Bram Cohen loves exchanges as to have created there a decade BitTorrent. According to the press, he is passionate now security tools and more exactly on steganography. Encryption is now a prominent element in the fight against piracy of data. This technology can make secret written or voice communications. But there are other security tools including steganography, the art of concealing or pass unnoticed a message in another message. According to Forbes magazine, Bram Cohen, inventor of the exchange solution BitTorrent files, working for a year on a steganography tool. This software called Dissident X should allow to hide data discreetly in a site, a business document or any file from a video to an ebook. In his interview to Forbes, Cohen says Braham will dust off old methods of steganography. Thus, traditionally, the messages are embedded in the media bit by bit. With DissidentX, it is possible to encrypt the entire file system via a hash. Furthermore, the tool will encode multiple m
http://www.bnxit.com/creator-bittorrent-developing-steganography-tool/
Subscribe to:
Post Comments (Atom)
Archives
-
▼
2014
(50)
-
▼
January
(41)
- Microsoft might be forced (again) to change the na...
- Microsoft facilitates the management of accounts O...
- EverNote: Sync 4 times faster after upgrading its ...
- Mobile applications, the other target of the NSA
- Information Builders launches Skybox for BI projec...
- Oracle Big Data: tangible business value
- Cisco annual security report unprecedented from ad...
- Apple quarterly, 2014: Record sales but concern ab...
- Native Windows malware tries to infect Android dev...
- ESET obtained the first position of AV-Comparative...
- Thomson is going to demonstrate the virtues of the...
- What is expected from Windows 8.1 Update 1?
- How to detect if Google has penalized us?
- Personal data: in the cloud and in the land
- Chrome goes to war against noisy tabs
- Case Target: 11 GB of data sent to a Russian server
- Fujitsu Labs invented a method for searching encry...
- China reactive the creation of a national OS calle...
- More updates for XP, except for anti-virus
- Using WiFi, Fortinet offers to track customers in ...
- The creator of BitTorrent developing a steganograp...
- Blackphone the smartphone ultra-secure Silent Circ...
- Dell relies on a security offering end to end
- NSA hacks radio waves unconnected PC
- Do Green Data Centers Exist?
- Data Center Management Through Careful Environment...
- Data Center Consolidation - What You Should Know
- How to Take Data Center Secure Backup
- Cisco Data Center Security: Taking the Next Step i...
- What Are The Technology Trends For 2014?
- Unlocking Encryption - A Method of Data Security
- Cisco - How to configure an IKEv2 Site to Site IPS...
- ASA - VPN Traffic is not being encrypted (CSCsd48512)
- Zone Based Firewall ZBFW
- Designing VPC and Routing
- Cisco Flex Link
- Understanding Cisco Nexus 2000 Series Fabric Exten...
- Distributed Firewall
- Distributed Firewall - Statefull ??
- Virtual Firewall
- Physical Firewall
-
▼
January
(41)
© Copyright 2014 - Security Data Center. Simple theme. Powered by Blogger.
No comments:
Post a Comment