Solved

Looking for choices to encrypt JPG files using visual basic or third party tools with command line functionality

Posted on 2014-03-25
3
517 Views
Last Modified: 2014-05-16
I am looking for examples about how to encrypt JPG files using visual basic or third party tools with command line functionality

Best Regards
SmileBeBrave
0
Comment
Question by:smilebebrave
  • 2
3 Comments
 
LVL 33

Expert Comment

by:Dave Howe
Comment Utility
you can encrypt files easily enough (for instance, using ebcrypt from vb, vba or vbs, but - what is the end goal here?
0
 

Author Comment

by:smilebebrave
Comment Utility
thank you.
I am creating a VB application that will manage confidential information related to payroll. Some files related to each employee are JPG files. People from IT infraestructure area which es responsible for servers must not have access to view the content of the JPG, they can only backup the information.

best regards
SmileBeBrave
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
Comment Utility
Problem you are going to have then is decrypting the data "on the fly" and using it, rather than encryption/decryption - if you decrypt the files to load them, then they will be accessable on disk when in use (mind you, there is little to be done about that anyhow against internal IT)

You have two real choices.
First, you can encrypt the data files and decrypt them at need - ebCrypt above will be fine for doing that.
Second, you can do "on the fly" file encryption, using either a third party app such as truecrypt, or MS EFS. EFS isn't absolutely proof against access, but is certainly good enough to prevent anything but a determined effort to break, and is effectively transparent for you and your users.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

A list of useful business intelligence software.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video shows how use content aware, what it’s used for, and when to use it over other tools.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now