THX for posting!
Great set.
:rockon:
nice set thanx for sharing
this is set by
PixAndVideo-CD139\2004-11-12_-_Carina_&_Victor\
by el-toro classification
thanks for pics
in the csv file taken from El-toro's site
the name of the pics are the same
but a size in bytes are different
for example:
first pic of set must be
0827-001.JPG, 212837 bytes
and we have:
e5d_0827_001.jpg 212898 bytes
where are some bytes from???
because that file is useless for collecting
:banghead:
may be the free host adding some data
or the pic was modified before
Originally Posted by kezman77
The filenames are the set number from twenty first sex tury
[QUOTE=iammorbius]The filenames are the set number from twenty first sex tury
yes, i know
but i asked for the differensies of file size
any comments or info on this problem?
Unknown. Quite possibly irrelevant too... These pics travel through many hands, I'm happy that the file names weren't changed too...
understand youOriginally Posted by iammorbius
anyway
thats VERY good that this pics posted here
may be for some people the size is not so important as for me
may be they are collecting the thru whole 21s sets
thanks again
Filesizes can change for many reasons. Open up a photo in Photoshop, for example, look at it, zoom in, zoom out, Save As, keep original file name, Replace?Yes, done.
No changes were made to the picture but now it is a different filesize than it was before it was opened in Photoshop. Stupid stuff like that is enough to change filesizes without visibly altering the photo.
Anyway, thanks for the help and keep those names coming...
sure i will
well that was a surprisingly good set.
FYI. Just to add the following from symantec
"W32.Perrun is a virus that appends itself to .jpeg or .txt files. The malicious content of files that it alters will not spread to other computers. Indications of infection are that .jpg or .txt files will have increased in size by approximately 11KB, and the presence of the file Extrk.exe or Textrk.exe.The original data will not successfully extract from .jpeg files if the file C:\Windows\System\Shimgvw.dll does not exist on an infected computer.
The original data will not successfully extract from .txt files if the file C:\Windows\Notepad.exe does not exist on an infected computer.
YAda yada yada. ...and should not, of course, detract from the great work that Iammorbius is doing on the posting front.
great set thanks for the post
Nice set. Keep 'em coming. Thanks.