BECAUSE of heavy processing requirements, we
are currently using some of your unused brain capacity for
backup processing. Please ignore any hallucinations, voices
or unusual dreams you may experience. Avoid all
concentration-intensive tasks until further notice.
Thank You!~ 
Icon Name Last modified Size Description

[FOLDER] Parent Directory   - Agonizing Memories
[DIR]archives18-Jul-2010 00:22 -  
[DIR]java18-Jul-2010 00:24 -  
[DIR]mac18-Jul-2010 00:24 -  
[DIR]unix18-Jul-2010 00:29 -  
[DIR]windos19-Jul-2010 01:11 -  
[DIR]Data_Dissimulation.txt03-Feb-2009 20:3115.65KLa dissimulation de donnees
[DIR]acm_outguess.pdf03-Feb-2009 20:31202.22K[stega] attacking outguess stegano
[DIR]cryptous.pdf03-Feb-2009 20:31144.50Kanalysis algo stegano wordlists
[DIR]detecting.pdf03-Feb-2009 20:31821.16Kanalyse de documents contenant de la steganographie (cf stegdetect)
[DIR]ieee99-infohiding.pdf03-Feb-2009 20:313.29M[stega] la theorie de base de la steganographie
[DIR]ih02.pdf03-Feb-2009 20:31494.59K[stega] detecter de la stegano en utilisant des math vectorielles
[DIR]ihw99.pdf03-Feb-2009 20:31963.68K[stega] casser de la stegano en utilisant des algo math. demo illustree
[DIR]jsac98-limsteg.pdf03-Feb-2009 20:31155.76K[stega] les limites de la stegano 1998
[DIR]r2026.pdf03-Feb-2009 20:312.28M[stega] explorer et comprendre la steganographie
[DIR]stegano-sand-musset.rtf03-Feb-2009 20:316.59K 
[DIR]stegdetectrch.txt03-Feb-2009 20:317.90Kpapier de recherche pratique sur stegdetect utilise sur jphide
[DIR]tr01.pdf03-Feb-2009 20:31602.32K[stega] math pour detecter de la stegano, classement et etude de differents outils de steg

There are two major produts that come out of Berkley: LSD and UNIX. We don't believe this to be a coincidence. [JS Anderson]
            _,'|             _.-''``-...___..--';)
           /_ \'.      __..-' ,      ,--...--'''
          <\    .`--'''       `     /'
           `-';'               ;   ; ;
     __...--''     ___...--_..'  .;.'
    (,__....----'''       (,..--''