exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

wns210.zip.inf

wns210.zip.inf
Posted Dec 21, 1999

wns210.zip.inf

tags | encryption, steganography
SHA-256 | 4637f5552055d68ab5bf3c21f9bc74f768203f680acb96e60e542eebb6e10539

wns210.zip.inf

Change Mirror Download
Subject: WNSTORM210 INFORMATION

Hi there. At some point you either requested WNSTORM from me and I'm now
sending you an update or you just requested it and I'm sending to you for
the first time, or I know you and think you might be interested in WNSTORM.

This is an automated mailing.

---------- cut here ------------------ for description ------------------

WNSTORM(tm) 2.10 Copyright (C) 1994 by Ray (Arsen) Arachelian
All Rights Reserved, GTDR. DO NOT EXPORT!!!
USA AND CANADA USE ONLY!!!!!!!!!!!!!!!!!!!!!!

WNSTORM (White Nouse Storm) is a new cryptography and steganography software
package which I'm developing. You can use WNSTORM to encrypt your files to
keep prying eyes from invading your privacy. You can use WNSTORM to hide
files, be they text, or otherwise within PCX images (other image formats will
be supported in the future.)

WNSTORM's method of hiding files in PCX images is very secure. With the right
kind of image, you won't even see any changes made to the picture unless you
look very very closely, and even then you are unlikely to recognize that there
is hidden data in the image. (Some images don't work well, others work very
well.)

You can then take the PCX image containing the hidden data and send it to your
friend, or post it up publicly on the alt.binary.pictures.* or whatever. Only
you and anyone you share the password with can get at the hidden data file!

More importantly, the intended recipient of the picture does not have to have a
previous copy of the image to get at the hidden data.

WNSTORM is also an encryption system. Unlike conventional systems, WNSTORM
uses random numbers to hide and encrypt your file. (see documentation for
technical details.) WNSTORM's encryption uses elements of frequency hopping
(also known as spread spectrum transmissions) but instead of using it over
radio waves, it uses it on your files. It does this by breaking up your
file into eight separate channels and mixing in anywhere between 16 to 240
other bogus random noise channels with your eight data channels. The
number of bogus channels varies with each byte taken from your file. The
position (similar to a frequency of a channel used by spread spectrum
communications) depends on the values in the bogus channels as well as your
password. The password can be upto 150 characters (that's 1200 bits) however
this can easily be changed to longer passwords.

All the source code for WNSTORM and its supporting programs is also included.
It's there for you to examine and see that there are no back doors, and to
modify so as to improve it.

WNSTORM is >FREE<, but not public domain. You may freely use it and give
copies away to anyone you like. (see documentation for license information.)


Enjoy.
-- Ray (Arsen) Arachelian
rarachel@photon.poly.edu

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close