SlideShare a Scribd company logo
Sending Under the Radar
    #2 - Avoid from monitoring




         ICT Training for Citizen Journalism
          January 29-31, 2008 - Bangkok
Multiple, Large, Secret ?

• Zip (Windows Compress, WinZip)
• Split (The File Splitter, WinRAR)
• Encryption (7zip, WinRAR)
Zip
      •   Windows Compress
Split
   •    The File Splitter
Encryption
   •   7zip, WinRAR
Send by E-mail & Web Service
   • Image to Text
   • Text to Image
   • Photo Hosting
   • Photo Sharing
   • File Hosting (Multiple format)
   • Google Docs.
Image to Text            (binary to base-64)

•   www.motobit.com/util/base64-decoder-encoder.asp
Text to Image
•   Paint (Windows) or other programs




           Type your serious information
         in picture and save to image kind.

       Save in different name, Ex. “flower.jpg”
Photo Hosting
•   www.ImageShack.us
Photo Sharing
•   www.flickr.com
File Hosting
•   www.YouSendIt.com
Google Docs.
•   http://docs.google.com

More Related Content

Similar to Sending under the Radar

Cataloging Video Resources with RDA: Part 1 (May 2018)
Cataloging Video Resources with RDA: Part 1 (May 2018)Cataloging Video Resources with RDA: Part 1 (May 2018)
Cataloging Video Resources with RDA: Part 1 (May 2018)
ALATechSource
 
Cataloging Video Resources with RDA: Part 1 (July 2019)
Cataloging Video Resources with RDA: Part 1 (July 2019)Cataloging Video Resources with RDA: Part 1 (July 2019)
Cataloging Video Resources with RDA: Part 1 (July 2019)
ALAeLearningSolutions
 
Таны мэдлэгт-Бяцхан зууш
Таны мэдлэгт-Бяцхан зуушТаны мэдлэгт-Бяцхан зууш
Таны мэдлэгт-Бяцхан зууш
Natsagdorj
 
Video Compression
Video CompressionVideo Compression
Video Compression
Shreyash Patel
 
Cataloging Video Resources with RDA: Part 1 (July 2017)
Cataloging Video Resources with RDA: Part 1 (July 2017)Cataloging Video Resources with RDA: Part 1 (July 2017)
Cataloging Video Resources with RDA: Part 1 (July 2017)
ALATechSource
 
7 3 Preparing The Elements Video
7 3 Preparing The Elements Video7 3 Preparing The Elements Video
7 3 Preparing The Elements VideoStark State College
 
Cataloging Video Resources with RDA Workshop: Pt. 1
Cataloging Video Resources with RDA Workshop: Pt. 1Cataloging Video Resources with RDA Workshop: Pt. 1
Cataloging Video Resources with RDA Workshop: Pt. 1
ALATechSource
 
Jpeg 2000 For Digital Archives
Jpeg 2000 For Digital ArchivesJpeg 2000 For Digital Archives
Jpeg 2000 For Digital Archives
Richard Bernier
 
Recover deleted photos from your Digital Camera sd Card
Recover deleted photos from your Digital Camera sd CardRecover deleted photos from your Digital Camera sd Card
Recover deleted photos from your Digital Camera sd CardArthur King
 
Free software-course
Free software-courseFree software-course
Free software-course
colin hamilton
 
Implementation Of Video Digital Watermarking Based on Python
Implementation Of Video Digital Watermarking Based on PythonImplementation Of Video Digital Watermarking Based on Python
Implementation Of Video Digital Watermarking Based on Python
IRJET Journal
 
Imagically Image Forensic Tool
Imagically Image Forensic ToolImagically Image Forensic Tool
Imagically Image Forensic Tool
ijtsrd
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSI
guest9f2a14
 
Lenovo Consumer
Lenovo ConsumerLenovo Consumer
Lenovo Consumer
xharlylejahn
 
PNGHack 1.0 Presentation
PNGHack 1.0 PresentationPNGHack 1.0 Presentation
PNGHack 1.0 Presentation
Yves Van Goethem
 
Planning and research
Planning and researchPlanning and research
Planning and researchsedgar7
 
Question 4
Question 4Question 4
Question 4sedgar7
 
Integra Micro Software Services (P) Ltd. - Imaging Expertise
Integra Micro Software Services (P) Ltd. - Imaging ExpertiseIntegra Micro Software Services (P) Ltd. - Imaging Expertise
Integra Micro Software Services (P) Ltd. - Imaging Expertise
sreesinbox
 
Mark Minasi Introducing Windows 7
Mark Minasi   Introducing Windows 7Mark Minasi   Introducing Windows 7
Mark Minasi Introducing Windows 7Nathan Winters
 

Similar to Sending under the Radar (20)

Cataloging Video Resources with RDA: Part 1 (May 2018)
Cataloging Video Resources with RDA: Part 1 (May 2018)Cataloging Video Resources with RDA: Part 1 (May 2018)
Cataloging Video Resources with RDA: Part 1 (May 2018)
 
Cataloging Video Resources with RDA: Part 1 (July 2019)
Cataloging Video Resources with RDA: Part 1 (July 2019)Cataloging Video Resources with RDA: Part 1 (July 2019)
Cataloging Video Resources with RDA: Part 1 (July 2019)
 
Таны мэдлэгт-Бяцхан зууш
Таны мэдлэгт-Бяцхан зуушТаны мэдлэгт-Бяцхан зууш
Таны мэдлэгт-Бяцхан зууш
 
Video Compression
Video CompressionVideo Compression
Video Compression
 
Cataloging Video Resources with RDA: Part 1 (July 2017)
Cataloging Video Resources with RDA: Part 1 (July 2017)Cataloging Video Resources with RDA: Part 1 (July 2017)
Cataloging Video Resources with RDA: Part 1 (July 2017)
 
7 3 Preparing The Elements Video
7 3 Preparing The Elements Video7 3 Preparing The Elements Video
7 3 Preparing The Elements Video
 
Punto 15
Punto 15Punto 15
Punto 15
 
Cataloging Video Resources with RDA Workshop: Pt. 1
Cataloging Video Resources with RDA Workshop: Pt. 1Cataloging Video Resources with RDA Workshop: Pt. 1
Cataloging Video Resources with RDA Workshop: Pt. 1
 
Jpeg 2000 For Digital Archives
Jpeg 2000 For Digital ArchivesJpeg 2000 For Digital Archives
Jpeg 2000 For Digital Archives
 
Recover deleted photos from your Digital Camera sd Card
Recover deleted photos from your Digital Camera sd CardRecover deleted photos from your Digital Camera sd Card
Recover deleted photos from your Digital Camera sd Card
 
Free software-course
Free software-courseFree software-course
Free software-course
 
Implementation Of Video Digital Watermarking Based on Python
Implementation Of Video Digital Watermarking Based on PythonImplementation Of Video Digital Watermarking Based on Python
Implementation Of Video Digital Watermarking Based on Python
 
Imagically Image Forensic Tool
Imagically Image Forensic ToolImagically Image Forensic Tool
Imagically Image Forensic Tool
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSI
 
Lenovo Consumer
Lenovo ConsumerLenovo Consumer
Lenovo Consumer
 
PNGHack 1.0 Presentation
PNGHack 1.0 PresentationPNGHack 1.0 Presentation
PNGHack 1.0 Presentation
 
Planning and research
Planning and researchPlanning and research
Planning and research
 
Question 4
Question 4Question 4
Question 4
 
Integra Micro Software Services (P) Ltd. - Imaging Expertise
Integra Micro Software Services (P) Ltd. - Imaging ExpertiseIntegra Micro Software Services (P) Ltd. - Imaging Expertise
Integra Micro Software Services (P) Ltd. - Imaging Expertise
 
Mark Minasi Introducing Windows 7
Mark Minasi   Introducing Windows 7Mark Minasi   Introducing Windows 7
Mark Minasi Introducing Windows 7
 

More from Poakpong Phongsasanongkul

Universal Access Design & Web Accessibility - Mekong ICT Camp 2010
Universal Access Design & Web Accessibility - Mekong ICT Camp 2010Universal Access Design & Web Accessibility - Mekong ICT Camp 2010
Universal Access Design & Web Accessibility - Mekong ICT Camp 2010Poakpong Phongsasanongkul
 
What Is Prettyconnect
What Is PrettyconnectWhat Is Prettyconnect
What Is Prettyconnect
Poakpong Phongsasanongkul
 
What Is Prachatai.com
What Is Prachatai.comWhat Is Prachatai.com
What Is Prachatai.com
Poakpong Phongsasanongkul
 
Web Accessibility (update)
Web Accessibility (update)Web Accessibility (update)
Web Accessibility (update)
Poakpong Phongsasanongkul
 
Google Docs
Google DocsGoogle Docs
Compression Tools
Compression ToolsCompression Tools
Compression Tools
Poakpong Phongsasanongkul
 
YouFest YouMedia
YouFest YouMediaYouFest YouMedia
YouFest YouMedia
Poakpong Phongsasanongkul
 
Web Accessibility - BarCamp Bangkok 2008
Web Accessibility - BarCamp Bangkok 2008Web Accessibility - BarCamp Bangkok 2008
Web Accessibility - BarCamp Bangkok 2008
Poakpong Phongsasanongkul
 

More from Poakpong Phongsasanongkul (8)

Universal Access Design & Web Accessibility - Mekong ICT Camp 2010
Universal Access Design & Web Accessibility - Mekong ICT Camp 2010Universal Access Design & Web Accessibility - Mekong ICT Camp 2010
Universal Access Design & Web Accessibility - Mekong ICT Camp 2010
 
What Is Prettyconnect
What Is PrettyconnectWhat Is Prettyconnect
What Is Prettyconnect
 
What Is Prachatai.com
What Is Prachatai.comWhat Is Prachatai.com
What Is Prachatai.com
 
Web Accessibility (update)
Web Accessibility (update)Web Accessibility (update)
Web Accessibility (update)
 
Google Docs
Google DocsGoogle Docs
Google Docs
 
Compression Tools
Compression ToolsCompression Tools
Compression Tools
 
YouFest YouMedia
YouFest YouMediaYouFest YouMedia
YouFest YouMedia
 
Web Accessibility - BarCamp Bangkok 2008
Web Accessibility - BarCamp Bangkok 2008Web Accessibility - BarCamp Bangkok 2008
Web Accessibility - BarCamp Bangkok 2008
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Sending under the Radar

  • 1. Sending Under the Radar #2 - Avoid from monitoring ICT Training for Citizen Journalism January 29-31, 2008 - Bangkok
  • 2. Multiple, Large, Secret ? • Zip (Windows Compress, WinZip) • Split (The File Splitter, WinRAR) • Encryption (7zip, WinRAR)
  • 3. Zip • Windows Compress
  • 4. Split • The File Splitter
  • 5. Encryption • 7zip, WinRAR
  • 6. Send by E-mail & Web Service • Image to Text • Text to Image • Photo Hosting • Photo Sharing • File Hosting (Multiple format) • Google Docs.
  • 7. Image to Text (binary to base-64) • www.motobit.com/util/base64-decoder-encoder.asp
  • 8. Text to Image • Paint (Windows) or other programs Type your serious information in picture and save to image kind. Save in different name, Ex. “flower.jpg”
  • 9. Photo Hosting • www.ImageShack.us
  • 10. Photo Sharing • www.flickr.com
  • 11. File Hosting • www.YouSendIt.com
  • 12. Google Docs. • http://docs.google.com