Featured Post Today
print this page
Latest Post
Showing posts with label Computer Trick. Show all posts
Showing posts with label Computer Trick. Show all posts

Cool Way to Hide Files Behind Image Using CMD and WINRAR


Today, I will teach you a way to hide some of your file behind image. What I mean is, you will actually put your files behind an image. This is a very effective way to hide any file with use of WinRAR and CMD.
To start off, first you need WinRAR. You can use Google to download it. After you download it, install it to you system. After that we are ready to go.

Learn To Hide Files Behind The Images...
 
1. Select an image to be used as a "hideout" image. This is where you will hide your file.

2. Now, select your file to hide behind the image and make it in .RAR format (the add to archive option),with the help of the WinRAR.

3. Next, put the image and your file on your desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.

4. Now open CMD by going to Start > Accessories > Command Prompt or press Windows Key on you keyboard plus R (WinKey + R) and type CMD then enter and type following commands in it.
         cd desktop
5. CD stands for change directory by typing above command you change your directory to desktop. After that type command

copy /b imagename.jpg + filename.rar finalimage.jpg
Replace "imagename.jpg" with the name of the image you're going to use. Don't forget to add image format (Eg: .jpg,.png,.gif)

Replace "filename.rar" with name of your file you want to hide. It must be in .rar format.


Finally Replace "finalimage.jpg" with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.

This is how it goes...

Now for extracting your files inside the image...

When you  try to open this newly created image it will open as normal image, but you can observe that the image size was changed into the size of the file you hid. Now, to get your hidden file all you need to do is:


How To Access Hidden File ?
1. Open WinRAR
2. Now locate your image (the final image produced.)
3. Extract the file and done.


That's it. As simple as that you now hide you important file inside an image. This is very useful in hiding confidential files.
This is one of my favorite trick. :)

Geeky Troll: Scheduler

Introduction


This tutorial will cover a somehow, hidden tools on Microsoft Operating System (Hidden in a way that most users don't know about it), it's called Task Scheduler.

Step 1: Go to Run and type "Task Scheduler"


















1 comments

Geeky Troll Part 1

Introduction


Trolling or simply annoying some people using jokes and pranks. Well you cannot complete your trolling experience without using one of the most used device in the world, the computer. But I will show simple tricks and those tricks that cannot harm someones PC.

Okay Let's start

The shutdown prank

This prank will simply shutdown and display a message when a user clicked the shortcut/program.

Step 1: Right-click in your desktop and Click New--Shortcut






The 101 Guide to use torrent

Introduction

Most of us already heard about "Torrent", using torrent to download a file is the easiest and most convenient way to download a file, there is no "interrupted download" with torrent, because you download a file piece by piece and when you shutdown your PC you can still resume it the next time you open it, it's also easier to find a software,movie,song or other files (legal or illegal). But many people don't know how to use this amazing software, in this article I will teach you how to use it.

Downloading the software
Bittorrent: http://www.bittorrent.com/downloads/
Utorrent: http://www.utorrent.com/downloads/complete?os=mac

You need to download the software first, there are different torrent engines (I prefer uTorrent), so you can use whatever you want.

0 comments

Protect the Net: Phishing


What is a phishing?

Phishing is a type of hacking where the attacker copy a website that you use in order to acquire information such as email, username and password. An attacker will copy the exact source code of a given page then change on how the data will be transmitted, instead of sending it to the server the webpage will simply log your data and redirect you to the actual site.
0 comments
 
Support : Trivia Mania Facebook Fanpage
Copyright © 2011. Trivia Mania - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger