Monday, October 26, 2020

How To Secretly Hide Folder/s or any Type of Files behind An Image

 

How To Secretly Hide Folder/s or any Type of Files behind An Image

How To Hide Your Secret Files Behind An Image: - Yes, you heard it right? You can hide all your secret files behind a harmless looking image file. No one would be able to guess where you have safely hidden all your secret data. This is an amazing trick that you should try today yourself. So let us Start to learn how to hack this amazing trick!

 

STEP 1

  •        First of all, create a folder or choose any folder in your hard disk drive .

STEP 2

·        Add all those files into this folder that you want to hide from others. You can add any sort of files including music files, documents, videos, your secret diary etc.



STEP 3

·        Now you need to compress all these files and make it a single file. For that I have used winrar. You can use any compression software of your choice. Another popular compression software is winzip or  7-Zip.



STEP 4

  • Now, open Command Prompt by typing cmd into your search box and launch it from the results that appear.

STEP 5

·        As next, copy-paste or type in the following commands one by one into your Command Prompt and hit Enter after each command.

Format

cd Folder Path\Name of the folder containing secret files

copy /b Name of the image file.jpg + Name of the zip file.zip Name of the image file.jpg

Example

cd D:\Important_Files

copy /b howto.jpg + Important_Files.zip newpicturename.jpg

 



That’s it. Now you can exit from the Command Prompt by either typing exit or simply by closing it. Refer to the screenshot given below in case you come across any difficulties.

Note : It is very important to take care of the special symbols like / and space while entering commands.

STEP 6

·        Now you can get back to the original folder. You can delete all the files including important_Files.zip AND KEEP ONLY THE NEWLY GENERATED PICTURE .

 

·        After this step, only the image file , i.e, newpicturename.jpg will remain in the Important_Files folder.




 



STEP 7

·        Now right click on the image file and then choose Open with. Choose a decompression software from the list. I have chosen winrar File Manager.



STEP 8

·        There you are! Now you can extract your secret files from your secret image file just like that.

After it is created, you can move the image file containing your secret files to any location as per your choice. You can save it anywhere, though, as no one would guess such a big secret could be lying under a sweet cute image. Feel free to leave comments in case you need assistance with any of the steps.

 




Sunday, October 25, 2020

How to Generate a QR code with your the access details to share your Wi-Fi access with your friends coming to your house

To share your Wi-Fi access with your friends coming to your house Simply go to  Generate a QR code  Put your access details. 

Print it and stick it on the wall.




How to Check a website is safe to visit or Not ?

Google’s Safe Browsing technology examines billions of URLs per day looking for unsafe websites. Every day, Google discover thousands of new unsafe sites, many of which are legitimate websites that have been compromised. When we detect unsafe sites, Google show warnings on Google Search and in web browsers. You can search to see whether a website is currently dangerous to visit.

Use the follwoing URL and change the red marked with your site you want to examine .

http://www.google.com/safebrowsing/diagnostic?site=spotlightshowto.blogspot.com




How to Search in Google for Direct Mp3 Links ?

 intitle:index.of?mp3 Your song name here



How to enable SSH session recording in CentOS 8 ?

CentOS 8 has been released and it includes some really amazing features. One feature that many security admins will greatly appreciate is session recording. With this feature, CentOS will record any/all SSH sessions, which includes all of the user activity that occurs during the session. Once recorded, videos of these sessions can be played back by any admin with a Cockpit login.

What you'll need

To make this work, you'll need the following:
  • A running instance of CentOS 8
  • A running instance of Cockpit 
  • A user with sudo privileges

How to install necessary packages

Before that first session can be recorded, there are a few packages that must be installed. Open a terminal window and issue the following commands:
sudo systemctl enable --now cockpit.socket"
sudo dnf install tlog
sudo dnf install sssd
sudo dnf install cockpit-session-recording
sudo dnf install systemd-journal-remote

Then setup a very basic SSSD configuration to manage local RHEL users.
To do this, I created an /etc/sssd/sssd.conf file with this basic example configuration:
[domain/local]
id_provider = files

[sssd]
domains = local
services = nss, pam, ssh, sudo
I then set the sssd.conf file permissions, and restart sssd:
chmod 600 /etc/sssd/sssd.conf
systemctl restart sssd
The next step is to open a web browser and to browse to the cockpit web interface, which is available on port 9090.  I used firefox, and browsed to https://<IP-Address>:9090, where <IP-Address> is the IP address of the RHEL 8 server.  
Login to cockpit either as the root user, or you can login with another user with sudo privileges, and check the box on the login screen to "Reuse my password for privileged tasks".  
Once logged in, click on the "Session Recording" link on the left hand menu, then click the configuration gear button in the upper right corner.  
Web console in RHEL 8 Beta
From here, several options can be configured such as a warning message to display to users to let them know their session is being recorded.   I’ll stick to the defaults, and scroll down to the SSSD Configuration section. From here, I’ll set the "Scope" to "All", and click the Save button.  This will configure session recording for all SSSD users.
SSSD Configuration

Testing Out Session Recording

At this point, we have a basic session recording configuration setup, and we will confirm that it’s working. I’ll login to the server over SSH:
SSH Session
Notice the warning message that this session is being recorded (this message is configurable).  
Next, I’ll go ahead and run several commands which will be recorded, then exit out of the SSH session.  
Back from the web console interface, if I go back to the "Session Recording" menu option, I can see the sessions that have been recorded, including: the user name, the start and end times, and the duration of the recording:
Web console session chooser
I’ll click on the this line, which will take me to the session recording player screen, where I can click the play button and watch what happened during the session. I can also change the playback speed to speed up or slow down the playback.  In my recorded session, I had run the top command:
Web console session playback

Accessing Recordings from the Command Line

It is also possible to access the recordings from the command line rather than the Cockpit web based interface.   By default, the session recordings are stored in journalctl.
The first step to playing back a session from the command line is to find the recording ID, by running a command such as journalctl -o verbose | grep \"rec\".
Once the recording ID has been determined, the session can be played back with the tlog-play -r journal -M TLOG_REC= command, where recording_ID is the recording ID found with the previous journalctl command.
As an example, see the screenshot of session playback:
Terminal-based session playback