Digital Steganography: The art of Hiding Files, Part 3
Can Digital Steganography be used with good intent?
Recall --
Last week, I wrote 2 articles on Digital Steganography (pronounced "Stay-Gan-Aw-Gra-Fee"). By definition, Steganography is simply the art of hiding plain data from sight. In the same respect, Digital Steganography is the ability to hide a file inside of another file, called the "carrier file".
Both articles focused on a question sent in from Infopackets Reader John B., who proposed the question, "If I downloaded a jpeg image file from the Internet, and it has a virus hidden inside ... [can the virus execute and cause damage to my computer]?"
As we discovered, a carrier file is harmless. Hidden content contained in a carrier file (in this case, a virus or Trojan) cannot execute arbitrarily. To execute a program which is contained within a carrier file, it must first be extracted using a specialized program.
Getting back to the original question -- "Can Digital Steganography be used with good intent?"
The answer, of course, is "Yes!"
Wait a sec. Why would anyone want to use Digital Steganography?
You can easily solve this question yourself: Do you have any private documents, emails, picture files, or programs stored on your computer and you don't want anyone else to access them?
Over the course of this past week, I came across a program called "Invisible Secrets 4" which is capable of Steganography -- plus a whole lot more.
In short, Invisible Secrets 4 features:
- An Integrated Help Wizard: Creating a stealthy file is extremely simple (and fun!). Having said that, I was able to create my very first steganographic file in 5 simple steps using the window dialogue.
- Lock Applications: Do you have a program listed in your Start Menu that you don't want anyone to see? In that case, you'll be happy to know that Invisible Secrets 4 can password protect and remove applications that are listed in your Start Menu!
- Strong Encryption: Invisible Secrets 4 uses strong encryption algorithms to password protect and encrypt personal data. Side note: An algorithm is a computer techy-term used to describe a method. In this case, an Encryption Algorithm is simply a method used to encrypt (I.E.: secretly code) the content contained in the carrier file.
- Create Self-Decrypting Packages: Take any file (such as a document) and Invisible Secrets 4 can password protect it. Once the file is password protected, you can send the file to a friend over the Internet. Once your friend receives the file, a password is required to open and execute the file. If the password is incorrect, the file cannot be opened. Neat!
- The File Shredder: Helps you destroy any file, folder, and Internet traces beyond recovery, including: cache, cookies, URLs, history, and Most Recently Used Files History.
- Password Management: Safely stores passwords and helps you to create secure passwords.
Where is a good place to Store your self-made Steganographic Files?
Anywhere! After all, these files are practically invisible.
Invisible Secrets 4: Download
Before I wrote this article, I contacted the authors @ NeoByte Solutions and asked if they would be willing to offer a special discount for Infopackets Readers. Invisible Secrets 4 normally retails for $39.95 on the NeoByte Solutions web site (as seen here, next to "Buy Now" button) -- but I managed to finagle an amazing discount of 50% off.
For a limited time only, Infopackets Readers can download Invisible Secrets 4 today for only $19.95. This offer is *only* available through this web site and will expire in 7 days (December 11th, 2003).
So, act now!
Get your copy of Invisible Secrets 4 today using the link below!
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.