Skip to main content

How to send secret messages within an image.

Are you searching for online or offline tools to send secret message to your friends or your beloved one's?If so in this post i am gonna show you how to hide a message or text under an image in two ways.This method of sending a hidden text under an image or by other means is called "Steganography".In this,the sender and recipient will only know about the existence of the text in an image.So let's see how to do this.
How to send secret messages within an image.

Steps:

Method-1:

1.Choose an image under which you want to hide the text.
2.Now move the image to the Local Disk C(i.e secured hard disk on your computer).
3.Open CMD(Run it with Administrator rights).
4.Type "cd\ or cd c:\"(without quotes).
5.Type "echo YOUR MESSAGE>> IMAGE.FORMAT".
Encrypting the text in the image.
6.Now the message as been encrypted into the image.In order to decrypt Right click on the image which you have used and open it with notepad or word pad or any other text viewing applications.
7.Now browse to end of the code and you will your message as shown below.
Decrypting the code with in an image

Method-2:

That's it friends i hope you enjoyed the article,if you have any queries regarding any topic feel free to ask us through comments.

Comments

Popular posts from this blog

How to make an Installation file(setup file) using Iexpress.

Hi guys welcome to worldtech360. In this tutorial or article I  am going to show you how to create an installation file(setup file) for the .EXE file which you have created using an inbuilt option in windows 7 named ‘ iexpress ’. So let’s see how to do this. Note: You can also create an installation file for .bat file files or .VBS files or any other files which are executable. Steps: 1. Choose an .EXE file or any other file for which you want to create a setup file or installation file. In this I am going to use .VBS file 2. Open Run and type “ iexpress ” or “ iexpress.exe ” and hit enter. 3. After hitting enter, iexpress wizard window will popup. On the screen you will see two options i.e. “ create new self-extracting directive file ” and the other is “ open existing self-extracting directive file ”. I recommend you to choose the first option as you are going to create a self-extracting file and click next. 4. In the next window select “ Extract files on...

How to install Backtrack 5 R3 on Oracle VM virtual box

Hi guys in this tutorial i am gonna show you how to install Backtrack 5r3 using virtual box.This tutorial is only for Educational purpose,Don't try to use it in a wrong way.Before going into the discussion let see what exactly backtrack means?Backtrack is an operating system which is developed especially for hackers and other security professionals.Mostly if we want to hack a wifi password i.e WEP or WPA or if we want to do phishing we need certain tools to do it.But Backtrack reduces this burden as it contains a bag full of hacking software's like gerex,Social engineering tools and many more.So lets install backtrack 5 r3 using virtual box. Steps:  Requirements: Backtrack( CLICK HERE ). Virtualbox( CLICK HERE ). 1.Install the Virtual box and open it. 2.Now we see a screen like below. 3.Click on New button and a window will up asking to type the name,Type and version.Select the type as 'linux' and version as 'oracle' as shown below and hit next...

8 Important Tips to Protect Your Magento Store from Hacking

Protection of eCommerce and financial websites is necessary because these websites deal with monetary transactions and stand first as a victim in the list of cyber crime. Magento is the most popular eCommerce platform which also comes under threat of hacking by accessing unauthorized logins and other attacks. Magento Platform is rich in security features but security is needed on the admin level to protect it from cyber criminals. Here are some security tips that help you to protect your Magento store and keep your site safe: 1.Admin Path Customization: It is the first step you can take to keep your Magento site safe is to customize the admin path because the normal login pages and admin pages can easily be accessed by just hit and trial methods and it is very easy to navigate to admin page by hackers if the path remains unchanged. With the use of many hacking software available online, it is easy to guess user name and password combinations and these software can guess user n...