Lizard Labs Software Frequently Asked Questions

 

Log Parser Lizard

Q. I purchased Log Parser Lizard but when I try to enter the registration key I receive an “Error while saving appSetting” dialogue box. The application still works but I am assuming it is still operating in free mode versus fully registered. Can you help?

It seems that your user settings don't have permissions to write to "Log Parser Lizard.exe.config", a configuration file located in the installation folder. In this file Log Parser Lizard tries to store registration, and all other configuration parameters. In that way we avoid writing to Windows Registry (or any other folder) and keep your system clean.

 

To successfully register the product you'll need write permissions to this file. Try to login as administrator or move the Log Parser Lizard installation folder to different location (you can copy the entire folder) where you have appropriate permissions.

 

Q. Can I try Log Parser Lizard before I buy it?

 

Log Parser Lizard is free to use, with additional advanced features available for the paid, registered users. This means it is free to try out and test drive before you buy.

 

Q. When I downloaded Log Parser Lizard, my file is a large .aspx file rather than the interface I was expecting. Why?

 

Your download manager may have converted the file, giving you a .aspx file rather than the .msi installer. Just change the file extension from .aspx to .msi and you should be all set.

 

Q. Regarding Log Parser Lizard, I am struggling to figure out how to change the regex in my log4netconfig.xml to match certain criteria for multi line log4net output. How do I specify in the regex that I want to match something on the second line of the output. The normal regex "\n" or "\r" does not seem to work.

 

Currently, you can't match a regex in the second log line (for log4net input format). The parser for log4net works something like this: if the one line from a log file matches the regex, then that line is the beginning of a new record. If following lines are not matched by regex, they are added to the same record in [Full Message] filed. This approach works for most multi-line text log formats (including log4net) but it is not so flexible. We have plans to add more advanced Multi Line Regex Input format in future versions of the product, but we don’t have a set date.

 

In the meantime, you can try to use the SUBSTR function on [Full Message] field to extract data from the second line in a separate field.

 


Ultimate Maps Downloader

Q. I’ve bought the software and installed it. At first, every time I ran the software, it asked for the license code. Now when I run it, it doesn’t ask for the license code, but every time I try to download a Selected Area, it states that “You can’t select a level greater than 10 in trial version”. I'm using Windows 7. Please help!

It seems that your user settings don't have permissions to write to "Ultimate Maps Downloader.exe.config", a configuration file located in the installation folder. In this file Ultimate Maps Downloader tries to store registration, and all other configuration parameters. In that way we avoid writing to Windows Registry (or any other folder) and keep your system clean.

 

To successfully register the product you'll need write permissions to this file. Try to login as administrator or move the Log Parser Lizard installation folder to different location (you can copy the entire folder) where you have appropriate permissions.

 

Q. I’d like to test Ultimate Maps Downloader. Do I need to purchase the mapping software before testing it?

 

No, Ultimate Maps Downloader is available in a trial version from our website. However, the trial version has limited functionality. Once you test it out and think it’s a good fit for you, you can purchase the upgraded version from us as well.

 

Q. Using Ultimate Maps Downloader, how can I download the “Birds Eye View” Bing maps data? It seems the Zoom 18 is the most I go, however, the “Birds Eye View” data is higher resolution.

 

Downloading "Birds Eye View" data is not supported in the current version of our mapping software. We will consider its implementation in future versions of the product.

 

Maximum zoom is provided by the server and depends on the area that is zoomed. It can vary from 15 to 20.

 


XSign & XEnc XML Digital Signature and XML Encryption Sofware Components

 

Q. What is XML Signature?

 

XML enables production and exchange of structured data. The usefulness of such structured data in business critical applications depends upon our ability to assess its origin and authenticity. Digital signatures provide integrity, message authentication, and signer authentication services and are essential to the success of Web Services.

 

“XML Signature” is a W3C (World Wide Web Consortium) recommendation that defines an XML syntax for digital signatures. Functionally, it has much in common with PKCS#7 but is more extensible and geared towards signing XML documents. It is used by various Web technologies such as SOAP, SAML, and others. It is also known as XML Digital Signature, XMLDsig, XML-DSig, and XML-Sig.

 

Digital signatures are created by performing an operation on information such that others can confirm both the identity of the signer, and the fidelity of the information. This capability is important to a growing number of XML protocol, publishing and commerce applications. The XSign component is based on the XML-signature standard of the World Wide Web Consortium (W3C) and the Internet Engineering Task Force (IETF).

 

For more information about XML digital signatures, see the World Wide Web Consortium (W3C) specification at www.w3.org/TR/xmldsig-core/.

 

Q. What is XML Encryption?

 

XML Encryption (also known as XML-Enc) is a W3C standard for encrypting XML elements. The encryption process involves taking an element from an xml document, encrypting it and it's children, and then replacing the original XML content with the generated encrypted XML in such a way as the document remains well formed and can be treated as XML. Although XML Encryption can be used to encrypt any kind of data, it is nonetheless known as "XML Encryption" because an XML element (either an EncryptedData or EncryptedKey element) contains or refers to the cipher text, keying information, and algorithms.

 

XEnc provide methods to encrypt the xml element using a combination of asymmetric and symmetric encryption. The dual approach requires a symmetric session key to encrypt the data and an asymmetric key to protect the session key. The public asymmetric key is used to encrypt the session key while the private asymmetric key is used to decrypt the key. XEnc covers this approach using a X.509 Certificate as the symmetrical key. X.509 certificates are provided by a third party vendor such as VeriSign.

 

For more information about XML Encryption Syntax and Processing, see the World Wide Web Consortium (W3C) specification at www.w3.org/TR/xmlenc-core/

 


XT File Shredder Lizard

 

Q. Am I really secure when I’m using this program XT File Shredder Lizard?

 

It depends on how much money and effort people trying to restore your data are willing to use. Erased data cannot be recovered with any software utility... but probably not secure enough from the CIA or KGB.

 

Q. Which programming language you used to create XT File Shredder Lizard?

 

Microsoft Visual C++ 6.0

 

Q. By writing this kind of software, do you support cyber criminals?

 

No, XT File SHredder Lizard is a file removal tool that was made for higher purposes - to protect your own privacy from prying eyes

 

Q. I found a virus in my program. Is it from you?

 

Our archive on our website does not contain viruses. If you have and infected computer, clean it and download the archive again.

 


Do you have a question that isn’t answered here? Please email it to us at
support@lizard-labs.com and we will get back to you shortly.