Solved

Vulnerabilities affecting Oracle's Java plugin

Posted on 2013-01-14
4
531 Views
Last Modified: 2013-01-15
We were reading about all the problems having the Java plugin enabled on any browser. And how it is possible for websites to launch software on PC's without the users consent. We  were wondering wondering for normal use (YouTube, Facebook, bank sites, Google,Yahoo) what type of impact would it cause to disable the Java plugin on all browsers?
Thanks
0
Comment
Question by:CityInfoSys
  • 2
4 Comments
 
LVL 28

Assisted Solution

by:Jan Springer
Jan Springer earned 100 total points
Comment Utility
For most apps, you should be able to disable java.  If you hit a trusted site that needs java, turn it, browse that site and turn it back off when done.
0
 
LVL 27

Expert Comment

by:Tolomir
Comment Utility
apart from that there is a fixed version java 7.11 available.
0
 
LVL 1

Author Comment

by:CityInfoSys
Comment Utility
We are thinking that there could still be other problems with future versions.
0
 
LVL 27

Accepted Solution

by:
Tolomir earned 400 total points
Comment Utility
yes sure. I see no reason to activate java (JRE) on a client PC. the days java was used to display content are over.
If there is a website that needs  to use java at all costs, and there are users that need to have access to that website you can setup a standalone PC for all to use, containign no private or corporate data.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers learn how to read error messages and identify possible mistakes that could cause hours of frustration. Coding is as much about debugging your code as it is about writing it. Define Error Message: Line Numbers: Type of Error: Break Down…
This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now