*Shudder* Pearson... how much money do they suck out of schools a year?
Smarter Balanced for us. All HTML5. Works on (almost) anything with a keyboard 
and a mouse.


--Matt Ross
Ephrata School District


Kennedy, Jim <[email protected]> , 4/29/2014 9:59 AM:
   

You must not be in a PARCC State.  All the states just got together and gave 
Pearson 186 million dollars to create a java based standardized test. 

    

From: [email protected] [mailto:[email protected]] On 
Behalf Of Matthew W. Ross
 Sent: Tuesday, April 29, 2014 12:46 PM
 To: [email protected]
 Subject: Re: [BULK] RE: [NTSysADM] IE exploit   

  

I thought I was cracking jokes the whole time!  

    

In all seriousness, I'm all for HTML5 taking over Java and Flash. There is no 
reason for a web browser to require either plugin anymore, except for old 
software. And only if the old software was updated, I could happily remove 
both.  

   

   

--Matt Ross
 Ephrata School District
 
 
   

Andrew S. Baker <[email protected]> , 4/29/2014 4:14 AM:   

Now you're cracking jokes...    


   

  

    
         

ASB
 http://XeeMe.com/AndrewBaker
 Providing Virtual CIO Services (IT Operations & Information Security) for the 
SMB market…     

   

   

On Mon, Apr 28, 2014 at 7:06 PM, Matthew W. Ross <[email protected]> 
wrote:  

I'm down with that. Thank goodness both have been replaced with HTML5.
 
 Well... sorta.  

   

   

--Matt Ross
 Ephrata School District
 
    

[email protected] , 4/28/2014 2:59 PM:      

Java and Adobe. Done.   

    

Sent from my Surface Pro    

     

From: Matthew W. Ross
 Sent: Monday, April 28, 2014 5:39 PM
 To: '[email protected]'    

      

Can we blame adobe for everything? They would make a great scapegoat.   

   

   

--Matt Ross
 Ephrata School District
 
    

Rod Trent <[email protected]> , 4/28/2014 2:33 PM:   

I blame Adobe.   


 -----Original Message----- 
 From: [email protected] [mailto:[email protected]] 
On Behalf Of Susan Bradley 
 Sent: Monday, April 28, 2014 5:15 PM 
 To: [email protected] 
 Subject: Re: [NTSysADM] IE exploit 
 
 Hang on, it's not the same exploit.  You are confusing two Flash vectors. 
 
 The zero day via Fireeye is CVE-2014-1776  
http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html
 
 
 The Flash patch below is a totally different Flash patch and it's from Adobe. 
 http://helpx.adobe.com/security/products/flash-player/apsb14-09.html 
 It's just via Microsoft becasuse they stuck Flash in their browser and thus 
they update it. *CVE number:* CVE-2014-0506, CVE-2014-0507, CVE-2014-0508, 
CVE-2014-0509 
 
 Two totally different issues. 
 
 Microsoft will patch all supported browsers for the weekend zero day when it's 
ready. 
 
 The flash patch is just a Flash update. 
 
 On 4/28/2014 2:00 PM, Rod Trent wrote: 
 > 
 > BTW: Microsoft has a patch ready for IE10 and IE11 only – for Windows 
 > 8.x and Windows Server 2012… 
 > 
 >  http://windowsitpro.com/msrc/flash-fix-ie-10-and-ie-11-only 
 > 
 > *From:*[email protected] 
 > [mailto:[email protected]] *On Behalf Of *David Lum 
 > *Sent:* Monday, April 28, 2014 4:56 PM 
 > *To:* [email protected] 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > Saw this on a forum today:  ”We have one agency warning us of an 
 > exploit, and the other agency trying to use the exploit :)” 
 > 
 > FTW! 
 > 
 > -Dave Lum 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *Rod Trent 
 > *Sent:* Monday, April 28, 2014 12:04 PM 
 > *To:* [email protected] 
 > <mailto:[email protected]> 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > It’s not. Adobe has been working on today’s patch since early April, 
 > working with Kaspersky. The one announced over the weekend as 
 > identified by FireEye and Microsoft is working on a patch. 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *David Lum 
 > *Sent:* Monday, April 28, 2014 3:00 PM 
 > *To:* [email protected] 
 > <mailto:[email protected]> 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > Adobe’s patch addresses CVE-2014-0515 
 > 
 > Microsoft’s address CVE-2014-1776 
 > 
 > It’s possible they are linked, since this article does make them seem 
 > like the same attack vector, but I do not speek enough 
 > programmer-speak to know for sure: 
 > 
 >  http://www.securelist.com/en/blog/8212/New_Flash_Player_0_day_CVE_2014 
 > _0515_used_in_watering_hole_attacks 
 > 
 > -Dave Lum 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *David McSpadden 
 > *Sent:* Monday, April 28, 2014 10:37 AM 
 > *To:* '[email protected]' 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > I thought that is what I read in the MS articles? 
 > 
 > VML and Flash were the vector for the exploit? 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *Rod Trent 
 > *Sent:* Monday, April 28, 2014 1:34 PM 
 > *To:* [email protected] 
 > <mailto:[email protected]> 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > Yes, but that has nothing to do with the exploit reported over the 
 > weekend. 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *Kennedy, Jim 
 > *Sent:* Monday, April 28, 2014 1:13 PM 
 > *To:* [email protected] 
 > <mailto:[email protected]> 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > Flash just released an update. 
 > 
 >  http://helpx.adobe.com/security/products/flash-player/apsb14-13.html 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *Rod Trent 
 > *Sent:* Monday, April 28, 2014 1:11 PM 
 > *To:* [email protected] 
 > <mailto:[email protected]> 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > It’s all versions of Internet Explorer. However, supported versions 
 > will be patched. 
 > 
 > There are ways to mitigate: 
 > 
 >  http://windowsitpro.com/windows/all-hands-deck-zero-day-reported-wild- 
 > affects-ie6-11 
 > 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *David McSpadden 
 > *Sent:* Monday, April 28, 2014 1:05 PM 
 > *To:* [email protected] 
 > <mailto:[email protected]> 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > Is it just XP or am I wrong that the 7’s, 8’s, and Server OS’s also an 
 > issue the way I am reading it. 
 > 
 > Especially if they have Adobe Flash (Not sure of version) and the 
 > website being visited using VML. 
 > 
 > ?? 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *Rod Trent 
 > *Sent:* Monday, April 28, 2014 12:59 PM 
 > *To:* [email protected] 
 > <mailto:[email protected]> 
 > *Subject:* RE: [NTSysADM] IE exploit 
 > 
 > The is the first in a coming list of exploits that Windows XP will be 
 > vulnerable to forever. 
 > 
 > *From:*[email protected] 
 > <mailto:[email protected]> 
 > [mailto:[email protected]] *On Behalf Of *Jonathan Link 
 > *Sent:* Monday, April 28, 2014 12:51 PM 
 > *To:* [email protected] 
 > <mailto:[email protected]> 
 > *Subject:* Re: [NTSysADM] IE exploit 
 > 
 > It's really bad if you're still running XP in your environment... 
 > 
 > On Mon, Apr 28, 2014 at 12:38 PM, David McSpadden <[email protected] 
 > <mailto:[email protected]>> wrote: 
 > 
 >     Any reason for concern? 
 > 
 >     This e-mail and any files transmitted with it are property of 
 >     Indiana Members Credit Union, are confidential, and are intended 
 >     solely for the use of the individual or entity to whom this e-mail 
 >     is addressed. If you are not one of the named recipient(s) or 
 >     otherwise have reason to believe that you have received this 
 >     message in error, please notify the sender and delete this message 
 >     immediately from your computer. Any other use, retention, 
 >     dissemination, forwarding, printing, or copying of this email is 
 >     strictly prohibited. 
 > 
 >     Please consider the environment before printing this email. 
 > 
 > This e-mail and any files transmitted with it are property of Indiana 
 > Members Credit Union, are confidential, and are intended solely for 
 > the use of the individual or entity to whom this e-mail is addressed. 
 > If you are not one of the named recipient(s) or otherwise have reason 
 > to believe that you have received this message in error, please notify 
 > the sender and delete this message immediately from your computer. Any 
 > other use, retention, dissemination, forwarding, printing, or copying 
 > of this email is strictly prohibited. 
 > 
 > Please consider the environment before printing this email. 
 > 
 > This e-mail and any files transmitted with it are property of Indiana 
 > Members Credit Union, are confidential, and are intended solely for 
 > the use of the individual or entity to whom this e-mail is addressed. 
 > If you are not one of the named recipient(s) or otherwise have reason 
 > to believe that you have received this message in error, please notify 
 > the sender and delete this message immediately from your computer. Any 
 > other use, retention, dissemination, forwarding, printing, or copying 
 > of this email is strictly prohibited. 
 > 
 > Please consider the environment before printing this email. 
 > 
 
 -- 
 Got your CryptoLocker prevention in place? 
 http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/ 
 Our last day of XP patching.  Wave it goodbye. 
 
 
 
 
 
 
 
           

        

Reply via email to