NiXPS
Javascript torpedo goes at it again
No more than 2 months ago, I wrote about how the JavaScript feature of PDF is turning it into a weapon for malware creators (read
here).
Adobe patched their reader, but it looks like they will need to plug some more holes, as 2 new security issues have popped up involving again the embedded javascript ability of the the PDF format (info
here).
Fair enough, you need to be popular to attract the the attention of virus writers, but still it would be a lot harder for anyone to write a useful exploit, if the PDF wasn't helping so much with it being able to just execute stuff like it is an application.
Follow us on Twitter
We're always looking to reach out to our customers and prospects. So I thought to give Twitter a go.
Expect the latest updates and ramblings about NiXPS, software development, XPS and generally running a software business.
And do not hesitate to post direct questions, we're here to help.
So if you feel like it: follow NiXPS on Twitter, our name: nixps
RIPs should consume XPS natively
I'm mailing with someone who has trouble getting his XPS data printed on their digital presses. The RIPs cannot handle the XPS format, and so the customer needs to convert the files to PS via driver sofware, leading to gigantic PS files and more troubles down the flow.
It shouldn't be like that.
XPS is a perfectly fine format for a RIP to take in, it's well specified, and any conversion to an intermediate format like PS is bound to introduce trouble (huge files, slow performance, rendering issues, etc...).
Good to read the EFI has included native support for XPS in the new release of their Micropress RIP, used in a lot of devices on the market (
link to brochure).