Languages Visual Basic & VB.NET .Net Security  

Encryption and Alternate Data Stream

download download home home  
important code information
Philip Pierce
minimum requirements:
Encryption and Alternate Data Stream description

This project does three things. The first is that it allows you to encypt any file using one of four different encryption algorithms. Once a file is encrypted, you can send the encrypted file to a partner. Your partner can use this program to view the decrypted contents of the file - WITHOUT THE DECRYPTED CONTENTS BEING WRITTEN TO THE HARD DRIVE. This gives extra security, in that even after a file is deleted, it is not truely deleted. This way, the partner never leaves decrypted information on their hard drive which can be recovered using off the shelf software or government recovery software. If you want to securely remove the original unencrypted file from your computer, I suggest you use PGP Tools to wipe the file.
The second part of this project will add any file to the Alternate Data Stream of another file. Please note that this only works with files residing on NTFS partitions (Windows NT 3.5, 4.0+, Windows 2000, Windows XP).

File List:
Masked Files.csproj7Kb
Masked Files.csproj.user2Kb
Masked Files.csproj.vspscc256b
Masked Files.sln1Kb
Masked Files.suo8Kb

Similar code
A1 Folder Lock (Popularity: ) : Updated Version of Directory Security From with features like encryption,password-protected folder,registry manipulation etc..

Visual Verification (Anti Robot) (Popularity: ) : Disallow robots attempting brute force attacks upon web pages (login screens) via a visual verification user control. Users will have to type in the string displayed in the image.
Active Directory (Popularity: ) : This example will do several things. Returns the user’s full name. Allows you to authenticate the users login name and password on the network. And gives you the ability to check to see if a user belongs to a specified ...
VB.NET Encryption Class (Popularity: ) : A Simple to use object that provides encryption and decryption methods for strings. This is done in memory using a choice of DES, RC2 or Rijndael encryption methods and a key string paramter that determines the level of encryption.
Dummy Desktop (Popularity: ) : This a simple desktop lock i did and it looks like your desktop at normal state but it is lock, im just a beginner.. well Please Vote, Thanks!!
XOR Crypt (Popularity: ) : A very Simple Crypt Method!!!
Very simple Log In code and time code (Popularity: ) : Securing and timing
User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
Rate me
supported os
downloads 61
size in Kb 211
popularity   2982/7916503
user rating 4/10

New Code
Popular Code