Ochrana Elektronických Dokumentov Protection of Electronic Documents

Total Page:16

File Type:pdf, Size:1020Kb

Ochrana Elektronických Dokumentov Protection of Electronic Documents Bankovní institut vysoká škola Praha zahraničná vysoká škola Banská Bystrica Katedra kvantitatívnych metód a informatiky Ochrana elektronických dokumentov Protection of Electronic Documents Bakalárska práca Autor: Peter Stano Informačné technológie Vedúci práce: Ing. Radoslav Forgáč, PhD. Banská Bystrica Apríl 2011 Vyhlásenie Vyhlasujem, ţe som bakalársku prácu spracoval samostatne a s pouţitím uvedenej literatúry. Svojím podpisom potvrdzujem, ţe odovzdaná elektronická verzia práce je identická s jej tlačenou verziou a som oboznámený so skutočnosťou, ţe sa práca bude archivovať v kniţnici BIVŠ a ďalej bude sprístupnená tretím osobám prostredníctvom internej databázy elektronických vysokoškolských prác. V Liptovskom Mikuláši, 30. 4. 2011 .................................... Peter Stano Poďakovanie Ďakujem môjmu vedúcemu bakalárskej práce pánovi Ing. Radoslavovi Forgáčovi, PhD. za jeho odborné vedenie, uţitočné rady a pripomienky k vypracovaniu tejto bakalárskej práce. Anotácia Bakalárska práca je zameraná na ochranu elektronických dokumentov. V prvej časti je rozobratá problematika dôvodov a spôsobov ochrany elektronických dokumentov. Predmetom druhej časti práce je zoznam dostupných metód a riešení na ochranu elektronických dokumentov. Zoznam metód je zameraný na softvérové a hardvérové riešenia, ktoré sú určené na šifrovanie diskov. Predmetom tretej časti je analýza vybraných riešení z hľadiska stupňa ochrany. Tretia časť zahŕňa aj porovnanie softvérových a hardvérových riešení. V záverečnej časti bakalárskej práce je navrhnutá bezpečnostná politika na ochranu elektronických dokumentov. Kľúčové slová: elektronické dokumenty, šifrovanie, bezpečnostná politika. Annotation Bachelor thesis is focused on protection of electronic documents. First part of thesis is analysis of issue of reasons and ways to protect electronic documents. Subject of the second part of thesis is list of available methods and solutions for protection of electronic documents. List of methods is focused on software and hardware solutions which are dedicated for disc encryption. Subject of third part is analysis of selected solutions in term of protection degree. This part also includes comparison of hardware and software solutions. In the last part is designed security policy for protection of electronic documents. Key words: electronic documents, encryption, security policy. Obsah ÚVOD .................................................................................................................................. 6 1 ŠPECIFIKÁCIA POŽIADAVIEK NA OCHRANU ELEKTRONICKÝCH DOKUMENTOV ............. 7 1.1 DÔVODY OCHRANY ELEKTRONICKÝCH DOKUMENTOV ................................................................................................. 7 1.2 SPÔSOBY OCHRANY ............................................................................................................................................ 9 1.2.1 Ochrana dokumentov na úrovni riadenia prístupu ................................................................................ 9 1.2.2 Ochrana šifrovaním ............................................................................................................................. 10 2 PREHĽAD RIEŠENÍ NA OCHRANU ELEKTRONICKÝCH DOKUMENTOV ........................... 13 2.1 SOFTVÉROVÉ RIEŠENIA ...................................................................................................................................... 13 2.1.1 Šifrovanie súborov ............................................................................................................................... 13 2.1.2 Šifrovanie diskov .................................................................................................................................. 15 2.1.3 Softvérové zabezpečenie hesiel ........................................................................................................... 16 2.2 HARDVÉROVÉ RIEŠENIA ..................................................................................................................................... 17 2.2.1 Šifrovacie zariadenia .......................................................................................................................... 17 2.2.2 Hardvérové zabezpečenie hesiel a šifrovacích kľúčov ......................................................................... 18 2.3 ADMINISTRATÍVNE RIEŠENIA ............................................................................................................................... 21 2.3.1 Politika silných hesiel ........................................................................................................................... 21 2.3.2 Utajenie hesiel a šifrovacích kľúčov ..................................................................................................... 24 2.3.3 Spôsoby získavania hesiel .................................................................................................................... 24 3 ANALÝZA JEDNOTLIVÝCH METÓD A RIEŠENÍ Z HĽADISKA STUPŇA OCHRANY ............. 30 3.1 SOFTVÉR NA ŠIFROVANIE DISKU ........................................................................................................................... 30 3.2 HARDVÉROVÉ ZARIADENIA ................................................................................................................................. 35 3.3 ZHODNOTENIE VYBRANÝCH PRODUKTOV ............................................................................................................... 40 4 NÁVRH BEZPEČNOSTNEJ POLITIKY NA OCHRANU ELEKTRONICKÝCH DOKUMENTOV . 43 4.1 FYZICKÁ BEZPEČNOSŤ ........................................................................................................................................ 43 4.2 PERSONÁLNA BEZPEČNOSŤ ................................................................................................................................. 44 4.3 PROGRAMOVÁ BEZPEČNOSŤ ............................................................................................................................... 45 ZÁVER ............................................................................................................................... 48 POUŽITÁ LITERATÚRA ....................................................................................................... 49 5 Úvod Dnešný svet informačných technológií je veľmi rozmanitý a vystupujú v ňom tri skupiny subjektov. Prvú skupinu tvoria spoločnosti, organizácie, firmy, osoby, vládne agentúry, ktoré vyuţívajú najrôznejšie technológie na prenos, uskladnenie, tvorbu, dát a prácu s nimi. Do druhej skupiny patria všetky spoločnosti, ktoré napomáhajú pri ochrane dát. Do tretej skupiny patria osoby/a organizácie, ktorých cieľom prelomenie bezpečnostných opatrení a zneuţitie odcudzených dát vo svoj prospech. Čoraz častejšie dochádza k úniku dát. Pre všetky spoločnosti, ktoré pracujú s citlivými údajmi je veľmi nepríjemné, niekedy je to otázka ich preţitia, keď dôjde k úniku dát. Obzvlášť to platí o vládnych inštitúciách a bankovom sektore. Spomeňme si aspoň pár únikov dát, ktoré nastali (Protectyourdata.ie, 2009): November 2007 - Allied Irish Bank omylom poslala 15 000 platobných správ s detailmi o bankových účtoch zákazníkom na zlé adresy. November 2008 - osobné údaje o 894 zákazníkoch Bank of Ireland, boli stratené potom, čo zamestnanec banky ich neoprávnene skopíroval na počítačovú pamäť a tá sa následne stratila. Apríl 2008 - Banková skupina HSBC priznala stratu počítačového disku s detailmi o 370 000 zákazníkoch. Spomenuté tri úniky sú len kvapkou v mori z celej histórie úniku dát. Najhorší scenár nastáva v prípade, ţe odcudzené dáta nemajú potrebnú úroveň zabezpečenia, alebo majú len veľmi slabú ochranu. Cieľom tejto práce je spracovanie metód na ochranu elektronických dokumentov a zhodnotenie stupňa ochrany jednotlivých metód, zhromaţdenie informácií súvisiacich s problematikou šifrovania dát, spôsobov prelomenia ochrany, analyzovanie jednotlivých metód zabezpečenia a vytvorenie bezpečnostnej politiky pre prácu s dokumentmi. Na základe stanovených cieľov je štruktúra práce rozdelená do 4 kapitol. V prvej kapitole budeme špecifikovať poţiadavky kladené na ochranu elektronických dokumentov. Uvedieme dôvody prečo chrániť dokumenty a vymenujeme spôsoby zabezpečenia na úrovni riadenia prístupu k dokumentom. Druhá kapitola je zameraná na súčasný prehľad softvérových a hardvérových riešení na ochranu elektronických dokumentov a prostriedkov, na ktorých sú dokumenty uloţené. V tretej kapitole budeme analyzovať vybrané riešenia z druhej kapitoly. Záverečná kapitola bude pozostávať z návrhu bezpečnostnej politiky na ochranu elektronických dokumentov v podniku. 6 1 Špecifikácia poţiadaviek na ochranu elektronických dokumentov V posledných rokoch sa svet technológii výrazne vyvinul a neočakáva sa jeho spomalenie. Stále a stále sa zdokonaľujú staré zariadenia alebo sa vyvíjajú nové. Veľké firmy ako Microsoft, IBM, SAP a iné, investujú značné finančné prostriedky do inovácií a výskumu. Počas vývoja často dochádzalo k úniku informácii. Preto sa postupne vyvinuli viaceré spôsoby ochrany elektronických dokumentov. V tejto kapitole si uvedieme dôvody ochrany elektronických dokumentov, poukáţeme na dva výskumy, ktoré sa dotýkajú úniku informácii. Ukáţeme si niektoré moţnosti ochrany dokumentov v rámci operačného systému Microsoft Windows7. V celej práci budeme uprednostňovať platformu Windows. 1.1 Dôvody ochrany elektronických dokumentov V súčasnosti pôsobia na celosvetovom trhu podniky zaoberajúce sa najrozmanitejšími
Recommended publications
  • PDF Studio 2019 User Guide
    Qoppa Software PDF Studio 2019 User Guide Affordable, Powerful PDF Software for Windows, Mac, Linux Copyright © 2002-Present Qoppa Software. All rights reserved Table of Contents Welcome to PDF Studio ............................................................................................................... 19 Previous Version User Guides ...................................................................................................... 21 What's New ................................................................................................................................... 21 System Requirements.................................................................................................................... 23 PDF Studio Installation Instructions ............................................................................................. 25 Registration / Unregistration / Transfer ........................................................................................ 26 Removing Demo Watermarks ....................................................................................................... 28 Getting Started with PDF Studio .................................................................................................. 29 Welcome Screen ........................................................................................................................... 30 PDF Studio Ribbon Toolbar ......................................................................................................... 32 Ribbon Toolbar
    [Show full text]
  • Nitro Pdf Reader 2 1 0 13 Setup Keygen
    Nitro pdf reader 2 1 0 13 setup keygen Nitro pdf reaNitdro pedfr rea d2er 2 1 0 103 se tu1p k3ey gesn etup keygen DOWNLOAD! DIRECT DOWNLOAD! Nitro pdf reader 2 1 0 13 setup keygen Nitro PDF Reader allows you to make notes and edit PDFs as well as. The Product Key from key4vip.com is great. Reply by SusieSmith13 on April 19, 2015. Nitro PDF Pro 9 Full Version Including Crack Serial Number or Activation Key. The document directly into PDF, is able to perform merge multiple files into one. 8 with Keygen Download Free Mega. By Final Cut Pro X 10 Serial Number Free 2014 11, 253 views. 2: 27.Nitro PDF Reader 3. 14: Powerful PDF viewer with annotation tools. 14 160513 Last months downloads: 22, 131 Size: 1. Nitro PDF Reader is a handy PDF editor that covers all the basic. Improved installer has been optimized and completes the installation in two less stages1. Getting started with Nitro Reader 3. The Nitro Reader 3 user interface is divided into 10 key areas. 2010-повідомлень: 10-авторів: 2Installation error with NitroPDF Reader - Running Windows 7- 64 bit. I am trying to install Nitro. Logging stopped: 1052010 14: 29: 29. This may sound lame but Nitro PDF Reader nissan pathfinder 2000 manual pdf has quite the extensive help database. I got 61, 300, 000 hits, so possibly there is one or two others out there that can. February 13, 2013 at 10: 26 PM Reply to this comment 50. Has the Pro version ticked but has FREEVERSION in the Serial key textbox.
    [Show full text]
  • 4Typesetting, Viewing and Printing
    Typesetting, viewing 4and printing We’ve now got far enough to typeset what you’ve entered. I’m assuming at this stage that you have typed some sample text in the format specified in the previous chapter, and you’ve saved it in a plain•text file with a filetype of .tex and a name of your own choosing. Picking suitable filenames Never, ever use directories (folders) or file names which contain spaces. Although your op• erating system probably supports them, some don’t, and they will only cause grief and tears with TEX. Make filenames as short or as long as you wish, but strictly avoid spaces. Stick to upper• and lower•case letters without accents (A–Z and a–z), the digits 0–9, the hyphen (-), and the full point or period (.), (similar to the conventions for a Web URI): it will let you refer to TEX files over the Web more easily and make your files more portable. Formatting information ✄ 63 ✂ ✁ CHAPTER 4. TYPESETTING, VIEWING AND PRINTING Exercise 4.1: Saving your file If you haven’t already saved your file, do so now (some editors and interfaces let you type• set the document without saving it!). Pick a sensible filename in a sensible directory. Names should be short enough to display and search for, but descriptive enough to make sense. See the panel ‘Picking suitable file• names’ above for more details. 4.1 Typesetting Typesetting your document is usually done by clicking on a button in a toolbar or an entry in a menu. Which one you click on depends on what output you want — there are two formats available: A f The standard (default) LTEX program produces a device•independent (DVI) file which can be used with any TEX previewer or printer driver on any make or model of computer.
    [Show full text]
  • Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
    Self-encrypting deception: weaknesses in the encryption of solid state drives Carlo Meijer Bernard van Gastel Institute for Computing and Information Sciences School of Computer Science Radboud University Nijmegen Open University of the Netherlands [email protected] and Institute for Computing and Information Sciences Radboud University Nijmegen Bernard.vanGastel@{ou.nl,ru.nl} Abstract—We have analyzed the hardware full-disk encryption full-disk encryption. Full-disk encryption software, especially of several solid state drives (SSDs) by reverse engineering their those integrated in modern operating systems, may decide to firmware. These drives were produced by three manufacturers rely solely on hardware encryption in case it detects support between 2014 and 2018, and are both internal models using the SATA and NVMe interfaces (in a M.2 or 2.5" traditional form by the storage device. In case the decision is made to rely on factor) and external models using the USB interface. hardware encryption, typically software encryption is disabled. In theory, the security guarantees offered by hardware encryp- As a primary example, BitLocker, the full-disk encryption tion are similar to or better than software implementations. In software built into Microsoft Windows, switches off software reality, we found that many models using hardware encryption encryption and completely relies on hardware encryption by have critical security weaknesses due to specification, design, and implementation issues. For many models, these security default if the drive advertises support. weaknesses allow for complete recovery of the data without Contribution. This paper evaluates both internal and external knowledge of any secret (such as the password).
    [Show full text]
  • Breaking PDF Encryption
    Practical Decryption exFiltration: Breaking PDF Encryption Jens Müller Fabian Ising Vladislav Mladenov [email protected] [email protected] [email protected] Ruhr University Bochum, Chair for Münster University of Applied Ruhr University Bochum, Chair for Network and Data Security Sciences Network and Data Security Christian Mainka Sebastian Schinzel Jörg Schwenk [email protected] [email protected] [email protected] Ruhr University Bochum, Chair for Münster University of Applied Ruhr University Bochum, Chair for Network and Data Security Sciences Network and Data Security ABSTRACT Home/Trusted Environment The Portable Document Format, better known as PDF, is one of the Decrypted Document 1. Victim opens 2. Exfiltrating Tax Declaration decrypted content most widely used document formats worldwide, and in order to en- an encrypted PDF file Scrooge McDuck with their password via the Internet sure information confidentiality, this file format supports document TOP SECRET Victim encryption. In this paper, we analyze PDF encryption and show Attacker two novel techniques for breaking the confidentiality of encrypted Victim’s PC documents. First, we abuse the PDF feature of partially encrypted documents to wrap the encrypted part of the document within Figure 1: An overview of the attack scenario: The victim attacker-controlled content and therefore, exfiltrate the plaintext opens an encrypted PDF document and unintentionally once the document is opened by a legitimate user. Second, we abuse leaks the decrypted content to an attacker-controlled server. a flaw in the PDF encryption specification to arbitrarily manipulate The encrypted PDF file was manipulated by the attacker be- encrypted content.
    [Show full text]
  • Analysis of an Encrypted HDD
    Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse engineer we present the process of studying a hardware-encrypted, PIN secured, external hard drive: the Zalman VE-400. While the end result of the analysis and attack is not a full success as it was not possible to recover an encrypted drive, it shows that the drive is nevertheless vulnerable by design. 1 Introduction 1.1 The target Analysing the security of hardware products seems to scare software reversers and hackers. It used to scare us. But, fortunately, today there is no need to know much about electronics, as most products are just System on Chip (SoC), a single integrated circuit with IO and a CPU or microcontroller. All that is needed is a bit of soldering ability, a multimeter, some useful pieces of hardware and a brain. The subject here is not embedded systems in the now common sense of “small hardware running Linux” but smaller systems using one or two chips. Most interesting for software hackers are encrypted HDD/USB keys: their functionnality is conceptually simple and they provide an interesting target. We will focus on the Zalman VE-400 encrypted drive, a consumer enclosure for 2.5" SATA hard drives which supports hardware encryption. It also supports advanced features like mounting ISO files as virtual optical drives. To do so, the user must choose between the ExFAT and NTFS filesystem support, by reflashing the correct firmware.
    [Show full text]
  • The Journal of AUUG Inc. Volume 21 ¯ Number 1 March 2000
    The Journal of AUUG Inc. Volume 21 ¯ Number 1 March 2000 Features: Linux under Sail 8 Aegis and Distributed Development 18 News: It’s Election,Time 11 Sponsorship Opportunities AUUG2K 33 Regulars: Meet the Exec 29 My Home Network 31 Book Reviews 36 The Open Source Lucky Dip 39 Unix Traps and Tricks 45 ISSN 1035-7521 Print post approved by Australia Post - PP2391500002 AUUG Membership and General Correspondence Editorial The AUUG Secretary G~nther Feuereisen PO Box 366 [email protected] Kensington NSW 2033 Telephone: 02 8824 9511 or 1800 625 655 (Toll-Free) Facsimile: 02 8824 9522 Welcome to Y2K. I hope all of you who were involved in the general Emaih [email protected] paranoia that gripped the world, got through unscathed. I spent my New Year watching things tick over - and for the first time at New AUUG Management Committee Year’s, I was glad to NOT see fireworks :-) Emaih [email protected] President: With the start of the year, we start to look to the Elections for the David Purdue AUUG Management Committee. [email protected] Tattersall’s 787 Dandenong Road The AUUG Management Committee (or AUUG Exec) is responsible for East Malvern VIC 3145 looking after your member interests. How AUUG serves you is Its’ primary function. This includes such things as organising the Winter Vice-President: Conference, Symposia around the country, coordinating efforts with Mark White Mark,[email protected] the Chapters, making sure we have enough money to do all these Red Hat Asia-Pacific things, and importantly, making sure that we give you, our Members, Suite 141/45 Cribb Street the best possible value for your Membership dollar.
    [Show full text]
  • Nouveau Mode Opératoire Pour La Cryptographie *
    Nouveau Mode Opératoire pour la Cryptographie * Naima Hadj-Said*, Adda Ali-Pacha, Mohamed Sadek Ali-Pacha – Aek Haouas *Laboratoire SIMPA (Signal-Image-Parole) Université des Sciences et de la Technologie d’Oran USTO , BP 1505 El M’Naouer Oran 31036 Algerie [email protected] Résumé : Un mode opératoire consiste en la description détaillée des actions nécessaires à l'obtention d'un résultat. Il décrit généralement le déroulement détaillé des opérations effectuées sur un poste fixe, mais il peut également décrire l'enchaînement des opérations de poste à poste. Un mode opératoire décrivant les enchaînements opératoires de poste à poste permet de définir : -l'ensemble des postes de travail concernés par la réalisation d'un produit, d'une pièce élémentaire, - les temps de passage prévus (alloués) à chaque poste, -l'ordre logique d'intervention de chaque poste (machine, ou poste manuel), -les conditions d'enchaînement, de déclenchement, des opérations successives, -les moyens de transfert de poste à poste. En cryptographie, un mode d'opération est la manière de traiter les blocs de texte clairs et chiffrés au sein d'un algorithme de chiffrement par bloc ou bien c’est la présentation d’une méthode de chaînage des blocs dans un chiffrement par blocs. Plusieurs modes existent possédant leur propre atout, certains sont plus vulnérables que d'autres et certains modes combinent les concepts d'authentification et sécurité. Dans ce travail on essaie de faire la synthèse des modes opératoires des systèmes cryptographique et de proposer une bonne alternative pour faire le bon choix du vecteur d'initialisation de ces modes, avec la suggestion d’un nouveau mode opératoire qu’on a appelé : mode Autonome Secure blocK (ASK).
    [Show full text]
  • Free As in Freedom
    Daily Diet Free as in freedom ... • The freedom to run the program, for any purpose (freedom 0). Application Seen elsewhere Free Software Choices • The freedom to study how the program works, and adapt it to Text editor Wordpad Kate / Gedit/Vi/ Emacs your needs (freedom 1). Access to the source code is a precondition for this. Office Suite Microsoft Office KOffice / Open Office • The freedom to redistribute copies so you can help your Word Processor Microsoft Word Kword / Writer Presentation PowerPoint KPresenter / Impress neighbor (freedom 2). Spreadsheet Excel Kexl / Calc • The freedom to improve the program, and release your Mail & Info Manager Outlook Thunderbird / Evolution improvements to the public, so that the whole community benefits (freedom 3). Access to the source code is a Browser Safari, IE Konqueror / Firefox precondition for this. Chat client MSN, Yahoo, Gtalk, Kopete / Gaim IRC mIRC Xchat Non-Kernel parts = GNU (GNU is Not Unix) [gnu.org] Netmeeting Ekiga Kernel = Linux [kernel.org] PDF reader Acrobat Reader Kpdf / Xpdf/ Evince GNU Operating Syetem = GNU/Linux or GNU+Linux CD - burning Nero K3b / Gnome Toaster Distro – A flavor [distribution] of GNU/Linux os Music, video Winamp, Media XMMS, mplayer, xine, player rythmbox, totem Binaries ± Executable Terminal>shell>command line – interface to type in command Partition tool Partition Magic Gparted root – the superuser, administrator Graphics and Design Photoshop, GIMP, Image Magick & Corel Draw Karbon14,Skencil,MultiGIF The File system Animation Flash Splash Flash, f4l, Blender Complete list- linuxrsp.ru/win-lin-soft/table-eng.html, linuxeq.com/ Set up Broadband Ubuntu – set up- in terminal sudo pppoeconf.
    [Show full text]
  • Enclave Security and Address-Based Side Channels
    Graz University of Technology Faculty of Computer Science Institute of Applied Information Processing and Communications IAIK Enclave Security and Address-based Side Channels Assessors: A PhD Thesis Presented to the Prof. Stefan Mangard Faculty of Computer Science in Prof. Thomas Eisenbarth Fulfillment of the Requirements for the PhD Degree by June 2020 Samuel Weiser Samuel Weiser Enclave Security and Address-based Side Channels DOCTORAL THESIS to achieve the university degree of Doctor of Technical Sciences; Dr. techn. submitted to Graz University of Technology Assessors Prof. Stefan Mangard Institute of Applied Information Processing and Communications Graz University of Technology Prof. Thomas Eisenbarth Institute for IT Security Universit¨atzu L¨ubeck Graz, June 2020 SSS AFFIDAVIT I declare that I have authored this thesis independently, that I have not used other than the declared sources/resources, and that I have explicitly indicated all material which has been quoted either literally or by content from the sources used. The text document uploaded to TUGRAZonline is identical to the present doctoral thesis. Date, Signature SSS Prologue Everyone has the right to life, liberty and security of person. Universal Declaration of Human Rights, Article 3 Our life turned digital, and so did we. Not long ago, the globalized commu- nication that we enjoy today on an everyday basis was the privilege of a few. Nowadays, artificial intelligence in the cloud, smartified handhelds, low-power Internet-of-Things gadgets, and self-maneuvering objects in the physical world are promising us unthinkable freedom in shaping our personal lives as well as society as a whole. Sadly, our collective excitement about the \new", the \better", the \more", the \instant", has overruled our sense of security and privacy.
    [Show full text]
  • Pymupdf 1.12.2 Documentation » Next | Index Pymupdf Documentation
    PyMuPDF 1.12.2 documentation » next | index PyMuPDF Documentation Introduction Note on the Name fitz License Covered Version Installation Option 1: Install from Sources Step 1: Download PyMuPDF Step 2: Download and Generate MuPDF Step 3: Build / Setup PyMuPDF Option 2: Install from Binaries Step 1: Download Binary Step 2: Install PyMuPDF MD5 Checksums Targeting Parallel Python Installations Using UPX Tutorial Importing the Bindings Opening a Document Some Document Methods and Attributes Accessing Meta Data Working with Outlines Working with Pages Inspecting the Links of a Page Rendering a Page Saving the Page Image in a File Displaying the Image in Dialog Managers Extracting Text Searching Text PDF Maintenance Modifying, Creating, Re-arranging and Deleting Pages Joining and Splitting PDF Documents Saving Closing Example: Dynamically Cleaning up Corrupt PDF Documents Further Reading Classes Annot Example Colorspace Document Remarks on select() select() Examples setMetadata() Example setToC() Example insertPDF() Examples Other Examples Identity IRect Remark IRect Algebra Examples Link linkDest Matrix Remarks 1 Remarks 2 Matrix Algebra Examples Shifting Flipping Shearing Rotating Outline Page Description of getLinks() Entries Notes on Supporting Links Homologous Methods of Document and Page Pixmap Supported Input Image Types Details on Saving Images with writeImage() Pixmap Example Code Snippets Point Remark Point Algebra Examples Shape Usage Examples Common Parameters Rect Remark Rect Algebra Examples Operator Algebra for Geometry Objects
    [Show full text]
  • A Complete Guide to Editing Pdfs
    A Complete Guide to Editing PDFs jotform.com/edit-pdf/ Automate polished, designed documents. ​Try JotForm PDF Editor for FREE!​ 1 How to Edit a PDF 4 How to edit a PDF in Adobe Acrobat 4 How to Edit a PDF on Mac 5 How to Edit a PDF on Windows 6 Best PDF Editors 7 Best PDF Editors for Windows 7 Best PDF Editors for Mac 8 Can I edit a PDF in Google Drive? 8 How do I compress PDF? 10 Here’s how to reduce your PDF size on a Mac 11 How do I remove pages from a PDF file? 12 Combine multiple PDF files into one single PDF file 12 Divide a PDF file into pieces 12 Problems with creating and editing PDFs manually 13 When you need to collect a lot of information 15 When you need to turn that information into documents 16 When you need a custom design for your PDFs 17 Automate PDF Creation Using Online Forms 19 Do More with JotForm PDF Editor 19 Field Assessments 20 Performance Evaluation 20 Certificates 21 Work Orders and Incident Reports 21 Event RSVPs 22 Offer Letters 22 Invoices 22 Consent and Medical Records 23 Two Time-Saving Automations 23 How can I create a Fillable PDF 25 (and why do I need it in the first place)? 25 Creating Documentation From Information 25 Education 26 Suppliers 26 Hiring 26 Healthcare 26 How can I create a Fillable PDF? 27 How to share a PDF 27 Scribd 28 Docdroid 28 Automate polished, designed documents.
    [Show full text]