How to hide a file secret in an image

Source: Internet
Author: User

Comments: Everyone has their own secrets, but some friends like to put them in the computer as files for their appreciation. Although these "secrets" are mostly encrypted on computers, some of them can only prevent cainiao from cracking and cannot achieve the purpose of truly hiding them. So I thought for a long time and finally found that using a JPG image can hide the secret of the file. Everyone has their own secrets, but some friends like to keep the secret, put the file in the computer for your appreciation. Although these "secrets" are mostly encrypted on computers, some of them can only prevent cainiao from cracking and cannot achieve the purpose of truly hiding them. So I thought for a long time and finally worked out a method to hide the file secret by using a JPG image.

I. The image "shell" blocks everything for you

Remember which file you want to hide. You only need to right-click the file, select the "attribute" option, and select the "hide" check box on it to hide the important file. But now with the gradual development of people's computer level, who do not know in the "folder" option, select "show all files and folders" single folder, to find hidden files (1 ).

500) this. width = 500 "title =" Click here to browse images in a new window "/>
Figure 1

Therefore, we need to use other methods to hide the file. It is better to use the COPY command here to hide the file. Maybe you may have a question: isn't the COPY command used to COPY files? How does it hide files? For more information, see.

First, we need to find an image in JPG format, find and right-click the secret file you want to hide, and select "add to compressed file, compress it into a RAR compressed file. Click the start button and select the run option. In the displayed run dialog box, enter the CMD command and press enter to open the CMD Command Prompt window. Then, at the blinking position of the cursor, enter the command to jump to the default path, under the secret file and the compressed secret file directory. Assume that the secret file name is wenpeng. JPG, compressed secret file name: wenpeng. RAR, we enter "COPY/B wenpeng. JPG wenpeng. RAR 123. run the JPG command and press Enter. At this time, you will find that there will be an additional 123 in this directory. JPG file, and the size is the sum of the secret file and the compressed secret file. The main reason is that the wenpeng. RAR file is hidden in wenpeng. JPG and a 123. JPG file is generated. And you open 123. JPG file, and open wenpeng. JPG files have the same effect. If you want to open wenpeng. RAR compressed package file, you need to set 123. change the JPG file name extension to the RAR format of the compressed file, and decompress the file to see its content. Of course, this is not ruled out. You are a user who knows little about the doscommand, so I will prepare a "embroidery file generator" software for you here, it can help you protect secret files (2 ).

500) this. width = 500 "title =" Click here to browse images in a new window "/>
Figure 2

I believe cainiao will understand the silly operation interface. Just add a protected file, select an image as the cover, and click "generate File.

Tip: the embroidery file generator is a completely free tool for disguising files as images. It can make one or more files that need to be disguised into a compressed file package, add the selected image as the cover of the compressed package. The generated image can be used normally. After the image extension is changed to a ZIP file, it can be opened by a decompressed program such as WinZip.

2. Trojans can also be hidden in Images

After knowing the above method, the black birds may ask, can they use images to hide horses? The answer is of course yes. Here you can add the trojan file to the compressed file, and then use the method described above to generate an image. You must never underestimate this hidden Trojan method. It can break through the monitoring of famous anti-virus software such as Kabbah and Kingsoft.

Because the methods for storing pictures and Trojans are similar to those for hiding secrets, we will not explain them much here. This article only wants to provide a better method.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.