Wednesday, October 27, 2010

Escape To Guantanamo Bay Bottomless Party

Short Tip - Tip URLEnDecode

Short Tip - URLEnDecode
http://users.adam.com.au/paulwh/
very useful tool to resolve web addresses of

Gez
Frank Zickler

Escape To Guantanamo Bay Bottomless Party

Short Tip - Tip URLEnDecode

Short Tip - URLEnDecode
http://users.adam.com.au/paulwh/
very useful tool to resolve web addresses of

Gez
Frank Zickler

Tuesday, October 26, 2010

Storing Leather In A Cold Room

Encryption - Hide encrypted images in an ODT

Tip - Secure Information -. Hiding of encrypted images in a
odt (open document) with Open Office 3.2.1
www.openoffice.org

images should first be dealt with there to steghide to hide information, a picture that was edited with steghide the encrypted information includes in addition to the original image (Tip StegHideUI a GUI see for steghide), opens an unauthorized person the document, we see that only a picture and a nice message, the background information remain hidden from the eyes.
steghide (Freeware) steghide.sourceforge.net

The images in the 1:1 internal directory of the document name (Pictures) are stored ...
access to the directory can be as small file manager program on the wxCommander or muCommander. Tip - the muCommander wxCommander and is available for Windows and Linux. wxCommander (Freeware) www.wxcommander.com
muCommander (Freeware) www.mucommander.com

Info - Does not always provided with a file with a password. Only a write-protect files that can be read easily. In order to decipher the images, recommending I copy this from the document and store separately.
Note - The password in a write protection on the reliability, ensures only the intended read-only and should read the permit, provided that open in Open Office 3.2.1 write the function with artillery and password is selected. If a password is used for document protection the case is somewhat different, in this case, the security of documents previously provided with the proper password removed, then the files can be copied easily.

Open Office 3.2.1
Tools - Safety - Options for joint use of the document - Unprotect
Lotus Symphony
File - Security - Document Protection
(*** delete password save and remove)

The pictures take temporary name (eg 100000000000023DE00007490AE12093.jpg) that do not meet the original it is necessary to remember the content and / or deposit a notice with or description of the image in the document or the image itself.

The content is authentic to the original image, will remain that the encrypted information.

Depending on how many images are supplied in the document with encrypted information, Only one thing is mounted inside the document, this step is not necessary.

Attention: send the information to unknown, should be known by OpenOffice users in the metadata stores information that should be removed beforehand.

If the document internally as company and / or private exchange, the step is not absolutely necessary and even authenticate the source, it is to see as well as acting as security for the recipient. The information is available in the meta.xml within the OpenDocument file.
PS: The meta information is also Tools - Options - OpenOffice.org - User Data influence.

Another tip: Also let hide images behind each other, but with the flaw, which this camouflage of an encrypted file behind a normal image in the document with AbiWord and Lotus behaves Symphony otherwise, the images are still play seen at the level of the Open Document this does not matter (if the file structure as the wxCommander muCommander or is inaccessible), however, if an image with encrypted sensitive information, such as is used behind a photograph of camouflage is to stand as a message of love behind the photo of a piano.

The trick with the encrypted image also works with AbiWord insert simple image and save to open document. A change from the open office, but the file name, here is a file name under Pictures, such as stored f6ed451a-9812-1256-2378-1178cd89ad79 without extension, this must be as subsequently in the image format. jpg unnamed.
Note: My comment AbiWord does not store user information in the standard. AbiWord (freeware) www.abisource.com - www.abiword.org

I recommend before starting the file, checking in particular the sending of previously unknown information in the meta.xml of OpenOffice .

PS: Alternatively, the encrypted image is stored locally in the document, I but wanted to show a possibility of independence.

mirror pdf

Gez
Frank Zickler

Storing Leather In A Cold Room

Encryption - Hide encrypted images in an ODT

Tip - Secure Information -. Hiding of encrypted images in a
odt (open document) with Open Office 3.2.1
www.openoffice.org

images should first be dealt with there to steghide to hide information, a picture that was edited with steghide the encrypted information includes in addition to the original image (Tip StegHideUI a GUI see for steghide), opens an unauthorized person the document, we see that only a picture and a nice message, the background information remain hidden from the eyes.
steghide (Freeware) steghide.sourceforge.net

The images in the 1:1 internal directory of the document name (Pictures) are stored ...
access to the directory can be as small file manager program on the wxCommander or muCommander. Tip - the muCommander wxCommander and is available for Windows and Linux. wxCommander (Freeware) www.wxcommander.com
muCommander (Freeware) www.mucommander.com

Info - Does not always provided with a file with a password. Only a write-protect files that can be read easily. In order to decipher the images, recommending I copy this from the document and store separately.
Note - The password in a write protection on the reliability, ensures only the intended read-only and should read the permit, provided that open in Open Office 3.2.1 write the function with artillery and password is selected. If a password is used for document protection the case is somewhat different, in this case, the security of documents previously provided with the proper password removed, then the files can be copied easily.

Open Office 3.2.1
Tools - Safety - Options for joint use of the document - Unprotect
Lotus Symphony
File - Security - Document Protection
(*** delete password save and remove)

The pictures take temporary name (eg 100000000000023DE00007490AE12093.jpg) that do not meet the original it is necessary to remember the content and / or deposit a notice with or description of the image in the document or the image itself.

The content is authentic to the original image, will remain that the encrypted information.

Depending on how many images are supplied in the document with encrypted information, Only one thing is mounted inside the document, this step is not necessary.

Attention: send the information to unknown, should be known by OpenOffice users in the metadata stores information that should be removed beforehand.

If the document internally as company and / or private exchange, the step is not absolutely necessary and even authenticate the source, it is to see as well as acting as security for the recipient. The information is available in the meta.xml within the OpenDocument file.
PS: The meta information is also Tools - Options - OpenOffice.org - User Data influence.

Another tip: Also let hide images behind each other, but with the flaw, which this camouflage of an encrypted file behind a normal image in the document with AbiWord and Lotus behaves Symphony otherwise, the images are still play seen at the level of the Open Document this does not matter (if the file structure as the wxCommander muCommander or is inaccessible), however, if an image with encrypted sensitive information, such as is used behind a photograph of camouflage is to stand as a message of love behind the photo of a piano.

The trick with the encrypted image also works with AbiWord insert simple image and save to open document. A change from the open office, but the file name, here is a file name under Pictures, such as stored f6ed451a-9812-1256-2378-1178cd89ad79 without extension, this must be as subsequently in the image format. jpg unnamed.
Note: My comment AbiWord does not store user information in the standard. AbiWord (freeware) www.abisource.com - www.abiword.org

I recommend before starting the file, checking in particular the sending of previously unknown information in the meta.xml of OpenOffice .

PS: Alternatively, the encrypted image is stored locally in the document, I but wanted to show a possibility of independence.

mirror pdf

Gez
Frank Zickler

Katesplayground Gello

TREAT ME RIGHT Party Performance

* Oct, 28, from 9pm:

hosted by

Collective involvement, severity
sisters and
Vipfek,
office for foreign affairs.

Katesplayground Gello

TREAT ME RIGHT Party Performance

* Oct, 28, from 9pm:

hosted by

Collective involvement, severity
sisters and
Vipfek,
office for foreign affairs.

Buy Protein Online In Singapore

Inter-Culture Club


The fundraising event of the initiative minorities
Thursday 2 December 2010 East Club

concert and party with a wonderful program:
Live:
plaided
Celia Mara
Jelena Popržan - Rina Kacinari - Ljubinka Jokic & Maria Petrova
alias: Catch-pop string YOK!
first fatal kiss
pop: sch
DJs on 2 floors: shushu, Iif & elchaos (quote) and the em (current + -) & & ruby
jasmine (homoriental)
Einlass: 20:30 h
Konzertbeginn 21h
Spen € 9 -

Buy Protein Online In Singapore

Inter-Culture Club


The fundraising event of the initiative minorities
Thursday 2 December 2010 East Club

concert and party with a wonderful program:
Live:
plaided
Celia Mara
Jelena Popržan - Rina Kacinari - Ljubinka Jokic & Maria Petrova
alias: Catch-pop string YOK!
first fatal kiss
pop: sch
DJs on 2 floors: shushu, Iif & elchaos (quote) and the em (current + -) & & ruby
jasmine (homoriental)
Einlass: 20:30 h
Konzertbeginn 21h
Spen € 9 -

Friday, October 22, 2010

Sean Cody I Could Not Resist

Encrypt - Tips - PixelCryptor special encrypted image as keys

Tip - PixelCryptor special encrypted image as a key

Tip - PixelCryptor special encrypted image as a key, a picture is still uncertain as the key right?
Taking a picture from the Internet as a news message ... so this key, an unauthorized person outside of the reach, the change of size, etc.. can also be simulated, an additional information, but even encrypted (secure), it acts as a watermark and is not easily replicate. Furthermore, the image can not be deposited with the human eye visible watermark, but it is important that it is indistinguishable from the original (for JPEG is the compression ratio is a possibility, along with hidden information).
Together with the background information, results in a virtually non-falsified image.
It may be that someone can calculate the value and or images can fake almost identical, therefore, attach the additional information behind a picture of it because, as later described, this additional information for further encrypted archive can be applied.

Even if the image looks the same, details of which Size and bears The same date,
be about as SetgHide or one of the alternatives GUIs feed a picture with additional information, background information can result in a meaningful text and / or contain a string that is only used to change the image it as a core for use with PixelCryptor encrypted file.

example

Creates a text file "1234FD671298ACBE.TXT" writes in this example

more strings and / or copy a randomly-generated RSA 8 MBit key in there, even a newspaper article to be "SMILE" .

example, a string that initially makes no sense
78123567adefcb678910987653efadfcd678909914567781edfcdbaedfdc9876gjriugshueirtueitureitu5tpiorguep98ur9u30t4riut39i40493ti30tgi4309gti4344gtzzbftuziuz48up8OIUZGIBUZKJMIÖOLIKOÖPIi09ig9045455ß43544443hfbIJTUZTFIUHLUMUpotghpi4r5tg950t40vgörk09543wit4632üt434r43e39723498034923403483094237832492830483403ß34ß34348kjfgodf34433

encrypted (hidden), the text file behind the image that you want to use as a key, see steghide instructions ... On Pixel Cryptor the image itself serves as a key, see instructions for Pixel Cryptor ...

Tip: Compression can be with different programs including GIMP, ThumbsPlus, almost infinitely change selected, an image with the highest possible resolution, change and / or placing your watermark there after scaling and compression to see both pictures of the same, however, are minimally different, but not for the eye to perceive.

If you have any pictures with high resolution, you can also increase small and then bring in the watermark, after reduction of the difference is no longer visible.

A detailed description of me here ...
mirror
http://imagecargo.com/view/gallery/KDQUJ/Tipp_PixelCryptor_photo.htm

A tip at the end
hence this string with some sense can the image be given a password that is as your circle is known.

The modified image itself is the key for that PixelCryptor encrypted file, this may include a different encrypted archives and / or containers, the contents of this further encrypted file can be with such additional information and entangle the content of the background information of the image .

example chain 1 = key to unpack Crypter of pixels with encrypted archive has to be present but steghide decrypted with the information from the image.

CodeGazer - http://steghide.sourceforge.net PixelCryptor (Freeware)
http://www.codegazer.com/

steghide (Freeware)


StegHideUI (Freeware)
http://www.softsea.com/download/StegHideUI.html
http://www.softpedia.com/get/Security/Encrypting/StegHideUI.shtml

StegUI by Nicola Cocchiaro - Linux (GNU General Public License)
http://stegui.sourceforge.net/

PDF
Tip - PixelCryptor special Encrypted image as keys
http://pdfcast.org/pdf/tipp- pixelcryptor-special-encrypted-image-as-schluessel

Here's a little test for PixelCryptor

Invite the first two images and Image01 image02.jpg, the images contain information on how you the background information within the time PixelCryptor encrypted images come ...

steghide Chiper GOST
image01.jpg - key: 6hjKlmERtz09Plas71234567890edfcb
steghide Chiper GOST
image02.jpg - key: 6dfasedfcdvegtzuhj7tgaWSxdcloPla
both images look the same ...

is the key to img01.cgp image01.jpg image02.jpg
is the key to img02.cgp

correspond to rename after downloading ...

(ImageCargo.com) keys_KDAQP1.jpg = image01.jpg
mirror

(ImageCargo.com)keys_KDAQP2.jpg = image02.jpg
mirror

(ImageCargo.com)keys_KDAQP3.jpg = img01.cgp
mirror

(ImageCargo.com)keys_KDAQP4.jpg = img02.cgp
mirror

another mirror pixelcryptor.zip simply unpack and rest see above ...
http://www.qdrive.net/FrankZickler/file/181613/f6bf8f0483fbfe07f43b0ea4d3b1bb61

further instructions are each behind the pictures ...

distance - please note the following distancing
http://distanzierungblog-frankzickler.blogspot.com/
alternative
http://x.vu/distanz
http://imagecargo.com / view / gallery / CEGXN / Distanzierung_photo.htm

Gez
Frank Zickler

Sean Cody I Could Not Resist

Encrypt - Tips - PixelCryptor special encrypted image as keys

Tip - PixelCryptor special encrypted image as a key

Tip - PixelCryptor special encrypted image as a key, a picture is still uncertain as the key right?
Taking a picture from the Internet as a news message ... so this key, an unauthorized person outside of the reach, the change of size, etc.. can also be simulated, an additional information, but even encrypted (secure), it acts as a watermark and is not easily replicate. Furthermore, the image can not be deposited with the human eye visible watermark, but it is important that it is indistinguishable from the original (for JPEG is the compression ratio is a possibility, along with hidden information).
Together with the background information, results in a virtually non-falsified image.
It may be that someone can calculate the value and or images can fake almost identical, therefore, attach the additional information behind a picture of it because, as later described, this additional information for further encrypted archive can be applied.

Even if the image looks the same, details of which Size and bears The same date,
be about as SetgHide or one of the alternatives GUIs feed a picture with additional information, background information can result in a meaningful text and / or contain a string that is only used to change the image it as a core for use with PixelCryptor encrypted file.

example

Creates a text file "1234FD671298ACBE.TXT" writes in this example

more strings and / or copy a randomly-generated RSA 8 MBit key in there, even a newspaper article to be "SMILE" .

example, a string that initially makes no sense
78123567adefcb678910987653efadfcd678909914567781edfcdbaedfdc9876gjriugshueirtueitureitu5tpiorguep98ur9u30t4riut39i40493ti30tgi4309gti4344gtzzbftuziuz48up8OIUZGIBUZKJMIÖOLIKOÖPIi09ig9045455ß43544443hfbIJTUZTFIUHLUMUpotghpi4r5tg950t40vgörk09543wit4632üt434r43e39723498034923403483094237832492830483403ß34ß34348kjfgodf34433

encrypted (hidden), the text file behind the image that you want to use as a key, see steghide instructions ... On Pixel Cryptor the image itself serves as a key, see instructions for Pixel Cryptor ...

Tip: Compression can be with different programs including GIMP, ThumbsPlus, almost infinitely change selected, an image with the highest possible resolution, change and / or placing your watermark there after scaling and compression to see both pictures of the same, however, are minimally different, but not for the eye to perceive.

If you have any pictures with high resolution, you can also increase small and then bring in the watermark, after reduction of the difference is no longer visible.

A detailed description of me here ...
mirror
http://imagecargo.com/view/gallery/KDQUJ/Tipp_PixelCryptor_photo.htm

A tip at the end
hence this string with some sense can the image be given a password that is as your circle is known.

The modified image itself is the key for that PixelCryptor encrypted file, this may include a different encrypted archives and / or containers, the contents of this further encrypted file can be with such additional information and entangle the content of the background information of the image .

example chain 1 = key to unpack Crypter of pixels with encrypted archive has to be present but steghide decrypted with the information from the image.

CodeGazer - http://steghide.sourceforge.net PixelCryptor (Freeware)
http://www.codegazer.com/

steghide (Freeware)


StegHideUI (Freeware)
http://www.softsea.com/download/StegHideUI.html
http://www.softpedia.com/get/Security/Encrypting/StegHideUI.shtml

StegUI by Nicola Cocchiaro - Linux (GNU General Public License)
http://stegui.sourceforge.net/

PDF
Tip - PixelCryptor special Encrypted image as keys
http://pdfcast.org/pdf/tipp- pixelcryptor-special-encrypted-image-as-schluessel

Here's a little test for PixelCryptor

Invite the first two images and Image01 image02.jpg, the images contain information on how you the background information within the time PixelCryptor encrypted images come ...

steghide Chiper GOST
image01.jpg - key: 6hjKlmERtz09Plas71234567890edfcb
steghide Chiper GOST
image02.jpg - key: 6dfasedfcdvegtzuhj7tgaWSxdcloPla
both images look the same ...

is the key to img01.cgp image01.jpg image02.jpg
is the key to img02.cgp

correspond to rename after downloading ...

(ImageCargo.com) keys_KDAQP1.jpg = image01.jpg
mirror

(ImageCargo.com)keys_KDAQP2.jpg = image02.jpg
mirror

(ImageCargo.com)keys_KDAQP3.jpg = img01.cgp
mirror

(ImageCargo.com)keys_KDAQP4.jpg = img02.cgp
mirror

another mirror pixelcryptor.zip simply unpack and rest see above ...
http://www.qdrive.net/FrankZickler/file/181613/f6bf8f0483fbfe07f43b0ea4d3b1bb61

further instructions are each behind the pictures ...

distance - please note the following distancing
http://distanzierungblog-frankzickler.blogspot.com/
alternative
http://x.vu/distanz
http://imagecargo.com / view / gallery / CEGXN / Distanzierung_photo.htm

Gez
Frank Zickler

Thursday, October 21, 2010

Replace Vaseline For Masterbation

concept of mobile ...

concept of mobile ...
still looking for contributors to create free software solutions for Linux and Microsoft operating systems, with the aim of compatible mobile application base Live and office machines. (Applications are based on freeware and GPL licenses).

particularly sought WINE Tester and configurators ...
The concept provides a uniform standard configuration (base) for WINE, which is also is incorporated into Debian Live DVD, unfortunately, the configuration of your Linux distribution winetricks and is not always available.

suggestions and tips for applications that can be applied-platform can be found at http://seytek.blogspot.com , the more I am always open for more tips ...

I continue to find sensible solutions that run on Windows and Linux mobile (portable) among others.

As a tip: these are, for Java applications within a Java platform works, freeware and GPL programs that are either designed for mobile and / or mobile can be used. Including applications include, for example, all the necessary Files and libraries to bring and / or access standards. (Running Not every application, the mobile is listed as a portable)

Test Tip: Most are small freeware tools from without complex installation and just copy files locally, use in a registration which only a file association create can be ignored for a mobile application be. File associations are not required for mobile, but you should worry small Srcipte to build, clean up your system registry, again, provided the mobile application is used on a company computer (typing regedit - Export Entry).

Contact: Tel +49 (0) 17675479380 Mail: seytekoffice@lavabit.com

Frank Zickler


Replace Vaseline For Masterbation

concept of mobile ...

concept of mobile ...
still looking for contributors to create free software solutions for Linux and Microsoft operating systems, with the aim of compatible mobile application base Live and office machines. (Applications are based on freeware and GPL licenses).

particularly sought WINE Tester and configurators ...
The concept provides a uniform standard configuration (base) for WINE, which is also is incorporated into Debian Live DVD, unfortunately, the configuration of your Linux distribution winetricks and is not always available.

suggestions and tips for applications that can be applied-platform can be found at http://seytek.blogspot.com , the more I am always open for more tips ...

I continue to find sensible solutions that run on Windows and Linux mobile (portable) among others.

As a tip: these are, for Java applications within a Java platform works, freeware and GPL programs that are either designed for mobile and / or mobile can be used. Including applications include, for example, all the necessary Files and libraries to bring and / or access standards. (Running Not every application, the mobile is listed as a portable)

Test Tip: Most are small freeware tools from without complex installation and just copy files locally, use in a registration which only a file association create can be ignored for a mobile application be. File associations are not required for mobile, but you should worry small Srcipte to build, clean up your system registry, again, provided the mobile application is used on a company computer (typing regedit - Export Entry).

Contact: Tel +49 (0) 17675479380 Mail: seytekoffice@lavabit.com

Frank Zickler


Tuesday, October 19, 2010

Recipes Using Betty Crocker Mix

steghide and StegHideUI mirror

steghide and StegHideUI mirror

view mythink.jpg
use the number for the password protecd extract zip files ...

use 7-Zip or PeaZIP
rename (ImageCargo.com)lilya_JOJQY2.jpg upt to (ImageCargo.com)lilya_JOJQY4.jpg after download,
this is not a image...

(ImageCargo.com)lilya_JOJQY1.jpg = mythink.jpg
http://imagecargo.com/view/image/JOJQY1/lilya_photo.htm
http://imagecargo.com/view/imagefile/JOJQY1/(ImageCargo.com)lilya_JOJQY1.jpg

(ImageCargo.com)lilya_JOJQY2.jpg = steghide2003.zip.001
http://imagecargo.com/view/image/JOJQY2/lilya_photo.htm
http://imagecargo.com/view/imagefile/JOJQY2/(ImageCargo.com)lilya_JOJQY2.jpg

(ImageCargo.com)lilya_JOJQY3.jpg = steghide2003.zip.002
http://imagecargo.com/view/image/JOJQY3/lilya_photo.htm
http://imagecargo.com/view/imagefile/JOJQY3/(ImageCargo.com)lilya_JOJQY3.jpg

(ImageCargo.com)lilya_JOJQY4.jpg = StegHideUI.zip
http://imagecargo.com/view/image/JOJQY4/lilya_photo.htm
http://imagecargo.com/view/imagefile/JOJQY4/(ImageCargo.com)lilya_JOJQY4.jpg

native download StegHide
http://steghide.sourceforge.net
native download StegHideUI
http://www.softpedia.com/get/Security/Encrypting/StegHideUI.shtml

have a nice day ...

distance - please note the following distancing
http://distanzierungblog-frankzickler.blogspot.com/
alternative
http://x.vu/distanz
http://imagecargo.com/view / gallery / CEGXN / Distanzierung_photo.htm


cu
Frank Zickler

Recipes Using Betty Crocker Mix

steghide and StegHideUI mirror

steghide and StegHideUI mirror

view mythink.jpg
use the number for the password protecd extract zip files ...

use 7-Zip or PeaZIP
rename (ImageCargo.com)lilya_JOJQY2.jpg upt to (ImageCargo.com)lilya_JOJQY4.jpg after download,
this is not a image...

(ImageCargo.com)lilya_JOJQY1.jpg = mythink.jpg
http://imagecargo.com/view/image/JOJQY1/lilya_photo.htm
http://imagecargo.com/view/imagefile/JOJQY1/(ImageCargo.com)lilya_JOJQY1.jpg

(ImageCargo.com)lilya_JOJQY2.jpg = steghide2003.zip.001
http://imagecargo.com/view/image/JOJQY2/lilya_photo.htm
http://imagecargo.com/view/imagefile/JOJQY2/(ImageCargo.com)lilya_JOJQY2.jpg

(ImageCargo.com)lilya_JOJQY3.jpg = steghide2003.zip.002
http://imagecargo.com/view/image/JOJQY3/lilya_photo.htm
http://imagecargo.com/view/imagefile/JOJQY3/(ImageCargo.com)lilya_JOJQY3.jpg

(ImageCargo.com)lilya_JOJQY4.jpg = StegHideUI.zip
http://imagecargo.com/view/image/JOJQY4/lilya_photo.htm
http://imagecargo.com/view/imagefile/JOJQY4/(ImageCargo.com)lilya_JOJQY4.jpg

native download StegHide
http://steghide.sourceforge.net
native download StegHideUI
http://www.softpedia.com/get/Security/Encrypting/StegHideUI.shtml

have a nice day ...

distance - please note the following distancing
http://distanzierungblog-frankzickler.blogspot.com/
alternative
http://x.vu/distanz
http://imagecargo.com/view / gallery / CEGXN / Distanzierung_photo.htm


cu
Frank Zickler