OpenXML Styles 101 – Understanding Table Style Conditional Formatting

IntroductionThis is the second in a series of articles covering various OpenXML topics. This article provides an example of creating some simple table styles that use conditional formatting, the pitfalls that you would probably encounter, and how to get the results you’re expecting. We will be using an example created in Microsoft Word 2016 and…

0

OpenXML Styles 101 – Creating Custom Styles and Understanding Style Inheritance

IntroductionThis will be the first in a series of articles on various OpenXML topics. This article provides an expanded description of how Style Inheritance works. We will be using an example created in Microsoft Word 2016 and then manually modifying the package contents. By simply reading through this blog you should be able to grasp…

0

MS-OXCFXICS – How to parse the FastTransfer Stream

Note: This article was written using version 16.2 (10/30/2014) of the MS-OXCFXICS document as reference and all links contained in this article reference sections of that version of the document. The current version of the MS-OXCFXICS document can be found here: https://msdn.microsoft.com/en-us/library/cc463916(v=exchg.80).aspx Resources: [MS-OXCFXICS] – Bulk Data Transfer Protocol [MS-OXPROPS] – Exchange Server Protocols Master…

0

Rich Text Format (RTF) and Watermarks

  Seldom is the question asked, “Is there an RTF directive that can be used to add watermarks in RTF documents?” One day recently this question found me, and after delving into the world of the Rich Text Format (RTF) specification you may in turn be interested in what I found, which includes a new…


SMB3 Secure Dialect Negotiation

This blog talks about secure dialect negotiation, one of the new SMB3 security enhancements in Windows Server 2012. Secure dialect negotiation is introduced in SMB3 to protect against man-in-the-middle attempt to downgrade dialect negotiation. The idea is to prevent an eavesdropper from downgrading the initially negotiated dialect and capabilities between the client and the server….


MS-FSU: A look from the Windows interface

  It is not unusual for our group to receive a question regarding Constrained Delegation and Protocol Transition. Even though the document (MS-SFU) does a great job in detailing the specification, not all implementers are familiar with the way in which Windows needs to be configured in order to be able to fulfill the requirements…


Encryption Negotiation in RDP connection

Encryption Negotiation in RDP connection  The RDP connections between clients and servers are normally encrypted for better security.  When we observe the network traffic to troubleshoot the RDP related problems, we may notice that the traffic between a server and client could be encrypted one way (such as client to server) and unencrypted the other…


Troubleshooting with the Microsoft Exchange RPC Extractor (or, the case of the mysterious Inbox sync)

  If you were not already familiar with decoding Exchange Server to Client communication, or have done so manually in the past, I present to you The Microsoft Exchange RPC Extractor (RPX). RPX is a command-line driven tool that parses network captures and decodes the RPC calls to a Microsoft Exchange Server. Perhaps the best…


Windows Configurations for Kerberos Supported Encryption Type

   In one of my previous blog(http://blogs.msdn.com/b/openspecification/archive/2010/11/17/encryption-type-selection-in-kerberos-exchanges.aspx) , I have talked about how the encryption types of the various encrypted parts of the Kerberos exchanges are selected.  The selections of these encryption types are dependent on some Active Directory attributes and policy settings.    It is important to understand how these settings are configured from the…


Implementing the Algorithm for Deriving Password and encrypting Connection String in MS-RAIOP

In Microsoft Open Protocol documents, there are many algorithms that involve with crypto operations in some particular ways.   Sometimes the protocol documents also provide specific protocol examples that include the initial input, the intermediate results and the final result for each step of the algorithm.   The correctness of the result  is very crucial for the…