Click here to jump to Nash!Com Solutions Homepage - Click here to request a test version.


Database Security


Nash!Com Solutions

Version: 1.0c
Shortname: nshsec
Category: Command-Line Tool


Short Description

Nash!Com Security is a command-line tool for changing database security settings via command-line.
It helps to display and modify "Allow use of stored forms in this database" on mutiple databases.
This program can be used on clients or servers (server console).


Key Features

- enable/disable stored forms in databases

Screen Print



* |  NshSec 1.1 - Notes/Domino Security
|\|  (c)1999-2001 NashCom - Daniel Nashed Communication Systems
| *  mailto:info@nashcom.de - http://www.nashcom.de

Syntax:  nshsec <database> [action flags] [-f<filename>]

Database Selection Options:

 -s<servername> : server name
 -r             : process directories recursively

Output Options:

 -o<outfile>    : output file
 -m<mailuser>   : send report to

Actions:

 -l[0,1]        : list 'allow store forms' property -l = all;
                : -l1 = only enabled; -l0 = only disabled
 -c[0,1]        : chance 'allow store forms' property -c = disable
                : -c0 = disable; -c1 = enable

Description:

Nash!Com Security helps to list and modify "Allow use of stored forms in this database" . This property might be a security problem if you do not have a virus scanning tool that detects stored froms sent by unauthorized persons. This tool helps to find databases that have "Allow use of stored forms in this database" enabled and also to modifiy this setting on a large number of databases.


-- Action to perform --

The following actions are currently supported

( -l ) List "Allow use of stored forms in this database".

lists "Allow use of stored forms in this database" for all databases.
You can may just want to display databases having this property enabled (-l1) or database having this property disabled (-l0)
When running on server you may want to use ( -m ) option to send a report by mail.

Examples:

nshsec *.nsf -l1

Lists all databases that have "allow use of stored forms in this database" enabled

( -c ) Changes "Allow use of stored forms in this database"

creates a database copy of selected databases. You need to specify a target server using "-t" or specify a target directory using "-g" option.

Examples:

nshsec *.nsf -r -c0

Disables "Allow use of stored forms in this database" in all database


What happens if no flags are used?

If you do not use one of the action flags, the databases are only listed.
You could use this feature to check if your selection is OK or to create a file that you can modify and use via -f option

-- Ways to select databases --

1. specify a database name in the command line
2. specify a list of databases listed in a file via option -f
3. use wildcards (* and ?) for specifying databases and templates including subdirectories if using the ( -r ) option
4. specify a remote server name ( -s ) where to search for databases

you can combine any listed ways

Some examples:

1. specify a database name in the command line

Example:

nshsec mydb.nsf

runs on mydb.nsf

2. specify a list of databases in a file via option -f

Example:

nshsec mydb.nsf -fdb.txt

runs on mydb.nsf and all databases listed in db.txt
db.txt should contain databases including full path like

names.nsf
mail/jdoe.nsf
info/acme.nsf

3. use wildcards for specifying databases and templates including subdirectories if using the ( -r ) option

Example:

nshsec mail/*test*.nsf

runs on all databases that meet the selection within the mail subdirectory
e.g. mail/dus-test.nsf but not mail/dus/old/test.nsf

If you want to include subdirectories use the -r switch.
As soon you have multiple wildcards in different directories you need to use the recurse subdirectory switch

Example:

nshsec mail/test?/*.nsf -r

this does match e.g. mail/test1/jdoe.nsf

but also matches mail/test2/hilden/acme.nsf because this does also match the pattern.

4. specify a remote server name ( -s ) where to search for databases

-s Option defines the server where databases are searched

Example

nshsec -snotes-acme-01 mail/*.nsf

runs on databases (.nsf files) in directory mail on notes-acme-01

nshsec mail/test??xxx*.nsf

runs on databases (.nsf files) that match the pattern "/mail/test??xxx*.nsf"

-- Output options --

In case you want to redirect output you have the following options

( -o ) Redirect output to file

Writes output to a the file specified.

Example: nshsec mydb.nsf -ooutfile.txt
writes output to outfile.txt

Comment: this option might help to create a list of databases that can be modified and uses as input for "-f" option.

( -m ) Send output via mail

Sends output to the specified user.

Example: nshsec mydb.nsf -m"John Doe"
sends output to John Doe

( -k ) Overwriting Client/Server Settings

Nash!Com Command Line Tools run on Servers or Clients.
However in some cases and environments it can not determine if running on server or as Client program using server environment.
Therefore you can override the default settings using this option.
Server and Client functionality does only differ in the way output is logged.



Show details for Installation InstructionsInstallation Instructions
Hide details for Installation InstructionsInstallation Instructions
  1. copy into Notes exe directory
  2. run from command line or server console
    and make sure notes.ini can be found in the directory or is in the path