返回列表 回復 發帖
MORNING~~~
要返工的日子~~~
08 Stepwgn Spada 海豚灰
Coooooool
附件: 您所在的用戶組無法下載或查看附件
薯嘜全原裝RG1
Coooooool
ttam 發表於 12-1-2013 20:41
HM?
Coooooool
ttam 發表於 12-1-2013 20:41
路証處
HM?
LHO 發表於 13-1-2013 00:13
Yes
薯嘜全原裝RG1
Yes
ttam 發表於 13-1-2013 14:56
荔枝角每日都有架黃色RG...
三哥 係時候準備歸隱
荔枝角每日都有架黃色RG...
nevillee 發表於 13-1-2013 18:43
我G,泊係利丰出面,仲有包圍tim
薯嘜全原裝RG1
我G,泊係利丰出面,仲有包圍tim
ttam 發表於 13-1-2013 18:47
好似係RG3
三哥 係時候準備歸隱
黃色 =  真係好工程 feel ...
「吾財也有涯,而慾也無涯。以有涯隨無涯,殆已」
就咁叫我呀 Cliff (奇利夫)
早呀
早晨
「吾財也有涯,而慾也無涯。以有涯隨無涯,殆已」
就咁叫我呀 Cliff (奇利夫)
Please note the a high risk Java vulnerability was announced on 11 Jan 2013. Please refer to US-CERT website: http://www.us-cert.gov/cas/techalerts/TA13-010A.html . As there is no solution/patch provided by Oracle yet, the only way to defend against this vulnerability is to disable Java in web browsers.

The U.S. Department of Homeland Security has already urged computer users to disable Java.

http://news.yahoo.com/government ... 640366--sector.html

You are advised to check your departmental web-based services (if any) to access the impact when Java in users' PCs are disabled. ITS will also access impact to the central IT Services we provided and announce a plan as soon as we possibly can.

The procedure to disable Java is documented in the java website: http://www.java.com/en/download/help/disable_browser.xml

Systems Affected

Any system using Oracle Java 7 (1.7, 1.7.0) including

    * Java Platform Standard Edition 7 (Java SE 7)
    * Java SE Development Kit (JDK 7)
    * Java SE Runtime Environment (JRE 7)

All versions of Java 7 through update 10 are affected.  Web browsers using the Java 7 plug-in are at high risk.

Overview

A vulnerability in the way Java 7 restricts the permissions of Java applets could allow an attacker to execute arbitrary commands on a vulnerable system.
「吾財也有涯,而慾也無涯。以有涯隨無涯,殆已」
就咁叫我呀 Cliff (奇利夫)
However, we are not using Oracle as a database server in Stepwgn Forum.
「吾財也有涯,而慾也無涯。以有涯隨無涯,殆已」
就咁叫我呀 Cliff (奇利夫)
Please note the a high risk Java vulnerability was announced on 11 Jan 2013. Please refer to US-CERT website: http://www.us-cert.gov/cas/techalerts/TA13-010A.html . As there is no solution/patch provi ...
cliffchow 發表於 14-1-2013 08:45
咁即係我地仲可唔可以用網上理財?
災後重建中.......
咁即係我地仲可唔可以用網上理財?
sammykwan 發表於 2013-1-14 08:47
It is better to enquire the custom service in your bank. It seems that HangSeng is using the same backend engine as HSBC ...

The only problem should be affected as
Any web browser using the Java version 7 plug-in is affected. Some common Java tools like Java Deployment Toolkit plug-in and Java Web Start can also be used as attack vectors. Reports indicate this vulnerability is being actively exploited, and exploit code is publicly available. There is no solution/patch provided by Oracle so far.
「吾財也有涯,而慾也無涯。以有涯隨無涯,殆已」
就咁叫我呀 Cliff (奇利夫)
返回列表