Thursday, April 7, 2011

How to hide files in JPEG pictures

If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else.

I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file!

You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one! This can come in very handy if you need to hide files and don’t want to bother with encryption and all that other technical stuff.

Hide File in Picture
In order to accomplish this task, you will need to have either WinZip or WinRAR installed on your computer. You can download either of these two off the Internet and use them without having to pay anything. Here are the steps for creating your hidden stash:

•Create a folder on your hard drive, i.e. C:\Test and put in all of the files that you want to hide into that folder. Also, place the image that you will be using to hide the files in.




want a free linux cd

http://www.ubuntu.com/

subscribe here they will send it to ur home

short cuts from run




•System Properties = sysdm.cpl
•Network Connections = ncpa.cpl
•ODBC Administrator = odbccp32.cpl
•Display Properties = desk.cpl
•Add or remove programs = appwiz.cpl
•Internet Properties = Inetcpl.cpl
•Game Controllers = joy.cpl
•Phone and modem Options = telephon.cpl
•Time and Date Properties = timedate.cpl
•Region and Language Options = intl.cpl
•Power Options = powercfg.cpl
•Mouse Properties = main.cpl
•Accessibility Options = access.cpl
•Add Hardware Wizard = hdwwiz.cpl
•Sound and Audio Devices = mmsys.cpl
•User Accounts = nusrmgr.cpl
•Speech Properties = sapi.cpl

Be Very Careful with this..! ctr+c n ctr+v

hi friends,

We all copy various data by using ctrl+c/Copy for pasting elsewhere.
This copied data is stored on clipboard and is accessible over the net by a combination of Javascripts and ASP.

Just try this:
1) Copy any text by ctrl+c
2) Click the Link: http://www.friendlycanadian.com/applications/clipboard.htm
3) You will see the text you copied on the Screen which was
accessed by this web page.

Moral:
Do not keep sensitive data (like passwords, creditcard numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information. If sufficient data is stored by mistake it would give away confidential and important information without you knowing about it.

To Avoid This
To avoid this, follow these steps:

1. Go to internet options->security

2. Press custom level

3. In the security settings, select disable under Allow paste operations via script.
Now the contents of your clipboard are safe.

Pass this information on to create an awareness of the same.

Safe Browsing,
Cheers.

Source: Can be found on lot of blogs and forums, just google for it

Creating f@ke login pages

Many people asked me how to create f@ke login pages,here is the method to create them (I’m taking yahoo mail as an example)

First save the yahoo login page, then copy the source code of the page directly from internet on to note pad or you favorite text editor (if you are using internet explorer right click on the login page and select view source for mozilla press ctr+u) .Now search for the term “action”, you should find a line like this



When you enter your login information in the original login page, it is submitted to this url https://login.yahoo.com/config/login
change https://login.yahoo.com/config/login to “input.php” . When you change the action to input.php, user name and password are submitted to this file when ever user enters his login information in our f@ke login page.

I will tell you how to create this input.php file, what is its function and how the passwords are saved in my next post

Here is the complete list of proxy sites to open blocked sites


* https://kproxy.com
* http://62.193.235.46
* http://62.193.226.25
* http://62.193.236.96
* http://62.193.226.74
* http://62.193.236.100
* http://62.193.245.234
* http://62.193.240.162
* http://www.atunnel.com
* http://www.aplusproxy.com
* http://proxify.com
* http://www.msproxy.net
* www.cacheless.org
* www.diyrollercoaster.com
* www.greenrabbit.org
* www.hybridstormlabs.com
* www.ibypass.biz
* www.ibypass.com
* www.ibypass.name
* www.ibypass.net
* www.ibypass.org
* www.ibypass.us
* www.ibypass.ws
* www.melloyello.org
* www.saselinux.com
* www.mathtunnel.com
* www.the-cloak.com
* www.ninjaproxy.com
* http://proxify.com
* https://www.vtunnel.com
* www.webroxy.com

How to easily Resize your Windows Vista/WIN 7 Partition? Partition your Drive

There are many products in the market like the legendary Partition Magic - but although it claims to work with Windows Vista/WIN 7, but the fact is that it doesn't does the job that well. So you may be wondering how to resize your existing partitions like c: , d: drives without losing any data. I'll help you out today to do just that and also without the need for any costly programs. I'll explain to you how Windows Vista can be used to manage your partition resizing with it's inbuilt tools.

Here are the easy steps to follow:


•Hit the Vista/WIN 7 Start Button.
•Right click on Computer and select Manage.
•If you happen to get an User Account Control[UAC] dialog now - just click Continue(Vista's Inbuilt protection has kicked in).
•On the left pane, expand the Storage category and click on Disk Management.
•Now, you'll find all the partitions of your computer listed out. Right click on the partition you'd like to modify(Lets say d:).
•Select the option Extend Volume or Shrink Volume(Extend - to increase the size or Shrink to reduce the size) of the selected partition.

That's it - you're done. You have now successfully resized your existing Windows Vista Partition.

Bits and Bytes

A common area of confusion among computer users is dealing with the prefixes we use to relate file sizes. Here is the easiest way I've seen to conceptualize these measurements.

Bit: the smallest unit of measure for data and space that holds it on your computer. This is the level at which all data is either a 1 or a 0.

Byte: made up of eight bits. A byte is equivalent to a character ("a", "b" etc.). The order and combination of the eight ones and zeros (bits) defines a character. eg. 00000001 etc.

Kilobyte: (K or KB ) equals: 1024 bytes

Megabyte: (MB, or M. or meg) equals 1024 kilobytes

Gigabyte: (GB, G or gig) equals 1024 Megabytes

Terabyte: (TB, T or tera) equals 1024 Gigabytes

How many bytes do we have in a gigabyte? 1024 x 1024 x 1024 = 1,073,741,824 bytes -- slightly over a billion.

That's a lot of one's and zero's that you have on your hard drive. Have you backed them up l

Facts About the Internet

Here are some interesting facts about my favorite thing:

1) How old is the internet?

The internet became popularized in 1983, but was based largely on the ARPANET, which was first launched in late 1969. The first email was sent in 1972. Therefore, the 'net is over 30 years old.

2) Who invented the internet?

The technology that underlies the internet involves packet-switching. This technology was invented in the 1960's by Paul Baran in the US and Donald Watts Davies in the UK, both working independently. However, the entire infrastructure is the product of cooperation between countless scientists and engineers� no single person or group can take responsibility for the internet.

3) I've heard that the interent was built to survive a nuclear war. Is this true?

Bugwash. The ARPANET was funded by the US Department of Defense; specifically, the Advanced Research Projects Agency� hence the name. The goal was to enable incompatible mainframe computers to communicate and share resources.

4) What is the World Wide Web and how old is it?

Many people confuse the World Wide Web with the internet itself. The WWW is but one aspect of the internet, albeit the most recognizable feature. Web pages are the 'front-end' of the 'net. The WWW technology was invented in 1989 by Tim Berners-Lee, an English software engineer. Other internet services include email, telnet, ftp, etc.

5) How many people are on the 'net?

At best an educated guess, this link purports that there were somewhere around 605.60 million internet users as of September 2002.

6) How does the growth of the internet compare to other forms of communication?

It took radio 37 years to reach 50 million listeners, and TV about 15 years to reach 50 million viewers. The World Wide Web took just over 3 years to acquire 50 million users.

7) Who owns the interent?

The infrastructure (transmission lines, computers, servers, switches, etc.) of the internet are owned by private companies and individuals, but all of the software that runs the show belongs in the public domain. You own the 'net, and so do I.

8) Where did the term 'cyberspace' come from?

The term comes from the novel Neuromancer, published in 1984. The writer (and more recently, blogger) William Gibson described it as a 'consensual illusion'.

9) The internet is flooded with pornography, isn't it?

The world is flooded with pornography� a massive industry. As the internet is the first completely uncensored publication medium in history, you should expect a lot of pornography. Despite what the press will have you believe, however, the internet is flooded by a heck of a lot more than just porn!

10) The internet is kind of like a billion channel television, right?

Television is 'push' technology. The content is programmed by a small number of providers and then pushed at viewers whose freedom of choice is limited to what the providers are offering. The internet, conversely, is a 'pull' medium. As a user, you decide what you want and then pull it to your screen. The affordability of web publishing ensures that almost anyone can become a content provider, which has translated to an amazingly diverse range of content. While television remains a passive medium, the internet is all about interactivity.