{"id":31,"date":"2007-01-05T23:08:52","date_gmt":"2007-01-05T23:08:52","guid":{"rendered":""},"modified":"2014-04-21T19:52:51","modified_gmt":"2014-04-21T19:52:51","slug":"the-abcs-of-the-pdf-d-to-f","status":"publish","type":"post","link":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html","title":{"rendered":"The ABCs of the PDF: D to F"},"content":{"rendered":"<p>The holidays are over for this year and it\u2019s time to get back to work\u2014and back to learning. Here\u2019s the second posting on the ABCs of the PDF and, as promised, a few tidbits behind the day to day elements you use in your PDF work.<\/p>\n<p><strong>D<\/strong>ata<\/p>\n<p>The most important thing about a PDF is the data\u2014 its printability, its transmission and its integrity. Of course, this last point is the driving force behind the inability to edit PDF content, a quality with which the PDF world is familiar.<\/p>\n<p>There have been notable rants and raves about this and, consequently, about the \u201cusability&#8221; of the PDF format, citing issues such as document size and on-screen behaviour as annoyances. And yet, there are strong arguments defending the PDF and the working needs it fulfills with its \u201cset-in-stone&#8221; data.<\/p>\n<p>What do we make of this PDF usage debate? What\u2019s the bottom line for PDF users, makers and shakers?<\/p>\n<p>Fantasy: digital documents that aren\u2019t easily manipulated by malicious users.<\/p>\n<p>Reality: file integrity and data extraction go hand-in-hand with the PDF format. The only way to change or work with the data is to extract (aka \u201cconvert&#8221;) the content.<\/p>\n<p>Conclusion: when working with a PDF, work with conversion in mind \u2014which conversion software is practical for daily use, which format conversions you need, what kinds of PDFs you\u2019re working with (scanned or native), what security features restrict the data you need, etc.<\/p>\n<p><strong>E<\/strong>ncryption<\/p>\n<p>And speaking of security, you\u2019ll more than likely encrypt the PDF documents you create yourself. So, here are a few knick-knacks surrounding the encryption you\u2019ll use:<\/p>\n<p>\u2022 You may see the word \u201cbit-encryption&#8221; when creating a PDF. Bit-encryption, which secure your documents, is based on the use of binary digits<\/p>\n<p>\u2022 The higher the bit-number, the more secure your files are because of the increased probability of possible decryption keys. A 128-bit encryption, for instance, has a key length of 128 bits long, meaning that there 2128 possible keys<\/p>\n<p>\u2022 Sonic PDF Creator v.1.2 includes 40- and 128-bit encryption<\/p>\n<p>\u2022 The DES (Data Encryption Standard) was based on 58-bit encryption and adopted by US Federal government in the 1970\u2019s. The current AES (Advanced Encryption Standard, 2000) is based on the RijnDael algorithm which makes use of128- to 256 -bit keys. It was adopted after winning a 3-year competition against other algorithms<\/p>\n<p>\u2022 The concept of the computer, in fact, was based upon \u201ccracking codes.&#8221; It was developed during WWII while trying to decode encrypted messages through the use of an \u201cEnigma&#8221; machine<\/p>\n<p><strong>F<\/strong>onts<\/p>\n<p>As a PDF user, you know that part of maintaining the document\u2019s appearance is retaining the textual font within the PDF. Yet, there is more to fonts than just a pretty face.<\/p>\n<p>\u2022 There are about 20 components in the anatomy of a letter that define one typeface from another<\/p>\n<p>\u2022 There are 3 different types of hyphen\/dashes and, of course, vary in usage\u2014 and in look, from typeface to typeface (Three? Yes, three. Who would\u2019ve thought?)<\/p>\n<p>\u2022 Which fonts are best used for on-screen (PDF) presentation?<\/p>\n<p>\u2022 The fonts used in a document affect the way you read the textual information. Serif fonts help to guide a reader\u2019s eye along the lines in large blocks of text. Thus, Times New Roman, for instance, is generally used for printed text. Sans-serif fonts are used ideally for on-screen text because it presents a legible rendition on-screen<\/p>\n<p>\u2022 Do you know the history behind the letters and fonts you use in your PDFs?<\/p>\n<p>Hopefully, next time you read or create a PDF, you\u2019ll look and think differently about the extraction, the encryption and the fonts you use on a daily basis. And, who knows, with a little tinkering, you just might create that ultimate PDF!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The holidays are over for this year and it\u2019s time to get back to work\u2014and back to learning. Here\u2019s the second posting on the ABCs of the PDF and, as promised, a few tidbits behind the day to day elements you use in your PDF work. Data The most important thing about a PDF is &#8230; <a title=\"The ABCs of the PDF: D to F\" class=\"read-more\" href=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html\" aria-label=\"More on The ABCs of the PDF: D to F\">Continue reading \u2192<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[56,32,205,65,98],"class_list":["post-31","post","type-post","status-publish","format-standard","hentry","category-3-diversions","tag-pdf","tag-pdf-file","tag-resources","tag-security","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The ABCs of the PDF: D to F<\/title>\n<meta name=\"description\" content=\"The second post in our series about the PDF format. This week we explain the details behind the data, encryption and fonts you come across daily.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The ABCs of the PDF: D to F\" \/>\n<meta property=\"og:description\" content=\"The second post in our series about the PDF format. This week we explain the details behind the data, encryption and fonts you come across daily.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html\" \/>\n<meta property=\"og:site_name\" content=\"PDF Blog | Investintech PDF Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2007-01-05T23:08:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-04-21T19:52:51+00:00\" \/>\n<meta name=\"author\" content=\"Reena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@able2extract\" \/>\n<meta name=\"twitter:site\" content=\"@able2extract\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html\"},\"author\":{\"name\":\"Reena\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409\"},\"headline\":\"The ABCs of the PDF: D to F\",\"datePublished\":\"2007-01-05T23:08:52+00:00\",\"dateModified\":\"2014-04-21T19:52:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html\"},\"wordCount\":631,\"publisher\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\"},\"keywords\":[\"PDF\",\"pdf file\",\"resources\",\"security\",\"technology\"],\"articleSection\":[\"Diversions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html\",\"name\":\"The ABCs of the PDF: D to F\",\"isPartOf\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#website\"},\"datePublished\":\"2007-01-05T23:08:52+00:00\",\"dateModified\":\"2014-04-21T19:52:51+00:00\",\"description\":\"The second post in our series about the PDF format. This week we explain the details behind the data, encryption and fonts you come across daily.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.investintech.com\/resources\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The ABCs of the PDF: D to F\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#website\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/\",\"name\":\"PDF Blog | Investintech PDF Solutions\",\"description\":\"Everything PDF\",\"publisher\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.investintech.com\/resources\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\",\"name\":\"PDF Blog | Investintech PDF Solutions\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp\",\"contentUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp\",\"width\":270,\"height\":40,\"caption\":\"PDF Blog | Investintech PDF Solutions\"},\"image\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/able2extract\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409\",\"name\":\"Reena\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g\",\"caption\":\"Reena\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The ABCs of the PDF: D to F","description":"The second post in our series about the PDF format. This week we explain the details behind the data, encryption and fonts you come across daily.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html","og_locale":"en_US","og_type":"article","og_title":"The ABCs of the PDF: D to F","og_description":"The second post in our series about the PDF format. This week we explain the details behind the data, encryption and fonts you come across daily.","og_url":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html","og_site_name":"PDF Blog | Investintech PDF Solutions","article_published_time":"2007-01-05T23:08:52+00:00","article_modified_time":"2014-04-21T19:52:51+00:00","author":"Reena","twitter_card":"summary_large_image","twitter_creator":"@able2extract","twitter_site":"@able2extract","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html#article","isPartOf":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html"},"author":{"name":"Reena","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409"},"headline":"The ABCs of the PDF: D to F","datePublished":"2007-01-05T23:08:52+00:00","dateModified":"2014-04-21T19:52:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html"},"wordCount":631,"publisher":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization"},"keywords":["PDF","pdf file","resources","security","technology"],"articleSection":["Diversions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html","url":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html","name":"The ABCs of the PDF: D to F","isPartOf":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#website"},"datePublished":"2007-01-05T23:08:52+00:00","dateModified":"2014-04-21T19:52:51+00:00","description":"The second post in our series about the PDF format. This week we explain the details behind the data, encryption and fonts you come across daily.","breadcrumb":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/31-the-abcs-of-the-pdf-d-to-f.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.investintech.com\/resources\/blog\/"},{"@type":"ListItem","position":2,"name":"The ABCs of the PDF: D to F"}]},{"@type":"WebSite","@id":"https:\/\/www.investintech.com\/resources\/blog\/#website","url":"https:\/\/www.investintech.com\/resources\/blog\/","name":"PDF Blog | Investintech PDF Solutions","description":"Everything PDF","publisher":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.investintech.com\/resources\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization","name":"PDF Blog | Investintech PDF Solutions","url":"https:\/\/www.investintech.com\/resources\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp","contentUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp","width":270,"height":40,"caption":"PDF Blog | Investintech PDF Solutions"},"image":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/able2extract"]},{"@type":"Person","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409","name":"Reena","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g","caption":"Reena"}}]}},"_links":{"self":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":2,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/31\/revisions"}],"predecessor-version":[{"id":5016,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/31\/revisions\/5016"}],"wp:attachment":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/media?parent=31"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/categories?post=31"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/tags?post=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}