Home »
» Hide your Message behind the Image
11/20/2013 10:26:00 pm
Store your message inside Image
Hide your Message behind the Image
Hello, i am going to show you how to store your secret message inside the image.
Follow my instruction.
Step 1 : Open Notepad [Start >> Run >> Type "notepad" >> Enter]
Type your message which you want to hide in image and save it on deaktop.
Here i am saving my message in msg.txt file.
Step 2 : Copy one image on desktop. [Here i am copying 401.jpg image]
Step 3 : Now Open Command prompt [Start >> Run >> Type "cmd" >> Enter]
Now type cd desktop then hit Enter.
Then Type copy /b 401.jpg + msg.txt hiddenmsg.jpg
[Note : Here hiddenmsg.jpg is new image file which contain your message.
401.jpg is your image and msg.txt is text file
you have to change this file name in command as per your file name]
Thats it...!!! Now you can delete your old file [401.jpg and msg.txt]
Now you can see one new image file on your desktop name with hiddenmsg,jpg
How to see your message??
Step 1 : Open your new image [hiddenmsg.jpg] with notepad.
Step 2 : Go to End of that file. you will see your message there.
Related Posts:
FREE IDM HACKING
STEP 1 : DOWLOAD INTERNET DOWNLOAD MANAGER 6.17
Dowload idm6.17(30-day trial version.)
(note)
STEP 2 : INSTALL … Read More
INTERNET DOWNLOAD MANAGER NEW ORIGINAL FOREVER
STEP 1 : DOWLOAD INTERNET DOWNLOAD MANAGER 6.17
Dowload idm6.17(30-day trial version.)
(note)
STEP 2 : INSTALL … Read More
HOW TO RECOVER FACEBOOK MESSAGES ???
Retrieve Deleted Facebook Messages,Photos and Videos
Basically its a Facebook Feature which not many people are aware of
and hence i will be writing this tutorial to let you guys know about
this amazing feature… Read More
WIRELESS NETWORK SECURITY
Hackers
are becoming more and more sophisticated each day and making use of
some of the most thought-bred effective tools that guarantee complete
attack and kill! While everyone can't be a tech-buff so as to know all
a… Read More
DO YOU WANT TO BECOME SYSTEM ADMINISTRATOR???
Sys
admins have a crucial work at hand, that of maintaining the security of
the systems they have been entrusted with. As such they need to be
extra careful while selecting the tools for managing the security
scenario … Read More
0 comments:
Post a Comment