Solved

Looking for choices to encrypt JPG files using visual basic or third party tools with command line functionality

Posted on 2014-03-25
3
535 Views
Last Modified: 2014-05-16
I am looking for examples about how to encrypt JPG files using visual basic or third party tools with command line functionality

Best Regards
SmileBeBrave
0
Comment
Question by:smilebebrave
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39954443
you can encrypt files easily enough (for instance, using ebcrypt from vb, vba or vbs, but - what is the end goal here?
0
 

Author Comment

by:smilebebrave
ID: 39959141
thank you.
I am creating a VB application that will manage confidential information related to payroll. Some files related to each employee are JPG files. People from IT infraestructure area which es responsible for servers must not have access to view the content of the JPG, they can only backup the information.

best regards
SmileBeBrave
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39959388
Problem you are going to have then is decrypting the data "on the fly" and using it, rather than encryption/decryption - if you decrypt the files to load them, then they will be accessable on disk when in use (mind you, there is little to be done about that anyhow against internal IT)

You have two real choices.
First, you can encrypt the data files and decrypt them at need - ebCrypt above will be fine for doing that.
Second, you can do "on the fly" file encryption, using either a third party app such as truecrypt, or MS EFS. EFS isn't absolutely proof against access, but is certainly good enough to prevent anything but a determined effort to break, and is effectively transparent for you and your users.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video demonstrates basic masking and how to edit the mask to reveal the desired image.
This video will demonstrate how to find the puppet warp tool from the edit menu and where to put the points to edit.

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question