Thursday, July 21, 2016

U.S. Authorities Charge Owner of Most-Visited Illegal File-Sharing Website with Copyright Infringement

Department of Justice
Office of Public Affairs

FOR IMMEDIATE RELEASE
Wednesday, July 20, 2016

U.S. Authorities Charge Owner of Most-Visited Illegal File-Sharing Website with Copyright Infringement

U.S. authorities have charged the alleged owner of today’s most visited illegal file-sharing website with criminal copyright infringement and have seized domain names associated with the website.
Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Zachary T. Fardon of the Northern District of Illinois, Executive Associate Director Peter T. Edge of U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (HSI) and Chief Richard Weber of the Internal Revenue Service-Criminal Investigation (IRS-CI) made the announcement.
Artem Vaulin, 30, of Kharkiv, Ukraine, was arrested today in Poland and is charged by criminal complaint, filed in U.S. District Court in Chicago, with one count of conspiracy to commit criminal copyright infringement, one count of conspiracy to commit money laundering and two counts of criminal copyright infringement.  The United States will seek to extradite Vaulin to the United States.
“Vaulin is charged with running today’s most visited illegal file-sharing website, responsible for unlawfully distributing well over $1 billion of copyrighted materials,” said Assistant Attorney General Caldwell.  “In an effort to evade law enforcement, Vaulin allegedly relied on servers located in countries around the world and moved his domains due to repeated seizures and civil lawsuits.  His arrest in Poland, however, demonstrates again that cybercriminals can run, but they cannot hide from justice.”
“Copyright infringement exacts a large toll, a very human one, on the artists and businesses whose livelihood hinges on their creative inventions,” said U.S. Attorney Fardon.  “Vaulin allegedly used the Internet to cause enormous harm to those artists.  Our Cybercrimes Unit at the U.S. Attorney’s Office in Chicago will continue to work with our law enforcement partners around the globe to identify, investigate and prosecute those who attempt to illegally profit from the innovation of others.”
“Artem Vaulin was allegedly running a worldwide digital piracy website that stole more than $1 billion in profits from the U.S. entertainment industry,” said Executive Associate Director Edge.  “Protecting legitimate commerce is one of HSI’s highest priorities.  With the cooperation of our law enforcement partners, we will continue to aggressively bring to justice those who enrich themselves by stealing the creative work of U.S. artists.”
“Investigating cyber-enabled schemes is a top priority for CI,” said Chief Weber.  “Websites such as the one seized today brazenly facilitate all kinds of illegal commerce.  Criminal Investigation is committed to thoroughly investigating financial crimes, regardless of the medium.  We will continue to work with our law enforcement partners to unravel this and other complex financial transactions and money laundering schemes where individuals attempt to conceal the true source of their income and use the Internet to mask their true identity.”
According to the complaint, Vaulin allegedly owns and operates Kickass Torrents or KAT, a commercial website that has enabled users to illegally reproduce and distribute hundreds of millions of copyrighted motion pictures, video games, television programs, musical recordings and other electronic media since 2008.  The copyrighted material is collectively valued at well over $1 billion, according to the complaint.  The complaint alleges that KAT receives more than 50 million unique visitors per month and is estimated to be the 69th most frequently visited website on the internet.
In addition, a federal court in Chicago ordered the seizure of one bank account and seven domain names associated with the alleged KAT conspiracy.
According to the complaint, KAT has consistently made available for download movies that were still in theaters and displayed advertising throughout its site.  KAT’s net worth has been estimated at more than $54 million, with estimated annual advertising revenue in the range of $12.5 million to $22.3 million, according to the complaint.  The complaint alleges that the site operates in approximately 28 languages.  KAT has moved its domains several times due to numerous seizures and copyright lawsuits, and it has been ordered blocked by courts in the United Kingdom, Ireland, Italy, Denmark, Belgium and Malaysia, according to the complaint.  KAT has allegedly operated at various times under the domains kickasstorrents.com, kat.ph, kickass.to, kickass.so and kat.cr, and relied on a network of computer servers located around the world, including in Chicago. 
Several motion pictures currently available for download and sharing on KAT are still showing in theatres, including “Captain America: Civil War,” “Now You See Me 2,” “Independence Day: Resurgence” and “Finding Dory,” according to the complaint.  The complaint alleges that Vaulin, who used the screen name “tirm,” was involved in designing KAT’s original website, oversaw KAT’s operations and, during the latter part of the conspiracy, Vaulin allegedly operated KAT under the auspices of a Ukrainian-based front company called Cryptoneat. 
The charges and allegations contained in the complaint are merely accusations.  The defendant is presumed innocent until and unless proven guilty. 
HSI and IRS-CI investigated the case with substantial assistance from the International Organized Crime Intelligence and Operations Center, the National Intellectual Property Rights Coordination Center, the Criminal Division’s Office of International Affairs and the Polish Border Guard and National Prosecutor’s Office.
Senior Counsel Ryan K. Dickey of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorneys William E. Ridgway and Devlin N. Su of the Northern District of Illinois are prosecuting the case.  The Criminal Division’s Office of International Affairs also provided significant assistance in this case. 


- wong chee tat :)

Weather

Raining. Cool Day


- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Using Goto




Seeing this comic strip reminds me of a "DOS" command "goto". I have changed the fonts and make the words bigger.


In the example below, the batch file would only print "DONE", skipping anything that is between the GOTO and the GOTO target label.

GOTO END
ECHO SKIPPING THIS
:END
ECHO DONE




- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Blog Updates:

Blog Updates:

Minor updates:

- Update labels on some old posts

Will continue to make minor improvements for this blog!

- wong chee tat :)

McAfee DAT version = 8232 (jul 20th 2016)

McAfee DAT version = 8232 (jul 20th 2016)

Link: here ( Select Yes. And it keeps getting updated daily. Region=US)




- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

六字真言頌 怙主三寶

六字真言頌 怙主三寶

虔心皈依怙主三寶,真心憐憫慈母眾生,嗡瑪尼巴美吽……

佛為導師法為正道,僧為善侶同為救主,嗡瑪尼巴美吽……
登山階梯過河船舟,驅愚慧燈險隘坦途,嗡瑪尼巴美吽……
口誦真言心中祈禱,地獄烈火從此熄滅,嗡瑪尼巴美吽……
唱頌六字胸中發願,冷獄冰雪消融變暖,嗡瑪尼巴美吽……
誦持六字威力無比,十八地獄變成樂土,嗡瑪尼巴美吽……
世間無實因緣難料,生死輪回行善為要,嗡瑪尼巴美吽……
萬物無常善惡交替,向善精進矢志不渝,嗡瑪尼巴美吽……
暇滿人身難得至寶,虛度此生實為可惜,嗡瑪尼巴美吽……
貪心無盡欲望皆空,惡趣業因棄之從善,嗡瑪尼巴美吽……
萬惡煩惱罪孽根源,時刻提防凡夫癡念,嗡瑪尼巴美吽……
強壯身軀入土荒野,驅走死神上師引路,嗡瑪尼巴美吽……
瑪尼頌詞怙主三寶,諾言活佛順口編唱,嗡瑪尼巴美吽……
虔誠頂禮觀音菩薩,消除罪孽速證佛果,嗡瑪尼巴美吽……
如來佛子慈悲引路,眾生往生極樂佛土,嗡瑪尼巴美吽……


六字斷除六道苦難頌


嗡字放光照耀天界,死苦難忍觀音救度,嗡瑪尼巴美吽……
瑪字光照阿修羅界,爭斗死傷觀音救度,嗡瑪尼巴美吽……
尼字放光照亮人間,生老病死觀音救度,嗡瑪尼巴美吽……
巴字放光照亮畜生,蠢啞痛苦觀音救度,嗡瑪尼巴美吽……
美字放光照亮惡鬼,饑餓難熬觀音救度,嗡瑪尼巴美吽……
吽字放光照亮地獄,冷熱煎熬觀音救度,嗡瑪尼巴美吽……


- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Port Assignments for Commonly-Used Services

Port Assignments for Commonly-Used Services

There are many services associated with the Windows 2000 operating system. These services might require more than one TCP or UDP port for the service to be functional. Table C.3 shows the default ports that are used by each service mentioned.
Table C.3 Default Port Assignments for Common Services
Service Name
UDP
TCP
Browsing datagram responses of NetBIOS over TCP/IP
138

Browsing requests of NetBIOS over TCP/IP
137

Client/Server Communication

135
Common Internet File System (CIFS)
445
139, 445
Content Replication Service

560
Cybercash Administration

8001
Cybercash Coin Gateway

8002
Cybercash Credit Gateway

8000
DCOM (SCM uses udp/tcp to dynamically assign ports for DCOM)
135
135
DHCP client

67
DHCP server

68
DHCP Manager

135
DNS Administration

139
DNS client to server lookup (varies)
53
53
Exchange Server 5.0


   Client Server Communication

   135
   Exchange Administrator

   135
   IMAP

   143
   IMAP (SSL)

   993
   LDAP

   389
   LDAP (SSL)

   636
   MTA - X.400 over TCP/IP

   102
   POP3

   110
   POP3 (SSL)

   995
   RPC

   135
   SMTP

   25
   NNTP

   119
   NNTP (SSL)

   563
File shares name lookup
137

File shares session

139
FTP

21
FTP-data

20
HTTP

80
HTTP-Secure Sockets Layer (SSL)

443
Internet Information Services (IIS)

80
IMAP

143
IMAP (SSL)

993
IKE (For more information, see Table C.4)
500

IPSec Authentication Header (AH) (For more information, see Table C.4)

IPSec Encapsulation Security Payload (ESP) (For more information, see Table C.4)


IRC

531
ISPMOD (SBS 2nd tier DNS registration wizard)

1234
Kerberos de-multiplexer

2053
Kerberos klogin
543
Kerberos kpasswd (v5)
464
464
Kerberos krb5
88
88
Kerberos kshell

544
L2TP
1701

LDAP

389
LDAP (SSL)

636
Login Sequence
137, 138
139
Macintosh, File Services (AFP/IP)

548
Membership DPA

568
Membership MSN

569
Microsoft Chat client to server

6667
Microsoft Chat server to server

6665
Microsoft Message Queue Server
1801
1801
Microsoft Message Queue Server
3527
135, 2101
Microsoft Message Queue Server

2103, 2105
MTA - X.400 over TCP/IP

102
NetBT datagrams
138

NetBT name lookups
137

NetBT service sessions

139
NetLogon
138

NetMeeting Audio Call Control

1731
NetMeeting H.323 call setup

1720
NetMeeting H.323 streaming RTP over UDP
Dynamic

NetMeeting Internet Locator Server ILS

389
NetMeeting RTP audio stream
Dynamic

NetMeeting T.120

1503
NetMeeting User Location Service

522
NetMeeting user location service ULS

522
Network Load Balancing
2504

NNTP

119
NNTP (SSL)

563
Outlook (see for ports)


Pass Through Verification
137, 138
139
POP3

110
POP3 (SSL)

995
PPTP control

1723
PPTP data (see Table C.4)


Printer sharing name lookup
137

Printer sharing session

139
Radius accounting (Routing and Remote Access)
1646 or 1813

Radius authentication (Routing and Remote Access)
1645 or 1812

Remote Install TFTP

69
RPC client fixed port session queries

1500
RPC client using a fixed port session replication

2500
RPC session ports

Dynamic
RPC user manager, service manager, port mapper

135
SCM used by DCOM
135
135
SMTP

25
SNMP
161

SNMP Trap
162

SQL Named Pipes encryption over other protocols name lookup
137

SQL RPC encryption over other protocols name lookup
137

SQL session

139
SQL session

1433
SQL session

1024 - 5000
SQL session mapper

135
SQL TCP client name lookup
53
53
Telnet

23
Terminal Server

3389
UNIX Printing

515
WINS Manager

135
WINS NetBios over TCP/IP name service
137

WINS Proxy
137

WINS Registration

137
WINS Replication

42
X400

102



- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum

- wong chee tat :)

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

- wong chee tat :)

Java 8u101 Update Release Notes

8u101 Update Release Notes

July 19, 2016



Java™ SE Development Kit 8, Update 101 (JDK 8u101)

The full version string for this update release is 1.8.0_101-b13 (where "b" means "build"). The version number is 8u101.

IANA Data 2016d

JDK 8u101 contains IANA time zone data version 2016d. For more information, refer to Timezone Data Versions in the JRE Software.
See JDK-8151876

Security Baselines

The security baselines for the Java Runtime Environment (JRE) at the time of the release of JDK 8u101 are specified in the following table:
JRE Family VersionJRE Security Baseline
(Full Version String)
81.8.0_101-b13
71.7.0_111-b13
61.6.0_121-b09

JRE Expiration Date

The JRE expires whenever a new release with security vulnerability fixes becomes available. Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Third Party Bulletin. This JRE (version 8u101) will expire with the release of the next critical patch update scheduled for October 19, 2016.
For systems unable to reach the Oracle Servers, a secondary mechanism expires this JRE (version 8u101) on November 19, 2016. After either condition is met (new release becoming available or expiration date reached), the JRE will provide additional warnings and reminders to users to update to the newer version. For more information, see JRE Expiration Date.

Certificate Changes


New DTrust certificates added to root CAs
Two new root certificates have been added:
D-TRUST Root Class 3 CA 2 2009
alias: dtrustclass3ca2
DN: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE
D-TRUST Root Class 3 CA 2 EV 2009
alias: dtrustclass3ca2ev
DN: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE
See JDK-8153080
New IdenTrust certificates added to root CAs
Three new root certificates have been added:
IdenTrust Public Sector Root CA 1
alias: identrustpublicca
DN: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US
IdenTrust Commercial Root CA 1
alias: identrustcommercial
DN: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US
IdenTrust DST Root CA X3
alias: identrustdstx3
DN: CN=DST Root CA X3, O=Digital Signature Trust Co.
See JDK-8154757
Comodo Root CA removed
The Comodo "UTN - DATACorp SGC" root CA certificate has been removed from the cacerts file.
See JDK-8141540

Sonera Class1 CA removed
The "Sonera Class1 CA" root CA certificate has been removed from the cacerts file.
See JDK-8141276

Changes


other-libs/corba
Improve access control to javax.rmi.CORBA.ValueHandler
The javax.rmi.CORBA.Util class provides methods that can be used by stubs and ties to perform common operations. It also acts as a factory for ValueHandlers. Thejavax.rmi.CORBA.ValueHandler interface provides services to support the reading and writing of value types to GIOP streams. The security awareness of these utilities has been enhanced with the introduction of a permissionjava.io.SerializablePermission("enableCustomValueHanlder"). This is used to establish a trust relationship between the users of the javax.rmi.CORBA.Util andjavax.rmi.CORBA.ValueHandler APIs.

The required permission is "enableCustomValueHanlder" SerializablePermission. Third party code running with a SecurityManager installed, but not having the new permission while invokingUtil.createValueHandler(), will fail with an AccessControlException.

This permission check behaviour can be overridden, in JDK8u and previous releases, by defining a system property, "jdk.rmi.CORBA.allowCustomValueHandler".

As such, external applications that explicitly call javax.rmi.CORBA.Util.createValueHandlerrequire a configuration change to function when a SecurityManager is installed and neither of the following two requirements is met:

1. The java.io.SerializablePermission("enableCustomValueHanlder") is not granted by SecurityManager.

2. In the case of applications running on JDK8u and before, the system property"jdk.rmi.CORBA.allowCustomValueHandler" is either not defined or is defined equal to "false" (case insensitive).
Please note that the "enableCustomValueHanlder" typo will be corrected in the October 2016 releases. In those and future JDK releases, "enableCustomValueHandler" will be the correct SerializationPermission to use.
JDK-8079718 (not public)


security-libs/java.security
Support added to jarsigner for specifying timestamp hash algorithm
A new -tsadigestalg option is added to jarsigner to specify the message digest algorithm that is used to generate the message imprint to be sent to the TSA server. In older JDK releases, the message digest algorithm used was SHA-1. If this new option is not specified, SHA-256 will be used on JDK 7 Updates and later JDK family versions. On JDK 6 Updates, SHA-1 will remain the default but a warning will be printed to the standard output stream.
See JDK-8038837


security-libs/javax.crypto
MSCAPI KeyStore can handle same-named certificates
Java SE KeyStore does not allow certificates that have the same aliases (http://docs.oracle.com/javase/8/docs/api/java/security/KeyStore.html).
However, on Windows, multiple certificates stored in one keystore are allowed to have non-unique friendly names. The fix for JDK-6483657 makes it possible to operate on such non-uniquely named certificates through the Java API by artificially making the visible aliases unique.

Please note, this fix does not enable creating same-named certificates with the Java API. It only allows you to deal with same-named certificates that were added to the keystore by 3rd party tools.

It is still recommended that your design not use multiple certificates with the same name. In particular, the following sentence will not be removed from the Java documentation:
"In order to avoid problems, it is recommended not to use aliases in a KeyStore that only differ in case."
(http://docs.oracle.com/javase/8/docs/api/java/security/KeyStore.html)
See JDK-6483657


deploy
Deployment Tookit API methods no longer install JRE
The Deployment Toolkit API installLatestJRE() and installJRE(requestedVersion)methods from deployJava.js and the install() method from dtjava.js no longer install the JRE. If a user's version of Java is below the security baseline, it redirects the user to java.com to get an updated JRE.
JDK-8148310 (not public)


security-libs/java.security
DomainCombiner will no longer consult runtime policy for static ProtectionDomain objects when combining ProtectionDomain objects
Applications which use static ProtectionDomain objects (created using the 2-arg constructor) with an insufficient set of permissions may now get an AccessControlException with this fix. They should either replace the static ProtectionDomain objects with dynamic ones (using the 4-arg constructor) whose permission set will be expanded by the current Policy or construct the static ProtectionDomain object with all the necessary permissions.
JDK-8147771 (not public)


Bug Fixes


This release contains fixes for security vulnerabilities described in the Oracle Java SE Critical Patch Update Advisory. For a more complete list of the bug fixes included in this release, see theJDK 8u101 Bug Fixes page.


Known Issues

deploy
JRE 8u101 is not recognized by Internet Explorer (IE) when using static class ID
When a static class id is used to launch an applet or web start application while using JRE 8u101, users will get an unwanted dialogue box stating that they either use the latest JRE or cancel the launch even though they have installed and are using the latest JRE (JRE 8u101).
This specific case is only applicable on Windows and IE.
We do not recommend using static class id for JRE version selection (since JDK 5u6, Dec 2005) per http://www.oracle.com/technetwork/java/javase/family-clsid-140615.html.
To work around this issue, users can do one of the following two things:
(1) Hit launch with the latest version (8u101) and ignore the warning.
(2) Install JRE 8u102 instead of JRE 8u101 to avoid this issue.
To address this issue, developers can do one of the following two things:
(1) Use a dynamic class id instead of static class id.
(2) Use java_version when using an HTML applet or a JNLP descriptor when using JNLP.
JDK-8147457 (not public)




- wong chee tat :)