Monday, March 28, 2016

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum

- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

8u77 Update Release Notes

8u77 Update Release Notes




Java™ SE Development Kit 8, Update 77 (JDK 8u77)

The full version string for this update release is 1.8.0_77-b03 (where "b" means "build"). The version number is 8u77.
This update release contains several enhancements and changes including the following.

IANA Data 2016a

JDK 8u77 contains IANA time zone data version 2016a. For more information, refer to Timezone Data Versions in the JRE Software.

Security Baselines

The security baselines for the Java Runtime Environment (JRE) at the time of the release of JDK 8u77 are specified in the following table:
JRE Family VersionJRE Security Baseline
(Full Version String)
81.8.0_77
71.7.0_99
61.6.0_111

JRE Expiration Date

The JRE expires whenever a new release with security vulnerability fixes becomes available. Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Third Party Bulletin. This JRE (version 8u77) will expire with the release of the next critical patch update scheduled for April 19, 2016.
For systems unable to reach the Oracle Servers, a secondary mechanism expires this JRE (version 8u77) on May 19, 2016. After either condition is met (new release becoming available or expiration date reached), the JRE will provide additional warnings and reminders to users to update to the newer version. For more information, see JRE Expiration Date.

Notes

This Security Alert (8u77) is based off the earlier 8u74 PSU release. All users of earlier JDK 8 releases should update to this release. For more information on the difference between Critical Patch Updates and Patch Set Updates please visit Java CPU and PSU Releases Explained.
The demos, samples, and Documentation bundles for 8u77 are not impacted by the Security Alert for CVE-2016-0636, so version 8u73 demos, samples, and Documentation bundles remain the most up to-date version until the April Critical Patch Update release.

Bug Fixes

This release contains fixes for security vulnerabilities. For more information, see Oracle Java SE Critical Patch Update Advisory.





- wong chee tat :)

Changelog Endian Firewall Community 3.0.0

Endian Firewall Community 3.0.0 Changelog

** Improvement
  * [UTM-829]      - UTM-828 Disable direct client communication when
                     multiple processes is enabled
  * [UTM-811]      - Optimize memory usage of urlfilter categories by
                     removing those which are not used
  * [UTM-810]      - Optimize memory usage by using 'file' instead of
                     'hash' for urlfilter lookup tables
  * [UTM-739]      - Connections page for VPN users: backend
  * [UTM-733]      - Reflect in GUI transitioning states of IPsec
                     connections
  * [CORE-685]     - Make Apply, Notification and Error box grow with
                     content
  * [CORE-629]     - Update Intel network drivers
  * [CORE-553]     - Configurable logs for trusted timestamping


** Bugfix
  * [UTM-806]      - When clamd is not running when c-icap is starting
                     and needs clamd, c-icap does not have a virus
                     engine and let all pass.
  * [UTM-805]      - Squid need also to be restarted when a file in
                     /etc/squid/squid.conf.d/ changed
  * [UTM-804]      - c-icap does not start when clamAV is enabled
                     instead of Panda Antivirus
  * [UTM-803]      - ClamAV safebrowsing is still enabled also if
                     disabled
  * [UTM-798]      - c-icap uses a very large amount of memory
  * [UTM-795]      - Providers associated to a scope are lost, syncing
  * [UTM-782]      - Virus engine for amavis is failing due to
                     unexpected exit code 255
  * [UTM-775]      - Duplicated lable in DNS Routing page
  * [UTM-771]      - Error signing a certificate request
  * [UTM-742]      - Disabling IPsec Net-to-Net connection displays
                     the status as if it was Connected or Connecting
  * [UTM-728]      - Application Control works only with source ANY
  * [UTM-702]      - HTTP Proxy issues
  * [UTM-698]      - Unable to download the content filter signatures
  * [UTM-697]      - IPsec 3.0 migration missing
  * [CORE-472]     - Remote authentication reply can contain binary
                     values
  * [CORE-462]     - Swap partition dimension reorganization
  * [CORE-423]     - Wrong baud rate on software appliance
  * [CORE-316]     - Values of default settings files are not read
                     when job uses get_config()
  * [COMMUNITY-53] - /var/log/fifo/dansguardian is not a fifo
  * [COMMUNITY-45] - ISSUU slow with Internet Explorer
  * [CORE-591]     - Logrotate removes archives older than 7 days
                     automatically for most daemons
  * [CORE-672]     - Emi commands ignores all but the first param of a
                     param list after the first request
  * [CORE-651]     - In System Status some sub categories disappear
                     when navigating to VPN connections
  * [CORE-644]     - Some log files are not rotated
  * [CORE-642]     - Kernel kmalloc traceback in /var/log/messages
  * [CORE-639]     - Log timestamping doesn't use correctly the
                     pattern variable
  * [CORE-638]     - Freezings and reboots caused by out of memory
  * [CORE-631]     - Default gateway is lost after adding an uplink on
                     the same interface the main one is using
  * [UTM-595]      - OpenVPN user migration
  * [UTM-593]      - OpenVPN server GUI
  * [UTM-591]      - OpenVPN server backend
  * [UTM-590]      - VPN authentication management (service) GUI
  * [UTM-589]      - VPN authentication backend GUI
  * [UTM-588]      - VPN user groups GUI
  * [UTM-587]      - VPN user groups support for remote providers
  * [UTM-586]      - VPN user groups support for local backend
  * [UTM-585]      - VPN user groups backend
  * [UTM-527]      - Outgoing IP address configuration for each domain

Source: README, updated 2014-01-20



- wong chee tat :)