Steganography can hide a file or as a picture or text document - video tutorial

Steganography can hide a file or as a picture or text document - video tutorial
5 (6) 100%

Who has not wished to be able to hide certain files (indecent pictures or important documents) from curious eyes, very jealous wife, or children? I'm sure a good portion of you have wanted to keep a secret or to keep well out of reach for you important files.

Well in today's tutorial we will talk about steganography and derivatives of this technique. What is the steganograpy?

It is the practice of hiding a message or a file to another file in a way that others can not discern the presence or contents of the hidden message.

What Steganography is used to?

It can be used for different purposes:
From the legitimate purposes such as a picture of watermarking for copyright protection
Digital watermarks also known as fingerprinting
Can be used to maintain the confidentiality of valuable information
To protect data from tampering, theft or possible unauthorized viewing.
Until illegitimate purposes such as hiding pornographic material, concealing evidence but once everything is meant to be kept as a means of covert communication malicious (terrorists) kayloggere hiding or remote servers that can AutoExec the simple double-click on the file at steganography.

On the market there 2 types related to steganography software such as forming steganography software and software that make Steganalysis (considering whether or not a file-at Steganography)

As mentioned above acasta technique can be used for good and for evil, and you are probably wondering how you stay away from evil purposes steganography files (files that contain keyloggers or remote server)?

Unfortunately you very much for the human factor and the knowledge that the one who is attacked steganography malicious files, they are in the IT field. First you have to be very careful to file received by a client say Yahoo Messenger and check the file size of the picture or text that you receive. In general text files or pictures are very small, a first step to quell suspicion of received file is to right click on the file and choose the suspect from the context menu function Properties (properties) if Specific Basis is one text with. txt these are typically very small d around a few KB if you still notice the text file exceeds or reaches some mega-1 2 CALRE MB then that file is something suspicious in it and you will not have to do is double click on that file.
Another way to protect ourselves is to have a firewall and an antivirus heuristic scanning in real time.

In conclusion steganography steganography and can be many ways to the more advanced (with a very good encryption) to the simplistic (with a weaker encryption). One of the most simplistic and will be presented in this tutorial.

Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!

Enjoy !

Adrian Burlugeanu...... ..landpc.wordpress.com

Get the Flash Player to see the video.


Related Tutorials



About Cristian Cismaru

I love everything related to IT & C, I like to share the experience and information that we accumulate every day.
Learn as you learn!

Comments

  1. Note 10's hard ..

  2. Guys I have a problem, i want to overclock the AMD + 4400 <a problem, is not the function of bios overclock the CPU and any Q-Flash to change my bios, I have a motherboard from MSI, but I found a program AI Booster which only overclock the motherboard windows ASUS.Poate you know a program that could help Sami to overclock the CPU in Windows! Please Healp

  3. I tried like this: http://www.youtube.com/watch?v=U8IBbrYq61E
    but a drawback bootable USB odd and not received, I tried netbooting give hardly received!

    • Joker: Like I tried this: http://www.youtube.com/watch?v=U8IBbrYq61E
      but a drawback bootable USB odd and not received, I tried netbooting give hardly received!


      Pretty please, do not post multiple times in different places, or stuffing your spam.
      Also do not post links.
      Try to describe your problem nicely, do not stand anyone to look at videos on youtube.
      Say what you want to do and what can we help you if we can be sure we will answer.

    • Joker: Like I tried this: http://www.youtube.com/watch?v=U8IBbrYq61E
      but a drawback bootable USB odd and not received, I tried netbooting give hardly received!


      In general motherboard manufacturer must provide tools to overclock, if you have the CD with drivers these tools, go to the official MSI website and search there.
      Q Gigabyte Flash is a proprietary method and can not be used on other boards, instead MSI should have something.

  4. I recommend you "overclocking" grammar.

  5. okay,

  6. It's nice tutorial only call me ride this thing ... I made a arviva eg with cun. Txt file in it and I want to hide intro pic and if I like:
    copy / B test.jpg + test2.txt test3.jpg> basically goes but if you open the image in jpg rename the txt giving opens the text but write what I write and I write a lot litere.Si no other example that all goes: test.rar (which is a text file) and test2.jpg and give the command: copy / B + test.rar test2.jpg test3.jpg and writes the copy etc but the picture goes but if you change the extension I says the archive is corrupt and does not work, so what's wrong to call me out?

    • iulian62: It's nice tutorial only call me ride this thing ... I made a arviva eg with cun. Txt file in it and I want to hide intro pic and if I like:
      copy / B test.jpg + test2.txt test3.jpg> basically goes but if you open the image in jpg rename the txt giving opens the text but write what I write and I write a lot litere.Si no other example that all goes: test.rar (which is a text file) and test2.jpg and give the command: copy / B + test.rar test2.jpg test3.jpg and writes the copy etc but the picture goes but if you change the extension I says the archive is corrupt and does not work, so what's wrong to call me out?

      Same thing happened to me, but be careful what you write (check again) to rush me go however ok.Nute

    • I tried going on Windows XP. I hid a picture archive. This method is ideal to take the data from someone without knowing, or ascude something important to the unsuspecting eye.
      For those who complained that they go very carefully in order to correctly write cmd (respecting including blanks)!
      Very good tutorial, videotutorial team congratulations!
      Sincerely, a fan.

  7. Guys, I worked very hard, respect this, thanks for tutorial

  8. I wrote nothing still does not work properly only and does not work, nothing nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?

    • LiviuFlorin said

      iulian62: In vain I wrote everything goes just right and not go in vain nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?

      You have to write the "copy / B test.jpg ..." with B and leave large spaces I tried necesare.Eu go.

      • LiviuFlorin:
        You have to write the "copy / B test.jpg ..." with B and leave large spaces I tried necesare.Eu go.

        Still not working so basically output is correct but if you change the extension from jpg to rar winrar site says, "This is Dameged or corupted Archives" and when to give nod32 scan tells me it's a single file ... nush that does not go, and I cristi @ XP.

    • iulian62: In vain I wrote everything goes just right and not go in vain nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?


      As you can see others succeed, be careful and try to write just right, every line, every space.
      Also if you use Windows Vista or Windows CMD 7 launches with administrator rights, you write the search "cmd" and you defend yourself up, right click on it and select "Run as administrator".
      Success.

  9. LiviuFlorin said

    Very cool method. I tried and I put a picture 140kB 692MB film (archived), and got a picture 692MB!!

  10. Bill Gates said

    Guys very good tutorial, but I have a big problem, I wanted to reinstall Windows is the newest ul.Problema to boot from CD is launching a program crap, sort of CALDERA DR-DOS and A: > / _ (and stops the whole process)
    I think that this caldera was installed at a time without my knowledge and can also be removed.
    If you can and can not get rid of it, can anyone has any idea how to install Windows back yet?

    • Bill Gates: Guys very good tutorial, but I have a big problem, I wanted to reinstall Windows is the newest ul.Problema to boot from CD is launching a program crap, sort of CALDERA DR-DOS and A :> / _ (and stops the whole process)
      I think that this caldera was installed at a time without my knowledge and can also be removed.
      If you can and can not get rid of it, can anyone has any idea how to install Windows back yet?

      Write up in the 'Search videotutorial.ro ... "from top right: Windows XP installation sp3, hit enter and you will find the tutorial

  11. Very cool.

  12. Hehe I finally got ... I made a. Beat with that order and went mia in. Beat I wrote:
    @ Echo off
    cd Desktop
    copy / b poza.jpg + arhiva.rar test.jpg

    And it worked THX.Minunat tutorial.

    • Catalin81 said

      iulian62: Hehe I finally got ... I made a. Beat with that order and went mia in. Beat I wrote:
      @ Echo off
      cd Desktop
      copy / b poza.jpg + arhiva.rar test.jpgSi worked THX.Minunat tutorial.

      Julian hello! want to be a little more explicit what about this command "@ echo off"!
      For me that no he did not want to open the archive ... gave error (This is Dameged or corupted Archives)
      I put the command line "@echo off" and now goes
      I see that there are others who did not go ...

      • Catalin81:
        Julian hello! want to be a little more explicit what about this command "@ echo off"!
        For me that no he did not want to open the archive ... gave error (This is Dameged or corupted Archives)
        I put in the command line "@ echo off" and now goes
        I see that there are others who did not go ...

        This command hides the location where you are, for example, when you enter the normal cmd write C: Documents and Settings it if you write in cmd: echo off your location disappears and to return to place the echo [Email protected] Off is used at the beginning of a .bat file if you do not put this command at first you will not go to anything you write in the file.You exactly like an Html file when I start such a file you have to write at the beginning of the HTML code to know the browser Kind of file e. I hope you understand what I mean.

  13. for example if I hide how many mb movie file will have final?

  14. dun hidden file if I want to mp3
    go??

    • razvan: Dun hidden file if I want to mp3
      go??

      closer look at the tutorial and all the way without scrolling going to hide anything mp3, video, text files, Word documents etc etc. That's mp3 Archives and hiding it in text file or picture

  15. not to me it does not work though I repeated it to "n" times, just like in tutorial .. NOTHING

  16. I can do this on Windows XP?

    • razvan: I can do this on Windows XP?

      Are you kidding us? You think if it works only on Vista or Windows 7 spcificam not in the title or text presentation as "only works on Windows Vista or 7" ??? If you look closely at the text and the icon tutorial for picture shows that the Windows XP or Windows Vista from 7 are otherwise not you think? More attention and observant DRAGILOOOR

  17. Great tutorial bravo. 10. May we tutorials genu

  18. Note 10's cool I liked, at least I we wanted to do something like this and did not know how

  19. Adrian tutorial BV's not note for note 10 12 is super hard if you have tutorials like we expect further success

  20. Adriane that the mouse cursor you? it's beautiful

  21. I tried going on vista but if you send someone mes and change the extension's nothing odd text document appeared to ...

    • AdrianR said

      augustin: I tried going on vista but if you send someone mes and change the extension's nothing odd text document appeared to ...

      Perhaps he does not disable the My Computer> Tools> Folder Options> View> Hide extensions for known file types. He changes his name when he changed not only the name of the. you if you put "test.rar" in the picture "poza.jpg" he sees only "picture" and not the. jpg and gives you rename the file and will be called "poza.jpg.rar" will be double extension and normal crashes that would be corrupted archive!

  22. Alin Lucian said

    please tell me what theme to use ... please fff nice tuturial

  23. Thank you so much for all videotutorialele we have created so far are the hottest I've learned a lot from you, so give tinetio all 10 note

  24. Hi friends. Please answer me, if you like, to my question "stupid" which I adreesez
    What can happen if you install too many windows very often? Affect a hard drive? He said an employee at Emag, cik if you reinstall windows often ruin the hard pins. I do not know if it were true. I declare that I do to reinstall windows once a week, often in my opinion, because I have a slightly weaker computer.
    Thank you very much and if I can expect to answer the question.

    • ady: Hello friends. Please answer me if you like, my question'' stupid "which I adreesez:) What can happen if you install too many windows very often? Affect a hard drive? He said an employee at Emag, cik if you reinstall windows often ruin the hard pins. I do not know if it were true. I declare that I do to reinstall windows once a week, often in my opinion, because I have a little computer slabut.Va thank you very much and if I can expect to answer the question.


      If a hard disk is damaged, do not think that will happen because reinstalling the system, you can install as many times as you want, hard drives, the next generation are quite hardy.
      The problem is that you "ruin" wrong time, and you do a correct installation and then do your backup.
      Even if the hard drive breaks you can take him to guarantee sit back, do your job, do not think too much about such details.
      Hard drives our server runs on almost 2 years 24 / 7 (non-stop) of course are enterprise hard drives that are more resistant than any 2 or your hard disk, but large differences between them and Your hard drive is not.

  25. It's great!
    I have a problem I did exactly Adrian did not work but I do not know why

  26. Congratulations for Ady. Tutorial note of 20 20

  27. Guys, how would the fan spins at high CPU?

  28. A very interesting tutorial, (useful).
    I strife to write before, but I have to brag.
    You are good two.
    Bravo. Thank you.
    In many tutorials before.

  29. really hard ... I knew that you can make files dynasty (hackers, so use as your tutorials say and one of those servers with auto-install, but I thought you should know who knows what information to make poi ... dynasty is also easy to did also dangerous ... so every kid can say is do not hacker ariveaza AUTOINSTALL servers but can archive say a virus.

  30. Katalin Adrian said

    too cool tutorialu this;)) can make a game server for Radmin "trap" and a picture and the picture momentu when desckide chyar to see her and the other Fiser Adika servaru trap to install?

  31. Julian Braila said

    No I do not go
    I have files: proba.jpg and desktop ip.rar
    I did the *. bat
    @ Echo off
    cd Desktop
    copy / b proba.jpg + ip.rar AA.jpg

    therefore result AA.jpg

    2 files appear in the file proba.jpg SO mean the opposite of what should be 2 files in AA.JPG
    I have windows xp
    and gives error unzipping ..... you want to extract meaning proba.rar

    the tutorial is to show the hidden file that is AA.jpg last ....

    HELP

  32. Julian Braila said

    I put the / B
    I put space between copy # / b # # + # ip.rar proba.jpg # AA.jpg
    where we put aku # is actually space

    • Catalin81 said

      Julian Braila:

      see writing that is identical command line where you put uppercase uppercase etc.
      try not to give names containing spaces (to me goes with spaces)
      ie not have something like:
      "Copy / B Test 1.jpg + Photo Archive Photo Test.rar Test 2.jpg"
      to have something like:
      "Copy / B + ArhivaTest.rar FotoTest1.jpg FotoTest2.jpg"
      As you see there are files in proba.jpg 2 if changing the extension in proba.rar archive does not open and gives error?
      have not tried to change the extension to result AA.jpg => AA.rar and see if it opens?

    • Julian BrailaNo I do not go
      I have files: proba.jpg and desktop ip.rar
      I did the *. bat
      @ Echo off
      cd Desktop
      copy / b proba.jpg + ip.rar AA.jpgdeci result AA.jpgapar 2 proba.jpgDECI files in the file that is the opposite of what should be 2 files in AA.JPG
      I have windows xp
      and gives error unzipping ..... you want to extract meaning proba.rarin tutorial shows the file that is hidden within AA.jpg last .... HELP

      Julian BrailaNo I do not go
      I have files: proba.jpg and desktop ip.rar
      I did the *. bat
      @ Echo off
      cd Desktop
      copy / b proba.jpg + ip.rar AA.jpgdeci result AA.jpgapar 2 proba.jpgDECI files in the file that is the opposite of what should be 2 files in AA.JPG
      I have windows xp
      and gives error unzipping ..... you want to extract meaning proba.rarin tutorial shows the file that is hidden within AA.jpg last .... HELP

      Julian Braila: I put the / B
      I put space between copy # / b # # + # ip.rar proba.jpg # AA.jpg
      where we put aku # is actually space

      Depends on the size of the picture, I used the first time a picture and I happened 1200 × 803 the same final picture opens and when you change the extension to. Rarely gave me error (unknow format or demaged). Then I tried to picture 640 × 480 and everything went perfect.

  33. Thank you very much Adrian response.
    Make a great job admins! CONGRATULATIONS.

  34. lor3nna22 said

    dragutz helpful tutorial ... shi ... aha baietzi tzinetzi it all the hottest suntetzi: d

  35. Excellent. Congratulations.

  36. As far MATERIALS YOU BELIEVE DAT E OF THE MOST TARRRRI! Really!

    Personal suspect kestii / "jokes" like this, but now we can see LIVE.
    It would be good to have and some materials on detection of such situations.
    Especially when you say the keylogger's. ESPECIALLY!
    Thanks and for reporting 5 AVAST!

  37. I want a tutorial about antivirus ZoneAlarm ® Extreme Security 2010

  38. for those who give ERUOARE be careful tutorial that tells how to make the extension file to see vio probably do not do this tools-folder options-view-and!! WHERE do you spell uncheck HIDE FILE EXTENSION ....!! Aply and ready
    pS PICTURES MUST BE THE WINDOWS TO OTHERS

  39. Katalin Adrian said

    Well, I went this stage is bad gyp!

  40. Hello!

    After several failed attempts I finally managed to put a picture X.rar a Y.jpg, the idea is simple for those who have failed Y.jpg should not be at a very high resolution ... I think the resolution picture of the maximum should not exceed succeed × 640 480!

    PS: Note 10 for boys at http://www.videotutoriale.ro

  41. Yes, very useful. Excellent solution. For those who want to use this opportunity to recommend watching carefully (even reviewing) tutorial.
    Inattention to "alex" (otherwise the attention of all) no longer post elsewhere without regard to the subject of the tutorial.
    Adrian Bravo, further successes.

  42. shawl!!!

  43. Adrian Burlugeanu ........ pretty please if you can give me add to the mess idul adryano_94x want to ask you something accest Cable free tutorial if you can .. contacteazama please so much

    • adryanoAdrian Burlugeanu ........ pretty please if you can give me add to the mess idul adryano_94x want to ask you something accest Cable free tutorial if you can .. contacteazama please so much

      Sorry but the questions are put and discuss here, no time to sit with each private mess.

  44. Rahan `Is` Back said

    I am interested in a detailed tutorial on the "manufacture of electronic books" mean to ebook sites: scan scanner or photo camera, processing programs used etc.
    You can do? Have you done that?

  45. Experiment I did after I removed the breaks between words originally had put them designating files.
    Ex: File gol.txt had modified: FisierGol.txt

    Congratulations to the tutorial!

  46. Note 10 +

  47. It is very interesting with this maneuver ... especially as everything is at hand ... I did another test, pt. as I hurried to congratulate you especially look to me once, can 2 times

  48. As usual, you guys rock! Works perfectly and gentlemen biti.Felicitari win 7 64

  49. good are Razvan and I have a question!! if you can answer me ....
    that the mouse cursor Flos? it's hard dragutt.

  50. salutare.sa said in tutorial that will make you a tutorial with exacutabil inserted into a picture and its opening is opened and the exacutabil. 'll make you something? I'm interested

  51. Now I can and I do Steganography :))

  52. AdrianR said

    I think it would be more useful than a tutorial on cryptography that will be explained how to make an executable to launch when you click on the picture! I'm sure many of you would use them just to put executables that close / restart pc or do other wacky like to make fun of others! A tutorial on encrypting information and software "free" if the encrypted information would be very welcome I'm sure!

    PS: I did not want to offend anyone when I say that you only use steganography "trazanai", but I know it is! The best way to use steganography is to hide the source of a "soft" / template / plugin or anything created by you, so it could not have been changed and you keep your copyright, not to make fun of someone inchizandu0i computer!

    • AdrianR: I think it would be more useful than a tutorial on cryptography that will be explained how to make an executable to launch when you click on the picture! I'm sure many of you would use them just to put executables that close / restart pc or do other wacky like to make fun of others! A tutorial on encrypting information and software "free" if the encrypted information would be very welcome I'm sure!
      PS: I did not want to offend anyone when I say that you only use steganography "trazanai", but I know it is! The best way to use steganography is to hide the source of a "soft" / template / plugin or anything created by you, so it could not have been changed and you keep your copyright, not to make fun of someone inchizandu0i computer!

      No one minds do not worry. The tutorial presented by me here in nature for educational and information purposes only and NOT try this at HOME!

      It's edged 2 this tutorial ... depends how you look and from what angle. It's good that people will know what to stehanography and know how to dodge and can be more careful and will think twice before 2 download and execute an executable or give double click on a picture

      Or maybe give children bad ideas that do not and will not be nazbatiosi.Sa hide evil means to remove and it's not the best way to protect the uninitiated
      Who wants to mock one or another seek and find 'gugal' enough methods
      Beginners should take note that if your eyes and not a helmet can do with their hands
      In my opinion

  53. AdrianR said

    You're right Adrian! Neither have I said that is not useful tutorial on the contrary it's very good if you can find a use in a constructive! But I saw that those who ask "executable launched by clicking on a picture" have names with "tz-s" and I get an idea about what they're going! Hope you can make about encryption and information!

    A further nice evening!

  54. I really like your tutorials and learned many things, congratulations!

  55. Very cool thing .... I need .... I was stealing another id but complicated methods but simply by "friend" I saw it when I tastam.As like to know how to get in his computer all by this method to see my password and I have it inapoi.Ms more

  56. Very interesting, but more interesting is I scanned the resulting file and nod32 sees only one file in it?!

  57. Brother Barim to do a charity to teach us and teach us stuff mistoace hide an 'auto run into a picture.
    I hope you can see my email and I can give commands you got there time

    • Brother Barim to do a charity to teach us and teach us stuff mistoace hide an 'auto run into a picture.
      I hope you can see my email and I can give commands there you have time

      No friends, no meaning "essence" tutorial. My role is not to teach you to be jaxor was hurt or break database. This tutorial is purely informative people to know that not everything that glitters is gold and not every picture is picture, and that as it may there is something fishy. If you want to be part of the dark side then you just squeeze you how to hack creierasii and learn how you want, but in any case from me.

  58. I would also like to know if you can hide a. BAT. Vbs in a picture, but when the picture is opened that file to be executed without having to change the extension or destenographya.

  59. octavian said

    super yes, in a similar time they wake shi other interests

  60. Horia-Mihai said

    bravo! very useful.

  61. perfect ten!

  62. I do not think it was a good idea to publish such a tutorial. This sensitive information should not be handy tool to anyone unless you want to trigger chaos in the virtual world ... Maybe it was sufficient in explaining the how to check a file, not to show how to create. I hope you have realized, from the comments of others, what they will use "chestioarele mistoace" that you teach them.

    • I do not think it was a good idea to publish such a tutorial. This sensitive information should not be handy tool to anyone unless you want to trigger chaos in the virtual world ... Maybe it was sufficient in explaining the how to check a file, not to show how to create. I hope you have realized, from the comments of others, what they will use "chestioarele mistoace" that you teach them.


      Information is information and ready, no boxing clubs, that does not mean those athletes learn there how to beat people on the street, there is the sport called TIR, that does not mean shooting clubs are preparing serial killers.
      I Steganography has invented us.
      Videotutorial.ro shows exactly what the IT world as it is, not always the wonderful world that we present in tutorials has a pink hue, there are hackers, there are gullible people, we try to cultivate valuable information as possible with this information people can avoid the bad things on the net and elsewhere.
      As you can protect it from malware, you should know a few things before, for example you have to know where they can hide such programs.
      Videotutorial.ro shows the reality of ICT - enabled, whether some like it or not.

    • The tutorial presented by me here in nature for educational and information purposes only and NOT try this at HOME!

      It's edged 2 this tutorial ... depends how you look and from what angle. It's good that people will know what to stehanography and know how to dodge and can be more careful and will think twice before 2 download and execute an executable or give double click on a picture

      Or maybe give children bad ideas that do not and will not be nazbatiosi.Sa hide evil means to remove and it's not the best way to protect the uninitiated
      Who wants to mock one or another seek and find 'gugal' enough methods
      Beginners should take note that if your eyes and not a helmet can do with their hands

      I said above ... if you say you did not read to you

      The tutorial presented by me here in nature for educational and information purposes only and NOT try this at HOME!

      It's edged 2 this tutorial ... depends how you look and from what angle. It's good that people will know what to stehanography and know how to dodge and can be more careful and will think twice before 2 download and execute an executable or give double click on a picture

      Or maybe give children bad ideas that do not and will not be nazbatiosi.Sa hide evil means to remove and it's not the best way to protect the uninitiated
      Who wants to mock one or another seek and find 'gugal' enough methods
      Beginners should take note that if your eyes and not a helmet can do with their hands

  63. You understand that you, as I do not like making videotutorial.ro? .. I wanted to draw your attention to the fact that most have retained the negative side of video. Anyway, how to express, I think it goes head to do much with the information you have provided. So you have no reason to worry too much.
    Ps. I love what you do.

  64. LA me go ... I tried twice and did not work bore fruit tree time ...... thxxx

  65. He walked me ... Tar all tutorialu

  66. ..bun tutorial, the way Uncle "dextop" learn to use "cd .." (Sidi douapuncte)

  67. I would be interested to know if the opening picture can turn that *. Exe. Adik to put *. Exe in the opening picture and picture appear but then run *. Exe.

  68. Marius said

    Howdy! On the card I 1 205 GB MB hidden and do not know how to see what's there? I searched around a bit but may not have known to look for. Thanks for support

    • Hi Marius I've had a similar problem some time ago and found that the solution is very simple
      everything you need to do is to insert the card into the computer and right click on the card and then left click on FORMAT You'll see a small window with buttons at the bottom 2 START AND CANCEL all you have to do is to give home and your card will return to normal but to delete everything on it. SUCCESS

  69. madutz said

    Marius ... it happened to me on a mp3 player I had half the memory of the whole ... and I put mp3 player in PC .. I put a cd with windows and then I came to baptize ... and when you get to the partition delete partition with Stik and then create and you restart .. see if it works ... me so I went .... I hope it's not you, if you ask me scz ...

  70. Merge, super misto.MERSI!

  71. my id is ncs_lx and I want to talk about stegonegrafie

  72. I read some reviews where people are unhappy with this tutorial, I deduced that they will continue to Ramna incompetent ... let's not do anything, do not watch movies that are fighting etc ...

  73. hello ... interesting tutorial .. I want to use it in a purpose if you could make a tutorial or help me, I put a ezecutabil a picture and you'll double click on the picture to see picture and at that time was lonely ... Ezekiel program can help me with some advice? I did exactly like in the picture but see Ezekiel tutorial program .. ms more

    • mihay:
      hello ... interesting tutorial .. I want to use it in a purpose if you could make a tutorial or help me, I want soap a ezecutabil a picture and you'll double click on the picture to see the picture and at that time was lonely ... Ezekiel program can help me with some advice? I did exactly like in the picture but see Ezekiel tutorial program .. ms more

      I do not think you want to be haker :)) and I do not think anyone will help in times which case no members videotutorial

  74. Hi are Alex please respond! I want to make a tutorial how to ascuzin a. Exe as a picture and when you double click on the pic to run a program and tell you why .. me and my brother for home PC and play a game called The Godfather II and he always comes into play in my salvation and all my hurt me .. and it pisses me off to the full game and not the only place where I do that .. and after learning from you how to use .... do not create or put passwords on pc for parents and do as they say panarama 12 years ... he knows he has to get into prog files or control panel to see if I uninstalled the game ... and if incoanele hide from the games start to look through folders and do not want to delete everything he ajutatima please!!

  75. You can leave dowload link

  76. No offense ... but could not be used for PGP encrypted messages ... And for regarding email are so many services deepweb Why did not disclose any location or anything. So everything was private and should not send emails .. picture ... If you were already intercept .. Using MIM everyone knew everything;). And if you think that the WTC attacks were made by the Taliban that barefoot then you do not get anything out of life. Misto tutorial btw

Viewpoint

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.