Who has not wished to be able to hide certain files (indecent pictures or important documents) from curious eyes, very jealous wife, or children? I'm sure a good portion of you have wanted to keep a secret or to keep well out of reach for you important files.
Well in today's tutorial we will talk about steganography and derivatives of this technique. What is the steganograpy?
It is the practice of hiding a message or a file to another file in a way that others can not discern the presence or contents of the hidden message.
What Steganography is used to?
It can be used for different purposes:
From the legitimate purposes such as a picture of watermarking for copyright protection
Digital watermarks also known as fingerprinting
Can be used to maintain the confidentiality of valuable information
To protect data from tampering, theft or possible unauthorized viewing.
Until illegitimate purposes such as hiding pornographic material, concealing evidence but once everything is meant to be kept as a means of covert communication malicious (terrorists) kayloggere hiding or remote servers that can AutoExec the simple double-click on the file at steganography.
On the market there 2 types related to steganography software such as forming steganography software and software that make Steganalysis (considering whether or not a file-at Steganography)
As mentioned above acasta technique can be used for good and for evil, and you are probably wondering how you stay away from evil purposes steganography files (files that contain keyloggers or remote server)?
Unfortunately you very much for the human factor and the knowledge that the one who is attacked steganography malicious files, they are in the IT field. First you have to be very careful to file received by a client say Yahoo Messenger and check the file size of the picture or text that you receive. In general text files or pictures are very small, a first step to quell suspicion of received file is to right click on the file and choose the suspect from the context menu function Properties (properties) if Specific Basis is one text with. txt these are typically very small d around a few KB if you still notice the text file exceeds or reaches some mega-1 2 CALRE MB then that file is something suspicious in it and you will not have to do is double click on that file.
Another way to protect ourselves is to have a firewall and an antivirus heuristic scanning in real time.
In conclusion steganography steganography and can be many ways to the more advanced (with a very good encryption) to the simplistic (with a weaker encryption). One of the most simplistic and will be presented in this tutorial.
Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!
Enjoy !
Adrian Burlugeanu.... landpc.wordpress.com
Note 10's hard ..
Guys I also have a problem, I want to overclock the AMD + 4400 processor <a problem, in the bios there is no function to overclock the processor and Q-Flash as sami change the bios, I have a board from MSI, but I found out about a program AI Booster that overclock windows only on ASUS motherboards. Maybe you know a program that could help me overclock the processor in windows! Please Healp
I tried like this: http://www.youtube.com/watch?v=U8IBbrYq61E
but a drawback bootable USB odd and not received, I tried netbooting give hardly received!
Pretty please, do not post multiple times in different places, or stuffing your spam.
Also do not post links.
Try to describe your problem nicely, do not stand anyone to look at videos on youtube.
Say what you want to do and what can we help you if we can be sure we will answer.
In general motherboard manufacturer must provide tools to overclock, if you have the CD with drivers these tools, go to the official MSI website and search there.
Q Gigabyte Flash is a proprietary method and can not be used on other boards, instead MSI should have something.
I recommend you to "overclock" your grammar.
Videotutorial.ro do not think you learn grammar.
If you want to learn grammar or if you bother us something, we invite you to visit other websites that you meet in morphologically and syntactically.
Nui too good to yourself!
correct first and then the rest GRAMMAR
And I will be understanding, so are messengeristii.
okay,
The tutorial is beautiful, only this thing works for me… for example I made an arviva with a .txt file in it and I want to hide it in a picture and if I give like this:
copy / B test.jpg + test2.txt test3.jpg> it doesn't work practically the image opens but if you give rename from jpg to txt the text opens but it doesn't write what I wrote I write a lot of numbers and letters. And another ex that still it doesn't work: test.rar (in which there is a text file) and test2.jpg and I give the command: copy / B test2.jpg + test.rar test3.jpg and it says that it was copied etc but the picture works but if you change the extension I says that the archive is corrupt and doesn't work, so what did I do wrong to name it ??
Same thing happened to me, but be careful what you write (check again) to rush me go however ok.Nute
I tried going on Windows XP. I hid a picture archive. This method is ideal to take the data from someone without knowing, or ascude something important to the unsuspecting eye.
For those who complained that they go very carefully in order to correctly write cmd (respecting including blanks)!
Very good tutorial, videotutorial team congratulations!
Sincerely, a fan.
Guys, I worked very hard, respect this, thanks for tutorial
I wrote nothing still does not work properly only and does not work, nothing nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?
You have to write the "copy / B test.jpg ..." with B and leave large spaces I tried necesare.Eu go.
It doesn't work like that either, so practically the output is correct, but if you change the extension from jpg, the winrar rarely says: "This Archive is Dameged or Corupted" and when I scan with nod32 it tells me that it's a single file it doesn't work, a @cristi I have XP.
As you can see others succeed, be careful and try to write just right, every line, every space.
Also, if you use windows vista or windows 7, launch CMD with administrator rights, type "cmd" on the search and it will appear at the top, right click on it and select "run as administrator".
Success.
Very cool method. I tried and I put a picture 140kB 692MB film (archived), and got a picture 692MB!!
Guys very good tutorial, But I also have a big problem, I wanted to reinstall windows. The problem is that newer booting from the CD launches a piece of crap, a kind of DR-DOS BOILER and A: > / _ (and the whole process stops)
I think that this caldera was installed at a time without my knowledge and can also be removed.
If you can and can not get rid of it, can anyone has any idea how to install Windows back yet?
Type up in the box "search on videotutorial.ro…" at the top right: install windows xp sp3, enter and you will find the tutorial
Very cool.
Hehe I managed in the end… I made a .bat file with that command and it worked for me, in .bat I wrote:
@ Echo off
cd Desktop
copy / b poza.jpg + arhiva.rar test.jpg
And it worked THX.Minunat tutorial.
Julian hello! want to be a little more explicit what about this command "@ echo off"!
For me that no he did not want to open the archive ... gave error (This is Dameged or corupted Archives)
I put in the command line "@echo off" and now it works 🙂
I see that there are others who did not go ...
That command hides the location where you are, for example, when you enter cmd, it normally writes C:Documents and Settings, but if you write in cmd: echo off, this location disappears and to return to its place, write echo on. @echo off is used at the beginning to a .bat file, if you don't put this command at the beginning, nothing you write in the file will work. It's just like with an Html file, when I start such a file, you have to write at the beginning of the HTML code so that the browser knows what kind of file it is. I hope you understand what I mean.
ok! Thanks Julian! good thing to be cognizant
for example if I hide how many mb movie file will have final?
dun hidden file if I want to mp3
go??
closer look at the tutorial and all the way without scrolling going to hide anything mp3, video, text files, Word documents etc etc. That's mp3 Archives and hiding it in text file or picture
not to me it does not work although I repeated everything "n" times, just like in the tutorial ..DEGAABA
I can do this on Windows XP?
Are you kidding us? do you think that if it only works on Vista or windows 7 we do not specify in the title or in the presentation text that “it only works on windows vista or 7” ??? If you look more closely at the tutorial, the text icon as well as the one for the picture show that in Windows XP the ones from Vista or Windows 7 are different, don't you think? MORE ATTENTION AND SPIRIT OF DRAGILOOOR OBSERVATION
ms
Great tutorial bravo. 10. May we tutorials genu
Note 10's cool I liked, at least I we wanted to do something like this and did not know how
Adrian tutorial BV's not note for note 10 12 is super hard if you have tutorials like we expect further success
Adriane that the mouse cursor you? it's beautiful
I tried and it works on vista but if I send it to someone on the table and change extensions in vain it doesn't show the text document…
He probably doesn't have the My Computer> Tools> Folder Options> View> Hide extensions for known file types option disabled. When he changes his name, he only changes his name, not his extension. if you put "test.rar" in the picture "poza.jpg" he sees only "picture" and not the extension .jpg and when you rename the file it will be called "poza.jpg.rar" it will be with double extension and of course it gives the error that the archive is corrupt!
please tell me what theme you use in the tutorial… please fff nice
Thank you so much for all videotutorialele we have created so far are the hottest I've learned a lot from you, so give tinetio all 10 note
hello friends. Please answer me, if you can, to my "stupid" question I am asking you 🙂
What can happen if you install too many windows very often? Affect a hard drive? He said an employee at Emag, cik if you reinstall windows often ruin the hard pins. I do not know if it were true. I declare that I do to reinstall windows once a week, often in my opinion, because I have a slightly weaker computer.
Thank you very much and if I can expect to answer the question.
If a hard disk is damaged, do not think that will happen because reinstalling the system, you can install as many times as you want, hard drives, the next generation are quite hardy.
The problem is that you "ruin" your time in vain, do a correct installation and then make a backup.
Even if the hard drive breaks you can take him to guarantee sit back, do your job, do not think too much about such details.
Hard drives our server runs on almost 2 years 24 / 7 (non-stop) of course are enterprise hard drives that are more resistant than any 2 or your hard disk, but large differences between them and Your hard drive is not.
It's great!
I have a problem I did exactly Adrian did not work but I do not know why
Congratulations for Ady. Tutorial note of 20 20
Guys, how would the fan spins at high CPU?
A very interesting tutorial, (useful).
I strife to write before, but I have to brag.
You are good two.
Bravo. Thank you.
In many tutorials before.
really hard iam I knew that dynasty files can be made (this is how hackers use -as one of your tutorials with those self-installing servers says-, but I thought you need to know who knows what computer science to make the dynasty… it's also easy to made and dangerous at the same time… so any kid can become a hacker - let's say no autoinstall servers arrive but can archive let's say a virus.
too clever this tutorial;)) can you make a radmin server "trap" and a picture and when you open the picture chyar to see it and the other file adika server trap to install?
No I do not go
I have files: proba.jpg and desktop ip.rar
I did the *. bat
@ Echo off
cd Desktop
copy / b proba.jpg + ip.rar AA.jpg
therefore result AA.jpg
2 files appear in the file proba.jpg SO mean the opposite of what should be 2 files in AA.JPG
I have windows xp
and gives error to unzip… .. when I want to unzip i.e. proof.rar
in the tutorial it shows that the hidden file is in AA.jpg, ie in the last….
HELP
I put the / B
I put space between copy # / b # # + # ip.rar proba.jpg # AA.jpg
where we put aku # is actually space
see writing that is identical command line where you put uppercase uppercase etc.
try not to give names containing spaces (to me goes with spaces)
ie not have something like:
“Copy / B Photo Test 1.jpg + Archive Test.rar Photo Test 2.jpg”
to have something like:
“Copy / B FotoTest1.jpg + ArhivaTest.rar FotoTest2.jpg”
As you see there are files in proba.jpg 2 if changing the extension in proba.rar archive does not open and gives error?
did not try to modify the extension to the result AA.jpg => AA.rar and see if it opens?
Depending on the size of the picture, I first used a 1200 × 803 picture and suffered the same, the final picture opened and when I changed the extension to .rar it gave me an error (unknow format or demaged). Then I tried with a 640 × picture. 480 and everything went perfectly.
Thank you very much Adrian response.
Make a great job admins! CONGRATULATIONS.
cute tutorial i and help… keep it up aha guys are the coolest guys: d
Excellent. Congratulations.
As far MATERIALS YOU BELIEVE DAT E OF THE MOST TARRRRI! Really!
Personally, we suspect such jokes, but now we can see them live.
It would be good to have and some materials on detection of such situations.
Especially when you say the keylogger's. ESPECIALLY!
Thanks and for reporting 5 AVAST!
I want a tutorial about antivirus ZoneAlarm ® Extreme Security 2010
for those who give them ERRORS be careful in the tutorial that it says how to make you see the extension of vio files probably don't do that tools-folder options-view-si !!!!! CHECK WHERE SRIE HIDE FILE EXTENSION…. !!!!! APLY IS READY
pS PICTURES MUST BE THE WINDOWS TO OTHERS
Well, I went this stage is bad gyp!
Hello!
After several failed attempts I finally managed to put an X.rar in a Y.jpg picture, the idea is simple for those who failed Y.jpg does not have to be at a very high resolution… I think the resolution the maximum of the picture and the process to succeed must not exceed 640 × 480 ?!
PS: Note 10 for boys at http://www.videotutoriale.ro
Yes, very useful. Excellent solution. For those who want to use this opportunity to recommend watching carefully (even reviewing) tutorial.
The attention of "alex" (otherwise in everyone's attention) do not post in vain without connection with the topic of the tutorial.
Adrian Bravo, further successes.
shawl!!!
View to not stay sprawl of enthusiasm. Jokes. It is indeed an interesting trick.
Welcome back.
Adrian Burlugeanu ........ pretty please if you can give me add to the mess idul adryano_94x want to ask you something accest Cable free tutorial if you can .. contacteazama please so much
Sorry but the questions are put and discuss here, no time to sit with each private mess.
I would be interested in a detailed tutorial on "making e-books", ie ebooks: scanning with the scanner, or photo with digital camera, processing, programs to use, etc.
You can do? Have you done that?
Experiment I did after I removed the breaks between words originally had put them designating files.
Ex: File gol.txt had modified: FisierGol.txt
Congratulations to the tutorial!
Note 10 +
It's very interesting with this maneuver… especially since everything is at hand… I haven't done the test yet, for that I hurried to congratulate you but especially to look again, maybe twice 😛 on the tutorial for. that I'm harder on my head… especially in the case of copying elsewhere… I lost the thread… 🙂 But by the way: How big can the files you want to hide be? All the best!
As usual, you guys rock! Works perfectly and gentlemen biti.Felicitari win 7 64
Hi, I'm Razvan and I have a question too !!!! if you can answer me….
that the mouse cursor Flos? it's hard dragutt.
salutare.sa said in tutorial that will make you a tutorial with exacutabil inserted into a picture and its opening is opened and the exacutabil. 'll make you something? I'm interested
Now I can and I do Steganography :))
I think a tutorial on cryptography would be more useful than one in which to explain how to make an executable launch when it clicks on the picture! I'm sure many of them would only use it to put executables that shut down / restart the pc or do other crazy things like to have fun at the expense of others! A tutorial on information encryption and "free" software if they are encrypting information would be very welcome I'm sure!
PS: I did not want to offend anyone when I say that you only use steganography "trazanai", but I know it is! The best way to use steganography is to hide the source of a "soft" / template / plugin or anything created by you, so it could not have been changed and you keep your copyright, not to make fun of someone inchizandu0i computer!
No one minds do not worry. The tutorial presented by me here in nature for educational and information purposes only and NOT try this at HOME!
It's edged 2 this tutorial ... depends how you look and from what angle. It's good that people will know what to stehanography and know how to dodge and can be more careful and will think twice before 2 download and execute an executable or give double click on a picture
Or maybe give children bad ideas that do not and will not be nazbatiosi.Sa hide evil means to remove and it's not the best way to protect the uninitiated
Who wants to mock one or another seek and find 'gugal' enough methods
Beginners should take note that if your eyes and not a helmet can do with their hands
In my opinion
You're right Adrian! I did not say that the tutorial is not useful, on the contrary it is very good if you can find a way to use it for a constructive purpose! But I saw that those who ask for "executable launched by clicking on a picture" have names with "tz" and I get an idea of what they are thinking! I hope you can do the same about encrypting information!
A further nice evening!
We already have some on this topic… you might be interested in:
How to encrypt a partition or USB stick with BitLocker - video tutorial
Protecting and managing passwords with the free KeePass - video tutorial
How paroleaza, encrypt folders and files with Folder Lock - HD video tutorial
Click on the titles red and you get to tutorials!
I really like your tutorials and learned many things, congratulations!
This thing is very strong… .I need another… .I was stolen my id but not by complicated methods but only by the simple fact that the "friend" saw it when I typed it. I would like to know how I can enter to him in the computer also by this method to see my password and to have it returned to me.
Very interesting, but more interesting is I scanned the resulting file and nod32 sees only one file in it?!
Brother Barim to do a charity to teach us and teach us stuff mistoace hide an 'auto run into a picture.
I hope you can see my email and I can give commands you got there time
No friend, you didn't understand the "essence" of the tutorial. My role is not to teach you to be a jerk, to do harm or to break databases. This tutorial is purely informative, so that people know that not everything that flies is eaten and not every picture is a picture, and that there may be something dubious under it. If you want to be part of the dark side then you have nothing to squeeze your brains and learn to hack where you want but in no case from me.
I would also like to know if you can hide a. BAT. Vbs in a picture, but when the picture is opened that file to be executed without having to change the extension or destenographya.
super yes, in a similar time they wake shi other interests
bravo! very useful.
perfect ten!
I do not think it was a good idea to publish such a tutorial. This sensitive information should not be handy tool to anyone unless you want to trigger chaos in the virtual world ... Maybe it was sufficient in explaining the how to check a file, not to show how to create. I hope you have realized, from the comments of others, what they will use "chestioarele mistoace" that you teach them.
Information is information and ready, no boxing clubs, that does not mean those athletes learn there how to beat people on the street, there is the sport called TIR, that does not mean shooting clubs are preparing serial killers.
I Steganography has invented us.
Videotutorial.ro shows exactly what the IT world as it is, not always the wonderful world that we present in tutorials has a pink hue, there are hackers, there are gullible people, we try to cultivate valuable information as possible with this information people can avoid the bad things on the net and elsewhere.
As you can protect it from malware, you should know a few things before, for example you have to know where they can hide such programs.
Videotutorial.ro presents the reality of IT&C, whether some like it or not.
I said above… if you haven't read I will tell you too
The tutorial presented by me here in nature for educational and information purposes only and NOT try this at HOME!
It's edged 2 this tutorial ... depends how you look and from what angle. It's good that people will know what to stehanography and know how to dodge and can be more careful and will think twice before 2 download and execute an executable or give double click on a picture
Or maybe give children bad ideas that do not and will not be nazbatiosi.Sa hide evil means to remove and it's not the best way to protect the uninitiated
Who wants to mock one or another seek and find 'gugal' enough methods
Beginners should take note that if your eyes and not a helmet can do with their hands
You understand that you, as I do not like making videotutorial.ro? .. I wanted to draw your attention to the fact that most have retained the negative side of video. Anyway, how to express, I think it goes head to do much with the information you have provided. So you have no reason to worry too much.
Ps. I love what you do.
It works for me… I tried twice it didn't work and the third time it worked …… thxxx 😀
it worked for me… .very tutorial 🙂
..good tutorial, by the way uncle “dextop” learns to use “cd ..” (sidi douapuncte) 🙂 it wouldn't spoil some MS-DOS commands. Good luck with as many tutorials as possible!
I would be interested to know if the opening picture can turn that *. Exe. Adik to put *. Exe in the opening picture and picture appear but then run *. Exe.
Howdy! On the card I 1 205 GB MB hidden and do not know how to see what's there? I searched around a bit but may not have known to look for. Thanks for support
Hi Marius I've had a similar problem some time ago and found that the solution is very simple
everything you need to do is to insert the card into the computer and right click on the card and then left click on FORMAT You'll see a small window with buttons at the bottom 2 START AND CANCEL all you have to do is to give home and your card will return to normal but to delete everything on it. SUCCESS
marius… that's how I suffered on an mp3 player I still had half the memory from the whole one… and I put the mp3 player in the pc..I put a cd with a windows and then I gave the baptism… and when you get to the partitions delete the partition with the stick and then you create it and restart..see if it works… that's how it worked for me… .I hope it's about you, if I don't ask scz…
Merge, super misto.MERSI!
my id is ncs_lx and I want to talk about stegonegrafie
I will not put you never entered in the list :)
I read some comments in which there are people dissatisfied with this tutorial, I deduced that they still want to remain incompetent… let's not do anything, don't watch movies that are fighting etc…
hello… interesting tutorial, .. I want to use it for a specific purpose if you could make a tutorial or help me, I want to put an executable in a picture and when I double click on the picture to see picture and at that time to execute the program alone puteti can you help me with some advice? that I did exactly as in the tutorial I see the picture but it does not execute the program ... a lot
I do not think you want to be haker :)) and I do not think anyone will help in times which case no members videotutorial
Hi I'm Alex please answer! I would like you to do a tutorial on how to hide an .exe file under a picture and when you double click on the picture to run the program I will tell you the reason .. my brother and I use pc at home and play a game called The Godfather II and he always comes into play on my rescue and spoils everything for me..and annoys me to the core and it's not the only game he makes me like that .. and after I learn from you how to do it I'll use… .I can't create or put passwords on the pc because he tells his parents and they panar… he is 12 years old he doesn't know how to enter the prog files or control panel to see if I uninstalled the game… and if I hide the icons from the games he starts searching through folders and I don't want to delete everything that catches, please help me !!!!
You can leave dowload link
Link to download what exactly?
Don't worry… But they couldn't use pgp for encrypted messages mesaj And for email, there are so many services on deepweb that don't reveal your location or anything. So everything was private and they didn't have to send emails .. with pictures… If they were already intercepted .. Using MIM everyone knew everything;). And if you think the WTC attacks were made by those barefoot Taliban, then you don't understand anything from life. Mixed btw tutorial