ted in the wild | BeyondTrust
This is exactly what we have done.
Thanks. Good to hear others recommend it.
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Friday, January 25, 2013 10:09 AM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | Beyond
. Thank you.
[Description: Description: Lifespan]
From: Sam Cayze [mailto:sca...@gmail.com]
Sent: Friday, January 25, 2013 11:33 AM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
This is exactly what we have done.
Thanks. Good to hear others
This is exactly what we have done.
Thanks. Good to hear others recommend it.
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Friday, January 25, 2013 10:09 AM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
If it is over
> *Sent:* Friday, January 25, 2013 11:04 AM
>
> *To:* NT System Admin Issues
> *Subject:* Re: Java 7 0day actively exploited in the wild | BeyondTrust***
> *
>
> ** **
>
> Be advised that the primary vector for Java exploits into an organization
> is via the web browse
AM
To: NT System Admin Issues
Subject: Re: Java 7 0day actively exploited in the wild | BeyondTrust
Be advised that the primary vector for Java exploits into an organization is
via the web browser plugin. So, unless your B2B app is over the public
network, or requires that the browser plugin be o
@elyriaschools.org]
> Sent: Tuesday, January 15, 2013 12:10 PM
> To: NT System Admin Issues
> Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
>
> Correct, but 6 is vulnerable to it's own set of exploits that were never
> fixed and they are well known. Arguabl
[mailto:kennedy...@elyriaschools.org]
Sent: Tuesday, January 15, 2013 1:29 PM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
I totally understand your risk vs reward scenario. We are in the same boat.
Yea, in Feb this is all a moot point.
-Original
ssage-
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Tuesday, January 15, 2013 12:10 PM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
Correct, but 6 is vulnerable to it's own set of exploits that were never fixed
and they
edy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Tuesday, January 15, 2013 12:10 PM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
Correct, but 6 is vulnerable to it's own set of exploits that were never
fixed and they are well known. Arguably
nt: Friday, January 11, 2013 1:34 PM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
http://www.zdnet.com/homeland-security-warns-to-disable-java-amid-zero-day-f
law-709713/
From: Mark Boeck
Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
http://www.zdnet.com/homeland-security-warns-to-disable-java-amid-zero-day-f
law-709713/
From: Mark Boeck [netadmin...@gmail.com]
Sent: Friday, January 11, 2013 12:15 PM
T
They bumped the security settings up. It prompts every time now.
-Original Message-
From: Richard McClary [mailto:richard.mccl...@aspca.org]
Sent: Monday, January 14, 2013 9:32 AM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
Wonder if
0day actively exploited in the wild | BeyondTrust
Java released update 11 last night.
-Original Message-
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Friday, January 11, 2013 2:36 PM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | Beyond
Java released update 11 last night.
-Original Message-
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Friday, January 11, 2013 2:36 PM
To: NT System Admin Issues
Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust
http://www.zdnet.com/homeland
http://www.zdnet.com/homeland-security-warns-to-disable-java-amid-zero-day-flaw-709713/
From: Mark Boeck [netadmin...@gmail.com]
Sent: Friday, January 11, 2013 12:15 PM
To: NT System Admin Issues
Subject: Re: Java 7 0day actively exploited in the
15 matches
Mail list logo