4 Options to view photos and avoid the JPEG exploit in Windows

jpeg exploit

On multiple occasions we have mentioned a certain number of applications that have the possibility of combining some type of "secret" element in a photograph. It could involve a text or some audio file, all depending on the tool and what you need to do.

If for us who are considered "ordinary users" this type of task is facilitated, Can you imagine what a computer expert can do? In a direct way, we are talking about what is known on the web as "JPEG exploit", an element that comes to be a photograph that contains a file of malicious code inside; For this reason, we will now recommend the use of a few image viewers that you can use, without any risk, to avoid the presence of these "JPEG exploits".

How dangerous can a "JPEG exploit" be?

Let's suppose for a moment that someone has sent you a photograph and it contains a file of malicious code; the same that can be classified as a «JPEG exploit». If you already have it downloaded to your personal computer and you double-click it, this element will automatically be executed from inside the photograph, infecting Windows and turning your personal computer into a "bot" that will receive orders remotely, from the place where the attacker is.

XnView

A good recommendation for using third-party image viewers is called «XnView«, Which theoretically, would not make an image whose structure has a« JPEG exploit »is displayed. We can achieve this after we install this tool and define it as "default".

xnview-tab-image-viewer

You have to open this application to find the images or photographs you want to view. Although the tool offers you a few other alternatives for use, the most important thing is in the distribution of the images in different tabs within its interface, something very similar to what Internet browsers currently do.

IrfanView Thumbnails

This tool has a double advantage, since on the one hand you have the possibility to search a specific location on the hard drive for the images you want to display.

irfanview-thumbnails

The other advantage lies in the possibility of create panoramic photos. A few other additional functions that it offers you «IrfanView Thumbnails»Is in the possibility of rotate the image without it losing a lot of quality according to the developer.

FastStone Image Viewer

Like the alternatives we mentioned earlier, with «FastStone Image Viewer»We will also have the possibility of view photos or images within the tool interface.

faststone-image-viewer

You can make small edits of the photographs that you manage to load within this application, which nor it will cause a large number of bytes to be lost in its resolution according to the developer.

Photoscape

The similarities to the tools we mentioned above are great, though each image will open in a new window. Simple but also important edits can be made with «Photoscape», which do not involve a loss of quality in the final result.

photoscape-image-viewer

You can choose its native function to process "batch of images", combine several of them, play animated gifs and even, you can get to print any image that you have imported within the interface.

Beyond what each application can do independently, the importance is that some of these applications they will not display those images that are considered a "JPEG exploit", something of which you can even admire in its properties. The consumption of RAM memory is low, as it covers a range that goes from 100 to 200 MB approximately. If for some reason you have double-clicked on an image and it had a malicious code inside it, we recommend that you analyze if any type of malware has been infiltrated with the alternative we mentioned above, which by the way, is completely free.


The content of the article adheres to our principles of editorial ethics. To report an error click here!.

Be the first to comment

Leave a Comment

Your email address will not be published.

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

bool (true)