<div dir="ltr">Hi Bill,<div><br></div><div>> But the press here is telling people to "uninstall java"</div><div><br></div><div>Fortunately, it is legal to bundle a copy of the Java runtime when distributing a Java-based app. So even if non-technical users uninstall Java, they can still run the app without worry.</div>

<div><br></div><div style>-Curtis</div><div class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Jan 11, 2013 at 2:41 PM, Mohler,William <span dir="ltr"><<a href="mailto:WMohler@neuron.uchc.edu" target="_blank">WMohler@neuron.uchc.edu</a>></span> wrote:<br>

<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">I'm hoping just what you're thinking.  But the press here is telling people to "uninstall java" as the only certain way to avoid having their systems hacked.  This is now backed by an announcement by US Dept of Homeland Security that there is no other recourse...  Not easy stuff to deal with, right or wrong.<br>


<br>
<br>
<br>
Jason Swedlow <<a href="mailto:j.r.swedlow@dundee.ac.uk">j.r.swedlow@dundee.ac.uk</a>> wrote:<br>
<br>
Bill-<br>
<br>
Still trying to verify this, but this is about browser plug-ins, which you can turn off.<br>
<br>
<a href="http://developers.slashdot.org/story/13/01/10/1540202/java-zero-day-vulnerability-rolled-into-exploit-packs" target="_blank">http://developers.slashdot.org/story/13/01/10/1540202/java-zero-day-vulnerability-rolled-into-exploit-packs</a><br>


<br>
Cheers,<br>
<br>
Jason<br>
<br>
--------------------<br>
Centre for Gene Regulation & Expression | Open Microscopy Environment | University of Dundee<br>
<br>
Phone:  <a href="tel:%2B44%20%280%29%201382%20385819" value="+441382385819">+44 (0) 1382 385819</a><br>
email: <a href="mailto:j.swedlow@dundee.ac.uk">j.swedlow@dundee.ac.uk</a><mailto:<a href="mailto:j.swedlow@dundee.ac.uk">j.swedlow@dundee.ac.uk</a>><br>
<br>
Web: <a href="http://www.lifesci.dundee.ac.uk/gre/staff/jason-swedlow" target="_blank">http://www.lifesci.dundee.ac.uk/gre/staff/jason-swedlow</a><br>
Open Microscopy Environment: <a href="http://openmicroscopy.org" target="_blank">http://openmicroscopy.org</a><<a href="http://openmicroscopy.org/" target="_blank">http://openmicroscopy.org/</a>><br>
<br>
<br>
From: <Mohler>, William <<a href="mailto:WMohler@NEURON.UCHC.EDU">WMohler@NEURON.UCHC.EDU</a><mailto:<a href="mailto:WMohler@NEURON.UCHC.EDU">WMohler@NEURON.UCHC.EDU</a>>><br>
Date: Friday, 11 January 2013 20:15<br>
To: "<a href="mailto:imagej-devel@imagej.net">imagej-devel@imagej.net</a><mailto:<a href="mailto:imagej-devel@imagej.net">imagej-devel@imagej.net</a>>" <<a href="mailto:imagej-devel@imagej.net">imagej-devel@imagej.net</a><mailto:<a href="mailto:imagej-devel@imagej.net">imagej-devel@imagej.net</a>>><br>


Subject: [ImageJ-devel] What about this huge Java security issue?? How do we keep ImageJ users both safe and satisfied with a Java platform?<br>
<div class="im"><br>
<br>
Sent from my Verizon Wireless 4G LTE DROID<br>
_______________________________________________<br>
ImageJ-devel mailing list<br>
</div><a href="mailto:ImageJ-devel@imagej.net">ImageJ-devel@imagej.net</a><mailto:<a href="mailto:ImageJ-devel@imagej.net">ImageJ-devel@imagej.net</a>><br>
<a href="http://imagej.net/mailman/listinfo/imagej-devel" target="_blank">http://imagej.net/mailman/listinfo/imagej-devel</a><br>
<br>
<br>
<br>
The University of Dundee is a registered Scottish Charity, No: SC015096<br>
<div class=""><div class="h5"><br>
_______________________________________________<br>
ImageJ-devel mailing list<br>
<a href="mailto:ImageJ-devel@imagej.net">ImageJ-devel@imagej.net</a><br>
<a href="http://imagej.net/mailman/listinfo/imagej-devel" target="_blank">http://imagej.net/mailman/listinfo/imagej-devel</a><br>
</div></div></blockquote></div><br></div></div>