- Joined
- Aug 31, 2015
- Messages
- 4,806
- Trophies
- 3
- Age
- 23
- Location
- Budakeszi, Hungary
- Website
- sites.google.com
- XP
- 10,600
- Country
What kind of ancient version of Firefox...
"2005"
Well, before the super annoying car-honking sounds, at least.Kinda sounds like something from paper mario
Speaking of which, somebody just started honking their car outside of my house!Well, before the super annoying car-honking sounds, at least.
CTRL-V:
print(colored(f"User {ctx.author} ran command ECHO in server {ctx.guild} with args {text}","green"))
It actually does work thoughI don't think that would work
Steganographied a .mp3 or something to that image?:/It actually does work though
Can't be steganography, you couldn't simply rename and play it, probably involve extracting it in some way.
There are many types of steganography actually, just the compressed type is the most common so most people refer to it like that, but there's no need for extraction often, you can hide .exe files in an image that runs as soon as you open the image as an image for example or two different files that load separately depending on what extension you append to themCan't be steganography, you couldn't simply rename and play it, probably involve extracting it in some way.
Ah, I've only got computerphile's steganography vid to go off of, so I was only aware of LSB steganography. Didn't know you could simply disguise an exe like that hahaThere are many types of steganography actually, just the compressed type is the most common so most people refer to it like that, but there's no need for extraction often, you can hide .exe files in an image that runs as soon as you open the image as an image for example or two different files that load separately depending on what extension you append to them
You can do LOTS of things with it, but having a hidden .exe such as those made using Ardamax Key Logger is a VERY common practice for stealing people's information, you post a picture on some forum, then as soon as they download it and click on it to open, it will install the hidden Keylogger on their system. An even more common thing though is to hide such .exe files inside other .exe files, you see a LOT of that in deep web really, reason why programs that let you access dark/deep web prevent downloading stuff without you specifically giving permission.Ah, I've only got computerphile's steganography vid to go off of, so I was only aware of LSB steganography. Didn't know you could simply disguise an executive lile haha