Several of the dinosaur wav files that were extracted from the new portal gcf that were not morse code sound files, were actually SSTV transmissions, and not steganography as reported in the posting.
SSTV is just an audible way to transmit an image.
Essentially what is required is to play the audio back and pipe it to SSTV software which reads the data from the audio stream and in turn displays the actual image is is contained in the data.
More about SSTV can be read here:
http://en.wikipedia.org/wiki/Slow-scan_television
There was not steganography involved.
It sounds very much like listening to the audio noise generated when you listen in on a modem.
The resulting images were analyzed and noticed that certain characters where cricled.
The circled characters where collected and ended up making a 32 character string which turned out to be an MD5 hash.
More on MD5 here: [ame]http://en.wikipedia.org/wiki/Md5[/ame]
The MD5 hash ended up being a hash for the phone number for the BBS.
The BBS itself was not encrypted. It was just necessary to use the correct terminal settings to display the content properly.
Once the content displayed correctly, a username and password was required.
The username and password was provided trough the transposed morse code that was extracted from the dinosaur wav files.