With the release of PowerShell Studio 2025, we updated our Windows Form generated code to remove the BinaryFormatter class when loading image data for Images, Icons, and ImageLists.
Security Risks of BinaryFormatter
The BinaryFormatter class in .NET has been a…
Read More
What personal data does SAPIEN collect and store? We get this question repeatedly in many forms—be it spreadsheets to complete, PDF forms created by corporations, or through online portals of assorted government agencies. But it is fair to say that…
Read More
Our Script Packaging series continues with an introduction to the Script Packager Credentials feature.
These days modern security mechanisms frequently work without passwords or user IDs. Instead, biometrics, access cards, trusted connections, etc., are usually far better mechanisms for authentication.…
Read More
1. Why can’t I sign scripts with my TLS/SSL certificate?
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), use encryption to transfer data securely between clients and servers. Certificates are issued with their intended purpose coded and…
Read More
You already know that using credentials in your code is very much frowned upon. Every security expert will tell you that there are now plenty of other ways to verify access beyond user IDs and passwords, and you should always…
Read More
In April 2020, we released a new tool, the SAPIEN Script Explorer. You can find the details here: https://www.sapien.com/blog/2020/04/06/introducing-the-sapien-script-explorer/.
The basic premise was to prevent users from having to associate script extensions (.ps1, .vbs, .js, etc.) with the ‘open’ verb…
Read More
Every now and then we get a forum post or an email from a customer bemoaning that PowerShell Studio associates the ‘open’ verb for Windows PowerShell script (.ps1) with itself.
Since the “open” verb is by default not associated with…
Read More
We are pleased to announce that we have completed the migration of our store to its new code base!
Why did we make this change?
Historically, we maintained several of our sites on different servers and software. To make life…
Read More
Just a quick note to let our customers know that our servers have been tested and have been deemed safe from the Heartbleed bug.
…
Read More
We have received a couple requests in the last few days to explain the security implications of using our Remote Script Execution Engine (RSEE).
The RSEE service must be installed on a target machine and uses a configurable tcp/ip port…
Read More