Validation of electronic signatures in C # using CRIPTO PRO

 3r33333. 3r3-31. Continuing the conversation on the topic of electronic signatures (hereinafter referred to as ED), it is necessary to say about verification. In the previous article I examined the more difficult part of the task - the creation of a signature. This article is somewhat simpler. Most of the code is an adaptation of examples from the CRYPTO PRO .NET SDK. First of all, we will check signatures according to GOST R ???-2001 and GOST R ???-201? for which we need the CRIPTO PRO. 3r33333.  3r33333.
3r33333.  3r33333. The task for us is divided into 3 parts: a separated signature, a signature ...
+ 0 -

Docotic.Pdf: What problems will PVS-Studio detect in a mature project?

 
3r3-31. Docotic.Pdf: What problems will PVS-Studio detect in a mature project?
 
 
Quality is important to us. And we have heard about PVS-Studio. All this led to the desire to check Docotic.Pdf and find out what else can be improved.
 
 
3r311.
 
 
Docotic.Pdf - A general purpose library for working with PDF files. Written in C #, there is no unsafe code, no external dependencies other than .NET runtime. It works under both .NET 4+ and under .NET Standard 2+.
 
 
The library has been in development for a little more than 10 years and it has 110 thousand lines of code without taking tests, examples and the rest. For static analysis, we constantly use Code Analysis and ...
.NET / C# / PDF
+ 0 -

Unobvious features of using Rotativa to generate PDF in an ASP.NET MVC application

 3r? 3580. 3r3-31. 3r33538. Many developers are faced with the task of creating PDF reports for web applications, quite a natural request. I would like to bring to your attention my experience with this task when using the Rotativa library for generating reports. This, in my opinion, is one of the most convenient libraries for such a goal in its segment, but when using it I encountered several not obvious points that I want to talk about. 3r? 3539. Rotativa 3r? 3539. 3r33540.  3r? 3580. 3r? 3567.  3r? 3580. 3r33535. 3r33538. Add a new controller for the PDF report 3r33539. 3r33540.  3r? 3580...
PDF / .NET
+ 0 -

As I am a diploma in LaTeX I wrote with GitHub, Docker and TravisCI

Ever since my studies at the university, I've used LaTeX to design laboratory and coursework. I met for the first time with LaTeX on Coursera, on the course " Documents and presentations in LaTeX ".
 
In this post I will tell you how I wrote the diploma with LaTeX and why I used GitHub, Docker and TravisCI.
 
As I am a diploma in LaTeX I wrote with GitHub, Docker and TravisCI
here you can see a lot of examples of how these presentations can look.
 
Bachelor's degree with LaTeX
 
By the end of the third year, I was already actively using LaTeX to design almost all documents, it was decided to write with it Bachelor's ...
+ 0 -

What's wrong with 3D PDF and eDrawings. As we have replaced the 3D model viewer in your application

This is a story about how we built a new C3D Viewer into the LOTSMAN product lifecycle management system: PLM, why we did it, and what we did.
 
 
What's wrong with 3D PDF and eDrawings. As we have replaced the 3D model viewer in your application
 
here ). It does not include APIs and some other functions. The version for embedding can be requested for testing from C3D Labs developers.
 
 
Sergey Ershov, head of the applied ARM group, ASCON.This is a story about how we built a new C3D Viewer into the LOTSMAN product lifecycle management system: PLM, why we did it, and what we did.    here ). It does not include APIs and some other functions. The version for embedding can be requested for testing from C3D Labs developers.   Sergey Ershov, head of the applied ARM group, ASCON...
+ 0 -

Theft of NTLM via PDF

Theft of NTLM via PDF
 
It was only a few days after it was announced that attackers could exploit the vulnerability in MS Outlook , using OLE to steal the NTLM-hash of Windows users.
 
The Check Point team found that the NTLM digest leak is also possible with PDF files. Attack is possible without any interaction with the user - just open the file.
 
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170014
 
 
At the time of this writing, we have not received a response from Foxit. It was only a few days after it was announced that attackers could exploit the vulnerability in MS Outlook , using OLE to steal the NTLM-hash of Windows users. The Check Point team found that the NTLM digest leak is also possible with PDF files. Attack is possible without any interaction with the user - just open the file.  portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170014   At the time of this writing, we have not received a response from Foxit...
+ 0 -