Avatar of RichInAustin
RichInAustin
 asked on

read NSF files

Does anyone have a wrapper class for reading NSF files?
Lotus IBM

Avatar of undefined
Last Comment
RichInAustin

8/22/2022 - Mon
mbonaci

That's a pretty general question. Java class?
Can you explain what exactly do you want to do?
KNolen

In order to read NSF files, you would need the Java libraries that are installed as part of a Lotus Notes or Lotus Domino server installation. Without this installation you can's read NSF files. For example, you can include Notes.jar in a Java project. See an example at

http://www.ibm.com/developerworks/lotus/library/notes-eclipse/

RichInAustin

ASKER
I was not aware of the Java libraries for Notes. Thanks for the info!
I guess I should have included more specifics in my question. I was wondering if anyone knew of a .NET wrapper around the C API. The COM object doesn't (to my knowledge) allow you to remove local security from an NSF file. You can with the C API and I was hoping to incorporate that functionality into my .NET code.
I started with Experts Exchange in 2004 and it's been a mainstay of my professional computing life since. It helped me launch a career as a programmer / Oracle data analyst
William Peck
Sjef Bosman

Remove local security from an NSF file?? Using the C API?? No way.
RichInAustin

ASKER
Are you sure? Then how do the third party guys do it? Like these guys:
http://www.perfectdatasolutions.com/nsf-security-eraser.html
Sjef Bosman

Oh, if they do what I think they do, it's a (not so) well-known hack to remove one bit in the database. That bit indicates the setting for Enforce consistent ACL across all replicas. Once that bit is removed on a LOCAL database, anyone with a VALID Notes-id can open that database. But that won't say that they can read all documents; well, they can read them, but the encrypted documents will not be decrypted.

So essentially, you're right, and I have to correct myself: you can "break" local security but you can't break encryption.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
RichInAustin

ASKER
Makes perfect sense. For some reason I thought it was a function of the C API. Would you be able to share the hack so I can test it? I have some databases with local security. The encryption part is OK, all I need to do is report on which documents can and can't be read and extracted, if it's encrypted it's encrypted!
ASKER CERTIFIED SOLUTION
Sjef Bosman

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
RichInAustin

ASKER
Thank you!