BECAUSE of heavy processing requirements, we
are currently using some of your unused brain capacity for
backup processing. Please ignore any hallucinations, voices
or unusual dreams you may experience. Avoid all
concentration-intensive tasks until further notice.
Thank You!~ 
Icon Name Last modified Size Description

[FOLDER] Parent Directory   - Agonizing Memories
[DIR]archives18-Jul-2010 00:22 -  
[DIR]java18-Jul-2010 00:24 -  
[DIR]mac18-Jul-2010 00:24 -  
[DIR]unix18-Jul-2010 00:29 -  
[DIR]windos19-Jul-2010 01:11 -  
[DIR]stegano-sand-musset.rtf03-Feb-2009 20:316.59K 
[DIR]stegdetectrch.txt03-Feb-2009 20:317.90Kpapier de recherche pratique sur stegdetect utilise sur jphide
[DIR]Data_Dissimulation.txt03-Feb-2009 20:3115.65KLa dissimulation de donnees
[DIR]cryptous.pdf03-Feb-2009 20:31144.50Kanalysis algo stegano wordlists
[DIR]jsac98-limsteg.pdf03-Feb-2009 20:31155.76K[stega] les limites de la stegano 1998
[DIR]icip02.pdf03-Feb-2009 20:31167.32K[stega] DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS (maths)
[DIR]acm_outguess.pdf03-Feb-2009 20:31202.22K[stega] attacking outguess stegano
[DIR]ih02.pdf03-Feb-2009 20:31494.59K[stega] detecter de la stegano en utilisant des math vectorielles
[DIR]tr01.pdf03-Feb-2009 20:31602.32K[stega] math pour detecter de la stegano, classement et etude de differents outils de steg
[DIR]detecting.pdf03-Feb-2009 20:31821.16Kanalyse de documents contenant de la steganographie (cf stegdetect) http://www.citi.umich.edu/u/provos/stego/
[DIR]ihw99.pdf03-Feb-2009 20:31963.68K[stega] casser de la stegano en utilisant des algo math. demo illustree
[DIR]r2026.pdf03-Feb-2009 20:312.28M[stega] explorer et comprendre la steganographie
[DIR]ieee99-infohiding.pdf03-Feb-2009 20:313.29M[stega] la theorie de base de la steganographie

Je suis capable du meilleur comme du pire, mais, dans le pire, c'est moi le meilleur. [Coluche]
     /|
   \`O.o'
   =(_|_)=
       U