Hi users….Welcome to this page …
Here
is some technical information about how data is hidden and sent over net.
Generally messages may be sent in the
form of images ,articles,
shopping lists, or some other covertext and,
classically, the hidden message may be in invisible ink between the visible
lines of a private letter. One of the emerging technique that is used to encrypt your message is STEGANOGRAPHY.
This is an alternative method used instead of encryption. In
case of the images the bits are used and the contrast size of the image matters
a lot. If the computer criminal has used some sort of steganography then it is
required for the computer forensics professional to decode that information to
acquire valid evidence that can be produced in the court of law. If not identified as a steganographic
message; there is no chance of any leakage of information.
The message rides safely and
secretly to its destination. The message can be decrypted only if it is
identified. So it has an advantage over the encryption process. In case of the
encrypted text; however complicated may be the cipher applied but at least the
encrypted message is detectable as an encrypted message.
To
know more about this method Steganography.
The application of computing and network resources to
try every possible combination of
options of a password is called a brute
force attack. Since this is often an attempt to repeatedly guess
passwords to commonly used accounts, it is sometimes called a password attack.
If attackers can narrow the field of accounts to be attacked, they can devote
more time and resources to attacking fewer accounts. That is one reason a
recommended practise is to change account names for common accounts from the
manufacturer’s default.