How to hide rar files in pictures

How to hide rar files in pictures
You can save this logo locally as a .rar file and unzip it to see the effect. I use batch processing, which is simpler and faster.

Copy code
The code is as follows:

copy /b logo.GIF+jb51.rar ok.gif

Many friends have seen such pictures on the Internet. By saving them and changing the extension to rar, you can decompress the files inside. It’s really magical! It’s like Liu Qian performing magic, incredible! Here I will introduce to you how to create this kind of file.

Use WinRAR to compress the files that need to be hidden into a rar file, and then prepare a gif format picture. Next download a hexadecimal file editor called UltraEdit. UltraEdit is a text, Hex, and ASCII code editing software that can edit EXE and DLL files in hexadecimal format.

Our goal is to hide the rar file in a gif file. When others click on this gif file, they will see an image, so that confidential files can be hidden. If you want to check the secrets yourself, you can rename the disguised gif file into a rar file. Click it to start WinRAR and you can see the hidden files inside. You can also run WinRAR first, drag its main window smaller, then use the left mouse button to drag the disguised gif file into the WinRAR window, release the left mouse button, and the confidential file you hid in it will be displayed in WinRAR. Who would have thought that such a big secret could be hidden in a gif image!

After the installation is complete, run UltraEdit and use it to open any gif file prepared in advance. It is recommended that the size of the gif file you choose should not be too small, otherwise the size will increase after adding the rar file. A gif file with a very small image but a very large file size will arouse suspicion from others. After opening the gif file, use UltraEdit to open the rar file which means the confidential file. You will see the hexadecimal code of the file. Press Ctrl+A to select the code of the entire rar file. Press Ctrl+C to copy the codes. Then go to the gif file opened by UltraEdit. Press Ctrl and End to come to the end of the gif file code. Before the last code (the second to last code), press Ctrl+V to insert the code of the rar file you just copied. Click "Save" in the "File" menu. This will merge the gif file and the ZIP file together. Now, no one can know your secrets!

Special note: Do not be smart and add an access password to the rar file you want to hide, otherwise it will not be hidden successfully. Running the hidden gif file will not display the image correctly, and it will not be able to be opened with WinRAR after being renamed as a rar file. Remember this, it is the key to success!

The above is the method of using software. Next, I will talk about a simpler method of using batch processing.

Create a new text file and place it in the directory. Place a picture .jpg and a compressed rar file in the directory.
The content of the text file is: copy /b picture.jpg+compressed package.rar new picture.jpg
For example: copy /b mypicture.jpg+myfile.rar bigtoothcat.jpg
Then change the extension of the text file txt to bat, double-click to run the bat file, and a new picture will be generated. This new picture has the compressed package hidden.
Mypicture.jpg and myfile.rar are connected with a + (plus sign). Note that the order of connection is the picture first and the rar file second. There is a space between the rar and the generated bigtoothcat.jpg. The /b parameter of the copy command indicates binary encoding, which can bundle the compressed file myfile.rar into mypicture.jpg. In fact, the files used for bundling and being bundled are not limited to jpg and rar. You can certainly change them to other file types you want to bundle, but don't use them to bundle viruses or malware, otherwise everyone will punish you.

<<:  Sample code for making desktop applications with vue + Electron

>>:  Summary of MySQL foreign key constraints and table relationships

Recommend

The difference between MySQL count(1), count(*), and count(field)

Table of contents 1. First look at COUNT 2. The d...

Detailed tutorial on installing Docker on CentOS 7.5

Introduction to Docker Docker is an open source c...

Detailed explanation of three solutions to the website footer sinking effect

Background Many website designs generally consist...

How to support full Unicode in MySQL/MariaDB

Table of contents Introduction to utf8mb4 UTF8 by...

Docker custom network detailed introduction

Table of contents Docker custom network 1. Introd...

Mysql database design three paradigm examples analysis

Three Paradigms 1NF: Fields are inseparable; 2NF:...

Detailed explanation of as, question mark and exclamation mark in Typescript

1. The as keyword indicates an assertion In Types...

Detailed explanation of this pointing in JS arrow function

Arrow function is a new feature in ES6. It does n...

HTML form component example code

HTML forms are used to collect different types of...

MySQL index principle and usage example analysis

This article uses examples to illustrate the prin...

How to implement import and export mysql database commands under linux

1. Export the database using the mysqldump comman...

How to implement Mysql scheduled tasks under Linux

Assumption: The stored procedure is executed ever...

How to configure VMware virtual machine NAT mode

This article describes the VMware virtual machine...

Mysql some complex sql statements (query and delete duplicate rows)

1. Find duplicate rows SELECT * FROM blog_user_re...

Commonly used JavaScript array methods

Table of contents 1. filter() 2. forEach() 3. som...