Corrupt: Data corruption software

“The corruption process start by reading the binary of an image file [JPG or GIF], then some bytes are swaps [the number of replacement is a random value f

“The corruption process start by reading the binary of an image file [JPG or GIF], then some bytes are swaps [the number of replacement is a random value from 1 to 20]. The file is then “saved as” a new document. Depending on the number replacement and of the original compression, the image will have a completely different and unpredictable aesthetics.” NOTE: The system displays the last three uploaded images so here’s hoping none of them are NSFW… (Thanks 30gms!)


Related Posts:

Tips for Live Sketching in Virtual Meetings

Investing in Innovation: One Day, Every Month

Use Journals to Introduce Culture and Accelerate Onboarding

Date:
November 24, 2016
Author:
XPLANE