Page 1 of 5

Old Iron versions - official archive - here!

Posted: Wed Sep 24, 2014 4:41 pm
by SRWare
By popular demand, we have created an official archive of old Iron versions. Due to unpatched vulnerabilities we do not recommend the use.

Link:
http://download1.srware.net/old/

Re: Old Iron versions - official archive - here!

Posted: Fri Sep 26, 2014 2:11 pm
by Hotcakes
This is the best thing ever. Good on you. About time! But good on you :)

Re: Old Iron versions - official archive - here!

Posted: Tue Sep 30, 2014 10:05 am
by XtremeRampage
Thank you very much. Some folk like classic items, I guess including classic version of internet browser :D

Also, a tip for anyone who wanted to install Chrome extensions on the older SRWare Iron version (like I did with Iron version 27.0):
markaz wrote:One thing to keep in mind is that Google is more than aware that non-Chrome users are still able to access extensions and are taking measures to plug every loophole. Their newest one is the creation of a _metadata file that is part of a download and not "installed" in the User Data directory. Here's the newest message that appears in Iron when trying to install a .crx extension downloaded from the Webstore using the Downloader:
Image
In looking at the .crx file name there is no "_" at the beginning of the name, so it's their recently added _metadata. I know no nothing about coding, but do wonder if this "barrier" is one that Iron developers could address. Dunno. What are a couple of the extensions you'd like to get? I want to see if I'm able to get them installed.
XtremeRampage wrote:I think I discovered from ABP forum a way to "fool" the Chrome developers shady attempt to forbid old extensions/chrome users:
https://adblockplus.org/forum/viewtopic ... 6&start=15
change the extension from crx to zip

Then un-zip file the file locally. ==> in a folder
In chrome, go to the extensions page (tools -> extensions), select the 'Developer mode' checkbox
Click the "Load unpacked extension..." button
Navigate to the location of the unzip ABP extension folder. and select it.
ABP extension should load.
In my case, I tried to install an extension using above method but SRWare Iron still "unable" to accept the extension. The workaround is that I rename the folder contained within the unzipped extension (e.g: _metadata to metadata) before clicking the "Load unpacked extension..." button.

:ironvschrome
Again, thanks a lot to SRWare Iron team :ironvschrome

Re: Old Iron versions - official archive - here!

Posted: Thu Feb 26, 2015 5:06 pm
by Azrael5
where are possible to download 37-38-39 previous versions?

Re: Old Iron versions - official archive - here!

Posted: Thu Mar 12, 2015 6:55 am
by lylejk
Can always get them at Sourceforge. Had to get 2150 since I had a flash issue. :)

http://sourceforge.net/projects/srwarei ... rce=navbar

Re: Old Iron versions - official archive - here!

Posted: Mon Mar 16, 2015 11:06 am
by SRWare
Azrael5 wrote:where are possible to download 37-38-39 previous versions?
Updated, now online

Re: Old Iron versions - official archive - here!

Posted: Mon May 04, 2015 7:59 pm
by blu08marlin
SRWare wrote:
Azrael5 wrote:where are possible to download 37-38-39 previous versions?
Updated, now online
Thanks for updating the older versions. Downloading.

Re: Old Iron versions - official archive - here!

Posted: Sat Aug 29, 2015 5:21 pm
by dwadefan45
Which one will allow me to watch twitter videos?

Re: Old Iron versions - official archive - here!

Posted: Fri Sep 18, 2015 7:37 pm
by abd38
When i returned from v.43 to v.39 i see this window
http://hostingkartinok.com/show-image.p ... 0f964a273a
Explain, please, what exactly im must to do? (win 7)

Re: Old Iron versions - official archive - here!

Posted: Sun May 01, 2016 1:00 am
by bugman
Anyone have a working sourceforge link for versions 37~39 ? (32bit)

I am still skeptical if versions past 39 are truly secure against google 's snooping. IIRC google made some "under their breath" changes starting with the chromium 4x base that really need to be looked at in detail.

....And yes, i'm aware of the ongoing remote exploit.