Java 7 Update 10 is out.
Java 6 end-of-life Feb 2013. https://isc.sans.edu/diary.html?storyid=14719&rss
Java 6 end-of-life Feb 2013. https://isc.sans.edu/diary.html?storyid=14719&rss
@echo off
title Java 32bit installing
echo Installing Java 6 - 32bit..
jre-6u38-windows-i586.exe /s /v/qn
echo Installing Java 7 - 32bit..
jre-7u10-windows-i586.exe /s /v/qn
if exist "c:\Program Files (x86)" goto x64
goto end
:x64
title Java 64bit installing
echo Installing Java 6 - 64bit..
jre-6u38-windows-x64.exe /s /v/qn
echo Installing Java 7 - 64bit..
jre-7u10-windows-x64.exe /s /v/qn
:end
title Java install complete
echo.
echo Java install complete
echo.
pause
@echo off
title Installing Flash Player
echo Installing Flash IE
install_flash_player_11_active_x.exe -install
echo Installing Flash Mozilla
install_flash_player_11_plugin.exe -install
echo.
echo Flash install complete
echo.
pause
Java 7 update 10 lets users restrict Java apps in browsers
We're making progress. It appears to be off by default in Firefox & Chrome.
http://www.computerworld.com/s/arti...owsers?taxonomyId=18&pageNumber=1&sf7991012=1
http://www.oracle.com/technetwork/java/javase/7u10-relnotes-1880995.html
Has anyone still using windows XP found that the Java control panel is missing from control panel.
Apple had a good model for a time which just disabled it after a period of inactivity.
I only have it for Minecraft and some silly Java stuff my university site uses... If it weren't for them, it won't even be on my system!
With this Security Alert, and in addition to the fixes for CVE-2013-0422 and CVE-2012-3174, Oracle is switching Java security settings to “high” by default. The high security setting requires users to expressly authorize the execution of applets which are either unsigned or are self-signed. As a result, unsuspecting users visiting malicious web sites will be notified before an applet is run and will gain the ability to deny the execution of the potentially malicious applet.
Oracle just released the February 2013 Critical Patch Update for Java SE. The original Critical Patch Update for Java SE was scheduled on February 19th, but Oracle decided to accelerate the release of this Critical Patch Update because active exploitation “in the wild” of one of the vulnerabilities affecting the Java Runtime Environment (JRE) in desktop browsers, was addressed with this Critical Patch Update.
In addition to a number of security in-depth fixes, the February 2013 Critical Patch Update for Java SE contains fixes for 50 security vulnerabilities. 44 of these vulnerabilities only affect client deployment of Java (e.g., Java in Internet browsers). In other words, these vulnerabilities can only be exploited on desktops through Java Web Start applications or Java applets. In addition, one vulnerability affects the installation process of client deployment of Java (i.e. installation of the Java Runtime Environment on desktops). Note also that this Critical Patch Update includes the fixes that were previously released through Security Alert CVE-2013-0422.