Results 1 to 9 of 9

Thread: Camouflage v1.2.1 The programme

  1. #1
    Gbin@ryR
    Guest

    Lightbulb Camouflage v1.2.1 The programme

    Here is a very good programme that hides files into other one (any type of file). Here is the ReadMe of this prog, where you can find many detailz:

    Gbin@ryR Newzletter



    Camouflage v1.2.1
    -----------------

    These days companies are given more power to monitor emails and to examine your personal files. And with more and more malicious 'spy' software being widely used, you need to be sure that files containing sensitive information are kept safe from prying eyes. Electronic privacy is no longer guaranteed - who knows who might be intercepting your emails or scanning your hard drive without your knowledge or consent?

    Camouflage allows you to hide files by scrambling them and then attaching them to the file of your choice. This camouflaged file then looks and behaves like a normal file, and can be stored or emailed without attracting attention.

    For example, you could create a picture file that looks and behaves exactly like any other picture file but contains hidden encrypted files, or you could hide a file inside a Word document that would not attract attention if discovered. Such files can later be safely extracted.

    For additional security you can password your camouflaged file. This password will be required when extracting the files within.

    You can even camouflage files within camouflaged files.


    Camouflaging Files
    ------------------
    After installing Camouflage you will find two new menu options when right-clicking files in Windows Explorer; 'Camouflage' and 'Uncamouflage'.

    You can camouflage a file or several files at a time by highlighting them in Windows Explorer, then clicking the right mouse button and choosing 'Camouflage' from the pop-up menu.

    A list of the files chosen is displayed in the Camouflage dialog.
    You can view/edit the files by double-clicking them with the mouse, or by highlighting and right-clicking them, then choosing 'Open' from the pop-up menu. Selecting 'Properties' from this menu will display an information page similar to that in Windows Explorer.
    Anyway, to continue click 'Next'.

    In the second screen choose a file to be used as camouflage. This can be any type of file, but some files work better than others. For example, avoid choosing a text file because Notepad would display the entire contents of it, including the scrambled files attached. Most other files work well.
    Camouflage remembers the last 10 files used and you can reuse one of them by selecting it from the drop-down list.
    Note that Camouflage will simply use a copy of the selected file. The original chosen file will not be altered in any way.
    Once you have selected a file, click 'Next'.

    From the third screen choose the folder and filename of the camouflaged file that will be created. The default folder is the folder where you selected the files in Windows Explorer, and the default filename is the name of the file you selected for use as camouflage in the previous screen.
    Check 'Read-only' to create the camouflaged file with its 'Read-Only' attribute set. This is recommended because it makes the file safer, and prevents other applications from modifying it and destroying the camouflaged section.
    Click 'Next'.

    From the final screen you can type in a password if you wish. This password will be required when extracting files from your camouflaged file. If you do not wish to add a password just click 'Finish'.
    Clicking 'Finish' will create the camouflaged file and then exit.


    Uncamouflaging Files
    --------------------
    To extract the files hidden within a camouflaged file, right-click it in Windows Explorer and choose 'Uncamouflage' from the pop-up menu.

    A password prompt appears in the Uncamouflage dialog. If this file was created with a password, type it in.
    Note that Camouflage was designed so that it doesn't reveal camouflaged files to the casual observer. For this reason the password screen is always displayed whether the file is a camouflaged file or not, or whether or not it contains a password.
    Once you have entered the correct password (if applicable), click 'Next'.

    The second screen displays a list of the files hidden within the camouflaged file. The first file in the list is the file originally used as camouflage.
    To extract all files from the camouflaged file, either select them all, or just click 'Next' without selecting any files. You can extract certain files by selecting them, then clicking 'Next'. Note that you can deselect files by holding down CTRL and left-clicking them with the mouse.
    You can view the files by double-clicking them with the mouse, or by highlighting and right-clicking them, then choosing 'Open' from the pop-up menu. Note that files modified in this way will not be changed in the archive. You can display further information about the files by choosing 'Properties' from this menu.

    From the final screen, choose the folder where the files are to be extracted. If you're not extracting the first file in the list (the file originally used as camouflage), the default folder will be the folder where you right-clicked on the camouflaged file in Windows Explorer.
    Click 'Finish' to extract the files and exit.


    Uncamouflaging several files at once
    ------------------------------------
    It is possible to uncamouflage several files at once by selecting them in Windows Explorer and choosing 'Uncamouflage' from the pop-up menu.

    Note that Camouflage will only allow you to do this if all the files are using the same password, or if none of the files are using a password.

    The contents of each file is displayed in the second screen, and you can uncamouflage them in the usual way.


    Configuring Camouflage Settings
    -------------------------------
    You can modify Camouflage settings by running Camouflage from the Windows Start Menu shortcut, by opening the folder where you installed Camouflage and double-clicking Camouflage.exe from Windows Explorer, or by clicking the 'Settings' button on the first screen.

    The Camouflage Settings screen will appear. The version number is displayed in the title bar.

    You can add or remove columns in the file selection screens (Size, Creation Date/Time, Modified Date/Time, Accessed Date, File Attributes) by checking or unchecking items in the 'Show File Details' area.

    You can switch the pop-up help messages on or off by checking or unchecking 'Tool Tips'.

    You can hide Camouflage from Windows Explorer by unchecking 'Show Camouflage menu options when right-clicking on files in Windows Explorer'.
    When checked, Camouflage is enabled and you can right-click on files in Windows Explorer to use the Camouflage options.
    When unchecked, Camouflage is disabled and the menu options do not appear when right-clicking on files in Windows Explorer.

    Or you can disguise Camouflage in Windows Explorer by changing the 'Camouflage' or 'Uncamouflage' pop-up menu captions to whatever you want. When changed, the Camouflage icons do not appear.
    To return the prompts and icons to normal, you can delete the text in the 'Camouflage' or 'Uncamouflage' fields.

    By checking 'Make camouflaged files Read-Only', all files created by Camouflage have their Read-Only attribute set by default. This is highly recommended and prevents the camouflaged file from being modified by certain applications when you open it.

    You can also display this Readme.txt file from Camouflage by clicking the 'View Readme File' button.


    Tips for Using Camouflage
    ------------------------
    Although they do work well, text files are not recommended to be used as camouflage. Files with '.txt' extensions are usually opened with Notepad by default. Notepad will display the entire file, including the encrypted camouflaged section which might give the game away.
    Most other applications will just open their part of the file, and ignore the camouflaged section.

    Certain files, for example, Microsoft Excel files, are often modified by their native application when opened by it. It is recommended that you always make camouflaged files Read-Only. This prevents these applications from modifying the camouflaged file and therefore destroying the camouflaged section.

    Be careful when uploading camouflaged files (especially text files) to an FTP site. Many FTP applications will 'auto-detect' the transfer type, and will upload text files as ASCII.
    This would destroy the binary section of the file (the camouflaged section), so you must make sure that when uploading camouflaged files, you always set the transfer type to BINARY.

    Be careful to remember your password, if you use one. We can't help you if you forget it and can't open your camouflaged file.

    For additional tips, check out the FAQ on our web site.


    Technical Support and Feedback
    ------------------------------
    This product is completely free, we ask only that you show your support by visiting our web site at http://www.camouflagesoftware.com where you can freely download the latest version. And if you like music please visit http://www.twistedpear.freeserve.co.uk

    When using Camouflage you can click on the link 'Click here to get the latest version' to automatically go to the Camouflage web site. The current version you are using is displayed when you move the mouse pointer over this link.

    Feedback is always encouraged. Please email bug-reports, comments, ideas or criticism to feedback@camouflagesoftware.com. Please include the version number of your copy and where you found it. Please check out the FAQ on the web site before emailing us.

    Please contact us in English only. Otherwise we may not be able to reply.

    If you find any bugs with Camouflage, please email as much information as possible. We want to know your operating system, the version of Camouflage you are using, and exactly what you were doing when the error occurred. When the bug has been fixed we can let you know via email. If you are experiencing problems with Camouflage, we suggest you first upgrade to the latest version, and email us if the problem persists.


    History
    -------

    Camouflage v1.2.1
    -----------------
    * Users can now uncamouflage multiple files in one session
    * Added option to write-protect camouflaged files (by default)
    * 'Settings' button added to first screen
    * The version of Camouflage used to camouflage the files is now displayed
    * Prompt for overwrite when creating the camouflage file, if the output file already exists
    * User is prevented from specifying an output file that would overwrite one of the selected files for camouflaging
    * Web page references now point to www.camouflagesoftware.com
    * Cleaned up resize limiter
    * Other miscellaneous changes

    Camouflage v1.1.2
    -----------------
    * Added support for additional regional standards, e.g. Brazilian.
    * Updated runtime files in installation.
    * Cleaned up the user prompt when overwriting files.

    Camouflage v1.1.1
    -----------------
    * Added option to open files when displaying them (double-click or right-click for menu).
    * Added 'Properties' page for files (right-click for menu).
    * Added file sizes, dates/times and attributes when displaying files.
    * Added feature to change Windows Explorer pop-up menu captions.
    * Added file icons in selection screens.
    * Camouflage is now resizable. Settings and file selection column widths are saved.
    * Added user prompts when overwriting files.
    * Added prompt to create folder when extracting files.
    * Camouflage version appears briefly in the title bar.
    * Added 'email us' link in Settings.
    * Added Tool Tips (can be switched off in Settings).

    Camouflage v1.0.4
    -----------------
    * First release.



    Copyright © 2000-2001 by Twisted Pear Productions, all rights reserved worldwide.

    www.camouflagesoftware.com



    The End

  2. #2
    Now, RFC Compliant! Noia's Avatar
    Join Date
    Jan 2002
    Posts
    1,210
    That sounds cool, I read about this a few years ago. although it wasn't very advanced then...
    With all the subtlety of an artillery barrage / Follow blindly, for the true path is sketchy at best. .:Bring OS X to x86!:.
    Og ingen kan minnast dei linne drag i dronningas andlet den fagre dag Då landet her kvilte i heilag fred og alle hadde kjærleik å elske med.

  3. #3
    Leftie Linux Lover the_JinX's Avatar
    Join Date
    Nov 2001
    Location
    Beverwijk Netherlands
    Posts
    2,534
    I've tested cammouflage A while ago.... And have sent alot of emails encapsulated in jpgs.... Even a hexeditor can't Discover it..
    But if U insert stuff in files like WOrd files... U can easaly recover it decrypting it is a whole other story.....

    Good post..
    ASCII stupid question, get a stupid ANSI.
    When in Russia, pet a PETSCII.

    Get your ass over to SLAYRadio the best station for C64 Remixes !

  4. #4
    hmmmmm only prob I can see is would it not bump up the file size alot? But other than that looks to be a good idea

    nice post

    v_Ln

  5. #5
    Gbin@ryR
    Guest
    A friend of mine has found a site which gives you songs of Iron Maiden on some photos. This site use Camouflage to hide inside the photo the song. Isn't it cool?

  6. #6
    Leftie Linux Lover the_JinX's Avatar
    Join Date
    Nov 2001
    Location
    Beverwijk Netherlands
    Posts
    2,534
    If u put larege files in (normaly) small files it does get noticed..

    I was talking about inserting txt files in pictures..

    Like pgp but different..

    It seems to work fine... nobody notices 2KB extra on a 53KB jpeg of your pet..
    But it can hold a lot of 'secret' information
    ASCII stupid question, get a stupid ANSI.
    When in Russia, pet a PETSCII.

    Get your ass over to SLAYRadio the best station for C64 Remixes !

  7. #7
    Senior Member
    Join Date
    Jan 2002
    Posts
    682
    FYI...it's called steganography...if ya want to google it...


    found a bunch of steg. software (free, share & pay) HERE
    I used to be With IT. But then they changed what IT was. Now what I'm with isn't IT, and what's IT seems scary and weird." - Abe Simpson

  8. #8
    Senior Member
    Join Date
    Feb 2002
    Posts
    120
    Very cool,
    I am going to start using this prog as well as an abi coder with 448 bit encryption to secure my filez.
    Thank you for another fine addition to my box Gbin@ryR
    \"To follow the path:
    look to the master,
    follow the master,
    walk with the master,
    see through the master,
    become the master.\"
    -Unknown

  9. #9
    Gbin@ryR
    Guest
    You're welcome.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •