Steganography is the art of hiding information in plain sight, and in this tutorial, I'll show you how to use Steghide — a very simple command line tool to do just that. In addition, I'll go over a bit of conceptual background to help you understand what's going on behind the ...more
Welcome to part two in a series about steganography, the art of hiding things in plain sight. We are practicing steganography because it can be a useful skill if you don't have access to encryption software, or need a quick solution to make sure the sender and recipient are th ...more
In this how-to video, you will learn how to hide a file inside an image file. You will need a program like WinZIP or WinRAR to do this. First, create a new zip folder. Drag the file you want to hide into the zip folder. Open the command prompt. From here, type in the location ...more
Want to make sure a message doesn't fall into the wrong hands? Try embedding it in a web image. With the Mozaic Encrypt web app, it's both quick and simple. For all of the relevant details, and to get started adding secret messages to image files yourself, watch this home-comp ...more
In this how-to we will be sending an email with an image we get from a php script after running some fishy code. What you'll need Apache web server with PHP An image (included bellow) An email Account (I use gmail) Step 1: Setting Up Make a folder called "image.jpg" in your ...more
I was looking around on this site and this article caught my eye. It was about hiding text in ADS or Alternate Data Streams. While this is nothing new in the tech world, it seems that more and more people are looking at ADS for one reason or another. Years ago, I created a si ...more
In my last tutorial, I talked about creating a virus inside of a Word Document in the scenario of a mass-mailer attack. In this post, however, I'm going to be covering creating a fake image or screenshot with a meterpreter backdoor hidden inside to be used in a similar scenari ...more
You may be familiar with image-based or audio-based steganography, the art of hiding messages or code inside of pictures, but that's not the only way to conceal secret communications. With zero-width characters, we can use text-based steganography to stash hidden information i ...more
Hackers are always seeking zero-day exploits that can successfully bypass Windows 10's security features. There has been extensive research into creating undetectable malware and entire GitHub projects dedicated to automating the creation of undetectable payloads such as WinPa ...more
Blogger Jimmy R. demonstrates how you can embed hidden files into an innocent-looking JPEG image using the free 7-Zip and the Windows command line.
Pixel Perfect is the "perfect" show to help you with your Photoshop skills. Be amazed and learn as master digital artist Bert Monroy takes a stylus and a digital pad and treats it as Monet and Picasso do with oil and canvas. Learn the tips and tricks you need to whip those dig ...more
Looking for a fun way to send secret messages to your friends? Check out this clip. If you need to hide a file from someone on a shared PC or are looking to secretly exchange information with a friend, this clip is for you. In this tutorial you will learn how to hide any file ...more
Welcome to part three in a series about steganography, the art of hiding things in plain sight. We are practicing steganography because it can be a useful skill if you don't have access to encryption software, or need a quick solution to make sure the sender and recipient are ...more
While many image sites allow you to hide image and video catalogs behind passwords, you can often gain access to these images by "guessing" the URL of the image. This process is called fuskering. Photobucket is one of the popular websites that can be fuskered and this tutorial ...more
When you watch the news or a television show where someone doesn't want to be identified, it is common to see the face blurred out or obscured. In this Adobe Photoshop tutorial you will learn how to blur someone's face in an image and preserve or hide their identity. So if you ...more
In this video the instructor shows how to hide any kind of file in a .Jpeg image file. To do this take the image in a new folder. Go to start button and then to run. Type cmd in the run and hit enter to open the command prompt. Now browse to the directory that contains the pic ...more
Here we will be making a website page layout for your Myspace account. A very common thing that people find difficult is the alignment of things such as text boxes and other DIV's. This video will demonstrate the proper meaning of alignment, as we have an already misaligned pa ...more
This tutorial will show you how to hide files on your computer using an image file. The first step is to get an image file and edit it with Microsoft Paint or Adobe Photoshop. The next step is to save the image file as a jpeg file. Now create a WinRaR archive file and copy the ...more
Got something to hide? Learn how to censor or "GMask" an image simply by using the Mosaic option in PhotoFiltre to pixelize the entire thing or just a small (Naughty!) area. It's not that difficult to protect the identities of the not-so-innocent, especially after following th ...more
Layer masks in Photoshop hide, but do not remove, pixels from your original image. Learn how to use them for revealing and hiding selections in this tutorial.
Looking for an easy way to hide a file or folder? Try embedding it within an image file. It's easy and this clip presents a complete, step-by-step overview of the process. For more information, including detailed instructions, and to get started embedding files within JPEG fil ...more
A toggle button can let visitors to your website hide or reveal content (such as a product description or explanation attached to an image). This tutorial shows you how to make your own content toggle buttons for your Flash-based website.
Dave shows you how to produce a glass three different ways in 3ds Max in the video tutorial. Put two panels away, then concentrating on sensor one press m on the keyboard to bring up the materials editor. On the material editor go to the first sphere, choosing a slight blue co ...more
A silhouette is an outline of a person or an object, usually dark or having little detail, against a brighter, more well-lit background. For this week's Phone Snap Challenge, we've asked you to capture your own silhouette photo with your cell phone for a chance to win a SuperH ...more
This article is dedicated to sugarcane, because we all want more sugarcane in Minecraft. The best way to generate sugar cane is with an automatic reed farm that uses pistons and redstone. The pistons push the canes into the water canal you'll build, then delivers them to the c ...more
First of all open adobe Firework CS3/CS4. Open the 'file', then 'new' and set a banner with 'width' as 900, 'height' as 100 and ‘resolution’ set as 72. It shall open a banner for you on the screen. Now from the side bar underneath the vector, select the 'ellipse tool' and then ...more
In this video, we learn how to turn a photo partially black and white using PhotoShop. First, open up the program and open up the picture you'd like to change. Now, click with the right key above the layer and choose duplicate "layer". Now click above the eye icon to hide the ...more
Um, genital anatomy is probably one of them. The image below first turned up on Buzzfeed, leading to shock, awe, and lots of head scratching over who could have possibly come up with such an interesting contribution to the world of fashion... ...and a little digging revealed ...more
Facebook's new Timeline feature has been rolling out gradually since its unveiling in September, but yesterday it finally became available to Facebookers everywhere. It's even available on your mobile device, too. Those who want to upgrade to the radical new profile design can ...more
Learn how to touch up images in Photoshop and bring out the true potential of your art. Using subtle strokes of image enhancement you can redefine the effect that shadows have on your images and use them to bring out the aspects of the photos that you want to highlight. Simila ...more
In this tutorial, we learn how to make 2-layer stencils in GIMP. First, cut out the background before you begin. Now, right click on your main layer and then select "add alpha layer". After this, select the magic wand tool and delete all the white areas on the outside of the p ...more
Everyone's been in the following situation. You're sitting there at a nice bar, chatting up a smoking hot member of the opposite sex when all of a sudden they drop this bomb: "Can you engrave on wood in Photoshop?" The next thing you know, the night spirals into blackness and ...more
Every morning I head on over to my gym to start storying away classes full of people dripping in sweat. This always makes me feel super awkward because it's not exactly the most photogenic time to take a picture, and if it was me, I would probably give that person a dirty look ...more
Some websites block image downloads on their webpages so you can't save them for reuse. That means long-pressing or force-pressing on protected images in Safari on your iPhone will not do anything or will omit the "Save Image" option. Taking a screenshot is the obvious solutio ...more
Spreading your reach to new audiences on Instagram takes time and effort. It's not only about taking unique photos and curating an exciting feed. You should choose the time of day wisely, connect with popular brands, and take advantage of hashtags. Unfortunately, hashtags can ...more
If you have some photos, videos, and documents that you want to keep completely hidden and encrypted on your Android device, Andrognito is the app you need. We showcased this app in the past, but since then, CODEX has rebuilt it from the ground up with new and improved feature ...more
Metadata contained in images and other files can give away a lot more information than the average user might think. By tricking a target into sending a photo containing GPS coordinates and additional information, a hacker can learn where a mark lives or works simply by extrac ...more
Headphones cables, USB cables, and other cords have a nasty habit of getting tangled up in-between uses. These tangles are almost always a result of us just mashing and twisting the cord up for "storage," which ends up taking several minutes to carefully untangle. But if you ...more
Though you can use the Social Engineering Toolkit to clone websites, this way is much more customisable. For example, you could send the credentials your victim enters to a script that mails you notifying you of new data someone's just entered, or automatically store them in ...more
The world is full of vulnerable computers. As you learn how to interact with them, it will be both tempting and necessary to test out these newfound skills on a real target. To help you get to that goal, we have a deliberately vulnerable Raspberry Pi image designed for practic ...more
Screenshots taken from a compromised computer can provide hackers with access to private emails, photographs, and information found in sensitive documents. This data can be used by the attackers to build profiles of a target for social engineering attacks and blackmail or even ...more
Apple gave its Photos app some serious muscle in a new update, and it's time to start flexing. Photos has so much power now that it may finally be time to ditch all your iPhone's other photo and video editing apps. You won't even need any third-party apps to remove background ...more
By default, Slack optimizes the images you upload and send to other users in your workspace. Although optimization lowers the resolution of the image, it does send quicker, which is better if your internet service is poor. However, you may want to send the highest-resolution i ...more
Deleted bank statements and private photos are still within an attacker's grasp, so don't think that emptying your recycling bin is enough to keep your files from coming back to life. It's possible for a hacker to recover compromising files and images from a backdoored compute ...more
As penetration testers, we sometimes need to securely store customer data for prolonged periods. Bruteforce-resistant, vault-like containers can be created with just a few commands to protect ourselves from physical attacks and unintended data disclosures. The subject of cryp ...more
In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload works. With all that taken care of, we can get into disguising our payload to appear as an image and crafting the note in the greetin ...more
These days, most images we post online or share with others come from our smartphones. Whenever personal data is in them, such as debit card numbers, addresses, phone numbers, passwords, and other sensitive information, it's easy to jump into your iPhone's markup tools to blac ...more
For anyone wanting to keep information private, plain text is a format of the past. Instead, cheap, powerful encryption is widely available, but often not easy enough to use to attract widespread adoption. An exception to this rule is EncryptPad, an easy to use application tha ...more
Do you have a file (or many files) that, in the wrong hands, may cause you trouble? Don't worry about it, because I'll show you how to wipe it (or them) from your computer in order to leave no trace behind. When you delete a file with the remove command (rm <file>), you're no ...more
While SSH is a powerful tool for controlling a computer remotely, not all applications can be run over the command line. Some apps (like Firefox) and hacking tools (like Airgeddon) require opening multiple X windows to function, which can be accomplished by taking advantage of ...more
The "Hidden" album on your iPhone has always had one problem — it was never truly hidden. Since iOS 10, when the feature was introduced in the Photos app, any image or video that you conceal in the private folder could be seen by anyone with access to your unlocked device. Fin ...more
As someone with a pretty nice TV, I've never found the allure in purchasing a projector. While they're certainly smaller and sleeker than a television, and more portable, they can be pricey and produce a less than stellar image. And who really buys a projector anyways? They're ...more
Next time you go to the beach, stash a bottle of baby powder in your beach tote—even if you're not planning on changing any diapers. Before you head back home, dust your hands and feet with baby powder to remove sand particles quickly and easily, so you don't track any into yo ...more
This video will show you how to change the default program for a Specific File Extension in Windows 7. Video: . For an example, you could change .txt file to open from notepad to word pad and vice verse. You could do this for image file type also.
Your iPhone's home screen is a tricky thing. You can sort your collection of apps in any order you'd like, but where you place those apps is a totally different story. App and folder placement follows a strict grid on iOS from left to right, top to bottom. No exceptions, and t ...more
The prospect of loss or theft is something we constantly live with. Stolen iPhones fetch a premium price on the black market for parts like OLED display assemblies, frames, and charging ports. Making matters worse, if someone were to steal your phone, they could simply turn it ...more
WhatsApp is the go-to messaging app for millions worldwide and its easy to see why. The app can be considered the Swiss Army Knife of texting thanks to numerous features like Group Chats and Status Stories, in addition to striking a great balance between ease of access and ove ...more
While the notch on Apple's newer iPhones started a wave of notches across the smartphone market, there are still plenty of users who don't like screen-obstructing zone up top, and you may be one of them. While it may soon disappear in future iPhone models, or at least get smal ...more
The new iPhone XR, XS, and XS Max have everyone buzzing. But, at first glance, the XR and XS look pretty similar in almost every way. So, what's the difference? It comes down to the XR's "Liquid Retina" LCD screen vs. the XS's "Super Retina" OLED display. How do they compare, ...more
The act of liking someone's really old Instagram post is called "deep-liking," which is pretty apt if you think about it. While going "deep" into older posts on the feed of your ex or crush or whoever, your finger may slip accidentally and double-tap on a photo or video that y ...more