473,395 Members | 1,488 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

how to open a file using encryption

375 256MB
Hi,

I have to develop an application, where the user will be asked to download a file. Each user will be allocated a password. After the file downloads(preferably a notepad or a doc or a pdf) the user will enter a password and if the password matches the file should open

Can anyone provide my any links for the same
Apr 8 '09 #1
2 1262
dorandoran
145 100+
1. build a class that will take user input (txtpassword) and run against your database (where you stored all the passwords for each user)
2. If they match (txtpassword.text = = stored password) then set the visible property for the download button to true

this could be very simple as you have described.
Apr 8 '09 #2
Frinavale
9,735 Expert Mod 8TB
I'm not sure how you would encrypt the file.

I know that you can do this with Access Files...but I guess it would really depend on the type of file that you're sending.

I would recommend generating the password dynamically in your code and use that password when encrypting the file. When you send the file to the person, also send them a message telling them the password to open the file.

If you zip the file using code I think that you can apply a password at that point.... check out this article. I didn't read it through fully but I think it mentions how to do this.

-Frinny
Apr 8 '09 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

6
by: Geert-Pieter Hof | last post by:
Hello, My VB 6.0 application read and writes data from and to a MS Excel workbook, using the Microsoft.Jet.OLEDB.4.0 provider. Now I want to protect the Excel workbook with a password, but I...
34
by: Michael Foord | last post by:
I'd like to formalise slightly the license I release my projects under. At the moment it's 'free to use, modify, distribute and relicense'. This is basically fine as I don't want t oprevent people...
0
by: DreamFly | last post by:
You can use this software to encrypt your important files which you don't want others to see with AES encryption algorithm. Cool File Encryption adopts the international standard cryptographic...
8
by: lauren quantrell | last post by:
When I open an Access form I can have no recordset specified, then in the form's OnOpen event I can do something like: Me.paramaters = "@SomeColumn = 22)" Me.recordsource = "dbo.sproc123" But I...
2
by: Nickneem | last post by:
I made a key generator according to the specs of a shareware partner so customers can register online. It generates a key from a 'secret' and a combination of name and email / zip and then...
2
by: Jonathan Trevor | last post by:
Hi, For the last couple of releases of a product we're developing we've been running to very wierd behavior from IE and our ASP.NET web application which serves up various types of files and I'm...
2
by: Peter | last post by:
I have a component that encrypts/decrypts files using Rijndael encryption. The component works flawlessly but I want to try to extend its capablities and this is my general question: I have an...
14
by: WebMatrix | last post by:
Hello, I have developed a web application that connects to 2 different database servers. The connection strings with db username + password are stored in web.config file. After a code review,...
4
by: Max Vit | last post by:
Here is my problem: I have an application built in Access that outputs sensitive data to a text file. I would like to encrypt this data *whilst* the file is being outputted. The encryption I was...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.