Ads

Friday 15 December 2017

Green & Red Lines in Dec 2017

Green & Red Lines in Dec 2017











- From SMRT


- wong chee tat :)


Is Friday...But ...My Brain is Fried


Is Friday...But ...My Brain is Fried

- Pic from Internet

- wong chee tat :)

380,000 Singapore users affected by massive data breach in 2016: Uber

380,000 Singapore users affected by massive data breach in 2016: Uber

By Kevin Kwang @KevinKwangCNA
15 Dec 2017 06:40PM (Updated: 15 Dec 2017 07:45PM)

SINGAPORE: Ride-hailing service provider Uber on Friday (Dec 15) said that 380,000 Singapore users were affected in the massive data breach that took place in 2016.

In a note on its website, Uber said that this figure was "an approximation rather than an accurate and definitive count because sometimes the information we get through the app or our website that we use to assign a country code is not the same as the country where a person actually lives".

"When the incident happened, we took immediate steps to secure the data, shut down further unauthorised access, and strengthen our data security," the company wrote.

It added that it does not believe any individual rider needs to take any action. "We have seen no evidence of fraud or misuse tied to the incident. We are monitoring the affected accounts and have flagged them for additional fraud protection."

The data breach was first disclosed by Uber CEO Dara Khosrowshahi in a statement last month, which said that hackers found 57 million names, email addresses, mobile phone numbers and driver license information belonging to users and drivers of the service. To keep the breach secret, the hackers were paid US$100,000 to destroy the data.

When asked why the company did not issue an apology after the initial disclosure as well as on Friday, Uber's head of communications for Southeast Asia Leigh Wong told Channel NewsAsia in an email: "We have indeed released the numbers and our CEO has indeed commented - at length - on the matter here", with an embedded link pointing to the CEO's statement in November.

He also declined to comment further on other questions beyond what was stated on the website.

The Personal Data Protection Commission (PDPC) told Channel NewsAsia on Friday that it takes a "serious view" of data breaches and is investigating whether Uber has breached the data protection provisions of the Personal Data Protection Act (PDPA).

"Uber has assured the PDPC that no credit card or bank account numbers had been compromised, and that it had since taken steps to address the vulnerability. We expect Uber’s full cooperation in the course of the investigation," a PDPC spokesperson said.

It also reminded all companies to take the protection of their customers' personal data seriously, as beyond regulatory considerations, failure to do so will affect the reputation of an organisation and erode the trust it has built with customers.

"HIGH STANDARDS OF PUBLIC ACCOUNTABILITY" EXPECTED: LTA

The Land Transport Authority (LTA) also said on Friday that it was "concerned" about the reported data breach at Uber.

"Uber, as a transport service provider, should be held to high standards of public accountability in both ensuring commuter safety as well as complying with the PDPA in relation to the personal data of commuters or drivers that they have collected," the spokesperson said.

She added that LTA expects the company to be "fully transparent" and cooperate with local regulators to disclose the extent of those drivers and customers that have been affected here. ​​​​​​​

Uber is slowly shedding more light on the extent of the breach, country by country. On Tuesday, it announced that about 815,000 Canadians were hacked, days after the country’s privacy commissioner said it is opening a formal investigation into the 2016 incident, according to Canadian news media reports.

After the data breach was first made public last month, a company spokesperson had said then that Uber was in the process of notifying various regulatory and government authorities and it expects to have ongoing discussions with them. Singapore’s Personal Data Protection Commission said it was aware of the incident and is in touch with the company for more details.

Source: CNA/kk
Read more at https://www.channelnewsasia.com/news/singapore/380-000-singapore-users-affected-by-massive-data-breach-in-2016-9502046


- Link:

- wong chee tat :)

ClamAV Signature Publishing Notice - 14th Dec 2017

ClamAV Signature Publishing Notice 

Datefile: daily
Version: 24130
Publisher: Alain Zidouemba
New Sigs: 370
Dropped Sigs: 2
Ignored Sigs: 271


New Detection Signatures:


* Doc.Macro.Obfuscation-6397033-2

* Win.Trojan.Gamarue-6398251-0

* Win.Trojan.Qakbot-6398864-0

* Win.Trojan.Emotet-6398865-0

* Win.Trojan.Qakbot-6398866-0

* Osx.Malware.Agent-6399597-0

* Osx.Malware.Agent-6399598-0

* Osx.Malware.Agent-6399599-0

* Win.Trojan.Emotet-6399600-0

* Win.Trojan.Emotet-6399601-0

* Win.Trojan.Emotet-6399602-0

* Win.Trojan.Emotet-6399603-0

* Win.Trojan.Emotet-6399604-0

* Win.Trojan.Emotet-6399605-0

* Win.Trojan.Emotet-6399606-0

* Win.Trojan.Emotet-6399607-0

* Win.Trojan.Emotet-6399608-0

* Win.Trojan.Emotet-6399609-0

* Win.Trojan.Emotet-6399610-0

* Doc.Dropper.Agent-6399611-0

* Doc.Dropper.Agent-6399612-0

* Doc.Dropper.Agent-6399613-0

* Doc.Dropper.Agent-6399614-0

* Doc.Dropper.Agent-6399615-0

* Doc.Dropper.Agent-6399616-0

* Doc.Dropper.Agent-6399617-0

* Doc.Dropper.Agent-6399618-0

* Win.Trojan.Agent-6399619-0

* Win.Trojan.Agent-6399620-0

* Win.Trojan.Agent-6399621-0

* Win.Trojan.Agent-6399622-0

* Win.Trojan.Agent-6399623-0

* Win.Trojan.Agent-6399624-0

* Win.Trojan.Agent-6399625-0

* Win.Trojan.Agent-6399626-0

* Win.Trojan.Agent-6399627-0

* Win.Trojan.Agent-6399628-0

* Win.Trojan.Agent-6399629-0

* Doc.Dropper.Agent-6399630-0

* Doc.Dropper.Agent-6399631-0

* Doc.Dropper.Agent-6399632-0

* Doc.Dropper.Agent-6399633-0

* Doc.Dropper.Agent-6399634-0

* Doc.Dropper.Agent-6399635-0

* Doc.Dropper.Agent-6399636-0

* Doc.Dropper.Agent-6399637-0

* Doc.Dropper.Agent-6399638-0

* Doc.Dropper.Agent-6399639-0

* Doc.Dropper.Agent-6399640-0

* Doc.Dropper.Agent-6399641-0

* Doc.Dropper.Agent-6399642-0

* Doc.Dropper.Agent-6399643-0

* Doc.Dropper.Agent-6399644-0

* Doc.Dropper.Agent-6399645-0

* Doc.Dropper.Agent-6399646-0

* Win.Malware.Agent-6399647-0

* Win.Malware.Agent-6399648-0

* Win.Malware.Agent-6399649-0

* Win.Malware.Agent-6399650-0

* Win.Malware.Agent-6399651-0

* Win.Malware.Agent-6399652-0

* Win.Malware.Agent-6399653-0

* Email.Phishing.VOF2-6399655-0

* Email.Phishing.VOF2-6399656-0

* Email.Phishing.VOF1-6399657-0

* Email.Phishing.VOF1-6399658-0

* Email.Phishing.VOF1-6399659-0

* Osx.Malware.Agent-6399660-0

* Win.Trojan.Emotet-6399661-0

* Win.Trojan.Emotet-6399662-0

* Win.Trojan.Emotet-6399663-0

* Win.Trojan.Emotet-6399664-0

* Win.Trojan.Emotet-6399665-0

* Win.Trojan.Emotet-6399666-0

* Win.Trojan.Emotet-6399667-0

* Win.Trojan.Emotet-6399668-0

* Win.Trojan.Emotet-6399669-0

* Email.Malware.Agent-6399670-0

* Email.Malware.Agent-6399671-0

* Email.Malware.Agent-6399672-0

* Email.Malware.Agent-6399673-0

* Archive.Malware.Agent-6399674-0

* Archive.Malware.Agent-6399675-0

* Email.Malware.Agent-6399676-0

* Doc.Dropper.Agent-6399677-0

* Doc.Dropper.Agent-6399678-0

* Doc.Dropper.Agent-6399679-0

* Doc.Dropper.Agent-6399680-0

* Doc.Dropper.Agent-6399681-0

* Doc.Dropper.Agent-6399682-0

* Doc.Dropper.Agent-6399683-0

* Doc.Dropper.Agent-6399684-0

* Doc.Dropper.Agent-6399685-0

* Doc.Dropper.Agent-6399686-0

* Doc.Dropper.Agent-6399687-0

* Doc.Dropper.Agent-6399688-0

* Doc.Dropper.Agent-6399689-0

* Doc.Dropper.Agent-6399690-0

* Doc.Dropper.Agent-6399691-0

* Doc.Dropper.Agent-6399692-0

* Doc.Dropper.Agent-6399693-0

* Doc.Dropper.Agent-6399694-0

* Doc.Dropper.Agent-6399695-0

* Doc.Dropper.Agent-6399696-0

* Doc.Dropper.Agent-6399697-0

* Win.Trojan.Agent-6399698-0

* Win.Trojan.Agent-6399699-0

* Win.Trojan.Agent-6399700-0

* Win.Trojan.Agent-6399701-0

* Win.Trojan.Agent-6399702-0

* Win.Trojan.Agent-6399703-0

* Win.Malware.Agent-6399704-0

* Win.Malware.Agent-6399705-0

* Win.Malware.Agent-6399706-0

* Win.Malware.Agent-6399707-0

* Win.Malware.Agent-6399708-0

* Win.Malware.Agent-6399709-0

* Win.Malware.Agent-6399710-0

* Win.Malware.Agent-6399711-0

* Win.Malware.Agent-6399712-0

* Win.Malware.Agent-6399713-0

* Win.Trojan.Emotet-6399714-0

* Win.Trojan.Emotet-6399715-0

* Win.Trojan.Emotet-6399716-0

* Win.Trojan.Emotet-6399717-0

* Doc.Dropper.Agent-6399718-0

* Doc.Dropper.Agent-6399719-0

* Doc.Dropper.Agent-6399720-0

* Doc.Dropper.Agent-6399721-0

* Doc.Dropper.Agent-6399722-0

* Doc.Dropper.Agent-6399723-0

* Doc.Dropper.Agent-6399724-0

* Doc.Dropper.Agent-6399725-0

* Doc.Dropper.Agent-6399726-0

* Doc.Dropper.Agent-6399727-0

* Doc.Dropper.Agent-6399728-0

* Doc.Dropper.Agent-6399729-0

* Doc.Dropper.Agent-6399730-0

* Doc.Dropper.Agent-6399731-0

* Doc.Dropper.Agent-6399732-0

* Doc.Dropper.Agent-6399733-0

* Doc.Dropper.Agent-6399734-0

* Doc.Dropper.Agent-6399735-0

* Doc.Dropper.Agent-6399736-0

* Doc.Dropper.Agent-6399737-0

* Doc.Dropper.Agent-6399738-0

* Doc.Dropper.Agent-6399739-0

* Doc.Dropper.Agent-6399740-0

* Doc.Dropper.Agent-6399741-0

* Doc.Dropper.Agent-6399742-0

* Doc.Dropper.Agent-6399743-0

* Doc.Dropper.Agent-6399744-0

* Doc.Dropper.Agent-6399745-0

* Win.Trojan.Agent-6399746-0

* Win.Trojan.Agent-6399747-0

* Win.Trojan.Agent-6399748-0

* Win.Trojan.Agent-6399749-0

* Win.Trojan.Agent-6399750-0

* Win.Trojan.Agent-6399751-0

* Win.Trojan.Agent-6399752-0

* Win.Malware.Agent-6399753-0

* Win.Malware.Agent-6399754-0

* Win.Malware.Agent-6399755-0

* Win.Malware.Agent-6399756-0

* Win.Malware.Agent-6399757-0

* Win.Malware.Agent-6399758-0

* Win.Malware.Agent-6399759-0

* Win.Malware.Agent-6399760-0

* Win.Malware.Agent-6399761-0

* Win.Malware.Agent-6399762-0

* Win.Malware.Agent-6399763-0

* Win.Malware.Agent-6399764-0

* Win.Trojan.Emotet-6399765-0

* Win.Trojan.Emotet-6399766-0

* Win.Trojan.Emotet-6399767-0

* Win.Trojan.Emotet-6399768-0

* Win.Trojan.Emotet-6399769-0

* Win.Trojan.Emotet-6399770-0

* Win.Trojan.Emotet-6399771-0

* Win.Trojan.Emotet-6399772-0

* Doc.Dropper.Agent-6399773-0

* Doc.Dropper.Agent-6399774-0

* Doc.Dropper.Agent-6399775-0

* Doc.Dropper.Agent-6399776-0

* Doc.Dropper.Agent-6399777-0

* Doc.Dropper.Agent-6399778-0

* Doc.Dropper.Agent-6399779-0

* Doc.Dropper.Agent-6399780-0

* Doc.Dropper.Agent-6399781-0

* Doc.Dropper.Agent-6399782-0

* Doc.Dropper.Agent-6399783-0

* Doc.Dropper.Agent-6399784-0

* Doc.Dropper.Agent-6399785-0

* Doc.Dropper.Agent-6399786-0

* Doc.Dropper.Agent-6399787-0

* Doc.Dropper.Agent-6399788-0

* Doc.Dropper.Agent-6399789-0

* Doc.Dropper.Agent-6399790-0

* Doc.Dropper.Agent-6399791-0

* Doc.Dropper.Agent-6399792-0

* Doc.Dropper.Agent-6399793-0

* Doc.Dropper.Agent-6399794-0

* Doc.Dropper.Agent-6399795-0

* Doc.Dropper.Agent-6399796-0

* Win.Trojan.Agent-6399797-0

* Win.Trojan.Agent-6399798-0

* Win.Trojan.Agent-6399799-0

* Win.Trojan.Agent-6399800-0

* Win.Trojan.Agent-6399801-0

* Win.Trojan.Agent-6399802-0

* Win.Trojan.Agent-6399803-0

* Win.Malware.Agent-6399804-0

* Win.Malware.Agent-6399805-0

* Win.Malware.Agent-6399806-0

* Win.Malware.Agent-6399807-0

* Win.Malware.Agent-6399808-0

* Win.Trojan.Emotet-6399809-0

* Win.Trojan.Emotet-6399810-0

* Win.Trojan.Emotet-6399811-0

* Win.Trojan.Emotet-6399812-0

* Win.Trojan.Emotet-6399813-0

* Win.Trojan.Emotet-6399814-0

* Win.Trojan.Emotet-6399815-0

* Win.Trojan.Emotet-6399816-0

* Win.Trojan.Emotet-6399817-0

* Win.Trojan.Emotet-6399818-0

* Win.Trojan.Emotet-6399819-0

* Win.Trojan.Emotet-6399820-0

* Win.Trojan.Emotet-6399821-0

* Win.Trojan.Emotet-6399822-0

* Doc.Dropper.Agent-6399823-0

* Doc.Dropper.Agent-6399824-0

* Doc.Dropper.Agent-6399825-0

* Doc.Dropper.Agent-6399826-0

* Doc.Dropper.Agent-6399827-0

* Doc.Dropper.Agent-6399828-0

* Doc.Dropper.Agent-6399829-0

* Doc.Dropper.Agent-6399830-0

* Doc.Dropper.Agent-6399831-0

* Doc.Dropper.Agent-6399832-0

* Doc.Dropper.Agent-6399833-0

* Doc.Dropper.Agent-6399834-0

* Doc.Dropper.Agent-6399835-0

* Doc.Dropper.Agent-6399836-0

* Doc.Dropper.Agent-6399837-0

* Doc.Dropper.Agent-6399838-0

* Doc.Dropper.Agent-6399839-0

* Doc.Dropper.Agent-6399840-0

* Doc.Dropper.Agent-6399841-0

* Doc.Dropper.Agent-6399842-0

* Doc.Dropper.Agent-6399843-0

* Doc.Dropper.Agent-6399844-0

* Doc.Dropper.Agent-6399845-0

* Doc.Dropper.Agent-6399846-0

* Doc.Dropper.Agent-6399847-0

* Doc.Dropper.Agent-6399848-0

* Doc.Dropper.Agent-6399849-0

* Doc.Dropper.Agent-6399850-0

* Doc.Dropper.Agent-6399851-0

* Doc.Dropper.Agent-6399852-0

* Doc.Dropper.Agent-6399853-0

* Win.Trojan.Agent-6399854-0

* Win.Malware.Agent-6399855-0

* Win.Malware.Agent-6399856-0

* Win.Malware.Agent-6399857-0

* Win.Malware.Agent-6399858-0

* Win.Malware.Agent-6399859-0

* Win.Malware.Agent-6399860-0

* Win.Trojan.Agent-6399861-0

* Osx.Malware.Agent-6399862-0

* Osx.Malware.Agent-6399863-0

* Osx.Malware.Agent-6399864-0

* Doc.Dropper.Agent-6399865-0

* Doc.Dropper.Agent-6399866-0

* Doc.Dropper.Agent-6399867-0

* Doc.Dropper.Agent-6399868-0

* Doc.Dropper.Agent-6399869-0

* Doc.Dropper.Agent-6399870-0

* Doc.Dropper.Agent-6399871-0

* Doc.Dropper.Agent-6399872-0

* Doc.Dropper.Agent-6399873-0

* Doc.Dropper.Agent-6399874-0

* Doc.Dropper.Agent-6399875-0

* Doc.Dropper.Agent-6399876-0

* Doc.Dropper.Agent-6399877-0

* Doc.Dropper.Agent-6399878-0

* Doc.Dropper.Agent-6399879-0

* Doc.Dropper.Agent-6399880-0

* Win.Trojan.Agent-6399881-0

* Win.Trojan.Agent-6399882-0

* Win.Trojan.Agent-6399883-0

* Win.Trojan.Agent-6399884-0

* Win.Trojan.Agent-6399885-0

* Win.Trojan.Emotet-6399886-0

* Win.Trojan.Emotet-6399887-0

* Win.Trojan.Emotet-6399888-0

* Win.Trojan.Emotet-6399889-0

* Win.Trojan.Emotet-6399890-0

* Win.Trojan.Emotet-6399891-0

* Win.Trojan.Emotet-6399892-0

* Win.Trojan.Emotet-6399893-0

* Win.Trojan.Emotet-6399894-0

* Win.Trojan.Emotet-6399895-0

* Win.Trojan.Emotet-6399896-0

* Win.Trojan.Emotet-6399897-0

* Win.Trojan.Emotet-6399898-0

* Win.Trojan.Emotet-6399899-0

* Win.Trojan.Emotet-6399900-0

* Win.Trojan.Emotet-6399901-0

* Win.Trojan.Emotet-6399902-0

* Win.Trojan.Emotet-6399903-0

* Win.Trojan.Emotet-6399904-0

* Win.Trojan.Emotet-6399905-0

* Doc.Dropper.Agent-6399906-0

* Doc.Dropper.Agent-6399907-0

* Doc.Dropper.Agent-6399908-0

* Doc.Dropper.Agent-6399909-0

* Doc.Dropper.Agent-6399910-0

* Doc.Dropper.Agent-6399911-0

* Doc.Dropper.Agent-6399912-0

* Doc.Dropper.Agent-6399913-0

* Doc.Dropper.Agent-6399914-0

* Doc.Dropper.Agent-6399915-0

* Doc.Dropper.Agent-6399916-0

* Doc.Dropper.Agent-6399917-0

* Doc.Dropper.Agent-6399918-0

* Doc.Dropper.Agent-6399919-0

* Doc.Dropper.Agent-6399920-0

* Doc.Dropper.Agent-6399921-0

* Doc.Dropper.Agent-6399922-0

* Doc.Dropper.Agent-6399923-0

* Doc.Dropper.Agent-6399924-0

* Doc.Dropper.Agent-6399925-0

* Doc.Dropper.Agent-6399926-0

* Doc.Dropper.Agent-6399927-0

* Doc.Dropper.Agent-6399928-0

* Win.Malware.Agent-6399929-0

* Win.Malware.Agent-6399930-0

* Win.Malware.Agent-6399931-0

* Win.Trojan.Agent-6399932-0

* Win.Trojan.Agent-6399933-0

* Win.Trojan.Agent-6399934-0

* Win.Trojan.Agent-6399935-0

* Win.Trojan.Agent-6399936-0

* Win.Trojan.Agent-6399937-0

* Win.Trojan.Agent-6399938-0

* Win.Trojan.Emotet-6399939-0

* Win.Trojan.Emotet-6399940-0

* Win.Trojan.Emotet-6399941-0

* Win.Trojan.Emotet-6399942-0

* Win.Trojan.Emotet-6399943-0

* Win.Trojan.Emotet-6399944-0

* Win.Trojan.Emotet-6399945-0

* Win.Trojan.Emotet-6399946-0

* Win.Trojan.Emotet-6399947-0

* Win.Trojan.Emotet-6399948-0

* Doc.Dropper.Agent-6399949-0

* Doc.Dropper.Agent-6399950-0

* Doc.Dropper.Agent-6399951-0

* Doc.Dropper.Agent-6399952-0

* Doc.Dropper.Agent-6399953-0

* Doc.Dropper.Agent-6399954-0

* Doc.Dropper.Agent-6399955-0

* Doc.Dropper.Agent-6399956-0

* Doc.Dropper.Agent-6399957-0

* Doc.Dropper.Agent-6399958-0

* Doc.Dropper.Agent-6399959-0

* Win.Trojan.Agent-6399960-0

* Win.Trojan.Agent-6399961-0

* Win.Trojan.Agent-6399962-0


Dropped Detection Signatures:


* Ppt.Exploit.CVE_2017_0199-6336815-2

* Doc.Macro.Obfuscation-6397033-1


- Link:

- wong chee tat :)

December 2017 Security Updates Release Notes

Release Notes - December 2017 Security Updates
Release Date: December 12, 2017

The December security release consists of security updates for the following software:
- Internet Explorer
- Microsoft Edge
- Microsoft Windows
- Microsoft Office and Microsoft Office Services and Web Apps
- Microsoft Exchange Server
- ChakraCore
- Microsoft Malware Protection Engine
Please note the following information regarding the security updates:
- Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog
- Starting in March 2017, there will be Windows 10 1607, 1703, and 1709 delta packages that contain just the delta changes between the previous month and the current release.
- Updates for Windows RT8.1 and Microsoft Office RT software are only available via Windows Update.
- In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
- After May 9, 2017, customers running Windows 10 version 1507 will no longer receive security and quality updates, with the exception of the Windows 10 2015 LTSB and the Windows 10 IoT Enterprise 2015 LTSB editions.  Microsoft recommends that customers with devices running other editions of Windows 10 version 1507 that are no longer supported update these devices to the latest version of Windows 10.  For more information, see Microsoft Knowledge Base Article 4015562.
Known Issues




- Link


- wong chee tat :)

Java Releases 7 & 8

Java Releases 7 & 8

Java 8 Update 151 CPUOctober 17, 2017
Java 8 Update 144 Limited UpdateJuly 26, 2017
Java 8 Update 141 CPUJuly 18, 2017
Java 8 Update 131 CPUApril 18, 2017
Java 8 Update 121 CPUJanuary 17, 2017
Java 8 Update 111 CPU
Java 8 Update 112 PSU (OTN)
October 18, 2016
Java 8 Update 101 CPU
Java 8 Update 102 PSU (OTN)
July 19, 2016
Java 8 Update 91 CPU
Java 8 Update 92 PSU (OTN)
8u91 build 14 released April 19, 2016
8u91 build 15 released May 26, 2016
April 19, 2016
Java 8 Update 77 CPUMarch 23, 2016
Java 8 Update 73 CPU
Java 8 Update 74 PSU (OTN)
February 5, 2016
Java 8 Update 71 CPU
Java 8 Update 72 PSU (OTN)
January 19, 2016
Java 8 Update 66 PSU (java.com)November 16, 2015
Java 8 Update 65 CPU
Java 8 Update 66 PSU (OTN)
8u66 build 17 released on OTN October 20, 2015
8u66 build 18 released on OTN November 11, 2015
October 20, 2015
Java 8 Update 60 Limited UpdateAugust 18, 2015
Java 8 Update 51 CPUJuly 14, 2015
Java 8 Update 45 CPU
Java 7 Update 79 CPU is the last public 7 release on java.com
Java 7 Update 80 PSU (OTN) is the last public 7 release
April 14, 2015
Java 8 Update 40 Limited UpdateMarch 3, 2015
Java 8 Update 31 CPU
Java 7 Update 75 CPU
Java 7 Update 76 PSU (OTN)
January 20, 2015
Java 8 Update 25 CPU
Java 7 Update 71 CPU
Java 7 Update 72 PSU (OTN)
October 14, 2014
Java 8 Update 20 Limited Update (OTN)August 19, 2014
Java 7 Update 67 Limited UpdateAugust 4, 2014
Java 8 Update 11 CPU (OTN)
Java 7 Update 65 CPU
July 15, 2014
Java 7 Update 60 Limited UpdateMay 28, 2014
Java 8 Update 5 CPU (OTN)
Java 7 Update 55 CPU
April 15, 2014
Java 8 Release (OTN)March 18, 2014
Java 7 Update 51 CPUJanuary 14, 2014
Java 7 Update 45 CPUOctober 15, 2013
Java 7 Update 40 Limited UpdateSeptember 10, 2013
Java 7 Update 25 CPUJune 18, 2013
Java 7 Update 21 CPUApril 16, 2013
Java 7 Update 17 - Special Update3March 4, 2013
Java 7 Update 15 CPU - Special UpdateFebruary 19, 2013
Java 7 Update 13 CPUFebruary 1, 2013
Java 7 Update 11 CPU2January 13, 2013
Java 7 Update 10 Limited UpdateDecember 11, 2012
Java 7 Update 9 CPUOctober 16, 2012
Java 7 Update 7 - Special Update1August 30, 2012
Java 7 Update 6 Limited UpdateAugust 14, 2012
Java 7 Update 5 CPUJune 12, 2012
Java 7 Update 4 Limited UpdateApril 26, 2012
Java 7 Update 3 CPUFebruary 14, 2012
Java 7 Update 2 Limited UpdateDecember 12, 2011
Java 7 Update 1 CPUOctober 18, 2011
Java 7 ReleaseJuly 28, 2011
- here - wong chee tat :)

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

- wong chee tat :)

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

- wong chee tat :)

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas

- wong chee tat :)

Meow?


Meow? Weekends are here!

- Pic from Internet

- wong chee tat :)