Return to site

Dos 2 hide and seek

broken image

We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information.

broken image
broken image

Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. Steganography applications conceal information in other, seemingly innocent media. Welcome to the Steganography Software for JJTC.Com