Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Looking for choices to encrypt JPG files using visual basic or third party tools with command line functionality

Posted on 2014-03-25
3
Medium Priority
?
564 Views
Last Modified: 2014-05-16
I am looking for examples about how to encrypt JPG files using visual basic or third party tools with command line functionality

Best Regards
SmileBeBrave
0
Comment
Question by:smilebebrave
  • 2
3 Comments
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39954443
you can encrypt files easily enough (for instance, using ebcrypt from vb, vba or vbs, but - what is the end goal here?
0
 

Author Comment

by:smilebebrave
ID: 39959141
thank you.
I am creating a VB application that will manage confidential information related to payroll. Some files related to each employee are JPG files. People from IT infraestructure area which es responsible for servers must not have access to view the content of the JPG, they can only backup the information.

best regards
SmileBeBrave
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 1500 total points
ID: 39959388
Problem you are going to have then is decrypting the data "on the fly" and using it, rather than encryption/decryption - if you decrypt the files to load them, then they will be accessable on disk when in use (mind you, there is little to be done about that anyhow against internal IT)

You have two real choices.
First, you can encrypt the data files and decrypt them at need - ebCrypt above will be fine for doing that.
Second, you can do "on the fly" file encryption, using either a third party app such as truecrypt, or MS EFS. EFS isn't absolutely proof against access, but is certainly good enough to prevent anything but a determined effort to break, and is effectively transparent for you and your users.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Rules and regulations were devised in order to maintain the integrity of a system. However, interpretation of rules can be quite tricky.
In today’s time where quality is an essential factor all over the world, software testing and effective QA (Quality Assurance) is an all-important element for any business to ensure less risk for an end product. A good software testing company deliv…
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question