hCaptcha delivers best-in-class bot mitigation and fraud detection solutions for organizations that require rapid deployment and strict privacy compliance to defeat sophisticated attacks with minimal customer friction. www.hcaptcha.com/networkchuck In this video we cover 5 ways to hide your files and folders, starting with basic, easy methods that anyone can do and ending with hacker-level techniques. 🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy 💯💯 To become a beta tester, email academy@networkchuck.com **Sponsored by hCaptcha
Just a small correction, experts can detect if there is a hidden partition/volume/disks. The original research was done on TrueCrypt but a later research also managed to detect hidden encryptied volumes in VeraCrypt. Basically, as you explained, someone can see that there is an encrypted volume due to the size discrepancy (amongst other ways), they can then (in some places) legally request that you disclose the password for it. If you then give them the password of the outer volume (aka Cover Volume) they can then use it to determine if there is a hidden volume and its approximate size. Quoting from a paper (called Detecting Hidden Encrypted Volumes - 2010): By visualising the changes that occur in the free space of a decrypted cover volume and using knowledge of file system structures is has been possible to identify the FATs, estimate the size of the hidden volume and derive the FAT version in use and the cluster size. In future it should also be possible to identify hidden volumes formatted using NTFS although the patterns of changes are different due to the use of a Master File Table rather than FATs. Another paper also look at this but on VeraCrypt (called Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems - 2017) but instead of checking the changes to the hexadecimal code of the volume, they conducted randomness testing to check for artifacts in the outer volume. Quote: The reason for this is because if a hidden OS is running inside a completely encrypted hidden volume that is located within an outer volume, which is also completely encrypted, no pseudo-random anomalies should be found. When we performed entropy analysis on the outer volume, it showed that most of the examined data had values between 7.9978 and 7.9986, which represent expected values from correctly encrypted cipher text data. However, we were able to observe some unexpected values in specific sectors that were occupied by the outer volume. In particular, there were two areas which clearly showed significantly lower entropy values of 7.9966 and 7.99 While these papers are a few years old, they are evidence that there will always be ways to detect these hidden volumes, which would stop anyone from having plausible deniability. Both papers can be found online, for free. The first on in the 'IFIP Digital Library' website, and the second one in the 'University of Wollongong Research Online' website.
It is awful, that accessibility cookie bullshit really needs to be deprecated, it doesn’t work half of the time and should be replaced with some sort of audio challenge, I know I’m screaming into the void, but who cares
For Steghide to run on Windows: Extract the "steghide" folder and move it into the "C:\Program Files" folder. Then after that, search for "Edit the system environment variables", click on the "Environment Variables" button, edit the "Path" variables either or on both on the user and or system variables, then add the path "C:\Program Files\steghide" as a new entry, And, that's it! ☕😊
lololol this brought back memories of doing stuff like this in highschool in the late 90's early 00's. Ahhh.. such innocent times... I don't think I could have wound up coming of age at a better time, as someone who's always had a natural interest in all things technology. I was exactly the right age to literally grow up "with" the internet.... as in, I developed into an adult, alongside the internet fundamentally being developed into existence. Something that's so much more profound than even I realize, let alone am I able to explain to the youth of today just how cool and meainingful this really is, if you really think about how integral it has all become. Its much easier to understand some of the more confusing parts of technology, software, programming and the internet, and why things work the way they do, when you lived through those things being made, and witnessed the struggles and decisions being made to wind up with what we have today. Back in my day, you could reset almost anyone's passwords on a good chunk of websites, so long as you knew the persons birthday, the name of the street they grew up on, and their mother's maiden name...... all things that are very easy to know if you are, let's say, the high school classmate of someone O:-) certainly easy enough things to ask about someone, if you don't already know them. (this is how I naturally learned through experience that 90% of hacking is just data mining anything and everything you can about the people around you, and social engineering and slick talking) yes, such very innocent times O:-). Of course, this was also a time when nothing of importance happened on the internet, and things like "online banking" was not a thing for anything but the largest of companies, and was still a ways away from reality for the average person. And then basically Columbine happened, and turned hacking the class president's personal geocities website and putting porn on to it as a joke, into something that gets you expelled from highschool because everyone thinks ur a mysterious hacker mass murderer :( But Karma took care of that and allowed me to laugh all the way to the bank as a senior software engineer and penetration (giggity) tester.
Wow I’m early! Thank you Chuck for getting me through both my cybersecurity and network admin associates degree! Wouldn’t know a fraction of what I do without you!
there is another method I like to use, not hidden but obfuscated. you take a file and fill it with bytes of multiple different files with a way (a program) to read the specific bytes and open them. for example a file with multiple images in bytes separated by a new line, so if anyone tries to open it (even with notepad) it will look like a weird bytes file.
Interesting. Used to use copy with the b option back in the day to hide files in other files on Windows. Hide a text file in an image file, open the file by clicking and it opens in image, open it in notepad and it opens the text file
I had problem comprehending trading in general. I tried watching other UA-cam trading channels, but they made the concepts more complicated. I was almost giving ap until when i discovered content and explain everything in detail. The videos are easy to follow
I've been making a lot of looses trying to make profit trading. I thought trading on a demo account is just like trading the real market. Can anyone help me out or at least advise me on what to do?
Trading on a demo account can definitely feel similar to the real market, but there are some differences. It's important to remember that trading involves risks and it's normal to face looses sometimes. One piece of advice is to start small and gradually increase your investments as you gain more experience and confidence. It might also be helpful to seek guidance from experienced traders or do some research on different trading strategies
The first step in every successful investment is to establish your goals and risk tolerance, a task best undertaken with the assistance of financial advisor.
As far as I know its the first time you ever did something like this in the middle of the video.😂😂😂😂 Now your videos are more fun to watch. Keep adding that some kind of unpredictable things. No one every know what is about to come.
You can hide exe’s in alternate datastreams too. Just make sure it doesnt try to grab any dependencies from its parent directory. To open a hidden exe simply do wmic process call create (path to hidden file) You can also hide files in folders doesn’t have to be a pdf or any file.
@NetworkChuck you need to know, I time my likes with purpose == you're a great youtuber, entertainer, teacher, coffee dood, and probably many more things I won't comment on. Also, helluva beard
hey chuck as u said steghide dont work properly on windows ....but recently i am working on my college mini project where I am combining steganography and blockchain....i was able to make steghide work on windows....and even my complete developemnt for this project took place on window machine
With TrueCrypt (pre VeraCrypt) you could corrupt/destroy the hidden volume by writing to the outer volume. This was because the outer volume occupied the full size of the file so as to leave no trace of there being a hidden volume. The idea was you created the outer volume first, put a few plausible-deniability psuedo-secrets in there, then create the hidden volume and it wouldn't overwrite the files in the outer volume. You could then write to the hidden volume, but if you also wrote to the outer volume the hidden volume could get partially overwritten and corrupted. I suspect the same will be true for VeraCrypt.
Hey, chuck your content always be unique and interesting also main point is valuable to viewers not only about your content but also what you are sponsoring that's too, and you really doing great marketing for your coffee brand compared to network chuck academy you prioritized coffee, your attitude communication style include hair style and the way you teaching all inspiring me to become like you I never found any other person like you in UA-cam keep it up make more content
Nice video (as usual) Chuck BUT.... you didn't explain how to extract the 'type command hidden file'. Could you explain me on answer please?. Big thanks
make sure your hidden desktop (windows) folder is not in the cloud (onedrive), your corporate IT Sec Policy may not allow the special file rename and only show a red circle with an X inside!
Really useful info.. but I like to know is there any simple way to encrypt folder with key like ssh key so when ever needed use that key to open folder anywhere in system or in cloud storage and then lock it again ??? please guide me if there any way also if you have discord channel please share.. I have learn allot of things from your videos especially its very helpful for me to change drive space in proxmox .. Thank you very much
Nices video, allerdings kleine Korrektur meiner Meinung nach: Durch den vaporizer wird man sogar mehr als weil weniger thc durch die Hitze zerfällt. Es it aber natürlich isein ganz anderes, eher kopflastiges high da der Kreislauf nicht belastet wird wie beispielsweise bei einem dicken jay
write a script or make an app that goes over the steps of hiding and encrypting etc at the click of a button so to speak, pass in your passwords and that should do the trick 😅
In method 4 most people I know would just delete that text file thinking it might be corrupted or infected by a virus or something. I'm a Linux user and most of the time I just use encfs.
More precisely, Base64 encode both the image and the text then reverse the process for the combined text. As long as it’s not large enough to cause encoding errors
I hide images in image :D and always delete them by mistake 😄 because those lines generates an image with zip file in it. it look like an image and act like an image. if you want to see the hidden archive in it must open the image with 7zip, and i like this video. :) copy /b image.png+text.zip image2.png
Doesn't you icon get a check mark for "availability status"? My icon is clear but with a check mark on the corner...so it is not invisible at all. What can I do in this case to make it invisible?
My PC is booby trapped. I have thermite taped to all my hard drives and proximity switches that will ignite the thermite if my PC case is ever opened. Only a certain bios setting can disable the switches. You aint shite.
hCaptcha delivers best-in-class bot mitigation and fraud detection solutions for organizations that require rapid deployment and strict privacy compliance to defeat sophisticated attacks with minimal customer friction. www.hcaptcha.com/networkchuck
In this video we cover 5 ways to hide your files and folders, starting with basic, easy methods that anyone can do and ending with hacker-level techniques.
🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
💯💯 To become a beta tester, email academy@networkchuck.com
**Sponsored by hCaptcha
Networking
We need more hacking video ❤❤❤
Just a small correction, experts can detect if there is a hidden partition/volume/disks. The original research was done on TrueCrypt but a later research also managed to detect hidden encryptied volumes in VeraCrypt.
Basically, as you explained, someone can see that there is an encrypted volume due to the size discrepancy (amongst other ways), they can then (in some places) legally request that you disclose the password for it. If you then give them the password of the outer volume (aka Cover Volume) they can then use it to determine if there is a hidden volume and its approximate size.
Quoting from a paper (called Detecting Hidden Encrypted Volumes - 2010): By visualising the changes that occur in the free space of a decrypted cover volume and using knowledge of file system structures is has been possible to identify the FATs, estimate the size of the hidden volume and derive the FAT version in use and the cluster size. In future it should also be possible to identify hidden volumes formatted using NTFS although the patterns of changes are different due to the use of a Master File Table rather than FATs.
Another paper also look at this but on VeraCrypt (called Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems - 2017) but instead of checking the changes to the hexadecimal code of the volume, they conducted randomness testing to check for artifacts in the outer volume.
Quote: The reason for this is because if a hidden OS is running inside a completely encrypted hidden volume that is located within an outer volume, which is also completely encrypted, no pseudo-random anomalies should be found. When we performed entropy analysis on the outer volume, it showed that most of the examined data had values between 7.9978 and 7.9986, which represent expected values from correctly encrypted cipher text data. However, we were able to observe some unexpected values in specific sectors that were occupied by the outer volume. In particular, there were two areas which clearly showed significantly lower entropy values of 7.9966 and 7.99
While these papers are a few years old, they are evidence that there will always be ways to detect these hidden volumes, which would stop anyone from having plausible deniability.
Both papers can be found online, for free. The first on in the 'IFIP Digital Library' website, and the second one in the 'University of Wollongong Research Online' website.
It is awful, that accessibility cookie bullshit really needs to be deprecated, it doesn’t work half of the time and should be replaced with some sort of audio challenge, I know I’m screaming into the void, but who cares
@@NetworkChuck That is exactly what a Bot would say!
baby john hammond 😭😭😭😭
No replies? gotta fix that!
No way your youtube handle is (underscore)JohnHammond. Thought you were a fake initially.
11 likes and 2 replies.
hahaha!
We love you John you're a living legend!
Ugh
-So how did you lose your files ?
I tried to hide it from everyone else and ended up hiding it from myself
That's me to a tee 😂
😂 always happens to me 😅 my brain is so lunatic
@@joe-skeen and Chuck likes tea, not coffee, you see ?!
So....there is a club? I'm not the only one?
NEVER DO THAT JUMPSCARE AGAIN
Lol
@@Rylocomp lol
@@DKSEWY lol
I didn't even flinch
Yes, I responded with a few choice words
Bro just started yapping about making coffee in the middle of a Harry Potter Computer hack course and then continues like nothing had happened.
For Steghide to run on Windows: Extract the "steghide" folder and move it into the "C:\Program Files" folder. Then after that, search for "Edit the system environment variables", click on the "Environment Variables" button, edit the "Path" variables either or on both on the user and or system variables, then add the path "C:\Program Files\steghide" as a new entry,
And, that's it! ☕😊
The process to something so damn simple as running a program is absolutely maddening 😂
We're gonna be hiding the homework folder with this one.
😂 Who downloads anymore?
@@imanassole9421 Bro just imagine your internet is down and you wanna do it..
lololol this brought back memories of doing stuff like this in highschool in the late 90's early 00's. Ahhh.. such innocent times... I don't think I could have wound up coming of age at a better time, as someone who's always had a natural interest in all things technology. I was exactly the right age to literally grow up "with" the internet.... as in, I developed into an adult, alongside the internet fundamentally being developed into existence. Something that's so much more profound than even I realize, let alone am I able to explain to the youth of today just how cool and meainingful this really is, if you really think about how integral it has all become. Its much easier to understand some of the more confusing parts of technology, software, programming and the internet, and why things work the way they do, when you lived through those things being made, and witnessed the struggles and decisions being made to wind up with what we have today. Back in my day, you could reset almost anyone's passwords on a good chunk of websites, so long as you knew the persons birthday, the name of the street they grew up on, and their mother's maiden name...... all things that are very easy to know if you are, let's say, the high school classmate of someone O:-) certainly easy enough things to ask about someone, if you don't already know them. (this is how I naturally learned through experience that 90% of hacking is just data mining anything and everything you can about the people around you, and social engineering and slick talking) yes, such very innocent times O:-). Of course, this was also a time when nothing of importance happened on the internet, and things like "online banking" was not a thing for anything but the largest of companies, and was still a ways away from reality for the average person. And then basically Columbine happened, and turned hacking the class president's personal geocities website and putting porn on to it as a joke, into something that gets you expelled from highschool because everyone thinks ur a mysterious hacker mass murderer :(
But Karma took care of that and allowed me to laugh all the way to the bank as a senior software engineer and penetration (giggity) tester.
@@imanassole9421 perverts like that guy 😂 shame
Why?
Good video, keep making these chuck!
Thank you. I will now forever be referring to drinking coffee as conducting a data transfer
Good insight as always, I havent watched your content in ages.
OMG, your coffee maker. I salute you my good Sir.
Wow I’m early! Thank you Chuck for getting me through both my cybersecurity and network admin associates degree! Wouldn’t know a fraction of what I do without you!
youd know (x the ammount with teachers that arent just selling you things they are sponsored by .
NOOO THE JUMPSCARE GOT ME
oh oh, that oldschool stuff with invisible folder pictogram and caption - I almost cried from nostalgy)))
i put my files on a usb stick then I put the the usb stick in a cup filled with network chuck coffee
what a supreme coffee maker holy
there is another method I like to use, not hidden but obfuscated.
you take a file and fill it with bytes of multiple different files with a way (a program) to read the specific bytes and open them.
for example a file with multiple images in bytes separated by a new line, so if anyone tries to open it (even with notepad) it will look like a weird bytes file.
Now i can keep my homework safe...
😂
Interesting. Used to use copy with the b option back in the day to hide files in other files on Windows. Hide a text file in an image file, open the file by clicking and it opens in image, open it in notepad and it opens the text file
It's pretty easy if you use KDE to do method 4, just expand the system tray and click on the "Vaults" button.
hey chuck, i think this is one of your best videos to date! haha
Your keyboard sound is so satisfying. What keyboard do you use?
well played editor. i haven't seen one of those in years!
8:28
Network chuck is also a coffee chef 👨🏼🍳
Please make a video on CPTS I'm really waiting for your journey and get started mine by getting inspired by yours please 🥺
I needed this info a year ago! lmao Glad I got it now. Thank youuuuu!! 😂
somehow your videos manage to make me laugh 😂 just can't wait to get into October can ya!
Steganography is old. When I was doing my Computer science course in the mid 90's we just did this...
copy /b "image.jpg" + "file.txt" "newimage.jpg"
So what happened to all the Bitcoin you mined back in the day..... I hid it from myself 😑🤦♂️
03:30 The coffee guy☕🔥🤣🤣🤣🤣🤣🤣🤣🤣
I had problem comprehending trading in general. I tried watching other UA-cam trading channels, but they made the concepts more complicated. I was almost giving ap until when i discovered content and explain everything in detail. The videos are easy to follow
I've been making a lot of looses trying to make profit trading. I thought trading on a demo account is just like trading the real market. Can anyone help me out or at least advise me on what to do?
Trading on a demo account can definitely feel similar to the real market, but there are some differences. It's
important to remember that trading involves risks and it's normal to face looses sometimes. One piece of advice is to start small and gradually increase your investments as you gain more experience and confidence. It might also be helpful to seek guidance from experienced traders or do some research on different trading strategies
I will advise you should stop trading on your own if you keep losing
l'd recommend Angela Camila. her profit is great even when there's a dip
The first step in every successful investment is to establish your goals
and risk tolerance, a task best undertaken with the assistance of financial advisor.
Honestly forgot this Chanel existed and of course a new video drops when I want to get back into this 😂
You're amazing mann ❤❤
Great video, tons of info, thx a lot!
That jump scare got me
bruh. im watching this at night alone and in the dark 😭
Time for Coffee Break 😂
@@shalomarputhasingh 😂😂
That jump scare scared the crap out of me
I love this guy. The way he made videos I never get bored like the other one did. u r awesome..................
As far as I know its the first time you ever did something like this in the middle of the video.😂😂😂😂 Now your videos are more fun to watch. Keep adding that some kind of unpredictable things. No one every know what is about to come.
bravo man i likeur posts...keep going...
You can hide exe’s in alternate datastreams too. Just make sure it doesnt try to grab any dependencies from its parent directory.
To open a hidden exe simply do wmic process call create (path to hidden file)
You can also hide files in folders doesn’t have to be a pdf or any file.
@NetworkChuck you need to know, I time my likes with purpose == you're a great youtuber, entertainer, teacher, coffee dood, and probably many more things I won't comment on.
Also, helluva beard
hey chuck
as u said steghide dont work properly on windows ....but recently i am working on my college mini project where I am combining steganography and blockchain....i was able to make steghide work on windows....and even my complete developemnt for this project took place on window machine
Another smashing vid
I didn’t even know it was possible to have custom emojis on youtube. Very fun 😎
Amazing 🥰🥰🥰
Arabic caption is very useful 🥰
Love how you teach all things
With TrueCrypt (pre VeraCrypt) you could corrupt/destroy the hidden volume by writing to the outer volume. This was because the outer volume occupied the full size of the file so as to leave no trace of there being a hidden volume. The idea was you created the outer volume first, put a few plausible-deniability psuedo-secrets in there, then create the hidden volume and it wouldn't overwrite the files in the outer volume. You could then write to the hidden volume, but if you also wrote to the outer volume the hidden volume could get partially overwritten and corrupted. I suspect the same will be true for VeraCrypt.
I like it am going to impress my friends with these new tips
Hey, chuck your content always be unique and interesting also main point is valuable to viewers not only about your content but also what you are sponsoring that's too, and you really doing great marketing for your coffee brand compared to network chuck academy you prioritized coffee, your attitude communication style include hair style and the way you teaching all inspiring me to become like you I never found any other person like you in UA-cam keep it up make more content
watching while taking my morning tea,🙂
windows 11 broken search and folder aliasing hides my files for me
Which keyboard do you use btw? It sounds awesome.
Cool! Thank you!
Epic video dude
Nice video (as usual) Chuck BUT.... you didn't explain how to extract the 'type command hidden file'. Could you explain me on answer please?. Big thanks
Lol I used to do this when I was younger for fun. I totally forgot about some of this stuff
make sure your hidden desktop (windows) folder is not in the cloud (onedrive), your corporate IT Sec Policy may not allow the special file rename and only show a red circle with an X inside!
Great job on your video
But can you send this to someone and that they can open the secret files/message
The Jumpscare made me spill my coffee :(
You should try some extra weirdness with the Raid disk format. Namastè.
Great VIdeo
finally i can hide my homework folder fulll of 1 terabyte of videos related to research
You can also hide folder or file in windows with
attrib +h +s "filename"
but you can see the hided file if you are in the folder with cd:
attrib
Yay time to break from networking homework.
Chuck is always keeping hacking on a special chase. Now hackers have to find new was of hiding their files again.
that last part of coffee sip was sarcastic. F.U. have a good day
Also you can use Zwnj or zwj characters not alt 255 ( you can right click insert Unicode character and zwnj which is also invisible
watch out when changing file extensions, it may loose important metada
4:33 Everybody is dunking on the Minecraft movie teaser now XD
Forensics programs will pick up all these files. Including steg.
Don't just hide it, make it invisible😊
lol good video bro
Chuck show like a hacker access to videos on youtube while blocks happenings in different countries , and videos is super slow :)
When you hide the files in linux, can you still use the cd command to jump into it or do you need another command?
Hi, i love your windows terminal themes and bash , could you share it's setting ? Thanks
well I don't know why but here it says steghide: could not open the file "my file name" so what should I do ?
Really useful info.. but I like to know is there any simple way to encrypt folder with key like ssh key so when ever needed use that key to open folder anywhere in system or in cloud storage and then lock it again ??? please guide me if there any way also if you have discord channel please share.. I have learn allot of things from your videos especially its very helpful for me to change drive space in proxmox .. Thank you very much
8:24 Why haha haha amazing jump scare
Nices video, allerdings kleine Korrektur meiner Meinung nach:
Durch den vaporizer wird man sogar mehr als weil weniger thc durch die Hitze zerfällt. Es it aber natürlich isein ganz anderes, eher kopflastiges high da der Kreislauf nicht belastet wird wie beispielsweise bei einem dicken jay
I wish you touched on accessing those files. I want to write in my secret diary without having to manually extract and re-hide my files.
write a script or make an app that goes over the steps of hiding and encrypting etc at the click of a button so to speak, pass in your passwords and that should do the trick 😅
I still use SSTV to obscure things it works cause it rare
In method 4 most people I know would just delete that text file thinking it might be corrupted or infected by a virus or something. I'm a Linux user and most of the time I just use encfs.
I need this for Mac!
Tinkertool can let you hide a file. to show hidden files though, CMD-Shift-Period If there are other ways, I don't know.
What about using method 5 and then method 4 will taht be secure?
Heyy NetworkChunk, how did you customize your Linux Terminal?
What are your opinions on cold brew?
Thanks man
8:28 actually scared the hell outa me lol
JUST MAKE A COFFEE CHANNEL ALREADY!
nahh he only makes videos about something if a company pays him to sell their product in it ...
@@myname-mz3lo I'm writing an email to tchibo RIGHT NOW!
17:16 should’ve encoded the image as base64 before trying to disguise it as a text file that way the signature would still be a text file
More precisely, Base64 encode both the image and the text then reverse the process for the combined text. As long as it’s not large enough to cause encoding errors
I hide images in image :D and always delete them by mistake 😄 because those lines generates an image with zip file in it. it look like an image and act like an image. if you want to see the hidden archive in it must open the image with 7zip, and i like this video. :)
copy /b image.png+text.zip image2.png
Doesn't you icon get a check mark for "availability status"? My icon is clear but with a check mark on the corner...so it is not invisible at all. What can I do in this case to make it invisible?
Yes, please steghide on Mac. Thx, may the LJC bless you.
for learning your hacking course should i use kali linux?
Always
method 1 and 2 I've done in 2015 😁😎
I backup & store as macro hardcopies in 4d micro Quartz crystals that look like dice using the number dots to hold the data in plain sight....... 8D
I store data on sound bytes as they can be readily converted using an algorithm I choose to use.
As a forensics analyst, you highly underestimate our tools.
My PC is booby trapped. I have thermite taped to all my hard drives and proximity switches that will ignite the thermite if my PC case is ever opened. Only a certain bios setting can disable the switches. You aint shite.
@@Bailey-k2j Ok? I don't need physical access to your computer to get access to your data, that's basic IT...
@@AnonymousApexio But you do need me to click on your phishing links/attachments. Good luck
@@Bailey-k2j No. There is like 10+ alternatives than that lol. Hell if I targeted someone I could even remotely unlock their car or hack the radio.
@@AnonymousApexio lol. no. you're not getting past my norton firewall.
The special character one is not working that is even keeping the num lock on/off , alt 255 doesn't do anything please tell me an alternative 😅
used to have fun at Volt testing NT5 ans hiding files for fun. :D