SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Magnatizer who wrote (5519)9/3/1999 12:02:00 AM
From: mr.mark  Read Replies (1) of 110655
 
from 2-Sept-99 LangaList...

"Major Java Security Bug in Windows 9x, Window NT,
plus IE 4 and 5!

One of the attractions of Java as a web platform is that
it's designed with security in mind. For example, by
design, Java applets operate in something called a
"sandbox" which is quite literally a safe place for
applets to play, where they usually can't hurt themselves
or damage the rest of the system. (Yes it sounds a little
silly, but that's how it really is---and it's really
called a "sandbox!") This safe operation is accomplished
by running the applets in a carefully proscribed manner on
a software-only "virtual machine" (VM) instead of letting
them run directly on your real hardware and software.

That's the theory, anyway. Trouble is, it turns out that
some implementations of Microsoft's Java Virtual Machine
have a hole that can let malicious applets loose, where
they can do harm. A hacker could post an applet on a web
site, for example, and cause you trouble when you surf
there.

Are you at risk? Here's how to find out:

Open a command window or "DOS Box". On Windows NT,
choose "Start", then "Run", then type "CMD" and hit the
enter key; on Windows 95 or 98, choose "Start", then type
"Run" then "COMMAND" and hit the enter key.

At the command prompt (C:\ >), type "JVIEW" and hit
the enter key.

A screen full of text will display, but all you care
about for now is the first line, which reads something
like "Microsoft (R) Command-line Loader for Java Version
5.00.1234"

Look at the last four digits in that line. In the
made-up example above, they are 1234. This is the build
number of your system's Java implementation.

If your build number is lower than 1521, you're OK.
(Well, you're out of date, but at least you don't have the
security problem we're discussing.)

If your build number is anything from 1521 through
3185, then you have a potential security problem.

If you do have the security problem, you have two choices.
You can disable Java applets and simply prevent them from
running at all: If they can't run at all, they can do no
harm. But this costs you functionality on many web sites.
The second, and better, approach is to grab a patch that
fixes the problem. It's over at
microsoft.com

Follow the instructions there to download and install the
patch. (Alas, it's beefy at just over 6MB.) When you've
installed the patch, follow the steps outlined above again
top verify that the patch worked: The build number of the
new, corrected version is 3186."

(looks like i need to install the patch. anyone with any input on the above?)

:)

mark
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext