Archive

Archive for January, 2013

Olin Center Extended Hours

January 31st, 2013 No comments

Olin’s hours change for Week 10, Finals Week, and Spring Break. We extend our building hours during Week 10 and Finals Week to allow students to have a place to study. Since few students are on campus during Spring Break, we are only open Monday-Friday, 8-4:30, at that time. The calendar for the end of Winter term and Spring break  can be seen below.

Olin Hours: Week 10, Finals Week, and Spring Break

Sun. Mon. Tues. Wed. Thurs. Fri. Sat.
2

10 AM-9 PM

Week 10 3

10-Midnight

(begin 24 hours)

4

24 hours

5
24 hours
6
24 hours
7
24 hours
8

Midnight-7 PM

9

10 AM-9 PM

Finals Week 10

10-Midnight

(begin 24 hours)

11

24 hours

12

24 hours

13

24 hours

14

Midnight- 4:30 PM

15
8 AM-4:30 PM
16
CLOSED
Spring Break 17
CLOSED
18

8 AM-4:30 PM

19

8 AM-4:30 PM

20

8 AM-4:30 PM

21

8 AM-4:30 PM

22

8 AM-4:30 PM

23
CLOSED
Spring Break 24
CLOSED
25

8 AM-4:30 PM

26

8 AM-4:30 PM

27

8 AM-4:30 PM

28

8 AM-4:30 PM

1

8 AM-4:30 PM

2
CLOSED
3
CLOSED
4

Return to Normal Hours

 

Categories: Uncategorized Tags:

Java 7 Bypass Vulnerability Alert

January 15th, 2013 Comments off

An article (link) released January 10, 2013 by the United States Computer Emergency Readiness Team (US-CERT.gov) states a known vulnerability in Java version 7.  The overview from the mentioned article is as follows:

“A vulnerability in the way Java 7 restricts the permissions of Java applets could allow an attacker to execute arbitrary commands on a vulnerable system.”

What this means is that [essentially] all versions of Java prior to Java 7.11 (build 1.7.0_11-b21) are vulnerable to attackers ignoring security restrictions and executing potentially malicious code on your computer. These attacks on you and your computer could be “crimes from identity theft to making an infected computer part of an ad-hoc computer network that can be used to attack websites” reports Reuters.com. US-CERT also describes the most likely effected users for the vulnerability:

“Any web browser using the Java 7 plug-in is affected. The Java Deployment Toolkit plug-in and Java Web Start can also be used as attack vectors.”

 

How do I fix this and/or update my computer’s Java version?

The previously mentioned article from US-CERT includes a section on a Solution which initially directs users to download the weekend’s fix/update from Oracle which release notes can be found here and the actual download link can be found on this page. The US-CERT article also provides brief instructions on disabling Java in your browser for those who don’t use Java and won’t notice it being disabled.