<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Java Vulnerabilities in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117044#M1178</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a registry file I can run that would disable the browser plugin?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 Oct 2013 18:00:26 GMT</pubDate>
    <dc:creator>blashmet</dc:creator>
    <dc:date>2013-10-24T18:00:26Z</dc:date>
    <item>
      <title>Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117029#M1163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When the recommended Java installation option is used with SAS, does SAS install the browser plugin/component of Java, or is this a special "localized" version of Java only utilized by SAS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if this is correct, but it seems like Java vulnerabilities are only exploitable when Java is enabled in a browser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ask because we are currently required to keep Java updated on SAS workstations, but this doesn't seem necessary if the SAS version of Java isn't really open to Java vulnerabilities (since it's not interfacing with the internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&amp;nbsp; Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 22:02:48 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117029#M1163</guid>
      <dc:creator>blashmet</dc:creator>
      <dc:date>2013-10-18T22:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117030#M1164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The standard SAS installation on a desktop will try to replace the default java installation. &lt;BR /&gt;This approach will lock you in to be dependent of the browser/default version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Knowing that it is better to define a localized java version by yourself and use that as the SAS version.&lt;/P&gt;&lt;P&gt;The advice is to install that SAS-JPRE, private java versions(s) on a local drive. &lt;BR /&gt;Once I got different behavior when it was installed on a network-drive or a local-drive as something with locking the log-files and more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SAS-code that will use this Java-run time can be placed on network drives. The ini-files are having the options/settings and there are no windows-registry or dll's involved. You could use a copy-deploy approach.&amp;nbsp; The more difficult clients are Eguide Amo and SAS/base as they are for more integrating into Windows.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;For fun after 9.3 the encoding of the JAVA environment is used in SAS not of the used OS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 15:51:34 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117030#M1164</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-19T15:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117031#M1165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your comments, however, I'm not sure they answered my questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To reiterate,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to know if allowing SAS to install Java means the browser component of Java will also be installed. If not, is that system still open to Java vulnerabilities?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 20:52:51 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117031#M1165</guid>
      <dc:creator>blashmet</dc:creator>
      <dc:date>2013-10-19T20:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117032#M1166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Blashmet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To repeat:&lt;/P&gt;&lt;P&gt;If you only type setup and say yes to all the defaults it will also do the browser (standard java install). &lt;/P&gt;&lt;P&gt;a/ You will be vulnerable by the browser by that java version&lt;/P&gt;&lt;P&gt;b/ you change/update process is introducing a dependicy. Some updates of java may be hurt SAS processing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change te installations approach you do not use that combined approach.&lt;/P&gt;&lt;P&gt;Do not use the same java-vm for the browser and SAS. So:&lt;/P&gt;&lt;P&gt;a/ you can still disable/not run java in the browser or use a dedicated verfied version for that. You will not be vulnerable at that part.&lt;/P&gt;&lt;P&gt;b/ run the SAS system with JAVA in a well secure OS security setting. No&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; matter how buggy java is it will not get out of that OS isolation level of your user /ssytem processes.&amp;nbsp; (do not run them root level)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The browser vulnerablilty is caused by braking barriers of outer/world - inner world.&lt;/P&gt;&lt;P&gt;That is a non-existent situation when running SAS as it is only the innner-world,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Oct 2013 21:23:40 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117032#M1166</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-19T21:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117033#M1167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Note that the answer is actually different for 9.3 and 9.4.&amp;nbsp; For 9.3, SAS ships a standard JRE install which does indeed include the browser plug-in.&amp;nbsp; For 9.4, SAS uses a private JRE which does not install the browser plug-in and does not impact other applications on the system.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2013 13:57:30 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117033#M1167</guid>
      <dc:creator>Mark_sas</dc:creator>
      <dc:date>2013-10-21T13:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117034#M1168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks mark, that is indeed an improvement asm it is avoiding the default Oracle Java-installation procedure.&lt;BR /&gt;There are more challenges like:&lt;/P&gt;&lt;P&gt;-&amp;nbsp; the .Net security and manifest file being abandoned by Microsoft. &lt;/P&gt;&lt;P&gt;- Vritualisation issues as of CCM (former Soft-Grid) with the default smaller machine setups as of VDI&lt;/P&gt;&lt;P&gt;- The reference file to a webserver with EMiner as part of the clientsoftware not the client configuration&lt;/P&gt;&lt;P&gt;- ...&lt;/P&gt;&lt;P&gt;Any improvements / "what is new" on those parts?&amp;nbsp; &lt;/P&gt;&lt;P&gt;I Could not resist to ask this because there a lot of issues getting SAS installations aligned according common IT governance policies. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2013 14:50:59 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117034#M1168</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-21T14:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117035#M1169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a way to use a "private" version of Java with SAS 9.3? Is there a way to simply delete the browser plugin?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2013 22:42:35 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117035#M1169</guid>
      <dc:creator>blashmet</dc:creator>
      <dc:date>2013-10-21T22:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117036#M1170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SAS 9.3 relies on a public JRE, either the one included in your order or one which is preinstalled on your system.&amp;nbsp; You'll need to consult your public JRE supplier if you're looking for a way to delete the browser plugin.&amp;nbsp; The last I explored this, Oracle recommended you disable the plugin via disabling Java in the browser interface rather than supplying a way to avoid installing it in the first place.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 15:40:48 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117036#M1170</guid>
      <dc:creator>Mark_sas</dc:creator>
      <dc:date>2013-10-22T15:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117037#M1171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Last week, i have observed that with the update of Java 1.7.0.45&lt;/P&gt;&lt;P&gt;this security update was destroying every other java directory inside&lt;/P&gt;&lt;P&gt;c:\Programs Files\Java&lt;/P&gt;&lt;P&gt;so the version of 9.3.2 32bits&amp;nbsp; were touched by this as at origin where you were&lt;/P&gt;&lt;P&gt;accepting the install of Sas the 1.6.0.24 was installed by defaut in&lt;/P&gt;&lt;P&gt;the directory where oracle is now purging anything else the jre7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the consequence was no graphics inside SAs and a&lt;/P&gt;&lt;P&gt;ERROR: The Java proxy is not responding.&lt;BR /&gt;ERROR: The Java proxy's JNI call to start the VM failed.&lt;BR /&gt;ERROR: Java failed to start during the SAS startup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the by pass i have found is to correct&lt;/P&gt;&lt;P&gt;all the sasv9.cfg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;
&lt;P&gt;For 9.3.2, the urgency by pass consist perhaps in modifying the config files (case windows 7 32 bits sas 9.3.2 32 bits)&lt;/P&gt;
&lt;P&gt;-Dsas.jre.libjvm=C:\PROGRA~1\Java\JRE7\bin\client\jvm.dll&lt;/P&gt;
&lt;P&gt;and the sassw.config and wrapper.conf files with the new location of the 32bits java&lt;/P&gt;
&lt;P&gt;\java\JRE7\&lt;/P&gt;




&lt;/PRE&gt;&lt;P&gt;Andre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 14:22:30 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117037#M1171</guid>
      <dc:creator>Andre</dc:creator>
      <dc:date>2013-10-23T14:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117038#M1172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andre, That behavior with all errors is "as expected" in the way I have described before.&lt;BR /&gt;You just changed the java version inside base/Foundation. &lt;BR /&gt;When other clients are involved (amo 9.3 and up) DI studio SMC&amp;nbsp; you could have same unpredictable results by java updates.&lt;/P&gt;&lt;P&gt;The ini files of these clients&amp;nbsp; combined to a wrapper are having the location of the java.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A JPRE is a simple copy of an existing JAVA version to an other location. That is as easy to create by&amp;nbsp; yourself.&lt;/P&gt;&lt;P&gt;Having the Original needed java version somewhere you can extract/isolate that with no hard work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 17:43:27 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117038#M1172</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-23T17:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117039#M1173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does this mean one can create a JPRE and copy it from machine to machine without installing the browser plugin? For example, one just copies the Java folder and points SAS to it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 22:29:35 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117039#M1173</guid>
      <dc:creator>blashmet</dc:creator>
      <dc:date>2013-10-23T22:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117040#M1174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I must add that this morning 24 october, the oracle update 1.0.7.45 was not more uninstalling the 1.0.6.24&lt;/P&gt;&lt;P&gt;so the maintenanceof a bundle of&amp;nbsp; individual windows install&amp;nbsp; is now easier than last week&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 09:20:26 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117040#M1174</guid>
      <dc:creator>Andre</dc:creator>
      <dc:date>2013-10-24T09:20:26Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117041#M1175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Blashmet, Yes copying it is as easy that way that is JVM (JPRE) behavior.&lt;/P&gt;&lt;P&gt;. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 16:47:13 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117041#M1175</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-24T16:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117042#M1176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How does one create a JPRE without installing the broswer plugin? Do I copy the folder C:\Program Files (x86)\Java from a machine where I ran the installer to the new machine with SAS, and then point the SAS config files to it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On another note, since it seems like SAS has the capability of connecting to the internet (&lt;A href="http://support.sas.com/resources/papers/proceedings12/121-2012.pdf"&gt;see here&lt;/A&gt;), don't we still have to worry about Java vulnerabilities even if an old version of Java is in use by SAS and the browser plugin is not installed?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 16:57:46 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117042#M1176</guid>
      <dc:creator>blashmet</dc:creator>
      <dc:date>2013-10-24T16:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117043#M1177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you go to: C:\Program Files\Java\jre7\bin&amp;nbsp; you will find the exe files SAS is referring to in their config / ini files (java run-time).&lt;/P&gt;&lt;P&gt;The welcome-html file is telling it has a run-time and a browser plugin. The browser plugin is working/found by windows registry settings.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Indeed just copy the jvm to another location will give you a usable JVM without touching windows registry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not have installed the browser plug of java it won't get touched by malicious webpages.&lt;/P&gt;&lt;P&gt;What is not there, cannot harm you. Do you need to use java for one strange reason you can do the updates as needed for the browser.&lt;/P&gt;&lt;P&gt;Having an isolated SAS java version you can delete all other old versions, so everyone must be convinced it is a safe situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could find a java version in the %sashome% location (installation 9.3)&amp;nbsp; as many clients are using a dedicted java (encoding part) version. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 17:43:16 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117043#M1177</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-24T17:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117044#M1178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a registry file I can run that would disable the browser plugin?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 18:00:26 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117044#M1178</guid>
      <dc:creator>blashmet</dc:creator>
      <dc:date>2013-10-24T18:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117045#M1179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://java.com/en/download/help/disable_browser.xml" title="http://java.com/en/download/help/disable_browser.xml"&gt;How do I disable Java in my web browser? &lt;/A&gt; (oracle java link) en &lt;A href="http://java.com/en/download/faq/remove_olderversions.xml" title="http://java.com/en/download/faq/remove_olderversions.xml"&gt;Why should I uninstall older versions of Java from my system?&amp;nbsp; &lt;/A&gt;&amp;nbsp; &lt;BR /&gt;This is going to get a little bit to the edge of the area I am moving arround. I needed this all for the issue running SAS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 18:20:35 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117045#M1179</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-24T18:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117046#M1180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know how to disable Java through the control panel, but you mentioned that the browser plugin is enabled/disabled via the registry. Also, you mentioned that disabling the browser plugin makes one insusceptible to Java vulnerabilities. So I have two questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Is there a way to disable the Java browser plugin via a simple .reg file?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If the browser plugin is disabled for all versions of Java on the system, does one really need to uninstall the old versions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 20:21:35 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117046#M1180</guid>
      <dc:creator>blashmet</dc:creator>
      <dc:date>2013-10-24T20:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117047#M1181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Blashmet, I do not know what you know about the Windows registry. It has a good name of doing automatization. It has a very bad name as buildng up a lot of a rubbish in it, very bad documented on all vaules an options. Changing names and locations by releases. This is life at the hard-core system level.&lt;BR /&gt;1/ Probably Oracle could deliver a reg file for disabling the java plugin, you should ask Larry. &lt;/P&gt;&lt;P&gt;2/ See the note to registry contents, you cannot really trust that. Unistalling is trying to clean that up. Do a research on your contents (regedit).&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 18:12:56 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117047#M1181</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-25T18:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: Java Vulnerabilities</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117048#M1182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.computing.net/answers/windows-xp/java-plugin-16024-jp2iexpdll/193900.html" title="http://www.computing.net/answers/windows-xp/java-plugin-16024-jp2iexpdll/193900.html"&gt;[Solved] Java Plug-in 1.6.0_24 jp2iexp.dll.&lt;/A&gt;&amp;nbsp; (plugin problems java install uninstall) &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 18:16:27 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Java-Vulnerabilities/m-p/117048#M1182</guid>
      <dc:creator>jakarman</dc:creator>
      <dc:date>2013-10-25T18:16:27Z</dc:date>
    </item>
  </channel>
</rss>

