Steganography or how we can hide a file in a picture or a text document - video tutorial

Who has not wished to be able to hide certain files (indecent pictures or important documents) from curious eyes, very jealous wife, or children? I'm sure a good portion of you have wanted to keep a secret or to keep well out of reach for you important files.

Well in today's tutorial we will talk about steganography and derivatives of this technique. What is the steganograpy?

It is the practice of hiding a message or a file to another file in a way that others can not discern the presence or contents of the hidden message.

What Steganography is used to?

It can be used for different purposes:
From the legitimate purposes such as a picture of watermarking for copyright protection
Digital watermarks also known as fingerprinting
Can be used to maintain the confidentiality of valuable information
To protect data from tampering, theft or possible unauthorized viewing.
Until illegitimate purposes such as hiding pornographic material, concealing evidence but once everything is meant to be kept as a means of covert communication malicious (terrorists) kayloggere hiding or remote servers that can AutoExec the simple double-click on the file at steganography.

On the market there 2 types related to steganography software such as forming steganography software and software that make Steganalysis (considering whether or not a file-at Steganography)

As mentioned above acasta technique can be used for good and for evil, and you are probably wondering how you stay away from evil purposes steganography files (files that contain keyloggers or remote server)?

Unfortunately you very much for the human factor and the knowledge that the one who is attacked steganography malicious files, they are in the IT field. First you have to be very careful to file received by a client say Yahoo Messenger and check the file size of the picture or text that you receive. In general text files or pictures are very small, a first step to quell suspicion of received file is to right click on the file and choose the suspect from the context menu function Properties (properties) if Specific Basis is one text with. txt these are typically very small d around a few KB if you still notice the text file exceeds or reaches some mega-1 2 CALRE MB then that file is something suspicious in it and you will not have to do is double click on that file.
Another way to protect ourselves is to have a firewall and an antivirus heuristic scanning in real time.

In conclusion steganography steganography and can be many ways to the more advanced (with a very good encryption) to the simplistic (with a weaker encryption). One of the most simplistic and will be presented in this tutorial.

Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!

Enjoy !

Adrian Burlugeanu.... landpc.wordpress.com



Related Tutorials


About Cristian Cismaru

I like everything related to IT&C, I like to share the experience and information I accumulate every day.
Learn as you learn!

Comments

  1. Note 10's hard ..

  2. Guys I also have a problem, I want to overclock the AMD + 4400 processor <a problem, in the bios there is no function to overclock the processor and Q-Flash as sami change the bios, I have a board from MSI, but I found out about a program AI Booster that overclock windows only on ASUS motherboards. Maybe you know a program that could help me overclock the processor in windows! Please Healp

  3. I tried like this: http://www.youtube.com/watch?v=U8IBbrYq61E
    but a drawback bootable USB odd and not received, I tried netbooting give hardly received!

    • Joker: Like I tried this: http://www.youtube.com/watch?v=U8IBbrYq61E
      but a drawback bootable USB odd and not received, I tried netbooting give hardly received!  


      Pretty please, do not post multiple times in different places, or stuffing your spam.
      Also do not post links.
      Try to describe your problem nicely, do not stand anyone to look at videos on youtube.
      Say what you want to do and what can we help you if we can be sure we will answer.

    • Joker: Like I tried this: http://www.youtube.com/watch?v=U8IBbrYq61E
      but a drawback bootable USB odd and not received, I tried netbooting give hardly received!  


      In general motherboard manufacturer must provide tools to overclock, if you have the CD with drivers these tools, go to the official MSI website and search there.
      Q Gigabyte Flash is a proprietary method and can not be used on other boards, instead MSI should have something.

  4. I recommend you to "overclock" your grammar.

  5. okay,

  6. The tutorial is beautiful, only this thing works for me… for example I made an arviva with a .txt file in it and I want to hide it in a picture and if I give like this:
    copy / B test.jpg + test2.txt test3.jpg> it doesn't work practically the image opens but if you give rename from jpg to txt the text opens but it doesn't write what I wrote I write a lot of numbers and letters. And another ex that still it doesn't work: test.rar (in which there is a text file) and test2.jpg and I give the command: copy / B test2.jpg + test.rar test3.jpg and it says that it was copied etc but the picture works but if you change the extension I says that the archive is corrupt and doesn't work, so what did I do wrong to name it ??

    • iulian62: It's nice tutorial only call me ride this thing ... I made a arviva eg with cun. Txt file in it and I want to hide intro pic and if I like:
      copy / B test.jpg + test2.txt test3.jpg> it doesn't work practically the image opens but if you give rename from jpg to txt the text opens but it doesn't write what I wrote I write a lot of numbers and letters. And another ex that still it doesn't work: test.rar (in which there is a text file) and test2.jpg and I give the command: copy / B test2.jpg + test.rar test3.jpg and it says that it was copied etc but the picture works but if you change the extension I says that the archive is corrupt and doesn't work, so what did I do wrong to name it ??  

      Same thing happened to me, but be careful what you write (check again) to rush me go however ok.Nute

    • I tried going on Windows XP. I hid a picture archive. This method is ideal to take the data from someone without knowing, or ascude something important to the unsuspecting eye.
      For those who complained that they go very carefully in order to correctly write cmd (respecting including blanks)!
      Very good tutorial, videotutorial team congratulations!
      Sincerely, a fan.

  7. Guys, I worked very hard, respect this, thanks for tutorial

  8. I wrote nothing still does not work properly only and does not work, nothing nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?

    • LiviuFlorin said

      iulian62: In vain I wrote everything goes just right and not go in vain nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?  

      You have to write the "copy / B test.jpg ..." with B and leave large spaces I tried necesare.Eu go.

      • LiviuFlorin:
        You have to write the "copy / B test.jpg ..." with B and leave large spaces I tried necesare.Eu go.  

        It doesn't work like that either, so practically the output is correct, but if you change the extension from jpg, the winrar rarely says: "This Archive is Dameged or Corupted" and when I scan with nod32 it tells me that it's a single file it doesn't work, a @cristi I have XP.

    • iulian62: In vain I wrote everything goes just right and not go in vain nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?  


      As you can see others succeed, be careful and try to write just right, every line, every space.
      Also, if you use windows vista or windows 7, launch CMD with administrator rights, type "cmd" on the search and it will appear at the top, right click on it and select "run as administrator".
      Success.

  9. LiviuFlorin said

    Very cool method. I tried and I put a picture 140kB 692MB film (archived), and got a picture 692MB!!

  10. Bill Gates said

    Guys very good tutorial, But I also have a big problem, I wanted to reinstall windows. The problem is that newer booting from the CD launches a piece of crap, a kind of DR-DOS BOILER and A: > / _ (and the whole process stops)
    I think that this caldera was installed at a time without my knowledge and can also be removed.
    If you can and can not get rid of it, can anyone has any idea how to install Windows back yet?

    • Bill Gates: Guys very good tutorial, But I also have a big problem, I wanted to reinstall windows. The problem is that more recently when booting from the CD a program shit is launched, a kind of DR-DOS BOILER and A :> / _ (and the whole process stops)
      I think that this caldera was installed at a time without my knowledge and can also be removed.
      If you can and can not get rid of it, can anyone has any idea how to install Windows back yet?  

      Type up in the box "search on videotutorial.ro…" at the top right: install windows xp sp3, enter and you will find the tutorial

  11. Very cool.

  12. Hehe I managed in the end… I made a .bat file with that command and it worked for me, in .bat I wrote:
    @ Echo off
    cd Desktop
    copy / b poza.jpg + arhiva.rar test.jpg

    And it worked THX.Minunat tutorial.

    • Catalin81 said

      iulian62: Hehe I finally got ... I made a. Beat with that order and went mia in. Beat I wrote:
      @ Echo off
      cd Desktop
      copy / b poza.jpg + arhiva.rar test.jpgSi worked THX.Minunat tutorial.  

      Julian hello! want to be a little more explicit what about this command "@ echo off"!
      For me that no he did not want to open the archive ... gave error (This is Dameged or corupted Archives)
      I put in the command line "@echo off" and now it works 🙂
      I see that there are others who did not go ...

      • Catalin81:
        Julian hello! want to be a little more explicit what about this command "@ echo off"!
        For me that no he did not want to open the archive ... gave error (This is Dameged or corupted Archives)
        I put in the command line "@ echo off" and now goes
        I see that there are others who did not go ...  

        That command hides the location where you are, for example, when you enter cmd, it normally writes C:Documents and Settings, but if you write in cmd: echo off, this location disappears and to return to its place, write echo on. @echo off is used at the beginning to a .bat file, if you don't put this command at the beginning, nothing you write in the file will work. It's just like with an Html file, when I start such a file, you have to write at the beginning of the HTML code so that the browser knows what kind of file it is. I hope you understand what I mean.

  13. for example if I hide how many mb movie file will have final?

  14. dun hidden file if I want to mp3
    go??

    • razvan: Dun hidden file if I want to mp3
      go??  

      closer look at the tutorial and all the way without scrolling going to hide anything mp3, video, text files, Word documents etc etc. That's mp3 Archives and hiding it in text file or picture

  15. not to me it does not work although I repeated everything "n" times, just like in the tutorial ..DEGAABA

  16. I can do this on Windows XP?

    • razvan: I can do this on Windows XP?  

      Are you kidding us? do you think that if it only works on Vista or windows 7 we do not specify in the title or in the presentation text that “it only works on windows vista or 7” ??? If you look more closely at the tutorial, the text icon as well as the one for the picture show that in Windows XP the ones from Vista or Windows 7 are different, don't you think? MORE ATTENTION AND SPIRIT OF DRAGILOOOR OBSERVATION

  17. Great tutorial bravo. 10. May we tutorials genu

  18. Note 10's cool I liked, at least I we wanted to do something like this and did not know how

  19. Adrian tutorial BV's not note for note 10 12 is super hard if you have tutorials like we expect further success

  20. Adriane that the mouse cursor you? it's beautiful

  21. I tried and it works on vista but if I send it to someone on the table and change extensions in vain it doesn't show the text document…

    • AdrianR said

      augustin: I tried going on vista but if you send someone mes and change the extension's nothing odd text document appeared to ...  

      He probably doesn't have the My Computer> Tools> Folder Options> View> Hide extensions for known file types option disabled. When he changes his name, he only changes his name, not his extension. if you put "test.rar" in the picture "poza.jpg" he sees only "picture" and not the extension .jpg and when you rename the file it will be called "poza.jpg.rar" it will be with double extension and of course it gives the error that the archive is corrupt!

  22. Alin Lucian said

    please tell me what theme you use in the tutorial… please fff nice

  23. Thank you so much for all videotutorialele we have created so far are the hottest I've learned a lot from you, so give tinetio all 10 note

  24. hello friends. Please answer me, if you can, to my "stupid" question I am asking you 🙂
    What can happen if you install too many windows very often? Affect a hard drive? He said an employee at Emag, cik if you reinstall windows often ruin the hard pins. I do not know if it were true. I declare that I do to reinstall windows once a week, often in my opinion, because I have a slightly weaker computer.
    Thank you very much and if I can expect to answer the question.

    • ady: Hello friends. Please answer me if you like, my question'' stupid "which I adreesez:) What can happen if you install too many windows very often? Affect a hard drive? He said an employee at Emag, cik if you reinstall windows often ruin the hard pins. I do not know if it were true. I declare that I do to reinstall windows once a week, often in my opinion, because I have a little computer slabut.Va thank you very much and if I can expect to answer the question.  


      If a hard disk is damaged, do not think that will happen because reinstalling the system, you can install as many times as you want, hard drives, the next generation are quite hardy.
      The problem is that you "ruin" your time in vain, do a correct installation and then make a backup.
      Even if the hard drive breaks you can take him to guarantee sit back, do your job, do not think too much about such details.
      Hard drives our server runs on almost 2 years 24 / 7 (non-stop) of course are enterprise hard drives that are more resistant than any 2 or your hard disk, but large differences between them and Your hard drive is not.

  25. It's great!
    I have a problem I did exactly Adrian did not work but I do not know why

  26. Congratulations for Ady. Tutorial note of 20 20

  27. Guys, how would the fan spins at high CPU?

  28. A very interesting tutorial, (useful).
    I strife to write before, but I have to brag.
    You are good two.
    Bravo. Thank you.
    In many tutorials before.

  29. really hard iam I knew that dynasty files can be made (this is how hackers use -as one of your tutorials with those self-installing servers says-, but I thought you need to know who knows what computer science to make the dynasty… it's also easy to made and dangerous at the same time… so any kid can become a hacker - let's say no autoinstall servers arrive but can archive let's say a virus.

  30. Katalin Adrian said

    too clever this tutorial;)) can you make a radmin server "trap" and a picture and when you open the picture chyar to see it and the other file adika server trap to install?

  31. Julian Braila said

    No I do not go
    I have files: proba.jpg and desktop ip.rar
    I did the *. bat
    @ Echo off
    cd Desktop
    copy / b proba.jpg + ip.rar AA.jpg

    therefore result AA.jpg

    2 files appear in the file proba.jpg SO mean the opposite of what should be 2 files in AA.JPG
    I have windows xp
    and gives error to unzip… .. when I want to unzip i.e. proof.rar

    in the tutorial it shows that the hidden file is in AA.jpg, ie in the last….

    HELP

  32. Julian Braila said

    I put the / B
    I put space between copy # / b # # + # ip.rar proba.jpg # AA.jpg
    where we put aku # is actually space

    • Catalin81 said

      Julian Braila:   

      see writing that is identical command line where you put uppercase uppercase etc.
      try not to give names containing spaces (to me goes with spaces)
      ie not have something like:
      “Copy / B Photo Test 1.jpg + Archive Test.rar Photo Test 2.jpg”
      to have something like:
      “Copy / B FotoTest1.jpg + ArhivaTest.rar FotoTest2.jpg”
      As you see there are files in proba.jpg 2 if changing the extension in proba.rar archive does not open and gives error?
      did not try to modify the extension to the result AA.jpg => AA.rar and see if it opens?

    • Julian BrailaNo I do not go
      I have files: proba.jpg and desktop ip.rar
      I did the *. bat
      @ Echo off
      cd Desktop
      copy / b proba.jpg + ip.rar AA.jpgdeci result AA.jpgapar 2 proba.jpgDECI files in the file that is the opposite of what should be 2 files in AA.JPG
      I have windows xp
      and gives error unzipping ..... you want to extract meaning proba.rarin tutorial shows the file that is hidden within AA.jpg last .... HELP  

      Julian BrailaNo I do not go
      I have files: proba.jpg and desktop ip.rar
      I did the *. bat
      @ Echo off
      cd Desktop
      copy / b proba.jpg + ip.rar AA.jpgdeci result AA.jpgapar 2 proba.jpgDECI files in the file that is the opposite of what should be 2 files in AA.JPG
      I have windows xp
      and gives error unzipping ..... you want to extract meaning proba.rarin tutorial shows the file that is hidden within AA.jpg last .... HELP  

      Julian Braila: I put the / B
      I put space between copy # / b # # + # ip.rar proba.jpg # AA.jpg
      where we put aku # is actually space  

      Depending on the size of the picture, I first used a 1200 × 803 picture and suffered the same, the final picture opened and when I changed the extension to .rar it gave me an error (unknow format or demaged). Then I tried with a 640 × picture. 480 and everything went perfectly.

  33. Thank you very much Adrian response.
    Make a great job admins! CONGRATULATIONS.

  34. lor3nna22 said

    cute tutorial i and help… keep it up aha guys are the coolest guys: d

  35. Excellent. Congratulations.

  36. As far MATERIALS YOU BELIEVE DAT E OF THE MOST TARRRRI! Really!

    Personally, we suspect such jokes, but now we can see them live.
    It would be good to have and some materials on detection of such situations.
    Especially when you say the keylogger's. ESPECIALLY!
    Thanks and for reporting 5 AVAST!

  37. I want a tutorial about antivirus ZoneAlarm ® Extreme Security 2010

  38. for those who give them ERRORS be careful in the tutorial that it says how to make you see the extension of vio files probably don't do that tools-folder options-view-si !!!!! CHECK WHERE SRIE HIDE FILE EXTENSION…. !!!!! APLY IS READY
    pS PICTURES MUST BE THE WINDOWS TO OTHERS

  39. Katalin Adrian said

    Well, I went this stage is bad gyp!

  40. Hello!

    After several failed attempts I finally managed to put an X.rar in a Y.jpg picture, the idea is simple for those who failed Y.jpg does not have to be at a very high resolution… I think the resolution the maximum of the picture and the process to succeed must not exceed 640 × 480 ?!

    PS: Note 10 for boys at http://www.videotutoriale.ro

  41. Yes, very useful. Excellent solution. For those who want to use this opportunity to recommend watching carefully (even reviewing) tutorial.
    The attention of "alex" (otherwise in everyone's attention) do not post in vain without connection with the topic of the tutorial.
    Adrian Bravo, further successes.

  42. shawl!!!

  43. Adrian Burlugeanu ........ pretty please if you can give me add to the mess idul adryano_94x want to ask you something accest Cable free tutorial if you can .. contacteazama please so much

    • adryanoAdrian Burlugeanu ........ pretty please if you can give me add to the mess idul adryano_94x want to ask you something accest Cable free tutorial if you can .. contacteazama please so much  

      Sorry but the questions are put and discuss here, no time to sit with each private mess.

  44. Rahan `Is` Back said

    I would be interested in a detailed tutorial on "making e-books", ie ebooks: scanning with the scanner, or photo with digital camera, processing, programs to use, etc.
    You can do? Have you done that?

  45. Experiment I did after I removed the breaks between words originally had put them designating files.
    Ex: File gol.txt had modified: FisierGol.txt

    Congratulations to the tutorial!

  46. Note 10 +

  47. It's very interesting with this maneuver… especially since everything is at hand… I haven't done the test yet, for that I hurried to congratulate you but especially to look again, maybe twice 😛 on the tutorial for. that I'm harder on my head… especially in the case of copying elsewhere… I lost the thread… 🙂 But by the way: How big can the files you want to hide be? All the best!

  48. As usual, you guys rock! Works perfectly and gentlemen biti.Felicitari win 7 64

  49. Hi, I'm Razvan and I have a question too !!!! if you can answer me….
    that the mouse cursor Flos? it's hard dragutt.

  50. salutare.sa said in tutorial that will make you a tutorial with exacutabil inserted into a picture and its opening is opened and the exacutabil. 'll make you something? I'm interested

  51. Now I can and I do Steganography :))

  52. AdrianR said

    I think a tutorial on cryptography would be more useful than one in which to explain how to make an executable launch when it clicks on the picture! I'm sure many of them would only use it to put executables that shut down / restart the pc or do other crazy things like to have fun at the expense of others! A tutorial on information encryption and "free" software if they are encrypting information would be very welcome I'm sure!

    PS: I did not want to offend anyone when I say that you only use steganography "trazanai", but I know it is! The best way to use steganography is to hide the source of a "soft" / template / plugin or anything created by you, so it could not have been changed and you keep your copyright, not to make fun of someone inchizandu0i computer!

    • AdrianR: I think it would be more useful than a tutorial on cryptography that will be explained how to make an executable to launch when you click on the picture! I'm sure many of you would use them just to put executables that close / restart pc or do other wacky like to make fun of others! A tutorial on encrypting information and software "free" if the encrypted information would be very welcome I'm sure!
      PS: I did not want to offend anyone when I say that you only use steganography "trazanai", but I know it is! The best way to use steganography is to hide the source of a "soft" / template / plugin or anything created by you, so it could not have been changed and you keep your copyright, not to make fun of someone inchizandu0i computer!  

      No one minds do not worry. The tutorial presented by me here in nature for educational and information purposes only and NOT try this at HOME!

      It's edged 2 this tutorial ... depends how you look and from what angle. It's good that people will know what to stehanography and know how to dodge and can be more careful and will think twice before 2 download and execute an executable or give double click on a picture

      Or maybe give children bad ideas that do not and will not be nazbatiosi.Sa hide evil means to remove and it's not the best way to protect the uninitiated
      Who wants to mock one or another seek and find 'gugal' enough methods
      Beginners should take note that if your eyes and not a helmet can do with their hands
      In my opinion

  53. AdrianR said

    You're right Adrian! I did not say that the tutorial is not useful, on the contrary it is very good if you can find a way to use it for a constructive purpose! But I saw that those who ask for "executable launched by clicking on a picture" have names with "tz" and I get an idea of ​​what they are thinking! I hope you can do the same about encrypting information!

    A further nice evening!

  54. I really like your tutorials and learned many things, congratulations!

  55. This thing is very strong… .I need another… .I was stolen my id but not by complicated methods but only by the simple fact that the "friend" saw it when I typed it. I would like to know how I can enter to him in the computer also by this method to see my password and to have it returned to me.

  56. Very interesting, but more interesting is I scanned the resulting file and nod32 sees only one file in it?!

  57. Brother Barim to do a charity to teach us and teach us stuff mistoace hide an 'auto run into a picture.
    I hope you can see my email and I can give commands you got there time

    • Brother Barim to do a charity to teach us and teach us stuff mistoace hide an 'auto run into a picture.
      I hope you can see my email and I can give commands there you have time
        

      No friend, you didn't understand the "essence" of the tutorial. My role is not to teach you to be a jerk, to do harm or to break databases. This tutorial is purely informative, so that people know that not everything that flies is eaten and not every picture is a picture, and that there may be something dubious under it. If you want to be part of the dark side then you have nothing to squeeze your brains and learn to hack where you want but in no case from me.

  58. I would also like to know if you can hide a. BAT. Vbs in a picture, but when the picture is opened that file to be executed without having to change the extension or destenographya.

  59. octavian said

    super yes, in a similar time they wake shi other interests

  60. Horia-Mihai said

    bravo! very useful.

  61. perfect ten!

  62. I do not think it was a good idea to publish such a tutorial. This sensitive information should not be handy tool to anyone unless you want to trigger chaos in the virtual world ... Maybe it was sufficient in explaining the how to check a file, not to show how to create. I hope you have realized, from the comments of others, what they will use "chestioarele mistoace" that you teach them.

    • I do not think it was a good idea to publish such a tutorial. This sensitive information should not be handy tool to anyone unless you want to trigger chaos in the virtual world ... Maybe it was sufficient in explaining the how to check a file, not to show how to create. I hope you have realized, from the comments of others, what they will use "chestioarele mistoace" that you teach them.  


      Information is information and ready, no boxing clubs, that does not mean those athletes learn there how to beat people on the street, there is the sport called TIR, that does not mean shooting clubs are preparing serial killers.
      I Steganography has invented us.
      Videotutorial.ro shows exactly what the IT world as it is, not always the wonderful world that we present in tutorials has a pink hue, there are hackers, there are gullible people, we try to cultivate valuable information as possible with this information people can avoid the bad things on the net and elsewhere.
      As you can protect it from malware, you should know a few things before, for example you have to know where they can hide such programs.
      Videotutorial.ro presents the reality of IT&C, whether some like it or not.

    • The tutorial presented by me here in nature for educational and information purposes only and NOT try this at HOME!

      It's edged 2 this tutorial ... depends how you look and from what angle. It's good that people will know what to stehanography and know how to dodge and can be more careful and will think twice before 2 download and execute an executable or give double click on a picture

      Or maybe give children bad ideas that do not and will not be nazbatiosi.Sa hide evil means to remove and it's not the best way to protect the uninitiated
      Who wants to mock one or another seek and find 'gugal' enough methods
      Beginners should take note that if your eyes and not a helmet can do with their hands

      I said above… if you haven't read I will tell you too

      The tutorial presented by me here in nature for educational and information purposes only and NOT try this at HOME!

      It's edged 2 this tutorial ... depends how you look and from what angle. It's good that people will know what to stehanography and know how to dodge and can be more careful and will think twice before 2 download and execute an executable or give double click on a picture

      Or maybe give children bad ideas that do not and will not be nazbatiosi.Sa hide evil means to remove and it's not the best way to protect the uninitiated
      Who wants to mock one or another seek and find 'gugal' enough methods
      Beginners should take note that if your eyes and not a helmet can do with their hands

  63. You understand that you, as I do not like making videotutorial.ro? .. I wanted to draw your attention to the fact that most have retained the negative side of video. Anyway, how to express, I think it goes head to do much with the information you have provided. So you have no reason to worry too much.
    Ps. I love what you do.

  64. It works for me… I tried twice it didn't work and the third time it worked …… thxxx 😀

  65. it worked for me… .very tutorial 🙂

  66. ..good tutorial, by the way uncle “dextop” learns to use “cd ..” (sidi douapuncte) 🙂 it wouldn't spoil some MS-DOS commands. Good luck with as many tutorials as possible!

  67. I would be interested to know if the opening picture can turn that *. Exe. Adik to put *. Exe in the opening picture and picture appear but then run *. Exe.

  68. Marius said

    Howdy! On the card I 1 205 GB MB hidden and do not know how to see what's there? I searched around a bit but may not have known to look for. Thanks for support

    • Hi Marius I've had a similar problem some time ago and found that the solution is very simple
      everything you need to do is to insert the card into the computer and right click on the card and then left click on FORMAT You'll see a small window with buttons at the bottom 2 START AND CANCEL all you have to do is to give home and your card will return to normal but to delete everything on it. SUCCESS

  69. madutz said

    marius… that's how I suffered on an mp3 player I still had half the memory from the whole one… and I put the mp3 player in the pc..I put a cd with a windows and then I gave the baptism… and when you get to the partitions delete the partition with the stick and then you create it and restart..see if it works… that's how it worked for me… .I hope it's about you, if I don't ask scz…

  70. Merge, super misto.MERSI!

  71. my id is ncs_lx and I want to talk about stegonegrafie

  72. I read some comments in which there are people dissatisfied with this tutorial, I deduced that they still want to remain incompetent… let's not do anything, don't watch movies that are fighting etc…

  73. hello… interesting tutorial, .. I want to use it for a specific purpose if you could make a tutorial or help me, I want to put an executable in a picture and when I double click on the picture to see picture and at that time to execute the program alone puteti can you help me with some advice? that I did exactly as in the tutorial I see the picture but it does not execute the program ... a lot

    • mihay:
      hello ... interesting tutorial .. I want to use it in a purpose if you could make a tutorial or help me, I want soap a ezecutabil a picture and you'll double click on the picture to see the picture and at that time was lonely ... Ezekiel program can help me with some advice? I did exactly like in the picture but see Ezekiel tutorial program .. ms more

      I do not think you want to be haker :)) and I do not think anyone will help in times which case no members videotutorial

  74. Hi I'm Alex please answer! I would like you to do a tutorial on how to hide an .exe file under a picture and when you double click on the picture to run the program I will tell you the reason .. my brother and I use pc at home and play a game called The Godfather II and he always comes into play on my rescue and spoils everything for me..and annoys me to the core and it's not the only game he makes me like that .. and after I learn from you how to do it I'll use… .I can't create or put passwords on the pc because he tells his parents and they panar… he is 12 years old he doesn't know how to enter the prog files or control panel to see if I uninstalled the game… and if I hide the icons from the games he starts searching through folders and I don't want to delete everything that catches, please help me !!!!

  75. You can leave dowload link

  76. Don't worry… But they couldn't use pgp for encrypted messages mesaj And for email, there are so many services on deepweb that don't reveal your location or anything. So everything was private and they didn't have to send emails .. with pictures… If they were already intercepted .. Using MIM everyone knew everything;). And if you think the WTC attacks were made by those barefoot Taliban, then you don't understand anything from life. Mixed btw tutorial

Speak Your Mind

*