?
Solved

Combining Binary files on x86/Win Platform

Posted on 1998-05-19
1
Medium Priority
?
709 Views
Last Modified: 2008-03-10
Hello.  I have 5 binary files that I would like to copy/turn into one large binary file by appending them to each other.
I don't know how I can do this - dos's copy stops at <EOF> markers, which is not acceptable
for my purpose.  Any help would be greatly appreciated - even if I knew of a text editor that
could read & write binary files I could make do --  thanks,

Scott Davis.
0
Comment
Question by:scdavis
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 1

Accepted Solution

by:
wcoyote earned 200 total points
ID: 1016948
I know this works with text files.  I think it'll work with binary files too.  Try this command at the command prompt:
copy filename1.bin+filename2.bin+filename3 largefile.bin

0

Featured Post

[Video] Create a Disruption-Free Workspace

Open offices have their challenges. And Sometimes, it's even hard to work at work. It's time to reclaim your office and create a disruption-free workspace. With the MB 660, you can:

-Increase Concentration
-Improve well-being
-Boost Productivity

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question