I just checked s/w update and got a Java software update for OS X
I knew Apple wouldn't let us down.
Haters can kiss my a....pple![]()
THANKS!
ON EDIT:
Nothing in Software Updater for me. Maybe when I did the Combo Update to 10.5.7 this was included.
I just checked s/w update and got a Java software update for OS X
I knew Apple wouldn't let us down.
Haters can kiss my a....pple![]()
Except it wasn't major until today and they fixed it within hours. Good luck getting that kind of support from MicrosuxCrying shame it take 6+ months to fix a major security flaw.
nothing here either
Since this has been know for a while, maybe this was included in 10.57
was in noted in the documentation?
Well that's your problem since it runs just fine here.
Except it wasn't major until today and they fixed it within hours. Good luck getting that kind of support from Microsux
The day has already been and passed. OS X has vulnerabilities... and they get patched. It's unfortunate that this one is there yes, but there's probably more than just this one right now waiting to be found.
I will however be curious to see how long it takes them to fix this now that it's more widely talked about.

Apple's problem isn't necessary whether there are vulnerabilities in OS X or how quickly they fix vulnerabilities, it's how they communicate about them.Except it wasn't major until today and they fixed it within hours. Good luck getting that kind of support from Microsux
Amen to that. Why does Apple release it's own Java updates? Does Sun not provide updates for OS X?
Okay, when you run the test page you get asked to accept incoming connections and then the voice starts.
Now is the voice just in the small piece of Java OR is it running something on your mac?
If it's just in the java then do you need to physically click allow incoming connections for something to happen?
I think it's more important that Mac users learn to stop running as an admin by default! There's no good reason for doing that, since OS X makes it brainless (and transparent) to invoke an admin username/password when necessary. If you're not running as an admin, the worst an exploit like this could do is hose stuff in your own account. That's still very bad; but it's less likely to allow installation of something like a keylogger, trojan or spyware without your knowledge. Besides, you all have current backups don't you?![]()
It's running the "say" command, in /usr/bin on your Mac. I assume the applet can be modified to run commands from other directories. Bad news in any case.
It's running the "say" command, in /usr/bin on your Mac. I assume the applet can be modified to run commands from other directories. Bad news in any case.
Really? I have been using OS X for a while now and I have never had a problem. Didn't know that OS X has exploits like that. Does OS X have as many as Windows does??? LOL![]()
I STRONGLY agree. I ran into a very nasty Trojan a few weeks back. It has changed my world. Nasty Mac malware DOES exist. I've seen it. If I had been running as admin I probably would never have noticed. The trojan would have installed some service and sat there listening for instructions.
Complacency is bad. Mac users think they're safe. Even after nasty malware has shown up.
Except they do. They have a lot more practice at it than Apple.
Hackers have wasted no time targeting a gaping hole in Microsoft's Internet Information Services webserver, according to administrators at Ball State University, who say servers that used the program were breached on Monday.
Microsoft declined to comment.
Sorry if that may sound rude, but you have been living under a rock, eh?
Check this out!
I know it's a trojan in pirated software, but the botnet is active, as there are hundreds of people not in the know. Just because the group is not as big as on the Windows side doesn't mean they don't do any harm.
We are on to rough times, and if Apple doesn't fix this stuff in a timely manner, I'm very shocked.