Tuesday, 17 July 2012
http://m14hackersworld.blogspot.com
VMware Workstation 8
HA432-D225P-MZD89-7H2NP-9CN05
5A2VK-8209H-JZM50-Y9070-AAC4H
1F0XY-8UKEL-GZ381-12356-0C23Q
5A2M0-FAJEM-2Z870-WT1Q2-8C4PU
1F63K-6AK83-0ZE31-XJA70-3AL2H
0A00F-83313-4ZMG0-1HA7P-22MNR
HA4HQ-0K0E2-PZQ69-4827H-33JMD
5A4H7-8H286-FZYU9-HH0N6-02L5J
GZ3NK-63W8J-488YZ-QYM5T-X68ZA
AV5MR-06D80-481FY-XMZNE-YVUEF
CU1XK-6WW50-M815Y-RPPNX-PCUE8
AG18K-4HGEK-H88HP-UQNQZ-YZ282
ZA3MR-0RG4M-M89EP-MWQ5C-WUK8F
AG7H8-DUD50-H885Q-UNNQC-ZFAD2
VMware Workstation 8
HA432-D225P-MZD89-7H2NP-9CN05
5A2VK-8209H-JZM50-Y9070-AAC4H
1F0XY-8UKEL-GZ381-12356-0C23Q
5A2M0-FAJEM-2Z870-WT1Q2-8C4PU
1F63K-6AK83-0ZE31-XJA70-3AL2H
0A00F-83313-4ZMG0-1HA7P-22MNR
HA4HQ-0K0E2-PZQ69-4827H-33JMD
5A4H7-8H286-FZYU9-HH0N6-02L5J
GZ3NK-63W8J-488YZ-QYM5T-X68ZA
AV5MR-06D80-481FY-XMZNE-YVUEF
CU1XK-6WW50-M815Y-RPPNX-PCUE8
AG18K-4HGEK-H88HP-UQNQZ-YZ282
ZA3MR-0RG4M-M89EP-MWQ5C-WUK8F
AG7H8-DUD50-H885Q-UNNQC-ZFAD2
Posted by
M14 Network
at
07:45
http://m14hackersworld.blogspot.com
VMware Workstation 8
HA432-D225P-MZD89-7H2NP-9CN05
5A2VK-8209H-JZM50-Y9070-AAC4H
1F0XY-8UKEL-GZ381-12356-0C23Q
5A2M0-FAJEM-2Z870-WT1Q2-8C4PU
1F63K-6AK83-0ZE31-XJA70-3AL2H
0A00F-83313-4ZMG0-1HA7P-22MNR
HA4HQ-0K0E2-PZQ69-4827H-33JMD
5A4H7-8H286-FZYU9-HH0N6-02L5J
GZ3NK-63W8J-488YZ-QYM5T-X68ZA
AV5MR-06D80-481FY-XMZNE-YVUEF
CU1XK-6WW50-M815Y-RPPNX-PCUE8
AG18K-4HGEK-H88HP-UQNQZ-YZ282
ZA3MR-0RG4M-M89EP-MWQ5C-WUK8F
AG7H8-DUD50-H885Q-UNNQC-ZFAD2
VMware Workstation 8
HA432-D225P-MZD89-7H2NP-9CN05
5A2VK-8209H-JZM50-Y9070-AAC4H
1F0XY-8UKEL-GZ381-12356-0C23Q
5A2M0-FAJEM-2Z870-WT1Q2-8C4PU
1F63K-6AK83-0ZE31-XJA70-3AL2H
0A00F-83313-4ZMG0-1HA7P-22MNR
HA4HQ-0K0E2-PZQ69-4827H-33JMD
5A4H7-8H286-FZYU9-HH0N6-02L5J
GZ3NK-63W8J-488YZ-QYM5T-X68ZA
AV5MR-06D80-481FY-XMZNE-YVUEF
CU1XK-6WW50-M815Y-RPPNX-PCUE8
AG18K-4HGEK-H88HP-UQNQZ-YZ282
ZA3MR-0RG4M-M89EP-MWQ5C-WUK8F
AG7H8-DUD50-H885Q-UNNQC-ZFAD2
http://m14hackersworld.blogspot.com
AVG Internet Security 2012 12.0 Build 2193 x86
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RAJC2-O3P77-KRRQA-H3SLN-REMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-R2CML-SS7FW-MOXFR-TRU8V-3EMBR-ACED
8MEH-RS47Y-82HT8-GONVA-BCCCZ-DEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTDO8-QEMBR-ACED
8MEH-RF7RF-MR8JO-EWOVA-UVKMQ-FEMBR-ACED
8MEH-RFR8J-PTS8Q-92ATA-O4WHO-JEMBR-ACED
8MEH-R336M-QDYTV-ECNOR-6VWKU-CEMBR-ACED
8MEH-R6FE9-FWO64-T84MR-O96CY-7EMBR-ACED
8MEH-R3VBQ-DC433-3FPOA-YFE9U-NEMBR-ACED
8MEH-R6633-YP39H-YCNSR-HHW2U-EEMBR-ACED
AVG Internet Security 2012 12.0 Build 2193 x86
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RAJC2-O3P77-KRRQA-H3SLN-REMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-R2CML-SS7FW-MOXFR-TRU8V-3EMBR-ACED
8MEH-RS47Y-82HT8-GONVA-BCCCZ-DEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTDO8-QEMBR-ACED
8MEH-RF7RF-MR8JO-EWOVA-UVKMQ-FEMBR-ACED
8MEH-RFR8J-PTS8Q-92ATA-O4WHO-JEMBR-ACED
8MEH-R336M-QDYTV-ECNOR-6VWKU-CEMBR-ACED
8MEH-R6FE9-FWO64-T84MR-O96CY-7EMBR-ACED
8MEH-R3VBQ-DC433-3FPOA-YFE9U-NEMBR-ACED
8MEH-R6633-YP39H-YCNSR-HHW2U-EEMBR-ACED
http://m14hackersworld.blogspot.com
Tera copy Pro 2.12 - serial Genuine 100%
highlight the all the code below and copy
LVUWAwRAAAgJy/0PRf1zTIyY6tYeTpp32bpKDZ/fIBMnse+U+q3tC6XpCD/+3CQO
oLLtHUrjgpheKVZe4dX/C83AcHysvt61NJG8h4MRzGnNGURI88oBZrqjyleiFVjE
YHQprCsk6WfPbYwjJ0KSUQap8kfFoSF3Liq1WLN0N+k23lyE5e39estAK5MuNUTF
mwnNXiahgsLo30sUlLemvdQ58s6PjmeoNnI+GHxop+MPVV77geLT/VWL9ZVEav6O
CGwCz69BTgeBO+AcRpFFRDOSJvAR0MUYyN2/gDai0t+7Y7Ec0P7CsZPNubVpbVm1
zvmBf3cZljogg/v0tcDlf84QEaYe1sDYh62snz+3gKdJLWPR6S5t71Ms8AwELmWu
TvIlZ7EDtIZJ6+yEXacNDBAAAAA=
Tera copy Pro 2.12 - serial Genuine 100%
highlight the all the code below and copy
LVUWAwRAAAgJy/0PRf1zTIyY6tYeTpp32bpKDZ/fIBMnse+U+q3tC6XpCD/+3CQO
oLLtHUrjgpheKVZe4dX/C83AcHysvt61NJG8h4MRzGnNGURI88oBZrqjyleiFVjE
YHQprCsk6WfPbYwjJ0KSUQap8kfFoSF3Liq1WLN0N+k23lyE5e39estAK5MuNUTF
mwnNXiahgsLo30sUlLemvdQ58s6PjmeoNnI+GHxop+MPVV77geLT/VWL9ZVEav6O
CGwCz69BTgeBO+AcRpFFRDOSJvAR0MUYyN2/gDai0t+7Y7Ec0P7CsZPNubVpbVm1
zvmBf3cZljogg/v0tcDlf84QEaYe1sDYh62snz+3gKdJLWPR6S5t71Ms8AwELmWu
TvIlZ7EDtIZJ6+yEXacNDBAAAAA=
Tuesday, 3 July 2012
http://m14hackersworld.blogspot.com
Steganography In Images+Mp3+Video+Audio Files
When hiding information inside images the LSB (Least Significant Byte) method is usally used.
To a computer an image file is simply a file that shows different colors and intensities of light on
different area of an image. The best type of image file to hide information inside of is a 24 Bit.
BMP (Bitmap) image. The reason being is this is the largest type of file and it normally is of the
highest quality.
when an image is of high quality and resoulation is a lot easier to hide and mask information
inside of. Although 24 Bit images are best for hiding information inside of due to their size some
people may choose to use 8 Bit BMP's or possibly another image format such as Gif, the reason
being is that of posting of large images on the internet may arouse suspicion. It is important to
remember that if you hide information inside of an image file and that file is converted to another
image format, it is most likely the hidden information inside will be lost.
Some Commands To hide a secret Text file behind a Image file
Open CMD and write:
C:\Users\M14 Network>copy /b Image.bmp+secret.txt final.bmp (Note: M14 Network Is my user name on my laptop)
This command will hide a secret.txt file Behind a Image.bmp File and create a new bmp file named
as Final.bmp. To see the secret message right click on the final.bmp and open it with notepad. You
Can see the secret message in the last line.
OR open CMD and write:
C:\Users\M14 Network>notepad image.bmp:1
With this command we can attach ao many notepad named as 1,2,3,.etc and attach secret
message with the image.bmp file. If Anyone want to open this file again write the same command
in the CMD.
You can also use the all Image formats, Mp3's, Video's Etc.........
Steganography In Images+Mp3+Video+Audio Files
When hiding information inside images the LSB (Least Significant Byte) method is usally used.
To a computer an image file is simply a file that shows different colors and intensities of light on
different area of an image. The best type of image file to hide information inside of is a 24 Bit.
BMP (Bitmap) image. The reason being is this is the largest type of file and it normally is of the
highest quality.
when an image is of high quality and resoulation is a lot easier to hide and mask information
inside of. Although 24 Bit images are best for hiding information inside of due to their size some
people may choose to use 8 Bit BMP's or possibly another image format such as Gif, the reason
being is that of posting of large images on the internet may arouse suspicion. It is important to
remember that if you hide information inside of an image file and that file is converted to another
image format, it is most likely the hidden information inside will be lost.
Some Commands To hide a secret Text file behind a Image file
Open CMD and write:
C:\Users\M14 Network>copy /b Image.bmp+secret.txt final.bmp (Note: M14 Network Is my user name on my laptop)
This command will hide a secret.txt file Behind a Image.bmp File and create a new bmp file named
as Final.bmp. To see the secret message right click on the final.bmp and open it with notepad. You
Can see the secret message in the last line.
OR open CMD and write:
C:\Users\M14 Network>notepad image.bmp:1
With this command we can attach ao many notepad named as 1,2,3,.etc and attach secret
message with the image.bmp file. If Anyone want to open this file again write the same command
in the CMD.
You can also use the all Image formats, Mp3's, Video's Etc.........
Subscribe to:
Posts (Atom)
2 comments: