AIM 7 使用 .aba 文件 - 需要解压它

发布于 2024-08-05 09:29:00 字数 574 浏览 2 评论 0原文

从 AIM 7 beta 2 开始,现在到 AIM 7 beta 6,GM - AIM 已开始使用新的 .aba 文件格式来保存文件。这些文件曾经位于我们可以在程序文件中访问的文件夹中,然而,由于“性能提高”,AOL 决定将它们放入此 .aba 文件中。该文件无法使用 winRAR 或我尝试过的任何其他通用提取器提取。

有办法提取吗?有人告诉我他非常确定 .aba 文件正在使用 ZLIB。但没有人能证实这一点。另一个站点上的某人试图使用 AIM 本身来提取文件并读取它们 - 但从未这样做过。

希望这里聪明的人能够弄清楚如何提取它们。具体来说,我希望将 bl.dtd 文件放在其中。如果您在记事本中打开该文件,您可以看到它大部分都是乱码,但也列出了其中的文件 - 其中包括该文件。

一旦提取出来,就不需要将其压缩回 aba 文件中 - 但如果可能的话 - 这样做也没什么坏处。

您可以在此处下载 .aba 文件:http://www.filedropper.com/en-us

非常感谢

Since AIM 7 beta 2, and now onto AIM 7 beta 6, and GM - AIM has started to use a new .aba file format for keeping files in. The files used to be located in a folder that we could access in program files, however due to "performance increasements", AOL has decided to put them in this .aba file instead. The file is not extractable using winRAR, or any other universal extractor I've tried.

Is there a way to extract it? Someone told me he was pretty sure the .aba file was using ZLIB. But nobody can confirm that. Someone on another site was going to try to use AIM itself to extract the files, and read them - but never did.

Hopefully the smart people here can figure out how to extract them. Specifically, I'd like to have the bl.dtd file located in it. If you open the file in notepad, you can see it has mostly gibberish, but also lists out the files in it - which includes that file.

There is not a need to compress it back into the aba file, once they're extracted - but if it's possible - it wouldn't hurt to do.

You can download the .aba file here: http://www.filedropper.com/en-us

Thanks so much!

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(1

你的往事 2024-08-12 09:29:00

这个“极其快速和肮脏(1)” PHP 代码通过查找一些神奇的字符串从该文件中提取 JPG、PNG、GIF 和 gz 压缩文本文件...文本被解码,图像被解码显示...

(1) Quick-and-dirty 是一个术语,用于
引用任何简单的东西
实施解决方法的方法或
“拼凑。”它的用法很受欢迎
程序员,他们用它来描述
粗略的解决方案或编程
实施不完善,
不优雅或其他方面不够充分,
但这解决或掩盖了问题
就在手头,而且通常更快,
比适当的更容易安装到位
解决方案。 (维基百科)

<?php
    $PNG_SIG = "\x89PNG\x0D\x0A\x1A\x0A";
    $PNG_EOF = "IEND\xAE\x42\x60\x82";
    $GIF_SIG = "GIF89a";

    $aba = file_get_contents('en-us.aba');
    $pngs = explode($PNG_SIG, $aba);
    foreach ($pngs as $i=>$png) {
      if ($i>0) {
        $extra = explode($PNG_EOF, $png);
        $img = base64_encode($PNG_SIG.$extra[0].$PNG_EOF);
        echo '<img src="data:image/png;base64,'."\n".$img.'" />';
        echo "\n";
        if ($extra[1]!='') {
          if (substr($extra[1], 0, 6)==$GIF_SIG) {
            $gifs = $extra[1];
            $gifs = explode($GIF_SIG, $gifs);
            foreach ($gifs as $j=>$gif) {
              if ($j>0) {
                $img = base64_encode($GIF_SIG.$gif);
                echo '<img src="data:image/gif;base64,'."\n".$img.'" />';
                echo "\n";
              }  
            }
          }
          else {
            $gz = @gzuncompress($extra[1]);
            if ($gz!==false) {
              echo "<pre>\n";
              echo htmlspecialchars($gz);
              echo "</pre>\n";
            }  
            else {
              $jpg = base64_encode($extra[1]);
              echo '<img src="data:image/jpeg;base64,'."\n".$jpg.'" />';
              echo "\n";
            }
          }  
        }
      }  
    }
?>

结果:

alt 文本 http://img132.imageshack.us/img132/ 280/83168934.png

替代文本 http://img62.imageshack.us /img62/6541/32497869.png

This "EXTREMELY QUICK AND DIRTY (1) " PHP code extracts JPGs, PNGs, GIFs, and gz-compressed text files from that file by finding some magic strings... The text is decoded and the images displayed...

(1) Quick-and-dirty is a term used in
reference to anything that is an easy
way to implement a workaround or
"kludge." Its usage is popular among
programmers, who use it to describe a
crude solution or programming
implementation that is imperfect,
inelegant, or otherwise inadequate,
but which solves or masks the problem
at hand, and is generally faster and
easier to put in place than a proper
solution. (Wikipedia)

<?php
    $PNG_SIG = "\x89PNG\x0D\x0A\x1A\x0A";
    $PNG_EOF = "IEND\xAE\x42\x60\x82";
    $GIF_SIG = "GIF89a";

    $aba = file_get_contents('en-us.aba');
    $pngs = explode($PNG_SIG, $aba);
    foreach ($pngs as $i=>$png) {
      if ($i>0) {
        $extra = explode($PNG_EOF, $png);
        $img = base64_encode($PNG_SIG.$extra[0].$PNG_EOF);
        echo '<img src="data:image/png;base64,'."\n".$img.'" />';
        echo "\n";
        if ($extra[1]!='') {
          if (substr($extra[1], 0, 6)==$GIF_SIG) {
            $gifs = $extra[1];
            $gifs = explode($GIF_SIG, $gifs);
            foreach ($gifs as $j=>$gif) {
              if ($j>0) {
                $img = base64_encode($GIF_SIG.$gif);
                echo '<img src="data:image/gif;base64,'."\n".$img.'" />';
                echo "\n";
              }  
            }
          }
          else {
            $gz = @gzuncompress($extra[1]);
            if ($gz!==false) {
              echo "<pre>\n";
              echo htmlspecialchars($gz);
              echo "</pre>\n";
            }  
            else {
              $jpg = base64_encode($extra[1]);
              echo '<img src="data:image/jpeg;base64,'."\n".$jpg.'" />';
              echo "\n";
            }
          }  
        }
      }  
    }
?>

The results:

alt text http://img132.imageshack.us/img132/280/83168934.png

alt text http://img62.imageshack.us/img62/6541/32497869.png

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文