigabit internet » 2018-12-17 18:59:47

I'm not going to get in the way of a good excuse to buy a new system.

But if my network throughput improved so significantly by landing in Safe Mode, I would blame the crush of things I have installed or mis-configured in full mode, and would perform a new bare-metal install.  And see what the throughput is after I've installed nothing except Windows and the required hardware drivers.  (You could also just set aside your current hard drive, and do the bare-metal install on a spare drive to see the results without squashing your current Windows installation.)  Safe Mode back-tracks many performance features of Windows, and things shouldn't be improving dramatically.

Also, something you may have already done, but in the Internet and Network control panel where you can see the Change Adapter Settings, right click on your network card and select "Status" to confirm its actually negotiated 1Gbps to the modem/gateway.  Clearly you have gigabit hardware, but the question is whether that's the mode the hardware is actually operating in / has negotiated with the Ethernet port on the modem/gateway.  This can typically also be configured to simply force a lower negotiation in the network adapter properties; so if you do see it's not 1Gbps, look at whether maybe it's configured not to for whatever reason.

On a desktop machine, swapping in a $15 1000base-TX Ethernet card to make sure it's not the built-in port that's failing is an option.  (Or even on a laptop, if you have a USB3 port to keep up with the transfer rate.)  Or just blow the dead crickets out of your current port, and re-connect the cable and assume its good.

#90 Re: Technical Help » can't play » 2018-12-17 18:16:47

aces of the ace wrote:

how do i extract  zip file and then start Setup.exe as admin. (right mouse > run as admin")

The default handling in Windows will simply "open a .ZIP file as though it's a folder".  You will be able to see both the SETUP.EXE and the DATA.BIN file as you would any other folder, but unfortunately just double-clicking on the SETUP.EXE at that point will only extract SETUP.EXE and attempt to run just that file.  Which results in "DATA.BIN not found", because double-clicking on SETUP.EXE did nothing about DATA.BIN or any other files delivered in the same .ZIP.

One approach is you can just "drag" all the files you see out to your own temporary folder on your desktop, so that then you can double-click on SETUP.EXE from that folder, knowing it also has the DATA.BIN and all other files available.  (Right-click and "Run as Administrator" is also fine, although Windows is already going to force that to happen for this SETUP.EXE whether you elect to or not.)

Another way is to simply right-click the .ZIP file you downloaded (not double-click; not open such that you can actually see the files inside the .ZIP file) and select the "Extract" option Windows provides, which by default will offer to extract all the files from the .ZIP into a folder with the same name as the .ZIP file.  Which is helpful, but also unfortunate, because now you have a real folder named the same as the .ZIP.  Which is what you need, but can be more confusing for "am I looking at the contents of the .ZIP, or am I looking at the extracted folder."  Be sure and look at the top "address bar" of Windows Explorer to confirm you're looking at the "real folder" versus  a "folder" that actually ends in ".zip".

Board footer