Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Looking for choices to encrypt JPG files using visual basic or third party tools with command line functionality

Posted on 2014-03-25
3
Medium Priority
?
562 Views
Last Modified: 2014-05-16
I am looking for examples about how to encrypt JPG files using visual basic or third party tools with command line functionality

Best Regards
SmileBeBrave
0
Comment
Question by:smilebebrave
  • 2
3 Comments
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39954443
you can encrypt files easily enough (for instance, using ebcrypt from vb, vba or vbs, but - what is the end goal here?
0
 

Author Comment

by:smilebebrave
ID: 39959141
thank you.
I am creating a VB application that will manage confidential information related to payroll. Some files related to each employee are JPG files. People from IT infraestructure area which es responsible for servers must not have access to view the content of the JPG, they can only backup the information.

best regards
SmileBeBrave
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 1500 total points
ID: 39959388
Problem you are going to have then is decrypting the data "on the fly" and using it, rather than encryption/decryption - if you decrypt the files to load them, then they will be accessable on disk when in use (mind you, there is little to be done about that anyhow against internal IT)

You have two real choices.
First, you can encrypt the data files and decrypt them at need - ebCrypt above will be fine for doing that.
Second, you can do "on the fly" file encryption, using either a third party app such as truecrypt, or MS EFS. EFS isn't absolutely proof against access, but is certainly good enough to prevent anything but a determined effort to break, and is effectively transparent for you and your users.
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
There can be many situations demanding the conversion of Outlook OST files to PST format and as such, there is no shortage of automated tools to perform this conversion. However, what makes Stellar OST to PST converter stand above the rest? Let us e…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question