• microsoft, software, download, excel, word, office 20
    Office 2013, which was released to manufacturing back in October with retail launch is expected soon, is now available for download as a 60 day trial. Office Professional Plus 2013 is the "future of productivity" as Microsoft puts it and can finally be downloaded for those wishing to try it out before purchasing.

    On the 24th of October, Microsoft released Office 2013 RTM to those who had a TechNet or MSDN subscription. Now, those wishing to try out Office 2013 Pro Plus for 60 days can now do so at TechNet. Office Professional Plus 2013 comes with Word, PowerPoint, Excel, Outlook, OneNote, Access, Publisher, and Lync. Office 2013 features integration with Windows 8 and is now touch-friendly as well as cloud-centered. Find below a roundup of Office 2013 and its new features or simply hit the source link below to download the 60-day trial.

    Office at Its Best on Windows 8

    • Touch everywhere. Office responds to touch as naturally as it does to keyboard and mouse. Swipe your finger across the screen or pinch and zoom to read your documents and presentations. Author new content and access features with the touch of a finger.
    • Inking. Use a stylus to create content, take notes and access features. Handwrite email responses and convert them automatically to text. Use your stylus as a laser pointer when presenting. Color your content and erase your mistakes with ease.
    • New Windows 8 applications. OneNote and Lync represent the first new Windows 8 style applications for Office. These applications are designed to deliver touch-first experiences on a tablet. A new radial menu in OneNote makes it easy to access features with your finger.
    • Included in Windows RT. Office Home and Student 2013 RT, which contains new versions of Word, Excel, PowerPoint and OneNote applications, will be included on ARM-based Windows 8 devices, including Microsoft Surface.

    Office Is in the Cloud

    • SkyDrive. Office saves documents to SkyDrive by default, so your content is always available across your tablet, PC and phone. Your documents are also available offline and sync when you reconnect.    
    •  Roaming. Once signed in to Office, your personalized settings, including your mostrecently used files, templates and even your custom dictionary, roam with you across virtually all of your devices. Office even remembers where you last left off and brings you right back to that spot in a single click.   
    • Office on Demand. With a subscription, you can access Office even when you are away from your PC by streaming full-featured applications to an Internet-connected Windows-based PC.   
    • New subscription services. The new Office is available as a cloud-based subscription service. As subscribers, consumers automatically get future upgrades in addition to exciting cloud services including Skype world minutes and extra Sky Drive storage. Subscribers receive multiple installs for everyone in the family and across their devices.

    Office Is Social

    • Yammer. Yammer delivers a secure, private social network for businesses. You cansign up for free and begin using social networking instantly. Yammer offers integration with SharePoint and Microsoft Dynamics.
    • Stay connected. Follow people, teams, documents and sites in SharePoint. View and embed pictures, videos and Office content in your activity feeds to stay current and update your colleagues.
    • People Card. Have an integrated view of your contacts everywhere in Office. The People Card includes presence information complete with pictures, status updates,contact information and activity feeds from Facebook and LinkedIn accounts.
    • Skype. The new Office comes with Skype. When you subscribe, you get 60 minutes of Skype world minutes every month. Integrate Skype contacts into Lync and call or instant message anyone on Skype.


    • Office 365 Home Premium — designed for families and consumers. This service also includes an additional 20 GB of SkyDrive storage and 60 minutes of Skype world minutes per month.
    • Office 365 Small Business Premium — designed for small businesses. This service also includes business-grade email, shared calendars, website tools and HD web conferencing.
    • Office 365 Pro Plus — designed for enterprise customers who want advanced business capabilities and the flexibility to deploy and manage in the cloud.
    If you haven't already, download Office 2013 Customer Preview and try out these new features for yourself. It requires either Windows 7 or Windows 8 for install.

    The download is available in 32- and 64-bit flavors from Microsoft's TechNet Evaluation Center. You’ll need to login with your Microsoft credentials, fill in a form with your name and country of residence, and choose the desired version and language, before being served with a download link and a product key to activate the trial.

    Instead of an installer, Microsoft decided to release the software as a disc image. Windows 8 offers native support for .img files, so users already running the latest version of the operating system will be able to access the installer with a simple double-click. Everyone else will need third-party software like ImgBurn or Daemon Tools, both available for free, to either burn it into a disc or mount it as a virtual drive.

    Microsoft Office 2013 requires Windows 7, Windows 8, Windows Server 2008 R2, or Windows Server 2012 to run -- Windows XP holdouts are out of luck. Standalone versions will be available at $139.99 for the Home & Student Edition, $219.99 for Home & Business and $399.99 for Office 2013 Professional. The suite will also be available as part of an Office 365 subscription package for either $99.99 or $149.99 per year.

    Download: Microsoft Office Professional Plus 2013 Trial

  • You’re On Cloud Nine with Cloud Computing

    Cloud computing can provide your company with an array of benefits. As you move forward with your business initiatives and try to increase your revenue, it’s important to stay on the cutting-edge to be competitive. With cloud computing, you’ll not only be utilizing the latest technology, but you’ll be doing so in a cost-effective way. Cloud computing streamlines everyday business processes by organizing and tracking information, and maintaining it in an easily accessible location so that all employees  have access to the same reliable, timely data whenever and wherever they need it.

    It may be helpful to have a basic understanding of the cloud computing paradigm, so that you can better understand its relevance to the enterprise world. Cloud computing is simply the online storage and processing of data, in comparison to first-generation computing, which takes place on individual PCs, servers or mainframes. In this style of computing, not only was it necessary to purchase, install and maintain this cumbersome and expensive hardware, but it was also necessary to purchase multiple copies of software, or software licenses, in order to make sure that all employees had access to the programs.

    Cloud computing has evolved from the Internet, and is familiar in such popular online services as wikis, photo storage and sharing Web sites, social media and message forums, and peer-to-peer file-sharing networks. Anyone who utilizes Gmail, Yahoo!, or Hotmail is using the cloud not only for sending E-mails and attachments, but also for storing these documents and files online. That’s cloud computing.

    On the enterprise level, cloud-based business applications can provide a wealth of services. The entire customer information database, including statistics, contact information, purchase patterns and trends, and target market information, can be stored in a shared data center and easily accessed by anyone who needs it – whether a sales rep out on a call, the manager back in the home office, or an executive in the boardroom.

    These applications can also analyze data, so that sales representatives no longer need to use software programs and their valuable time to generate reports. All they have to do is input the data, and it’s analyzed and reported automatically. This means that the entire pipeline is made much more efficient. Cloud computing updates all applications and data in real-time, so there are no more delays, and everyone is assured that they have the most reliable, up-to-date information possible.

    Marketing and upper-level management can use this information to formulate strategies, plan products and promotional campaigns, and keep an eye on their sales team’s performance. Call centers can also have access to timely and accurate information, which empowers them to better serve the customer and to serve more customers, since each call will take less time when they have the information they need at their fingertips.

    The best part about Web-based business applications? They’re as easy to use as a Web site, and each user can individually customize his or her interface to their own preferences. This means that the programs will be quickly and readily adopted across the board, and it also eliminates the training and lengthy rollouts associated with conventional software programs. Cloud computing is cost-effective, too, because it’s billed on a per-use basis, instead of requiring high upfront capital investments in hardware infrastructure.

    When you look at all the benefits that cloud computing can provide, it’s easy to see why moving your company into the cloud can increase productivity, grow revenue, encourage customer satisfaction, and lower costs – thereby improving your company’s bottom line.

    How Then Can Cloud Computing Benefit My Business?

    Cloud computing is important to your business especially when it comes to customer relationship management. There are many different descriptions for cloud computing, but contrary to popular thought, it is not something new. Cloud computing is something that’s been around for a long time. In fact, you’re probably already using it right now within your business organization.

    Cloud computing is simply a term that is used to describe services that are provided to you via the Internet. While these services can include something as simple as email, cloud computing can also include more complex tasks like accounting,forecasting and tracking. Cloud computing services are provided to you through a remote server. This means that you can just conveniently log in from any Internet location to access and utilize them. You can use them from any computer, not just your own.

    This is why the term cloud is used. The services are up in the air, accessible to everyone. Of course this doesn’t mean that the services are not secure. They are usually secured with a user name and password, and sometimes greater security measurements are taken.
    You are probably  wondering what  other cloud computing applications besides email can improve your business and customer relationship management.  Besides email, when it comes to business, Internet telecommunications have increased the professionalism of many small businesses.

    Because of cloud computing, you can now meet with your clients from all over the world in real time via video and webinars. You could put together professional presentations from your basement if you wanted to and emergency meetings are simple to organize when using the internet.

    In addition to all of the exciting functionality within cloud computing, these services are very affordable and accessible to most, if not all businesses. There are some services that offer  professional services like this for free. Internet telecommunications applications are extremely important cloud tools when it comes to customer relationship management.
    Cloud computing can also be used for additional storage. Expensive hard drives are not needed, as you will store your files in an off-site location.  This can increase your office space and hard drive space while helping you to organize data. At the same time, your data can be accessed remotely and quickly whenever necessary. This means a lot to clients. It makes them feel important when you have their information right at hand.

    There are now more and more online backup corporations that are popping up to provide companies and individuals with backup storage in case of emergencies and for convenience.
    Cloud computing has applications that can help with your accounting needs, contact lists and customer lists. Your client lists and business contact lists are the most important lists you will have in business, and anything that makes accounting easier is very helpful to resource for every user.
    Cloud computing accounting software in fact has eliminated the expense of a professional accountant from the budget of many small businesses. The software is often so complete and user-friendly,  that a professional accountant has become absolutely unnecessary.

    Cloud computing offers so many advantages to the modern business person. In the past, many of these small businesses would never exist because they wouldn’t have had the seed money to start. Cloud computing provides professional business services that can help any business grow for free or at a very low cost price point. There are also some cloud computing services that cost a bit more, so it is wise to shop around.  In many instances you can start a successful online business or brick and mortar cloud computing supported business for less than $200.

    So as you can see, cloud computing is an institution on the internet that has been around for many years. You are probably already familiar with some of the most popular elements of cloud computing, like email, and enjoy utilizing them in your personal and business life. Now that you know some of the other cloud computing applications that are available to you, you can branch out and improve your business even more.

  • Anonymous vs Wikileaks:


    Hacktivism is considered one of the most interesting phenomena of the last year, despite this form of dissent is dated in the last years it has catalyzed the media attention with its exploit.

    Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for this reason security expert all over the world are trying to deeply analyze the different movements of dissent and their mutual relationship. In the collective, the term hacktivist is immediately associated to names of group such as Anonymous and Wikileaks, two groups that in more than one occasion have operated together for a common intent. We must specify that the two souls of the hacktivism are very different for organization and modus operandi, Anonymous collective hasn’t a leader such as Assange for Wikileaks and it doesn’t have an organic structure, but consists of a multitude of cells that sometimes have moved in a manner dissonant. Other deep difference is in the way to move the protest, Anonymous hackers usually choose a target and try to attack it in various ways, Wikileaks follows whistleblowing strategy using information acquired from third parties. The two organization are complementary and have demonstrated that joining their force could represents a serious menace.

    In 2010, Anonymous organized different attacks against the sites of MasterCard, Visa and Paypal to protest against the refusal of these companies to send customer donations to WikiLeaks, don’t forget also the collaboration in the case of Stratfor hack.

    But what has happened to the solid alliance?
    A deep crack seems to threaten the relationship between the two groups, recently Anonymous collective, at least in some of its current, has released many announcements and posted many tweets to express disappoint against the policy of Wikileaks.
    “The end of an era. We unfollowed @Wikileaks and withdraw our support. It was an awesome idea, ruined by Egos. Good Bye,” said a tweet from Anonymous IRC.
    In the following picture other messages from collective.
    The fracture occurred this week because Wikileaks organization added an overlay donation page that popped up when user visited the web site’s Global Intelligence Files.
    The web site propose the millions of emails leaked from intelligence company Stratfor and stolen by Anonymous with a clamorous hack to the web site of the company, that’s why the collective hasn’t accepted the decision of Wikileaks to request a donation for the precious contents.
    “The information must to be free, it hasn’t owners” that’s is the thought of Anonymous that interpreted donation page as a “paywall” and an unacceptable affront.
    “We call on @WikiLeaks to change their current set up to force donations. #InformationWantsToBeFree,” states a tweet.
    The page seems to be related to a fundraising campaign pro Assange announced on Oct.3. WikiLeaks confirmed that the banner is financially necessary during the US election campaign which will expire on Election Day. Assange asking for donations, in the ad he suggests the support to “vote with their wallet” this election season.

     “WikiLeaks faces unprecedented costs due to involvement in over 12 concurrent legal matters around the world, including our litigation of the US military in the Bradley Manning case. Our FBI file as of the start of the year had grown to 42,135 pages,”

    A note positioned at the bottom of the WikiLeaks page, however, says the banner only appears once a day for each user.
    WikiLeaks was surprised by the reaction of Anonymous and in a first moment defended its initiative leaving the page, but later it removed it.
    WikiLeaks tweeted the following reply to the group of hacktivist:
    “A tweet, share, wait or donate campaign is not a ‘paywall,’”

    Is it possible that the split is triggered by the single published web page? What is changed in the relationship between the groups?

    According the declarations of Anonymous the recent evolution of Wikileaks are too different from its original motivations, today it appears to concentrate on preserving its leader Julian Assange from the extradition in the Sweden  to face rape charge. Once in Sweden the government could send Assange to U.S. to face charges for publishing secret documents leaked by Army analyst Bradley Manning, but Washington considers him a danger for homeland security exactly like Al-Qaeda.
    A statement published on pastebin.com states that Anonymous cannot support the “One Man Julian Assange show,” adding that the collective continues to support the principles behind WikiLeaks.
    “We have been worried about the direction Wikileaks is going for sometime now,” “In the past year, the focus has moved away from actual leaks and the fight for freedom of information and concentrated more and more on Julian Assange and a rabid scrounging for money.”
    “Anonymous turns it’s back on WikiLeaks,”
    “WikiLeaks has with its actions this past 48 hours betrayed Anonymous, and thus has lost its biggest and most powerful supporter.”
    I think what happened is another demonstration of the heterogeneity Anonymous group that does not seem to be compact on this occasion. This is the greatest limit of the collective, it’s hasn’t a unique soul and this characteristic is penalizing it’s possibility to influence worldwide policy.
    Certainly some currents within the group are contrary to the policy of Wikileaks but many other faces were not expressed in a manner so hard against the group of Assange.

    But reading these press release with such contrasting springs to mind another idea:
    And if someone was deliberately introducing elements of disorder in the dialogue between the two organizations. The absence of a leader in Anonymous, again, may be the weak point of the collective, a multitude of uncoordinated groups move too simple to operate on some of them feeding the clutch with Wikileaks.

    Who would want that?
    Surely governments, but also some intelligence organizations who fear the collaboration between Wikileaks and Anonymous.

    For many experts in our sector, the whistleblowing and the hacktivism in general represents an evolution of ordinary protest through the new media, while condemning some sensational initiatives many believe that the revelations of some of the burning truth has contributed to a change, but these contrasts represent a dangerous evolution of the phenomenon.
    Assange has become a leader in a cage, an icon of a movement that has to live its own life.

    Just as I imagine he desires, you can condemn a man but not wipe out an ideology.

    What's your take on this?

    How to cover your tracks online

    From Tor to steganography, these six techniques will help obscure the data and traces you leave online

    Security through obscurity: How to cover your tracks online

    Thinking about the bits of data you leave behind is a one-way ticket to paranoia. Your browser? Full of cookies. Your cellphone? A beacon broadcasting your location at every moment. Search engines track your every curiosity. Email services archive way too much. Those are just the obvious places we're aware of. Who knows what's going on inside those routers?

    The truth is, worrying about the trail of digital footprints and digital dustballs filled with our digital DNA is not just for raving paranoids. Sure, some leaks like the subtle variations in power consumed by our computers are only exploitable by teams of geniuses with big budgets, but many of the simpler ones are already being abused by identity thieves, blackmail artists, spammers, or worse.

    Sad news stories are changing how we work on the Web. Only a fool logs into their bank's website from a coffee shop Wi-Fi hub without using the best possible encryption. Anyone selling a computer on eBay will scrub the hard disk to remove all personal information. There are dozens of sound, preventative practices that we're slowly learning, and many aren't just smart precautions for individuals, but for anyone hoping to run a shipshape business. Sensitive data, corporate trade secrets, confidential business communications -- if you don't worry about these bits escaping, you may lose your job.

    Learning how best to cover tracks online is fast becoming a business imperative. It's more than recognizing that intelligent traffic encryption means not having to worry as much about securing routers, or that meaningful client-based encryption can build a translucent database that simplifies database management and security. Good privacy techniques for individuals create more secure environments, as a single weak link can be fatal. Learning how to cover the tracks we leave online is a prudent tool for defending us all.

    Each of the following techniques for protecting personal information can help reduce the risk of at least some of the bytes flowing over the Internet. They aren't perfect. Unanticipated cracks, even when all of these techniques are used together, always arise. Still, they're like deadbolt locks, car alarms, and other security measures: tools that provide enough protection to encourage the bad guys to go elsewhere.

    Online privacy technique No. 1: Cookie management
    The search engines and advertising companies that track our moves online argue they have our best interests at heart. While not boring us with the wrong ads may be a noble goal, that doesn't mean the relentless tracking of our online activities won't be used for the wrong reasons by insiders or websites with less esteemed ideals.

    The standard mechanism for online tracking is to store cookies in your browser. Every time you return to a website, your browser silently sends the cookies back to the server, which then links you with your previous visits. These little bits of personalized information stick around for a long time unless you program your browser to delete them.

    Most browsers have adequate tools for paging through cookies, reading their values, and deleting specific cookies. Cleaning these out from time to time can be helpful, although the ad companies have grown quite good at putting out new cookies and linking the new results with the old. Close 'n Forget, a Firefox extension, deletes all cookies when you close the tab associated with a site.

    Standard cookies are just the beginning. Some ad companies have worked hard on burrowing deeper into the operating system. The Firefox extension BetterPrivacy, for example, will nab the "supercookies" stored by the Flash plug-in. The standard browser interface doesn't know that these supercookies are there, and you can delete them only with an extension like this or by working directly with the Flash plug-in.

    There are still other tricks for sticking information in a local computer. Ghostery, another Firefox extension, watches the data coming from a website, flags some of the most common techniques (like installing single-pixel images), and lets you reverse the effects.

    Online privacy technique No. 2: Tor
    One of the simplest ways to track your machine is through your IP address, the number the Internet uses like a phone number so that your requests for data can find their way back to your machine. IP addresses can change on some systems, but they're often fairly static, allowing malware to track your usage.

    One well-known tool for avoiding this type of tracking is called Tor, an acronym for "The Onion Router." The project, developed by the Office of Naval Research, creates a self-healing, encrypted supernetwork on top of the Internet. When your machine starts up a connection, the Tor network plots a path through N different intermediate nodes in the Tor subnet. Your requests for Web pages follow this path through the N nodes. The requests are encrypted N times, and each node along the path strips off a layer of encryption like an onion with each hop through the network.

    The last machine in the path then submits your request as if it were its own. When the answer comes back, the last machine acting as a proxy encrypts the Web page N times and sends it back through the same path to you. Each machine in the chain only knows the node before it and the node after it. Everything else is an encrypted mystery. This mystery protects you and the machine at the other end. You don't know the machine and the machine doesn't know you, but everyone along the chain just trusts the Tor network.

    While the machine acting as your proxy at the other end of the path may not know you, it could still track the actions of the user. It may not know who you are, but it will know what data you're sending out onto the Web. Your requests for Web pages are completely decrypted by the time they get to the other end of the path because the final machine in the chain must be able to act as your proxy. Each of the N layers was stripped away until they're all gone. Your requests and the answers they bring are easy to read as they come by. For this reason, you might consider adding more encryption if you're using Tor to access personal information like email.

    There are a number of ways to use Tor that range in complexity from compiling the code yourself to downloading a tool. One popular option is downloading the Torbutton Bundle, a modified version of Firefox with a plug-in that makes it possible to turn Tor on or off while using the browser; with it, using Tor is as simple as browsing the Web. If you need to access the Internet independently from Firefox, you may be able to get the proxy to work on its own.

    Online privacy technique No. 3: SSL
    One of the easiest mechanisms for protecting your content is the encrypted SSL connection. If you're interacting with a website with the prefix "https," the information you're exchanging is probably being encrypted with sophisticated algorithms. Many of the better email providers like Gmail will now encourage you to use an HTTPS connection for your privacy by switching your browser over to the more secure level if at all possible.

    An SSL connection, if set up correctly, scrambles the data you post to a website and the data you get back. If you're reading or sending email, the SSL connection will hide your bits from prying eyes hiding in any of the computers or routers between you and the website. If you're going through a public Wi-Fi site, it makes sense to use SSL to stop the site or anyone using it from reading the bits you're sending back and forth.

    SSL only protects the information as it travels between your computer and the distant website, but it doesn't control what the website does with it. If you're reading your email with your Web browser, the SSL encryption will block any router between your computer and the email website, but it won't stop anyone with access to the mail at the destination from reading it after it arrives. That's how your free Web email service can read your email to tailor the ads you'll see while protecting it from anyone else. The Web email service sees your email in the clear.

    There are a number of complicated techniques for subverting SSL connections, such as poisoning the certificate authentication process, but most of them are beyond the average eavesdropper. If you're using a local coffee shop's Wi-Fi, SSL will probably stop the guy in the back room from reading what you're doing, but it may not block the most determined attacker.

    Online privacy technique No. 4: Encrypted messages
    While Tor will hide your IP address and SSL will protect your bits from the prying eyes of network bots, only encrypted mail can protect your message until it arrives. The encryption algorithm scrambles the message, and it's bundled as a string of what looks like random characters. This package travels directly to the recipient, who should be the only one who has the password for decrypting it.

    Encryption software is more complicated to use and far less straightforward than SSL. Both sides must be running compatible software, and both must be ready to create the right keys and share them. The technology is not too complicated, but it requires much more active work.

    There's also a wide range in quality of encryption packages. Some are simpler to use, which often makes for more weaknesses, and only the best can resist a more determined adversary. Unfortunately, cryptography is a rapidly evolving discipline that requires a deep knowledge of mathematics. Understanding the domain and making a decision about security can require a doctorate and years of experience. Despite the problems and limitations, even the worst programs are often strong enough to resist the average eavesdropper -- like someone abusing the system admin's power to read email.

    Online privacy technique No. 5: Translucent databases
    The typical website or database is a one-stop target for information thieves because all the information is stored in the clear. The traditional solution is to use strong passwords to create a wall or fortress around this data, but once anyone gets past the wall, the data is easy to access.

    Another technique is to only store encrypted data and ensure all the encryption is done at the client before it is shipped across the Internet. Sites like these can often provide most of the same services as traditional websites or databases while offering much better guarantees against information leakage.

    Many databases offer other encryption tools that can provide some or all of the benefits, and it's easy to add other encryption to the Web clients.

    In the best examples, the encryption is used to obscure only the sensitive data, leaving the rest in the clear. This makes it possible to use the non-personal information for statistical analysis and data-mining algorithms.

    Online privacy technique No. 6: Steganography
    One of the most elusive and beguiling techniques is steganography, a term generally applied to the process of hiding a message so that it can't be found. Traditional encryption locks the data in a safe; steganography makes the safe disappear. To be more accurate, it disguises the safe to look like something innocuous, such as a houseplant or a cat.

    The most common solutions involve changing some small part of the file in a way it won't be noticed. A single bit of a message, for instance, can be hidden in a single pixel by arranging the parity of the red and green components. If they're both even or both odd, then the pixel carries the message of 0. If one is even and one is odd, then it's a 1. To be more concrete, imagine a pixel with red, green and blue values of 128, 129, and 255. The red value is even, but the green value is odd, meaning the pixel is carrying the message of 1.

    A short, one-bit message can be hidden by taking a file, agreeing upon a pixel, and making a small change in either the red or green value so that the pixel carries the right message. A one-bit change will be tiny and almost certainly not visible to the human, but a computer algorithm looking in the right place will be able to find it.

    You needed to send only one bit, but you may need to send more. If this technique is repeated long enough, any amount of data can be hidden. An image with 12 megapixels can store a message with 12Mb, or 1.5MB, without changing any pixel by more than one unit of red or green. Judicious use of compression can improve this dramatically. A large message like this article can be snuck into the corners of an average photo floating around the Internet.

    Tweaking pixels is just one of the ways that messages can be inserted in different locations. There are dozens of methods to apply this approach -- for example, replacing words with synonyms or artfully inserting slight typographical mistakes into an article. Is that a misspelling or a secret message? All rely on inserting small, unnoticeable changes.

    Steganography is not perfect or guaranteed to avoid detection. While the subtle changes to values like the red and green component may not be visible to the naked eye, clever algorithms can sometimes find the message. A number of statistical approaches can flag files with hidden messages by looking for patterns left behind by sloppy changes. The glare off of glass or chrome in a picture is usually stuffed with pixels filled with the maximum amount of red, green, and blue. If a significant number of these are just one unit less than the maximum, there's a good chance that a steganographic algorithm made changes.

    These detection algorithms also have limits, and there are a number of sophisticated approaches for making the hidden messages harder to find. The scientists working on detection are playing a cat-and-mouse game with the scientists looking for better ways to hide the data.