Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Does not Affect Vista, Windows 7, Windows 8, 8.1. (Score 4, Informative) 178

Does not Affect Vista, Windows 7, Windows 8, 8.1. RTF when doing a summary. Affected Software Windows Operating System and Components
Windows Server 2003
Bulletin Identifier
MS14-068
Aggregate Severity Rating
Critical
Windows Server 2003 Service Pack 2 (Critical)
Windows Server 2003 x64 Edition Service Pack 2 (Critical)
Windows Server 2003 with SP2 for Itanium-based Systems (Critical)
Windows Vista
Bulletin Identifier
MS14-068
Aggregate Severity Rating
None
Windows Vista Service Pack 2 (No severity rating)[1]
Windows Vista x64 Edition Service Pack 2
(No severity rating)[1]
Windows Server 2008
Bulletin Identifier
MS14-068
Aggregate Severity Rating
Critical
Windows Server 2008 for 32-bit Systems Service Pack 2 (Critical)
Windows Server 2008 for x64-based Systems Service Pack 2 (Critical)
Windows Server 2008 for Itanium-based Systems Service Pack 2 (Critical)
Windows 7 Bulletin Identifier MS14-068
Aggregate Severity Rating
None
Windows 7 for 32-bit Systems Service Pack 1 (No severity rating)[1]
Windows 7 for x64-based Systems Service Pack 1 (No severity rating)[1]
Windows Server 2008 R2 Bulletin Identifier MS14-068
Aggregate Severity Rating
Critical
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Critical)
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (Critical)
Windows 8 and Windows 8.1
Bulletin Identifier
MS14-068
Aggregate Severity Rating
None
Windows 8 for 32-bit Systems
(No severity rating)[1]
Windows 8 for x64-based Systems (No severity rating)[1]
Windows 8.1 for 32-bit Systems
(No severity rating)[1]
Windows 8.1 for x64-based Systems (No severity rating)[1]
Windows Server 2012 and Windows Server 2012 R2
Bulletin Identifier
MS14-068
Aggregate Severity Rating Critical
Windows Server 2012 (Critical)
Windows Server 2012 R2 (Critical)
Windows RT and Windows RT 8.1
Bulletin Identifier
MS14-068
Aggregate Severity Rating
None
Windows RT
Not applicable
Windows RT 8.1
Not applicable
Server Core installation option
Bulletin Identifier
MS14-068
Aggregate Severity Rating
Critical
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (Critical)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (Critical)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Critical)
Windows Server 2012 (Server Core installation) (Critical)
Windows Server 2012 R2 (Server Core installation) (Critical)
Notes for MS14-068
Windows Technical Preview and Windows Server Technical Preview are affected. Customers running these operating systems are encouraged to apply the update, which will be available via Windows Update.
[1]Severity ratings do not apply for this operating system because the vulnerability addressed in this bulletin is not present. This update provides additional defense-in-depth hardening that does not fix any known vulnerability.
Security

Sun Pushes Emergency Java Patch 90

Trailrunner7 writes "In a sudden about-face, Sun has rushed out a Java update to fix a drive-by download vulnerability that exposed Windows users to in-the-wild malware attacks. The patch comes less than a week after Sun told a Google researcher it did not consider the issue serious enough to warrant an out-of-cycle patch and less than a day after researchers spotted live exploits on a booby-trapped Web site. The flaw, which was also discovered independently by Ruben Santamarta, occurs because the Java-Plugin Browser is running 'javaws.exe' without validating command-line parameters. Despite the absence of documentation, a researcher was about to figure out that Sun removed the code to run javaws.exe from the Java plugin. The about-face by Sun is another sign that some big vendors still struggle to understand the importance of working closely with white hat researchers to understand the implications of certain vulnerabilities. In this case, Google's Tavis Ormandy was forced to use the full-disclosure weapon to force the vendor into a proper response."
Cellphones

Duke Nukem 3D Ported To Nokia N900 95

andylim writes "It looks as if Duke Nukem isn't completely 'nuked' after all. Someone has ported the 90s classic on to a Nokia N900. As you'll see in the video, you control Duke using the Qwerty keypad and shoot using the touchscreen. I'm wondering how long it will take for this to get on other mobile platforms." In other Duke news, reader Jupix points out that 3D Realms' CEO Scott Miller recently said, "There are numerous other Duke games in various stages of development, several due out this year. We are definitely looking to bring Duke into casual gaming spaces, plus there are other major Duke games in production."

Comment Re:Or more reasonable policies (Score 1) 881

My wife a teacher, the problem is students don't study for the test and know they can make up the test(this is the current policy at Visalia Unified school district). They then know what is on the test and then look it up. If the teacher has 2 or 3 copies, they just keep retaking it. It's a lot of work for Teachers to make up a new test, just so the student can keep retaking without studying. It a wake up call in High school when they tell the teacher, passing it out, and they say I"ll make it up tomorrow because I didn't study, and the teacher goes, no you won't.

Slashdot Top Deals

Behind every great computer sits a skinny little geek.

Working...
OSZAR »