Solved

How to encrypt HTML file and vbs script

Posted on 2011-03-04
7
354 Views
Last Modified: 2012-05-11
Have a html file which contains the vbs codes. Want to encrypt it like an .exe file. double click it, it will run. Is it possible??
0
Comment
Question by:jl66
7 Comments
 
LVL 33

Expert Comment

by:paulmacd
ID: 35039252
Not in and of itself.  You could create a Windows application that behaved that way though.

What is it you're trying to accomplish?  Do you have access to ASP.Net?
0
 
LVL 4

Expert Comment

by:Tomun
ID: 35039551
Try a password protected zip file instead.
0
 

Author Comment

by:jl66
ID: 35040546
paulmacd:Yes for ASP.Net. Can you show me an example or a link to accomplish it?
Tomun: in my situation, zip file does not seem a suitable solution.
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 33

Assisted Solution

by:paulmacd
paulmacd earned 200 total points
ID: 35051812
No, and neither is compiling, in the strictest sense.  I'm guessing you want to hide some bit of proprietary code that would otherwise be in the page on the client side.  If you're working with (or can work with) ASP.Net (or PHP or any of several other server-side lanugages) you can serve up the page, but keep the code secret.

Can you be specific about what you want to accomplish?
0
 

Author Comment

by:jl66
ID: 35053264
Back one step. Can the vbs be encrypted, and still executed as usual??
0
 
LVL 4

Accepted Solution

by:
simpsol earned 300 total points
ID: 35053276
You will need some tool to convert vbs file to exe and encrypt it. I use PrimalScript which has it inbuilt which will encrypt and create an exe file for you. If you just want to encrypt the vbs file google for a free utility VBEncrypt.
0
 

Author Closing Comment

by:jl66
ID: 35110956
Thanks for everyone.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
In this tutorial viewers will learn how to style transparent/translucent elements using alpha transparency in CSS Start with a normal styled element, such as a div.: Define its "background-color" property as "rgba (255, 255, 255, .5): The numbers in…
In this tutorial viewers will learn how to style a corner ribbon overlay for an image using CSS Create a new class by typing ".Ribbon":  Define the class' "display:" as "inline-block": Define its "position:" as "relative": Define its "overflow:" as …

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now