Net-Zone

security tips

How to hide files behind the images?

1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
cd desktop
5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
Copy /b imagename.jpg + filename.rar finalimage.jpg
Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
Replace filename with name of your file you want to hide. It must be in .rar format.
Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.
How To Access Hidden File ?
To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
1. Open winrar
2. Now locate your image and open it or simply drag your image in winrar.
3. Extract the file and done

As an information security professional, your toolkit is the most critical item you can possess — other than hands-on experience and common sense. Your hacking tools should consist of the following (and make sure you’re never on the job without them):

Password cracking software, such as ophcrack, Hydra and John

Network scanning software, such as Nmap

Network vulnerability scanning software, such as GFI LanGuard and Nessus

Network analyzer software, such as Cain & Abel and Wireshark

Wireless network analyzer and software, such as Aircrack-ng and CommView for WiFi

File search software, such as FileLocator Pro and Identity Finder

Web application vulnerability scanning software, such as Acunetix Web Vulnerability Scanner and WebInspect

Database security scanning software, such as SQLNinja and SQLmap

Exploit software, such as Metasploit



Magic trick

Post Blank Comment or Status On Facebook
First Go To Comment Field Where You Want To Post Comment or Status.
Then Hold Alt Key And Type 0173 From Numeric Pad.
Press Enter To Post Comment.
OR
Paste this string into the text field: @+[0:0: ] and remove '+' sign.
See the magic

Did you know that the flight number of the plane that had hit World Trade Center on 9/11 was Q33N
Open your Notepad
Type the flight number i.e Q33N in Capital Letters.
Increase the Font Size to 72 or more
Change the Font to Wingdings
You will be amazed by the findings. Its a Plane going for 2 building shaped structures & then death.
Isn't it amazing ??

Create Your Own Google Search
Page
Be my Friend- Nitish kumar

Step 1: Open Your Browser
Step 2: Go To goglogo.com
Step 3: Type Your Name In Search
Bar.
Step 4: Click On "Create My Search
Page Now".

You can not make any folder named
any of the following :
CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9
Reason :
This is because these are windows inbuilt 'Reserved Device Names' .
Just avoid these words and name
anything else !

No comments: