Solved

read NSF files

Posted on 2010-11-12
9
1,386 Views
Last Modified: 2013-12-18
Does anyone have a wrapper class for reading NSF files?
0
Comment
Question by:RichInAustin
9 Comments
 
LVL 22

Expert Comment

by:mbonaci
ID: 34121242
That's a pretty general question. Java class?
Can you explain what exactly do you want to do?
0
 
LVL 1

Expert Comment

by:KNolen
ID: 34121689
In order to read NSF files, you would need the Java libraries that are installed as part of a Lotus Notes or Lotus Domino server installation. Without this installation you can's read NSF files. For example, you can include Notes.jar in a Java project. See an example at

http://www.ibm.com/developerworks/lotus/library/notes-eclipse/

0
 

Author Comment

by:RichInAustin
ID: 34122230
I was not aware of the Java libraries for Notes. Thanks for the info!
I guess I should have included more specifics in my question. I was wondering if anyone knew of a .NET wrapper around the C API. The COM object doesn't (to my knowledge) allow you to remove local security from an NSF file. You can with the C API and I was hoping to incorporate that functionality into my .NET code.
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 34122261
Remove local security from an NSF file?? Using the C API?? No way.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:RichInAustin
ID: 34122298
Are you sure? Then how do the third party guys do it? Like these guys:
http://www.perfectdatasolutions.com/nsf-security-eraser.html
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 34122805
Oh, if they do what I think they do, it's a (not so) well-known hack to remove one bit in the database. That bit indicates the setting for Enforce consistent ACL across all replicas. Once that bit is removed on a LOCAL database, anyone with a VALID Notes-id can open that database. But that won't say that they can read all documents; well, they can read them, but the encrypted documents will not be decrypted.

So essentially, you're right, and I have to correct myself: you can "break" local security but you can't break encryption.
0
 

Author Comment

by:RichInAustin
ID: 34122918
Makes perfect sense. For some reason I thought it was a function of the C API. Would you be able to share the hack so I can test it? I have some databases with local security. The encryption part is OK, all I need to do is report on which documents can and can't be read and extracted, if it's encrypted it's encrypted!
0
 
LVL 46

Accepted Solution

by:
Sjef Bosman earned 500 total points
ID: 34123299
0
 

Author Comment

by:RichInAustin
ID: 34123712
Thank you!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Work Space in Lotus Notes cannot found 6 167
Lotus notes send email with attachments 8 162
Text over two lines in VBA for email 26 159
attaching a file lotus notes 4 108
This is an old article, please see an updated version of this article, located here: http://www.experts-exchange.com/articles/23619/Notes-8-5x-Windows-7-Notes-info-and-tips.html
Article by: Rob
Notes 8.5 Archiving Steps and Tips This article covers setting up a Notes archive, and helps understand some of the menu choices making setting up and maintaining a Notes archive file easier.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now