Pages

Thursday, March 8, 2012

Computer hacking by terrorists -sundaravel

Criminals like terrorists use hacking for high grade safe communication.

1)Email communication with 2 terrorists.
2)Data recovery after DOD  standard data format used by PGP and others.


1)Email communication with 2 terrorists.

on both sides "invisible secrets software" is installed and sender creates a txt file and hides it in jpg file with encription and after double encription in rar (.exe) mode.

recieve open the file with the help of some software and password that given by sender. file will be compiled and open sucessfully.

The software named as invisible secret .

 Invisible Secrets 4

Keep those prying eyes out of your emails and prevent unwanted people from reading your private documents!

Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Using our file encryption software nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. With Invisible Secrets 4 - File encryption software you may encrypt and hide files directly from Windows Explorer, and then automatically transfer them by e-mail or via the Internet.
It features strong file encryption algorithms (including AES - Rijndael), a password management solution that stores all your passwords securely and helps you create secure passwords, a shredder that helps you destroy beyond recovery files, folders and internet traces, a locker that allows you to password protect certain applications, the ability to create self-decrypting packages and mail them to your friends or business partners, a tool that allows you to transfer a password securely over the internet, and a cryptboard to help you use the program from Windows Explorer. Invisible Secrets 4 - File encryption software is shell integrated and offers a wizard that guides you through all the necessary steps needed to protect your data. 



2)Data recovery after DOD  standard data format used by PGP and others.

hackers and terrorists use some software and PGP DOD 5.2 standard to delete sesitive data after that we cannot recover the data.

www.symantec.com

No comments:

Post a Comment