Showing posts with label Computer Trick. Show all posts
Showing posts with label Computer Trick. Show all posts

Wednesday, 11 September 2013

Cool Way to Hide Files Behind Image Using CMD and WINRAR


Today, I will teach you a way to hide some of your file behind image. What I mean is, you will actually put your files behind an image. This is a very effective way to hide any file with use of WinRAR and CMD.
To start off, first you need WinRAR. You can use Google to download it. After you download it, install it to you system. After that we are ready to go.

Learn To Hide Files Behind The Images...
 
1. Select an image to be used as a "hideout" image. This is where you will hide your file.

2. Now, select your file to hide behind the image and make it in .RAR format (the add to archive option),with the help of the WinRAR.

3. Next, put the image and your file on your desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.

4. Now open CMD by going to Start > Accessories > Command Prompt or press Windows Key on you keyboard plus R (WinKey + R) and type CMD then enter and type following commands in it.
         cd desktop
5. CD stands for change directory by typing above command you change your directory to desktop. After that type command

copy /b imagename.jpg + filename.rar finalimage.jpg
Replace "imagename.jpg" with the name of the image you're going to use. Don't forget to add image format (Eg: .jpg,.png,.gif)

Replace "filename.rar" with name of your file you want to hide. It must be in .rar format.


Finally Replace "finalimage.jpg" with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.

This is how it goes...

Now for extracting your files inside the image...

When you  try to open this newly created image it will open as normal image, but you can observe that the image size was changed into the size of the file you hid. Now, to get your hidden file all you need to do is:


How To Access Hidden File ?
1. Open WinRAR
2. Now locate your image (the final image produced.)
3. Extract the file and done.


That's it. As simple as that you now hide you important file inside an image. This is very useful in hiding confidential files.
This is one of my favorite trick. :)

Sunday, 8 July 2012

Geeky Troll: Scheduler

Introduction


This tutorial will cover a somehow, hidden tools on Microsoft Operating System (Hidden in a way that most users don't know about it), it's called Task Scheduler.

Step 1: Go to Run and type "Task Scheduler"


















Step 2: Click "Create Basic Task"







Step 3: 
Type anything in the name then click "Next"
Choose "When Computer Starts"
Choose "Start a program"
Now browse for the browser he is using like firefox or chrome (shortcut in the desktop will do)
In the "Add Arguments" type any website you want

That's it!

Whenever his/her computer starts his computer will open that website.

You can also try to experiment with this trick like instead of "When computer starts" set it at 12:00 in the evening then open a scary website, if he's already browsing the internet it will be opened as a new tab which is scarier.

Happy Trolling

Thursday, 5 July 2012

Geeky Troll Part 1

Introduction


Trolling or simply annoying some people using jokes and pranks. Well you cannot complete your trolling experience without using one of the most used device in the world, the computer. But I will show simple tricks and those tricks that cannot harm someones PC.

Okay Let's start

The shutdown prank

This prank will simply shutdown and display a message when a user clicked the shortcut/program.

Step 1: Right-click in your desktop and Click New--Shortcut






Step 2: Type "Shutdown -s -t 100 -c "Trojan Horse Activated"
Note: -t 100 means that in 100 seconds the computer will shutdown (change it for more fun)
-c "Trojan Horse Activate" will display the text inside the "" when they clicked it.

Click next then finish














But that doesn't look convincing right?
Now let's pick a software in the desktop to follow. 
In this tutorial i'll choose chrome because it is a frequently used software.













Step 3: Now Right-Click the software you want to copy and click "Properties" Then "Change Icon"
Copy the link you see above


















Step 4: Now do the same with the shortcut you created, Right-Click it, Choose "Properties"--"Change Icon". Paste the path you copied recently to the path now and hit Enter.

You'll now see the icons of Google Chrome, Choose the appropriate Icon then click ok then apply.
Just rename your shutdown.exe icon then delete/hide the google chrome original icon.

Enjoy!














Monday, 2 July 2012

The 101 Guide to use torrent

Introduction

Most of us already heard about "Torrent", using torrent to download a file is the easiest and most convenient way to download a file, there is no "interrupted download" with torrent, because you download a file piece by piece and when you shutdown your PC you can still resume it the next time you open it, it's also easier to find a software,movie,song or other files (legal or illegal). But many people don't know how to use this amazing software, in this article I will teach you how to use it.

Downloading the software
Bittorrent: http://www.bittorrent.com/downloads/
Utorrent: http://www.utorrent.com/downloads/complete?os=mac

You need to download the software first, there are different torrent engines (I prefer uTorrent), so you can use whatever you want.



Looking for a torrent file

Now that you have a software to download a torrent file, the next thing we will do is to find what to download, in this tutorial we will download a Men in Black 3 movie.






















First search for something you want to download and add a "Torrent" in it, in this case this are the top results for that torrent, try to download a torrent file on trusted sites like thepiratebay, isohunt and other sites.

Choosing the best torrent:

When choosing what torrent file to download we must consider some factors.

1. Video Quality (For movies): Quality copy of newly released movies are hard to find because there are no DVDRip version yet, so your best shot is to look for a Cam version of the movie and look for the comments about its quality.

2. Seeders and Leechers: This is a very important part of a torrent, a healthy torrent usually has 1,000+ seeders. Seeders are computers that has the complete the file where you can download it, leechers are people who are downloading that file too, so it is good to choose a torrent with 5:1 ratio of seeders and leechers for a fast download.

3. Comment and ratings: Some losers will try to upload a file with binded virus in it, so try to read the comment first if it is a legit copy or if its working or not.


Downloading the torrent:


There are two ways to download a torrent:

Using magnet links: When you click a magnet link (magnet icon or sometimes in text) your torrent engine will open and ask if you want to download it. (Image Below)


Using .torrent file: You can also download the .torrent file, just click the part where it says "Download .torrent" or "Download Torrent" then you'll be prompted to save it, when you finish downloading it you can drag it inside your torrent engine.

Open your file:

When you finish downloading the torrent you can now right-click it (in torrent engine) and click "Open Containing Folder" in this torrent you'll see a .avi file and that is your downloaded file, you can now watch and enjoy it.



Speed Up the download:

To increase the download speed simply click Options -- Preferences -- Bandwidth.
Then change Global maximum number of connections into higher number (5000 for example) also change the "Maximum number of connected peers per torrent to something like 1000.

Note: This will only work if you have a fast internet.

For question, suggestion and violent reaction just leave a comment and we'll try to answer it as far as we can.

Thursday, 28 June 2012

Protect the Net: Phishing


What is a phishing?

Phishing is a type of hacking where the attacker copy a website that you use in order to acquire information such as email, username and password. An attacker will copy the exact source code of a given page then change on how the data will be transmitted, instead of sending it to the server the webpage will simply log your data and redirect you to the actual site.

How to detect a phishing site?

The URL:
The very first thing you should see is the URL or Uniform Resource Locator, so a phishing site for facebook will not show http://facebook.com in your address bar, the attacker will have for example facebo0k.webhost.com, so whenever you are asked to sign-in you have to look first in your address bar and see if it is the real site.
Redirect:
A phishing site is not connected to the actual site so the best thing it can do is to redirect you to the original website after giving your information.
For example:
You are in facebook and someone send you a link. You clicked the link and you see the facebook home page and asking you to login.
You will normally see the website asking you to login (see picture above). And because you want to see the link or just relogin you will enter your email and password (you are not actually logged out), when the phishing site got your account it will just simply redirect you to the original website. Because you are not really logged out you will still see your account and suspect nothing, but your information is already stored in their database. If you experience clicking a link and you are suddenly logged out for no reason then it can be a phishing site and look for the URL first before doing anything.

Source: