L
Lukas Bradley
I recently installed the newest JDK and JRE 1.4.2_003 for development
purposes and client applet support. When surfing around the web for a
NON-pornographic video, I happened upon a particular site that
apparently started an Applet.
Immediately, Norton 2003 Anti-Virus caught a ZIP within C:\Documents and
Settings\lbradley\Application
Data\Sun\Java\Deployment\cache\javapi\v1.0\jar named
plugin.jar-3aafe450-3b041b4c.zip (this may have been renamed by the
browser, IE). The virus was identified as Trojan.ByteVerify. More
information is located here:
http://securityresponse.symantec.com/avcenter/venc/data/trojan.byteverify.html
My question is WHY hasn't the JRE for my browser been fixed to not allow
the runtime security PermissionSet to be circumvented? Even though the
above is defined as a Microsoft security alert, I am no longer using the
Microsoft VM.
Lukas
purposes and client applet support. When surfing around the web for a
NON-pornographic video, I happened upon a particular site that
apparently started an Applet.
Immediately, Norton 2003 Anti-Virus caught a ZIP within C:\Documents and
Settings\lbradley\Application
Data\Sun\Java\Deployment\cache\javapi\v1.0\jar named
plugin.jar-3aafe450-3b041b4c.zip (this may have been renamed by the
browser, IE). The virus was identified as Trojan.ByteVerify. More
information is located here:
http://securityresponse.symantec.com/avcenter/venc/data/trojan.byteverify.html
My question is WHY hasn't the JRE for my browser been fixed to not allow
the runtime security PermissionSet to be circumvented? Even though the
above is defined as a Microsoft security alert, I am no longer using the
Microsoft VM.
Lukas