How to hide rar files in pictures

How to hide rar files in pictures
You can save this logo locally as a .rar file and unzip it to see the effect. I use batch processing, which is simpler and faster.

Copy code
The code is as follows:

copy /b logo.GIF+jb51.rar ok.gif

Many friends have seen such pictures on the Internet. By saving them and changing the extension to rar, you can decompress the files inside. It’s really magical! It’s like Liu Qian performing magic, incredible! Here I will introduce to you how to create this kind of file.

Use WinRAR to compress the files that need to be hidden into a rar file, and then prepare a gif format picture. Next download a hexadecimal file editor called UltraEdit. UltraEdit is a text, Hex, and ASCII code editing software that can edit EXE and DLL files in hexadecimal format.

Our goal is to hide the rar file in a gif file. When others click on this gif file, they will see an image, so that confidential files can be hidden. If you want to check the secrets yourself, you can rename the disguised gif file into a rar file. Click it to start WinRAR and you can see the hidden files inside. You can also run WinRAR first, drag its main window smaller, then use the left mouse button to drag the disguised gif file into the WinRAR window, release the left mouse button, and the confidential file you hid in it will be displayed in WinRAR. Who would have thought that such a big secret could be hidden in a gif image!

After the installation is complete, run UltraEdit and use it to open any gif file prepared in advance. It is recommended that the size of the gif file you choose should not be too small, otherwise the size will increase after adding the rar file. A gif file with a very small image but a very large file size will arouse suspicion from others. After opening the gif file, use UltraEdit to open the rar file which means the confidential file. You will see the hexadecimal code of the file. Press Ctrl+A to select the code of the entire rar file. Press Ctrl+C to copy the codes. Then go to the gif file opened by UltraEdit. Press Ctrl and End to come to the end of the gif file code. Before the last code (the second to last code), press Ctrl+V to insert the code of the rar file you just copied. Click "Save" in the "File" menu. This will merge the gif file and the ZIP file together. Now, no one can know your secrets!

Special note: Do not be smart and add an access password to the rar file you want to hide, otherwise it will not be hidden successfully. Running the hidden gif file will not display the image correctly, and it will not be able to be opened with WinRAR after being renamed as a rar file. Remember this, it is the key to success!

The above is the method of using software. Next, I will talk about a simpler method of using batch processing.

Create a new text file and place it in the directory. Place a picture .jpg and a compressed rar file in the directory.
The content of the text file is: copy /b picture.jpg+compressed package.rar new picture.jpg
For example: copy /b mypicture.jpg+myfile.rar bigtoothcat.jpg
Then change the extension of the text file txt to bat, double-click to run the bat file, and a new picture will be generated. This new picture has the compressed package hidden.
Mypicture.jpg and myfile.rar are connected with a + (plus sign). Note that the order of connection is the picture first and the rar file second. There is a space between the rar and the generated bigtoothcat.jpg. The /b parameter of the copy command indicates binary encoding, which can bundle the compressed file myfile.rar into mypicture.jpg. In fact, the files used for bundling and being bundled are not limited to jpg and rar. You can certainly change them to other file types you want to bundle, but don't use them to bundle viruses or malware, otherwise everyone will punish you.

<<:  Sample code for making desktop applications with vue + Electron

>>:  Summary of MySQL foreign key constraints and table relationships

Recommend

MySQL NULL data conversion method (must read)

When using MySQL to query the database and execut...

Docker time zone issue and data migration issue

Latest solution: -v /usr/share/zoneinfo/Asia/Shan...

Creating a file system for ARM development board under Linux

1. Please download the Busybox source code online...

Linux system repair mode (single user mode)

Table of contents Preface 1. Common bug fixes in ...

MySQL trigger detailed explanation and simple example

MySQL trigger simple example grammar CREATE TRIGG...

The concept of MTR in MySQL

MTR stands for Mini-Transaction. As the name sugg...

How to solve the problem that the project in eclipse cannot be added to tomcat

1. Right-click the project and select properties ...

Solve the group by query problem after upgrading Mysql to 5.7

Find the problem After upgrading MySQL to MySQL 5...

How to check if the firewall is turned off in Linux

1. Service method Check the firewall status: [roo...

Nginx load balancing algorithm and failover analysis

Overview Nginx load balancing provides upstream s...

Vue implements verification code countdown button

This article example shares the specific code of ...

Detailed explanation of how to detect and prevent JavaScript infinite loops

Table of contents Preface Fix infinite loop in fo...

Comparative Analysis of UI Applications of Image Social Networking Sites (Figure)

In our life, work and study, social networks have ...

A brief talk about JavaScript Sandbox

Preface: Speaking of sandboxes, our minds may ref...