Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

GNU Privacy Guard automation of file encryption?

Posted on 2012-03-25
2
402 Views
Last Modified: 2012-04-11
I was tasked to automate an encryption of a data extraction output. It's basically a query to a SQL table and saved as a .csv file. Then I want to be able to use GNU Privacy Guard and encrypt the file.

Is there anyway to automate this process? I was maybe SSIS and then use xp_sendmail (Transact-SQL)
to send the email with the file attached.
0
Comment
Question by:TeknikDev
2 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 37765222
What sort of information, is it subject to any additional laws or regulations like FISMA(gov't), PCI(creditcard/SSN), HIPAA(patient/doctor)? Is Public key cryptography required or will password protection do? GPG/PGP can be complex to setup and maintain the keys and their exchanges, especially with non-tech savvy folk. We like to use AES-256 bit encryption from 7zip and maintain an offline list of passwords (printed to paper as opposed to keeping on a PC).
-rich
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 37766565
There is command line avail
 http://www.glump.net/howto/gpg_intro#encrypting_and_decrypting_files
Probably a bat file after the csv for encryption and even sending email out
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question