|
More tags: stego, steganography, steganographical, invisible, invisible, secret, hide a file, hide, file, hiding a file, bmp, graphics files, encryption,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Win98, WinME, WinNT 4.x, Windows2000, WinXP, Windows2003, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate |
|
|
Price : |
USD 23.50 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
20 Days |
|
|
Date : |
08/09/2008 |
|
|
Size : |
2.10 MB |
|
|
Software In :
Utilities
Security
stego, steganography, steganographical, invisible, invisible, secret, hide a file, hide, file, hiding a file, bmp, graphics files, encryption,
|
Hermetic Stego is a steganography program which allows you to encrypt and hide the contents of any data file in another file so that the addition of the data to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then there is no indication that it even exists, but it can still be recovered when you need to get at it. This program allows hiding a file of any size in one or more BMP image files, with or without the use of a user-specified stego/encryption key, so that (i) the presence of the hidden file is undetectable (even by forensic software using statistical methods) and (ii) if a user-specified stego key is used then the hidden file can be extracted only by someone, using this software, who knows that stego key. Hermetic Stego allows two operations: (i) hiding a message file in single BMP image file or in a set of BMP images and (ii) extracting a message file from a single BMP image file or a set of them. This program differs from others of this sort in two respects: 1. There is no limit on the size of the data file to be hidden because Hermetic Stego can hide a data file, not just in a single BMP image file, but in a set of them -- as many images as needed to contain the data file. 2. The bits of the data are inserted into the bytes of the image files randomly and in such a way as to defeat the use of statistical tests to reveal the presence of a hidden message. 3. The program can be used with a user-specified stego key or with a default stego key; use of a default stego key allows sending hidden data to another person who does not know what that stego key is.
Work Alone MonitorBarbell Exercises for the LegsSolitaire Scary Mummy FreeTourettes Guy RingtoneChemistry Solver17 Kisah Penuh Hikmah
|
|
Also See
1)
Encryption Xpert
Want to know what the easiest and the safest way to protect your data is? It's encryption. You can encrypt your files manually, as well as one hundred years ago, or using modern software. Encryption X...
License:Shareware USD 24.95
Size:0.92 MB
2)
VB AntiCrack
VB AntiCrack is used to make it more difficult to crack your programs written in Visual Basic 6.0. Most crackers will not be able to crack your program because they will not find a single text strings...
License:Shareware USD 39
Size:1.47 MB
3)
S.O.S.Automation
Baby - Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Cal...
License:Shareware USD 18
Size:3 MB
baby alarm, security, pc alarm, home monitor, ils servers,
4)
CDDVD Lock
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. ...
License:Shareware USD 29
Size:0.92 MB
5)
WinDentify
Windentify is a voice biometric source code for desktop clients. Visit www.windentify.com for live server demo. Includes fully working voice verified windows logon. Now start your machine with your vo...
License:Shareware USD 29
Size:8.77 MB
6)
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29
Size:0.62 MB
7)
IDFile
File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0
Size:0.22 MB
8)
CHAOS Public Key
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95
Size:0,4 MB
9)
ANTITHIEFWARE
ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.45 MB
10)
asquared HiJackFree
a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0
Size:1.54 MB
Tags: spyware, browser, tools, adware, toolbar, scripts, virus, trojan, malware, worm, dos, horse, worms, viruses, trojan horse, objects
|
1)
AnyPassword
It’s pretty difficult to hold a multitude of passwords in mind, isn’t it? A pin code for your mobile, a password for your mailbox, a pin code for your credit card, a password for your MSN Messenge...
License:Freeware USD 0
Size:0.63 MB
2)
Simply Accounting File Repair 2.0
Simply Accounting Corrupt or Damaged File Repair/Recovery We offer the following services to users of Simply Accounting®: Data Recovery including damaged media (backups made on bad floppy disks) Pass...
License:Shareware USD 199.00
Size:5.09 MB
3)
Password Recovery for Corel Paradox
Password Recovery by HXTT is a free toolkit for Corel Paradox databases from 3.0, 3.5, 4.x, 5.x, 7.x to 11.x. That freeware can help you to retrieve forgotten database password from Paradox password p...
License:Freeware USD 0
Size:0.03 MB
corel paradox recovery, corel paradox, paradox, java, password recovery, hxtt,
4)
Arc Menu
Y2K compliant, text-based,mouse-driven, uses NO memory, network support, multi- user, passwords and authority levels + access retrictions. Auto install. Short cuts and hot keys. Context help and user-...
License:Shareware USD 19.95
Size:0.57 MB
5)
SoundTimer
SoundTimer is simple and flexible task scheduling utility, for automating routine and repetitive tasks. It has many advantages over the standard Windows Task Scheduler: - Execute tasks every few secon...
License:Shareware USD 19.95
Size:0.58 MB
6)
ScriptMaker
ScriptMaker is a tool for script-writers and directors. It allows you to develop your script as well as format it properly, by integrating the process of story development with script writing. Story-p...
License:Shareware USD 25
Size:3.40 MB
7)
Cool Find
Cool Find is a powerful file search and management tool for Windows on PC&LAN. Many practical and cool functions make the work more effective and convenient. - Anything you can see in Windows Explorer...
License:Shareware USD 38.95
Size:1.61 MB
8)
Encrypt Files
Encrypt Files is free software to securely encrypt and password protect your confidential data. It is fast desktop application that supports 13 advanced encryption algorithms including Blowfish, Cast,...
License:Freeware USD 0
Size:1.01 MB
9)
Chilkat Create SelfExtracting EXE from Zip
Create self-extracting ZIP files optionally with unbreakable AES encryption. The ChilkatZip Self-Extractor can safely encrypt the contents of your ZIP file with 128, 192, or 256-bit AES Encryption. To...
License:Freeware USD 0
Size:.300 MB
10)
ExpressZIP
ExpressZIP features all of the powerful ZIP tools you'll ever need in an easy to use and attractive interface and comes complete with built-in Wizards to walk you through creating ZIP and EXE (self ex...
License:Shareware USD 19.95
Size:3.91 MB
Tags: zip, unzip, cab
|
|
More tags: stego, steganography, steganographical, invisible, invisible, secret, hide a file, hide, file, hiding a file, bmp, graphics files, encryption,
|
|