What's wrong with 3D PDF and eDrawings. As we have replaced the 3D model viewer in your application

This is a story about how we built a new C3D Viewer into the LOTSMAN product lifecycle management system: PLM, why we did it, and what we did.
 
 
What's wrong with 3D PDF and eDrawings. As we have replaced the 3D model viewer in your application
 
here ). It does not include APIs and some other functions. The version for embedding can be requested for testing from C3D Labs developers.
 
 
Sergey Ershov, head of the applied ARM group, ASCON.This is a story about how we built a new C3D Viewer into the LOTSMAN product lifecycle management system: PLM, why we did it, and what we did.    here ). It does not include APIs and some other functions. The version for embedding can be requested for testing from C3D Labs developers.   Sergey Ershov, head of the applied ARM group, ASCON...
+ 0 -

Theft of NTLM via PDF

Theft of NTLM via PDF
 
It was only a few days after it was announced that attackers could exploit the vulnerability in MS Outlook , using OLE to steal the NTLM-hash of Windows users.
 
The Check Point team found that the NTLM digest leak is also possible with PDF files. Attack is possible without any interaction with the user - just open the file.
 
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170014
 
 
At the time of this writing, we have not received a response from Foxit. It was only a few days after it was announced that attackers could exploit the vulnerability in MS Outlook , using OLE to steal the NTLM-hash of Windows users. The Check Point team found that the NTLM digest leak is also possible with PDF files. Attack is possible without any interaction with the user - just open the file.  portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170014   At the time of this writing, we have not received a response from Foxit...
+ 0 -