Explaining .p7m and .p7s Files
.p7m and .p7s files are types of files associated with cryptographic signatures and encryption, specifically those based on the PKCS #7 standard. These files are commonly encountered in contexts like...
View ArticleHow to Run 32-bit vs 64-bit VBScript
To run a .vbs VBScript explicitly as either a 32-bit or 64-bit process on a 64-bit Windows system, you need to specify which version of the Windows Script Host (wscript or cscript) to use. By default,...
View ArticleError Code 800A01AD trying to CreateObject in VBScript
Question: I got the following error when trying to instantiate an ActiveX object in my VBScript (.vbs) Code “800A01AD”Message “ActiveX component can’t create object: ‘Chilkat.Cert'” Answer: It means...
View ArticleExplaining the SigningTime Authenticated Attribute in PKCS7 Signatures
The “signingTime” authenticated attribute in PKCS #7 (now part of Cryptographic Message Syntax or CMS) signatures is an optional attribute that indicates the date and time when the digital signature...
View ArticlePDF Unsigned Signature Fields
Unsigned signature fields in a PDF are placeholders for digital signatures that can be added to a PDF document at a later time. These fields are often created by the author or originator of the...
View ArticleHow to Implement a REST API Function
Question: We are trying to interface with RingCentral to send faxes and they require us to upload the file and also send a JSON message at the same time – is there a function that can do this? Answer:...
View ArticleReturning Binary Data from ActiveX to SQL Server varbinary(max)
The error -2147211494 (hex 0x80040202) in SQL Server when using “sp_OAMethod” typically indicates a type mismatch or invalid data type issue, particularly when interacting with COM objects that return...
View ArticleExplaining Google Service Accounts
Google Service Accounts are special types of Google accounts that are used by applications or virtual machines to authenticate and interact with Google services without the need for a user to be...
View ArticleHow to Setup a Google Service Account to Send Email via GMail
To use a Google Service Account to send emails from your Gmail account in a back-end process, you will need to follow a few steps to enable service account access and authenticate it correctly using...
View ArticleHow to Setup a Google Service Account to Send Email via GMail
Sending GMail from a Google Service Account can be a complicated undertaking w.r.t. setting things up in your Google account correctly. If something is not correct, the only indication of an error will...
View ArticleWasabi: The provided ‘x-amz-content-sha256’ header does not match what was...
As of 14-Oct-2024, Wasabi (an S3 compatible service), does not understand that uppercase/lowercase hex should not matter.. <Error> <Code>XAmzContentSHA256Mismatch</Code>...
View ArticleCode Signing with a USB Token
Here are examples for code signing with a USB token.. AutoIt Code Signing using Sectigo USB Token C Code Signing using Sectigo USB Token Python Code Signing using Sectigo USB Token C++ Code Signing...
View ArticleOCSP Nonce Lengths
In the OCSP (Online Certificate Status Protocol), the nonce is an optional field used to prevent replay attacks by ensuring that the OCSP response corresponds to the specific OCSP request. The nonce is...
View ArticleWhat is a .p7m or .p7s File?
“.p7m” and “.p7s” files are both related to PKCS #7 (Public Key Cryptography Standards #7) and are used for secure email and digital signatures. These files encapsulate data with cryptographic...
View ArticleHow ASN.1 Encodes Lengths
In ASN.1 (Abstract Syntax Notation One), lengths are encoded as part of the TLV (Type-Length-Value) structure, where each element consists of: Type: Identifies the data type of the element. Length:...
View ArticleWrapping a Chilkat Synchronous Method in C# async/await
Chilkat provides its own Async functions, separate from C#’s async/await. For each synchronous Chilkat function that may take time due to network communication or other factors, an Async version is...
View ArticleMultiple Reply-To Email Addresses
Is it Possible for an Email to Have Multiple “Reply-To” Addresses? Yes, it is technically possible for an email to have multiple “Reply-To” addresses. The “Reply-To” header in an email can list...
View ArticleExplaining Email Return Receipts and Disposition-Notification-To
Disposition-Notification-To Email Header The “Disposition-Notification-To” email header is used to request a return receipt or read receipt from the recipient’s email client. When this header is...
View ArticlePKCS7 (CMS) Encryption vs RSA Encryption
The difference between PKCS7 (CMS) encryption and RSA encryption lies in their purpose, scope, and how they handle encryption. * Output size differences are described further below. PKCS7 (CMS)...
View ArticleFTP Rename Remote File – What Happens if the Target Remote File Already Exists?
The behavior of the FTP “RNTO” command when the target file already exists depends on the FTP server implementation and configuration. The File Transfer Protocol (FTP) itself, as defined in RFC 959,...
View Article