We help IT Professionals succeed at work.

read NSF files

RichInAustin
RichInAustin asked
on
1,770 Views
Last Modified: 2013-12-18
Does anyone have a wrapper class for reading NSF files?
Comment
Watch Question

Commented:
That's a pretty general question. Java class?
Can you explain what exactly do you want to do?

Commented:
In order to read NSF files, you would need the Java libraries that are installed as part of a Lotus Notes or Lotus Domino server installation. Without this installation you can's read NSF files. For example, you can include Notes.jar in a Java project. See an example at

http://www.ibm.com/developerworks/lotus/library/notes-eclipse/

Author

Commented:
I was not aware of the Java libraries for Notes. Thanks for the info!
I guess I should have included more specifics in my question. I was wondering if anyone knew of a .NET wrapper around the C API. The COM object doesn't (to my knowledge) allow you to remove local security from an NSF file. You can with the C API and I was hoping to incorporate that functionality into my .NET code.
Sjef BosmanGroupware Consultant
CERTIFIED EXPERT

Commented:
Remove local security from an NSF file?? Using the C API?? No way.

Author

Commented:
Are you sure? Then how do the third party guys do it? Like these guys:
http://www.perfectdatasolutions.com/nsf-security-eraser.html
Sjef BosmanGroupware Consultant
CERTIFIED EXPERT

Commented:
Oh, if they do what I think they do, it's a (not so) well-known hack to remove one bit in the database. That bit indicates the setting for Enforce consistent ACL across all replicas. Once that bit is removed on a LOCAL database, anyone with a VALID Notes-id can open that database. But that won't say that they can read all documents; well, they can read them, but the encrypted documents will not be decrypted.

So essentially, you're right, and I have to correct myself: you can "break" local security but you can't break encryption.

Author

Commented:
Makes perfect sense. For some reason I thought it was a function of the C API. Would you be able to share the hack so I can test it? I have some databases with local security. The encryption part is OK, all I need to do is report on which documents can and can't be read and extracted, if it's encrypted it's encrypted!
Groupware Consultant
CERTIFIED EXPERT
Commented:
This one is on us!
(Get your first solution completely free - no credit card required)
UNLOCK SOLUTION

Author

Commented:
Thank you!

Gain unlimited access to on-demand training courses with an Experts Exchange subscription.

Get Access
Why Experts Exchange?

Experts Exchange always has the answer, or at the least points me in the correct direction! It is like having another employee that is extremely experienced.

Jim Murphy
Programmer at Smart IT Solutions

When asked, what has been your best career decision?

Deciding to stick with EE.

Mohamed Asif
Technical Department Head

Being involved with EE helped me to grow personally and professionally.

Carl Webster
CTP, Sr Infrastructure Consultant
Empower Your Career
Did You Know?

We've partnered with two important charities to provide clean water and computer science education to those who need it most. READ MORE

Ask ANY Question

Connect with Certified Experts to gain insight and support on specific technology challenges including:

  • Troubleshooting
  • Research
  • Professional Opinions
Unlock the solution to this question.
Join our community and discover your potential

Experts Exchange is the only place where you can interact directly with leading experts in the technology field. Become a member today and access the collective knowledge of thousands of technology experts.

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OR

Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.