Solved

Looking for choices to encrypt JPG files using visual basic or third party tools with command line functionality

Posted on 2014-03-25
3
530 Views
Last Modified: 2014-05-16
I am looking for examples about how to encrypt JPG files using visual basic or third party tools with command line functionality

Best Regards
SmileBeBrave
0
Comment
Question by:smilebebrave
  • 2
3 Comments
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39954443
you can encrypt files easily enough (for instance, using ebcrypt from vb, vba or vbs, but - what is the end goal here?
0
 

Author Comment

by:smilebebrave
ID: 39959141
thank you.
I am creating a VB application that will manage confidential information related to payroll. Some files related to each employee are JPG files. People from IT infraestructure area which es responsible for servers must not have access to view the content of the JPG, they can only backup the information.

best regards
SmileBeBrave
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39959388
Problem you are going to have then is decrypting the data "on the fly" and using it, rather than encryption/decryption - if you decrypt the files to load them, then they will be accessable on disk when in use (mind you, there is little to be done about that anyhow against internal IT)

You have two real choices.
First, you can encrypt the data files and decrypt them at need - ebCrypt above will be fine for doing that.
Second, you can do "on the fly" file encryption, using either a third party app such as truecrypt, or MS EFS. EFS isn't absolutely proof against access, but is certainly good enough to prevent anything but a determined effort to break, and is effectively transparent for you and your users.
0

Featured Post

MS Dynamics Made Instantly Simpler

Make Your Microsoft Dynamics Investment Count  & Drastically Decrease Training Time by Providing Intuitive Step-By-Step WalkThru Tutorials.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Video by: Tony
This video teaches viewers how to export a project from Adobe Premiere Pro and the various file types involved.
The viewer will learn how to successfully download and install the SARDU utility on Windows 7, without downloading adware.

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question