loading
If you're interested in coding or batch scripting, check out my latest Ible here.

A lot of people can't do more with a computer than type a Word document or make a "picture", so called, on Paint. Of course most people reading this instructable will know a bit more about Windows than that. But even people whose knowledge is limited to browsing the Web have digital secrets they would like to conceal from prying eyes (and chances are, the more you know about computers and related items, the more you will have to hide). This -ible is meant to give a few ideas to people who can really use computers about hoarding information, teach people who know the basics a few ways to hide sensitive data, and perhaps inspire the computer illiterate to learn something (though the last group will most likely never get a chance to read this page).
You need:

> A Computer
> A Little Bit of Your Time
> A Little Patience: this is my first instructable.

  • This instructable is not meant for people who are so completely "computer illiterate" that they do not understand computer basics, such as how to navigate directories, save documents, etc. If you have trouble saving a Word document to your desktop instead of My Documents, I advise you to learn the simple things first (just opening My Computer and browsing folders is surprisingly informative) before continuing here.

Step 1: Making a “Hole-In-the-Wall”

This is a very useful way to hide things from view, but if a nosy user searches for material hidden in this folder (yes a Hole-In-the-Wall is simply a folder) the material will emerge from hiding. These folders are very useful for storing Caches, Strongboxes, and Crates, which you will learn about later.
Open C: and navigate to some little-opened directory. My favorite is C:\WINDOWS\system32, but you could build a Hole anywhere in the Master Drive (or any drive, really). Program Files is another good place; just build the Hole in the files of some random game. Once you have your "Wall" create a new folder (right-click, New, Folder) and name it. If you really want, you can name it "My Hole-In-the-Wall where I store my secret files" but this defeats the purpose. A Hole is supposed to be inconspicuous, so it is best to name it something like "sat" or "pta" (this is why WINDOWS is a good place; it is full of folders with names like "oobe" and "ras"). Now, simply put your files into your new hiding place and leave them there. It is a good idea to change the names of these files if they are really incriminating: use numbers or symbols, or even type the names backward; this way someone poking through your C: won't be tempted to open them if they do stumble upon your Hole-In-the-Wall. Now just memorize the file path and you have a secret folder!

  • Search Instructables for "How To Make An Invisible Folder". This is useful too.

Step 2: Building a “Crate”

This method will only allow you store text, whether a sensitive document or the source code of some program. Simply type or paste text into NotePad and save as Whatever.jpg, then change "Text Document" to "All Program Files" and save somewhere. This exports your text into a JPEG picture file. You can also save them as Bitmap (.bmp), PNG (.png), or GIF (.gif) images; simply replace ".jpg" with ".bmp", ".png", or ".gif". If you try to open a Crate with an image viewer, the program should just say something like "No Preview Available", so to retrieve the Crate's contents, you have open NotePad, select File, Open, and navigate to the directory your Crate is located in. Just as you did to build the Crate, change "Text Document" to "All Program Files", and then select your Crate and click "Open". Now you can view, edit, or copy/paste the text concealed inside. Again, it is a good idea to name this file something inconspicuous and store it someplace safe, where your sibling won't "accidentally" delete it.

Step 3: Constructing a “Strongbox”, Part 1

This follows the same idea as a Crate, in that it stores data inside another file, but a Strongbox is password protected. This involves batch, which you can easily learn about from the countless "How-To-Do-Batch" instructables on this site. Simply copy/paste the following into NotePad:

@echo off

set key=*****

title ::
color 0a
echo Please enter your password.
set/p "pass= >"
if %pass%==%key% goto UnPack
cls
color 0c
echo That is not the password! Aborting unpack!
echo.
pause
exit
:UnPack
set dest=C:\Contents.txt
cls
echo That is the correct passord!
echo.
echo Your data will unpacked and sent here: %dest%
echo.
echo Please make sure this file does not already exist befor continuing
echo as this may ruin your data.
echo.
pause
cls

echo $$$$$>>%dest%

echo Unpack complete!
echo.
echo Your data can be found here: %dest%
echo.
pause
exit

Step 4: Constructing a “Strongbox”, Part 2

At the top of the script you will see "@echo off", followed by a space. Below this is a line that says "set key=*****". Replace "*****" with the password that will unlock the Strongbox. This password can't have any spaces, so use an underscore ( _ ) to separate words.
Ex: set key=Hello
set key=unlock_this_box

Also, make sure there is no space between "key=" and your password.
Now the annoying part: packing the contents. Eight lines from the bottom of the script you will see a line that reads "echo $$$$$>>%dest%". "$$$$$" represents a line of text. Type or copy/paste a strand of text here.
Ex: echo Hi>>%dest% (notice the dollar signs are replaced by "Hi"
echo I am really a potato in man's clothing.>>%dest%

For every line in your document you must place "echo" before your words and ">>%dest%" after them (it is much easier to copy "echo $$$$$>>%dest%" and paste it once for each line, and then go back and insert your words).

Ex: echo Potatoes are not geniuses.>>%dest%
echo El Mano is a genius.>>%dest%
echo Therefore, El Mano is not a potato.>>%dest%

  • Make sure not to change ">>%dest%" or the program won't unpack correctly.

Once you have set a password and packed your contents, save this text file as Anything.bat (.bat is extremely important! Don't leave it out!), and change File Type to "All Program Files", then save. If you live with someone who knows batch, you might want to compile this as an .exe file so they can't open it through NotePad. To open your Strongbox, run your new .bat program, type in the password you set, and press enter. The program unpacks your words as "C:\Contents.txt", so make sure this file does not already exist, then hit any key. Your words are now unpacked!

  • I can't get this to work with pictures, sounds, executables, movies, and the like. If you have any suggestions or ideas, please post them.

Step 5: Creating a “Cache”, Part 1

Crazy Leprecaun has an entire -ible on this process (which you can find here: https://www.instructables.com/id/How_to_Hide_Files_Inside_Pictures/), but I wrote a batch file that makes it a little easier than using Command Prompt. This simply stores an archived folder inside a picture. First, copy/paste the following script into NotePad and save as a batch program (name.bat, All Program Files):

@echo off
title Cache Creator[
color 07
:InA
cls
echo Cache:
echo Contents:
echo Destination:
echo.
echo Please enter the name of the Cache.
echo (must be an image, must contain no spaces)
echo.
set/p "cache= >"
if Exist %cache% goto InB
cls
echo The file could not be found.
pause
goto InA
:InB
cls
echo Cache: %cache%
echo Contents:
echo Destination:
echo.
echo Please enter the name of the Contents.
echo (must be a zipped file, must contain no spaces)
echo.
set/p "contents= >"
if Exist %contents% goto InC
cls
echo The file could not be found.
pause
goto InB
:InC
cls
echo Cache: %cache%
echo Contents: %contents%
echo Destination:
echo.
echo Please enter the Destination.
echo (must contain no spaces, must have same extension as Cache)
echo.
set/p "destination= >"
cls
echo Cache: %cache%
echo Contents: %contents%
echo Destination: %destination%
echo.
echo Do you wish to build a Cache? y/n
set/p "com= >"
if %com%==y goto Hole
if %com%==n goto InA
cls
echo That is not a valid command.
pause
goto Select
:Hole
copy/b "%cache%"+"%contents%" "%destination%"
echo Cache created.
pause
goto InA

Step 6: Creating a “Cache”, Part 2

Now follow Leprecaun's instructions: compress the files you want to hide in an archive such as "Archive.7z" (7z Portable is a very good archiver; WinRar is too, but you have to buy it). The file-to-be-hidden MUST be an archive if you ever want to retrieve its contents! Second, choose a picture to be the Cache; I like using PNG and BitMap images, which you can easily make using Paint. Place both your archive and your image in a directory with no spaces (C:\z), and run Cache Creator. Type in the file path for your Cache (C:\z\Image.png) and press ENTER. Now type in your contents (C:\z\Archive.7z). You can't enter the archive before the image; if you do, the picture will not be displayed when you open the file and someone might delete your Cache, thinking it is a mistake. Finally, enter your Cache's destination, the place it will be created in, and make sure to include the same extension as the image you used. I use the same folder as my archive (in this case C:\z\Cache.png). Type in "y", hit ENTER, and you have a Cache! To retrieve its contents, open up 7z Portable/WinRar/Whatever, select your cache, and hit "Extract". If you password-protected your archive (a very good idea) you will have to enter the password. The resulting files should be exactly the same as the ones you buried in your Cache.

Step 7: Putting on a "Mask"

A Mask is simply a file that has been renamed, so it won't function in a way that someone will want.
To make one, open Command Prompt and type "rename *YOUR FILE HERE* *THINGIE.EXTENSION*"

Example: rename C:\MyProgram.exe C:\MyProgram.txt

Not only does this change the file's name, it changes the extension. Instead of opening "MyProgram" as an application, the computer will use NotePad/WordPad to view it. It is now hidden from plain sight. To return it to its original state, once again type "rename *YOUR FILE HERE* *THINGIE.EXTENSION*", and give the file its original extension (in this case ".exe") once more.

rename C:\MyProgram.txt C:\MyProgram.exe

You can rename any file/program/document so it pretends to be anything else. Changing something to "Name.fil" or Name.dat" is a good way hide it, as Files and Databases are difficult to open without the right software.

This rename thing has another incredably useful trick: you can use it to email things that your provider wouldn't normally allow. My email (Gmail) doesn't allow the sending of Executables for security reasons, but you can rename an Executable as a text file or something, and then attac/send it. The reciever can then simply rename it ".exe".

Step 8: Building a “Storage Bin”

A Storage Bin is a hidden, password-protected folder you can use to store whatever you want. To my knowledge, the contents of this folder are search-proof, making it perfect for hiding things others know you have. This hiding place is very easy to make: just download and run the attached file; it will walk you through the setup process. Use your new Storage Bin to hide sensitive documents pictures, programs, or whatever.

  • Storage Bin Creator is not a virus. If for some reason it harms your computer in any way, I'm extremely sorry. It's a compiled batch file with no other purpose then to create a hidden folder and a PadLock file to open it.

Step 9: Nothing Is Ever Secure!

I hope this Instructable was worth the time you spent reading (and perhaps experimenting with) it. If you have any comments, questions, ideas, or useful facts, please post them.

Several people have commented that these methods of concealment would never hide anything from the police/FBI/CIA/NSA/Computer Technicians. This is very true. To quote myself, nothing is ever, ever, completely secure. If you can access something, there are probably six ways to crack, trick, or manipulate it. These are ways you could hide things from nosy family members, coworkers, and/or friends, ways to hide things like the family picture you use to blackmail your brother, and the book you're writing but are too embarrassed to ever let your mom see. If you really want to hide something, use TrueCrypt (look for Instructables adout it; I didn't mention it because I really haven't figured it all out yet).

I wrote this Instructable as a way to help people who need to hide data but don't know how. I can't control what you do with this information, but please respect me, my ideas and yourself and don't use it to hide anything thoroughly sordid.


******************************


El Mano:


Build your own CMD Prompt

Keep your Eyes working Great

This simple health switch will Keep you Warm

Wreak Havok with this simple Computer Virus


******************************
<p>I made a &quot;Hole-in-the-Wall&quot;, but when I tried to save something to it I was told that I don't have permission to save in the location (C:\Program Files). I did some Googles to see if there was a way around this, and couldn't find any good answer. Could someone please help me on this? Thanks.</p>
<p>Cool!</p>
<p>1. do we use Storage bin creator1 or 2?</p><p>2.neither of them make the padlock file....</p>
<p>Excellent tips, i must say. I have also mentioned a few things one must consider hiding from his/her desktop. http://techyuga.com/things-you-need-to-hide-on-your-computer/</p>
<p>To get the .tmp to work I just changed the file extension to &quot;.exe&quot; and it booted no issue.<br><br>Thanks for the help too, Mano!</p>
I like making caches...<br><br>I thought of that a long time ago and saw that it was on Instructables...<br><br>It is very cool though!
Batch files are way too easy to read, by just right clicking on them and selecting &quot;edit&quot;. Not a bad idea if the person looking for stuff like that knows anything about batch files.
You can easily change the file extension back to .txt to make it readable in notepad. Using software to hide text, pics, etc, inside a picture works very well. There are several programs out there that can do that. Hide a porn pic inside a background or other normal pic. Only you know which picture contains it.<br>You and your friends can communicate privately by typing your text and hiding it in a picture, send the picture and they can decode it. Don't modify the picture in any way after you encode it with text, or the text will become unrecoverable.<br>
Ok i'm sorry to break it to you but your thinking to hard. some on can just right click on the batch press edit and get pass.&nbsp; i suggest that you put the batch&nbsp; in a hole in the wall.<br />
If you don't want that to happen, go to f2ko.com and download their .bat to .exe converter.
there are people amongst us, that reverse an exe built by a novice within seconds...
first thing I do, if I cannot open a file is look at it with my trusty hex editor.
Personally I use a separate partition. When not in use, I go into Disk Management, and remove the drive letter. The drive goes away until you reapply a drive letter to it in Disk Management. I am sure you can apply more security to this 'hidden' drive, but it serves my purposes ;)
TrueCrypt is great for that, too.
&nbsp;How about disguising a batch file in a steganograph? Check my recent instructable &quot;<a href="https://www.instructables.com/id/Steganography-the-easy-way/" rel="nofollow">steganography the easy way</a>&quot; to know how, or maybe just disguise the file with steganography in the first place...
Fuel bills would be a bit expensive =)<br />
&nbsp;Very Very Good, but i was wondering why, whenever i open the Batch file that the text has filled another line. Please help me.
I'll try to answer both questions at once.&nbsp;<br /><br />By &quot;multiple files&quot; I'm guessing you want to get sveral identical text files unpacked, perhaps in seperate locations?<br /><br />Where does this extra line appear?
&nbsp;The &nbsp;text appears underneath the original text, and i wish to make more than one DIFFERENT batch files please help
For each line you want unpacked, put it between &quot;echo&quot; and &quot;&gt;&quot;/&quot;&gt;&gt;&quot;<br /> <br /> echo Hello! I am a text file.&gt;X.txt<br /> echo This is a second line beneath the previous one.&gt;&gt;X.txt<br /> echo The End&gt;&gt;X.txt<br /> <br /> This would create a txt file with three lines, line one saying &quot;I am a text file,&quot; and line three saying &quot;The End.&quot;<br /> <br /> To create multiple files:<br /> <br /> echo I am file # 1&gt;PATH\File_1.txt<br /> echo I am file # 5345422A&gt;PATH\File_5345422A.txt
&nbsp;you can right-click-&gt;edit a batch file and it'll show everything in it. This isn't a very good way to store things
&nbsp;and how do i create multiple &quot;batches&quot;?
on my pc it saves the files as .tmp....is that problem from my pc or????
Try to make a "Cache" with the .txt document instead of archive.That text can be seen when you open your picture with notepad.It will be situated at the end of the whole text in Notepad.And your picture can still be opened as a picture
Good idea...It wouldn't work with most files, but it would be a handy way to hide passwords.
Mate, thank you for the great 'ible. This instructable has unlocked secrets of xp I did not even know existed. Thank you again.
you could also change the font on all of your word documents into the symbols and then place them into the secret file
Nice car! Where did you get it from? :D
hmmm, good idea, but the program doesnt seem to be working for me. any idea about that?
Storage Bin Creator is in batch now. Let me know if it doesn't work.
I know that two of the three computers in my house have AVG 8 virus protection, which prevents the program from running, showing a message titled "Storage Bin Creator.exe has encountered a problem and needs to close...", followed by a "Threat detected; Heal, Move to Vault; Ignore" window. I had to uninstall AVG to compile the batch file. I compiled the .bat file because the safe icon looks better than the batch file icon, but there's no point if one can't run the program; I'll add the batch version as soon as I can.
well this was nice<sup>i say this know that im REALLY good with pcs</sup>i would like to know how to compile a .bat file to a .exe file<br/><br/>and you should add a step about turecrypt <br/><a rel="nofollow" href="http://www.truecrypt.org/">http://www.truecrypt.org/</a><br/>
You can find a fairly good batch compiler <a rel="nofollow" href="http://www.f2ko.de/English/b2e/download.php">http://www.f2ko.de/English/b2e/download.php</a>. I couldn't get this program to work until I disabled my virus protection; AVG immediately tagged any .exe it compiled as a virus, and promptly destroyed it.<br/><br/>Yes I know about TrueCrypt. Ironically, I discovered it literally five minutes after I published this instructable.<br/>
wow thats funny and thanks for the link
btw is that a Ogame background?
sure looks like ogame or evogame
It is simply a wallpaper. I needed a picture for the intro, so I took a screenshot of my desktop.
as a technician, I can say that in the course of diagnosing a computer, I would likely discover or delete any and all data stored in these manners... I would read any bat files I find, definitely check out any nonstandard folders, and open any "misbehaving" image files with a hex editor ... these are common virus techniques for basic obfuscation... I would not trust them for anything more than simple "security through obscurity" ... which is only useful if no one skilled wants your information.
First of all, nothing is ever, <em><strong>ever</strong></em>, completely secure. If you can access something, there are probably six ways to crack, trick, or manipulate it. These are ways you could hide things from nosy family members, coworkers, and/or friends, but yes, as you made clear, no one with expert PC knowledge and a couple of good programs would be fooled.<br/><br/>Second, what is a hex editor?<br/>
a hex editor is a program that allows you to view and change any file as straight hexadecimal numbers... most hex editors also show binary and ascii (or unicode) representations... they are pretty darn useful in reverse engineering or editing compiled programs or file formats that don't provide a spec... also useful for figuring out when a jpeg isn't a jpeg, or when programs' skin files are really renamed zip files or such things...
If the cops are looking at your computer, they'll hand it off to a computer forensics specialist who will run a program that scans every disk block, searching for incriminating content. It will even pick up deleted files - hiding things with odd file or directory names won't help. The only security is encryption - and even that is true only if you can ensure that non unencrypted copy is ever written to disk.
As I said above, these are methods of hiding things from your family and friends. They would never keep anything from a skilled technician. If you have reciepts for murder weapons or files you use on your underground Anti-Obama radio show and the cops are closing in on you, I advise you to A) Encrypt everything on your computer, or B) Place a large pile of thermite on top of your poor PC and cremate it.
I would suggest just using a <a rel="nofollow" href="http://www.sandisk.com/Enterprise/">secure USB drive</a><br/>

About This Instructable

56,339views

72favorites

License:

More by El Mano:Connect To Google Public DNS On Linux Mint Make A Joule Thief Coil Without A Ferrite Toroid Creating A Pixel Screen In Batch 
Add instructable to: