Solved

shd and spl analysis

Posted on 2016-11-15
3
187 Views
Last Modified: 2016-11-21
are there any specialist tools to analyse print spool files, i.e. shd and spl.

And does anyone know what kind of information they will contain, i.e. is it purely metadata such as user, print date/time, filename, printer, etc or does it give any clues on content of the print job?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 55

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 41888356
It's the print job itself in a form the print server understands. Having these files means having the data you print out - making it readable will not be a big problem, I guess.
0
 
LVL 16

Accepted Solution

by:
DansDadUK earned 250 total points
ID: 41889637
My understanding is that:

.shd files are 'shadow' files, used to hold job-level meta-data.
.spl files are 'spool' files, used to hold data related to what is actually going to be printed; it may be raw data, or it may be in the form of a (proprietary) EMF (Enhanced Meta File) format.

The format of raw data will depend on the Page Description Language generated by the printer driver (and which the target printer hopefully understands!).

Common PDLs are PCL5, PCL XL, PostScript, PCL3GUI, PCLm/PCLmS, Esc/P, etc.
So you'd need parsers able to understand all of the potential PDLs in use in your system.

To analyse the content of .spl files which contain PCL5 or PCL XL print data, use the PRN File Analyse tool in the PCL Paraphernalia application, available via http://www.pclparaphernalia.eu
0
 
LVL 55

Expert Comment

by:McKnife
ID: 41889687
I guess you'll agree that if someone gets hold of the .spl files, he can replay the print job, so those are as good as the data itself.
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
Here's a look at newsworthy articles and community happenings during the last month.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question