Steganography or how we can hide a file in a picture or a text document - video tutorial

Who has not wished to be able to hide certain files (indecent pictures or important documents) from curious eyes, very jealous wife, or children? I'm sure a good portion of you have wanted to keep a secret or to keep well out of reach for you important files.

Well in today's tutorial we will talk about steganography and derivatives of this technique. What is the steganograpy?

It is the practice of hiding a message or a file to another file in a way that others can not discern the presence or contents of the hidden message.

What Steganography is used to?

It can be used for different purposes:
From the legitimate purposes such as a picture of watermarking for copyright protection
Digital watermarks also known as fingerprinting
Can be used to maintain the confidentiality of valuable information
To protect data from tampering, theft or possible unauthorized viewing.
Until illegitimate purposes such as hiding pornographic material, concealing evidence but once everything is meant to be kept as a means of covert communication malicious (terrorists) kayloggere hiding or remote servers that can AutoExec the simple double-click on the file at steganography.

On the market there 2 types related to steganography software such as forming steganography software and software that make Steganalysis (considering whether or not a file-at Steganography)

As mentioned above acasta technique can be used for good and for evil, and you are probably wondering how you stay away from evil purposes steganography files (files that contain keyloggers or remote server)?

Unfortunately you very much for the human factor and the knowledge that the one who is attacked steganography malicious files, they are in the IT field. First you have to be very careful to file received by a client say Yahoo Messenger and check the file size of the picture or text that you receive. In general text files or pictures are very small, a first step to quell suspicion of received file is to right click on the file and choose the suspect from the context menu function Properties (properties) if Specific Basis is one text with. txt these are typically very small d around a few KB if you still notice the text file exceeds or reaches some mega-1 2 CALRE MB then that file is something suspicious in it and you will not have to do is double click on that file.
Another way to protect ourselves is to have a firewall and an antivirus heuristic scanning in real time.

In conclusion steganography steganography and can be many ways to the more advanced (with a very good encryption) to the simplistic (with a weaker encryption). One of the most simplistic and will be presented in this tutorial.

Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!

Enjoy !

Adrian Burlugeanu.... landpc.wordpress.com


Cristian Cismaru: I like everything related to IT&C, I like to share the experience and information I accumulate every day. I'm learning to teach you!

View Comments (110)

  • Guys I also have a problem, I want to overclock the AMD + 4400 processor <a problem, in the bios there is no function to overclock the processor and Q-Flash as sami change the bios, I have a board from MSI, but I found out about a program AI Booster that overclock windows only on ASUS motherboards. Maybe you know a program that could help me overclock the processor in windows! Please Healp

    • Joker: Like I tried this: http://www.youtube.com/watch?v=U8IBbrYq61E
      but a drawback bootable USB odd and not received, I tried netbooting give hardly received!  


      Pretty please, do not post multiple times in different places, or stuffing your spam.
      Also do not post links.
      Try to describe your problem nicely, do not stand anyone to look at videos on youtube.
      Say what you want to do and what can we help you if we can be sure we will answer.

    • Joker: Like I tried this: http://www.youtube.com/watch?v=U8IBbrYq61E
      but a drawback bootable USB odd and not received, I tried netbooting give hardly received!  


      In general motherboard manufacturer must provide tools to overclock, if you have the CD with drivers these tools, go to the official MSI website and search there.
      Q Gigabyte Flash is a proprietary method and can not be used on other boards, instead MSI should have something.

    • Ionut: I recommend you "overclocking" grammar.  


      Videotutorial.ro do not think you learn grammar.
      If you want to learn grammar or if you bother us something, we invite you to visit other websites that you meet in morphologically and syntactically.

  • The tutorial is beautiful only because this thing doesn't work for me ... for example I made an arviva with a .txt file in it and I want to hide it in a picture and if I give it like this:
    copy / B test.jpg + test2.txt test3.jpg> it doesn't work practically the image opens but if you give rename from jpg to txt the text opens but it doesn't write what I wrote I write a lot of numbers and letters. And another ex that still it doesn't work: test.rar (in which there is a text file) and test2.jpg and I give the command: copy / B test2.jpg + test.rar test3.jpg and it says that it was copied etc but the picture works but if you change the extension I says that the archive is corrupt and doesn't work, so what did I do wrong to name it ??

    • iulian62: It's nice tutorial only call me ride this thing ... I made a arviva eg with cun. Txt file in it and I want to hide intro pic and if I like:
      copy / B test.jpg + test2.txt test3.jpg> it doesn't work practically the image opens but if you give rename from jpg to txt the text opens but it doesn't write what I wrote I write a lot of numbers and letters. And another ex that still it doesn't work: test.rar (in which there is a text file) and test2.jpg and I give the command: copy / B test2.jpg + test.rar test3.jpg and it says that it was copied etc but the picture works but if you change the extension I says that the archive is corrupt and doesn't work, so what did I do wrong to name it ??  

      Same thing happened to me, but be careful what you write (check again) to rush me go however ok.Nute

    • I tried going on Windows XP. I hid a picture archive. This method is ideal to take the data from someone without knowing, or ascude something important to the unsuspecting eye.
      For those who complained that they go very carefully in order to correctly write cmd (respecting including blanks)!
      Very good tutorial, videotutorial team congratulations!
      Sincerely, a fan.

  • I wrote nothing still does not work properly only and does not work, nothing nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?

    • iulian62: In vain I wrote everything goes just right and not go in vain nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?  

      You have to write "copy / B test.jpg ..." with a big B and leave the necessary spaces. I tried and it works.

      • LiviuFlorin:
        You have to write the "copy / B test.jpg ..." with B and leave large spaces I tried necesare.Eu go.  

        It doesn't work like that, so practically the output is correct, but if you change the extension from jpg, the winrar rarely says: "This Archive is Dameged or Corupted" and when I scan with nod32 it tells me it's a single file ... nush what's wrong, a @cristi I have XP.

    • iulian62: In vain I wrote everything goes just right and not go in vain nush innervated me why it's just command: copy / b test.jpg + test2.rar test3.jpg and it does not work because I have XP?  


      As you can see others succeed, be careful and try to write just right, every line, every space.
      Also, if you use windows vista or windows 7, launch CMD with administrator rights, type "cmd" in the search and it will appear at the top, right click on it and select "run as administrator".
      Success.

  • Very cool method. I tried and I put a picture 140kB 692MB film (archived), and got a picture 692MB!!

  • Guys very good tutorial, But I also have a big problem, I wanted to reinstall windows. The problem is that newer booting from the CD launches a piece of crap, a kind of DR-DOS BOILER and A: > / _ (and the whole process stops)
    I think that this caldera was installed at a time without my knowledge and can also be removed.
    If you can and can not get rid of it, can anyone has any idea how to install Windows back yet?

    • Bill Gates: Guys very good tutorial, But I also have a big problem, I wanted to reinstall windows. The problem is that more recently when booting from the CD a program shit is launched, a kind of DR-DOS BOILER and A :> / _ (and the whole process stops)
      I think that this caldera was installed at a time without my knowledge and can also be removed.
      If you can and can not get rid of it, can anyone has any idea how to install Windows back yet?  

      Write up in the box "search on videotutorial.ro ..." from the top right: install windows xp sp3, enter and you will find the tutorial

Related Post

This website uses cookies.