Looking for history of JRE security issues

I'm trying to find out what security vulnerabilities have been found in previous versions of JRE. Anyone have a resource?

Interesting question.
Older stuff is supposed to be here.
[http://java.sun.com/products/archive/]
I would suppose that the documentation would provide whatever was documented, which as you go further back is going to be less clear.
At the above I see docs for 1.4 and even 1.1 but not for 1.5. But the jdk download would have some docs in it which might have links to the relevent docs.

Similar Messages

  • Any suggestions?  I'm looking for a comfortable and secure drawer to house my keyboard (wired, with number pad) and magic tracker.

    Any suggestions?  I'm looking for a comfortable and secure drawer to house my keyboard (wired, with number pad) and magic tracker.

    Apples wireless magic trackpad
    http://www.apple.com/magictrackpad/

  • Looking for history about 6 months ago. history is not set far enough back. any other options to retrieve it?

    i need to retrieve my history from about 6 months ago. if my history folder does not go back this far, is there another way to review it? Anyway?

    To view your browsing history, go to '''History > Show all History'''. If what you're looking for is not there, there is no way to retrieve it.

  • Looking for book about building secured webpages

    Hi, I'm looking for a good book about building secured webpages, the use of SSL etc.
    Can't find much about this subject. Anyone?!
    Greetings BG

    It depends on what you wish to do and which language you wish to use (php, asp, .net, jave, etc), also which server you will be using.
    If you are new to the subject a good starting point would be a book on your preferred langages security, (e.g. PHP security, .net security), a simple search at any of the on-line book stores will deliver a long list (the newer ones are normally better as they cover the newer versions of the language).
    As for building an e-commerce system (or similar), the above books and a good book in programming generally is also helpful, (ensure it covers processing on-line payments).
    If you wish to build a 'ssl vpn', then I have found, "SSL VPN: Understanding, Evaluating and Planning Secure, Web-Based Remote Access" by  Joseph Steinberg a good start.
    HTH
    PZ

  • Looking for clarification on network latency issue vs drive mapping

    Hi,
    I am seeing this as mystery and not getting crystal clear idea on the reason for the issue. Issue is related to the performance of the application interms of time it is taking in processing the input file.
    I wrote a swing application, which is a client application. Which takes some parameters like server name and iphostaddress and connects to the Process Server which is, responsible for processing client application requests. Client application will communicate with process server through TCP/IP connection and process the input file and returns the decisions back to the user through the output file.
    Below is the scenarios I am using for launching the application:
    1. If both client application and server are running locally in my desktop the time it is taking to process the input file is 2 minutes.
    2. If client is running my application and server is running remotely on wondows server, it's taking 13 minutes to process same input file.
    3. To reduce the time in scenario2, I installed the client appliation also on the remote server ( so that both client and server application are running on the windows server). and mapped the server's share drive to my desktop. And launched the application from my desktop (from U drive, where application is mapped), now it's taking 10 minutes to process the same input file.
    I am struggling in understanding why it's taking that long in scenario 3. Because application is installed locally on the server and input file and output files also copied onto the U drive. Sometimes thinking am I launching the application in the right way or not?
    Can somebody explain me, if we launch the remote java application through drive mapping will there be network latency there eventhough everything is there on the server (U drive)? Here I need to tell one more scenario 4, If loginto the remote windows server and launch the client application time it's taking to process the same input file is about a minute.
    Below are some more details on the issue: I am not encoding the file, I am using third party application, which provides an API to communicate with the process server. Just using the API methods and classes to pass the input file data to server. I have used the 'tracert' command for the remote server and I am seeing 8 hops between my desktop and remote server. I even installed network sniffer tool in my laptop and captured the files when application running.
    The input file has 140000 records (text lines with comma delimited) of 6.271MB in size. I have posted to understand the time it is taking in scenario3, where evrything is on mapped drive (i.e, client application and input file are technically recides on the server right?) , but client application is launched from desktop. The reason I am doing this way is, instead of log-in into the remote server, user can easily launch the application from the desktop. So, when I try to launch the application this way, this doesn't count as if client application is running local to the server? Will it becomes remote (I have even captured the network traffic file in this scenario too, and I have seen the comminication between my desktop ip address to server ip address and server is taking abour 3.84 milliseconds for each item to respond to client, I think it's just travel time not the process time). I am assuming, even when application launched from drive that is mapped, it should take about 1 minute (the time taking when I launch the aplication after log-into the server,not through drive mapping) to prcess input file as everything is on the server.
    Thanks in advance,
    Jyothi

    reading and writing the data shouldn't be the problem, its what you are doing with the data which will be taking all the time.
    Try this
    public class WriteFile {
        public static void main(String... args) throws IOException {
            String filename = "record.csv";
            int records = 140 * 1000;
            int values = 6;
                long start = System.nanoTime();
                PrintWriter pw = new PrintWriter(new BufferedWriter(new FileWriter(filename)));
                for (int r = 0; r < records; r++) {
                    for (int i = 0; i < values; i++) {
                        if (i > 0)
                            pw.print(',');
                        pw.print(r * 10 + i);
                    pw.println();
                pw.close();
                long time = System.nanoTime() - start;
                System.out.printf("Time to write %,d records was %.3f sec. file size=%.3fMB%n",
                        records, time / 1e9, new File(filename).length() / 1e6);
                long start = System.nanoTime();
                BufferedReader br = new BufferedReader(new FileReader(filename));
                String line;
                while ((line = br.readLine()) != null) {
                    // do some work.
                    String[] parts = line.split(",");
                    int[] nums = new int[parts.length];
                    for (int i = 0; i < parts.length; i++)
                        nums[i] = Integer.parseInt(parts);
    br.close();
    long time = System.nanoTime() - start;
    System.out.printf("Time to read %,d records was %.3f sec%n",
    records, time / 1e9);
    PrintsTime to write 140,000 records was 0.462 sec. file size=6.193MB
    Time to read 140,000 records was 0.792 sec

  • Leapfrog software wants to update my flash for me?? Security issue? Help please.

    Hi,
    I'm trying to get Leapfrog software (a kids learing tablet, it requires me to install this software on my PC in order to install apps as it lacks internet connectivity) working on my PC. During installation it told me in order for the software to work, my flash needs an update. The Adobe site says my flash is up-to-date. I've had issues with this software before, it spread itself across a friend's computer and was so difficult to remove it bordered on malware. So, I just really don't trust this at all now: I think allowing this software to install "a flash update" could give it some kind of priviledges on my computer right? I find the whole thing quite insidious and only want to agree to this with assurance from someone "in the know" that I'm being paranoid Thank you very much for your help!

    You're not paranoid. There are literally thousands of "fake" Flash Player updates that are all malware.
    Here are the "real" ones:
    Flash Player 12.0.0.44 for ActiveX (Internet Explorer)
    Flash Player 12.0.0.44 Plug-in (All other browsers)

  • Looking for OC4J "how-to-security-jaas.zip".

    Hi
    Can somebody point me to the location of this "how-to-security-jaas.zip".
    Need it urgently.
    I found this link mentioning abt the above example.
    http://www.oracle.com/technology/tech/java/oc4j/htdocs/how-to-security-JAAS.html
    Thanks

    http://www.oracle.com/technology/tech/java/oc4j/1013/how_to/index.html
    Frank

  • Security issues for Discoverer 10g apps 12i

    gurus,
    I have couple of things to get it done at client.
    We are on Oracle Apps rel 12i with dicoverer 10g.
    Did anyone setup MOAC to be enabled and operational in business areas?
    Setting up secure responsibilities in discoverer for MOAC?
    Any setup needs to be done for custom report security in discoverer ?
    thx

    Hi,
    I did setup new MOAC security profiles and assigned multiple organizations to that profile for testing purpose.
    After this, I did run concurrent program "Security List Maintennce" etc...
    Tested Upding profile at user level or responsibility level.
    On APPS side fine.
    I need the some basic steps on setup of security issues for discoverer side.
    1) Business areas (any security steps need to be followed in order to access data for single or multi-org)
    2) Custom Reports ( any security setup or any moac security profile setting against responsibilty for accessing single or multi-org data)
    Since we dont have default operating unit parameter as specified in the concurrent program, how do you restrict data?
    3) Reconciling security approach r12 with discoverer (any steps need to be followed here after r12 configuration with security issues)
    4) Custom Views ( any steps to be followed for single or multi-org data as security aspect)
    Looking for info on these setups.
    Thx

  • Wi-Fi WEP security - looking for a way to make my use more secure.

      Having system results even using Kaspersky as a Internet application for security, and found the reinstall not just slow as a result of my attempts to reinstall, and failing to complete the down load. Looking for a tool that can help, any suggestions?

    Second the advice to remove the Anti-Virus software.
    WEP - Are you using System Preferences -> Sharing -> Internet Sharing?
    If you are, you cannot change the protection.  It is WEP only.
    I would suggest you get a dedicated router which is capable of WPA/WPA2 encryption.
    If you have a short term need for Internet Sharing (such as a hotel room with ethernet, and you want to share with your iPhone/iPad/iPod Touch, etc...), then Internet Sharing for that is not that much of an issue.  After all you are trusting the hotel network :-)

  • Looking for Serial Code Security for Dreamweaver Extensions.

    Hello
    I am looking for a solution or an extension which would allow me to secure my Dreamweaver Extension with a Serial Code so that i can atleast save it from being pirated.
    Does anyone have a solution for this ? I would like to purchase it.

    Could you please share the following  log files from your system so that we could debug this issue.
    Files :   amt3.log and oobelib.log from /tmp on  Mac  or %TEMP% on Win).
    Please send it to [email protected] 
    Thanks
    Vikas

  • Security issues for mail relay.

    When setting up a mail relay.
    Are there any special considerations regarding passwords for the administrator?
    Are there any services that need to be specifically turned off?
    Any other issues?
    TIA
    Hans

    Hi,
    I did setup new MOAC security profiles and assigned multiple organizations to that profile for testing purpose.
    After this, I did run concurrent program "Security List Maintennce" etc...
    Tested Upding profile at user level or responsibility level.
    On APPS side fine.
    I need the some basic steps on setup of security issues for discoverer side.
    1) Business areas (any security steps need to be followed in order to access data for single or multi-org)
    2) Custom Reports ( any security setup or any moac security profile setting against responsibilty for accessing single or multi-org data)
    Since we dont have default operating unit parameter as specified in the concurrent program, how do you restrict data?
    3) Reconciling security approach r12 with discoverer (any steps need to be followed here after r12 configuration with security issues)
    4) Custom Views ( any steps to be followed for single or multi-org data as security aspect)
    Looking for info on these setups.
    Thx

  • Looking for a Darknet/Secure BBS app

    I have been a fan of Haxial KDX for the longest time, but due to the bugs, etc., I would like to move on.  I'm looking for a secure darknet/bbs styled program that supports chat, filesharing, and of basic user management (who can login, who can't, etc..).  I have been asking this question all over the web, and haven't gotten (or found) a single response.  Waste has never worked right for me, by the way.  I would definitely prefer it to be open source, which is why I thought it best to post here.  Please help out, or at least direct me somewhere where I should ask... Thanks.
    As an aside, the guy who wrote KDX and Hotline (Adam?? Hinckley) claimed on the Haxial website that he is willing to sell the project.  I wouldn't mine purchasing and restarting the KDX Project, but I've been unable to get in contact with him.  So...if you are him, or know him, or own the rights to Haxial KDX and all related projects...$$$$$
    Last edited by xen0blade (2010-01-12 13:18:15)

    I've recently become a big fan of OneSwarm - http://oneswarm.cs.washington.edu - I like that it supports remote access.
    But I'm definitely interested to see what this thread brings up!
    Last edited by hAyZe (2010-01-11 20:50:45)

  • I downloaded CS6 and am having issues with my print driver. It is not compatible with the HP 2600n and have tried to download drivers given to me by adobe ( (Jupiter 3) but it is not working. after a few days. Its a temporary fix and is still looking for

    I downloaded CS6 and am having issues with my print driver. It is not compatible with the HP 2600n and have tried to download drivers given to me by adobe ( (Jupiter 3) but it is not working. after a few days. Its a temporary fix and is still looking for the HP driver when i boot up. It also will not save in any print or postscript format. Does anyone know how to fix?
    Currently use a Mac with the latest Mavericks 10.9.4

        Oh boy! Acting kind of weird seems to be an understatement, aquaequus!
    What type of troubleshooting were we able to do with you? I want to make sure that we can get some sort of resolution for this problem.
    It is quite possible the battery door may get your phone in working order again. I'm not sure if the store has it in stock, but it is available in our warehouse for $14.99 which can be ordered via customer service.
    Tamara H.
    Follow us on Twitter @VZWSupport

  • Looking for security tips about webhosting app

    We want to use an XServe for hosting some of our clients' websites. These should have web and ftp services only (maybe webmail) as well as able to install their own CGIs (or run ours).
    So far (and with the help of the forum here I managed to set up the server. However before taking over the first websites, I generally wanted to know if there are any security issues to consider when intending such an application.
    So some things I'm still unsure with when setting up a user regarding security:
    (1)
    Each user I create is automatically assigned to the group 20 (shortname "staff"). Should I made any changes here ? Must the user be part of other groups ?
    (2)
    Should I set the login shell for these users to "none" or doesn't it play a role ?
    (3)
    Which application has the "Info" section for each user at the WGM ? Is it just for information ?
    (4)
    How can I prevent a user logging in to the server by telnet or ssh ? Currently I have configured our router to block traffic on ports 22 and 23 and this works quite well. But isn't there a more radical solution (beside disabling these ports in the server firewall) ?
    Any other advise or security tips for protecting the server is welcome and appreciated.

    1. I would probably set it up so each of your clients has it's own group.
    Although, I don't know the specifics of your setup.
    Why is this recommended seen security aspects ?
    Users have only access by ftp/mail services, anything else is disabled.
    2. A shell is required for FTP access. So unfortunatly this is not an option.
    Strange that Apple likes to give each user that requires ftp also shell access in the way that they can log in via terminal - or is their command set limited to only viewing files, creating directories and changing permissions ?
    Anyway, since we disabled the ports for ssh in our router I think that we are on the safe side here. Or can you think of a tricky user that finds a way to work around this ? I don't think, but better asking the experts before a hacker shows that it is possible
    4. The info tab in WGM is to populate the associated fields in the LDAP DB.
    Okay, then we leave this out, since users have not access to the server in a way that they can use the address book.
    May I add another question:
    How safe is it to enable the webmail feature for users ? Are there any known bugs or security holes ?

  • Looking for a free app for secure note taking with search feature (unlimited)

    Hi dudes,
    As the topic suggests, I'm looking for a free app for secure note taking with search feature without any restriction on the number of notes or any other major restriction. I already use HiDisk (which lacks search feature), and security note+ (which has limitation on the number of notes). I also have used My Disk which its search feature doesn't work correctly (it's buggy).
    Thank you.

    One named NotePad is free, saves as .txt files.
    Another, WriterRoom, costs $1.99USD, and saves as .txt and .doc files.
    1. If any post helps you please click the below the post(s) that helped you.
    2. Please resolve your thread by marking the post "Solution?" which solved it for you!
    3. Install free BlackBerry Protect today for backups of contacts and data.
    4. Guide to Unlocking your BlackBerry & Unlock Codes
    Join our BBM Channels (Beta)
    BlackBerry Support Forums Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

Maybe you are looking for

  • Error Message when trying to open iTunes (error -50)

    Hello. I am unable to open iTunes. The message I get says "the iTune application is unable to open. An unknown error has occur (-50). I tried downloading the latest version of iTunes, same message appeared.Can someone help? Thank you

  • How can i pass a value between tabs

    Hi How do i pass values to a particuluar page when that pages tab is clicked on as i need the value to be able to be used for an insert form on the page that it tabs to. You can tab this page from anywhere in the application and i literally just want

  • Converting seconds to HH:MM:SS

    Apologies if this has been answered already, but I'm simply trying to convert seconds to HH:MM:SS. If someone could point me to how Numbers can best handle that I'd appreciate it. Here's an example: The CSV I receive has a duration column that has th

  • Training an SVM on table with schema flexibility fails

    Dear colleagues, I'm trying to train a Support Vector Machine on a table with schema flexibility. On a small test table with only a couple of columns both the training and the prediction using the PAL libraries work fine. However, on my large sparse

  • ABAP methods overloading

    Hi All, In ABAP objects, is it possible to use same method name with different signature in the same class. In Se24, i have build a class xyz and a method A. The method A has a string as importing parameter. I have to use the same method A with an in