Skip to content

homeofoffice2007professional

EUROPA > Summaries of EU legislation > Environment > Waste management

This legislation prohibits the placing on the market of most batteries and accumulators with a certain mercury or cadmium content and establishes rules for the collection, recycling, treatment and disposal of batteries and accumulators.

ACT

Directive 2006/66/EC of the European Parliament and of the Council of 6 September 2006 on batteries and accumulators and waste batteries and accumulators and repealing Directive 91/157/EEC [See amending acts].

SUMMARY

The Directive prohibits the placing on the market of certain batteries and accumulators with a proportional mercury or cadmium content above a fixed threshold. In addition, it promotes a high rate of collection and recycling of waste batteries and accumulators and improvement in the environmental performance of all involved in the life-cycle of batteries and accumulators, including their recycling and disposal.

The aim is to cut the amount of hazardous substances – in particular, mercury, cadmium and lead – dumped in the environment; this should be done by reducing the use of these substances in batteries and accumulators and by treating and re-using the amounts that are used.

The Directive applies to all types of batteries and accumulators, apart from those used in equipment to protect Member States’ security or for military purposes, or in equipment designed to be sent into space. It therefore covers a wider range of products than Directive 91/157/EEC, which applied only to batteries containing mercury, lead or cadmium, and excluded “button cells”.

The Directive prohibits:

batteries and accumulators, whether or not incorporated in appliances, containing more than 0.0005% by weight of mercury (except for button cells, which must have a mercury content of less than 2% by weight); portable batteries and accumulators, including those incorporated in appliances, with a cadmium content by weight of more than 0.002% (except for portable batteries and accumulators for use in emergency and alarm systems, medical equipment or cordless power tools).

Batteries or accumulators which do not meet the requirements of this Directive may not be placed on the market after 26 September 2008.

To ensure that a high proportion of spent batteries and accumulators are recycled, Member States must take whatever measures are needed (including economic instruments) to promote and maximise separate waste collections and prevent batteries and accumulators being thrown away as unsorted municipal refuse. They have to make arrangements enabling end-users to discard spent batteries and accumulators at collection points in their vicinity and have them taken back at no charge by the producers. Collection rates of at least 25% and 45% have to be reached by 26 September 2012 and 26 September 2016 respectively.

In principle, it must be possible to remove batteries and accumulators readily and safely. It is for Member States to ensure that manufacturers design their appliances accordingly.

Member States also have to ensure that, from 26 September 2009 at the latest, batteries and accumulators that have been collected are treated and recycled using the best available techniques. Recycling must exclude energy recovery.

As a minimum, treatment must include removal of all fluids and acids. Batteries and accumulators must be treated and stored (even if only temporarily) in sites with impermeable surfaces and weatherproof covering, or in suitable containers.

The recycling of battery and accumulator content to produce similar products or for other purposes has to reach the following levels by 26 September 2011:

at least 65% by average weight of lead-acid batteries and accumulators, including the recycling of the lead content to the highest degree that is technically feasible; 75% by average weight of nickel-cadmium batteries and accumulators, including the recycling of the lead content to the highest degree that is technically feasible; at least 50% by average weight of other battery and accumulator waste.

If there is no viable end market, or if a detailed assessment of environmental, economic and social impact concludes that recycling is not the best solution, Member States may dispose of batteries and accumulators containing cadmium, mercury or lead in landfills or underground storage. Otherwise, it is prohibited to put waste from industrial and automotive batteries and accumulators into landfill, or to incinerate it; only residues from treating and recycling them may be disposed of in these ways.

Treatment and recycling may take place outside the Member State concerned or even outside the Community, provided EU legislation on the shipment of waste is respected.

The producers have to bear the cost of collecting, treating and recycling industrial, automotive and portable batteries and accumulators, as well as the costs of campaigns to inform the public of these arrangements. Small producers may be exempted from this obligation if this does not impede the proper functioning of the collection and recycling schemes. All producers of batteries and accumulators have to be registered.

End-users are to be informed in various ways:

through campaigns covering, among other things, the potential effects on the environment and human health of the substances used in batteries and accumulators, and the collection and recycling arrangements at the end-users’ disposal; being directly informed by distributors that they can discard waste batteries and accumulators at sales points; visible, legible and indelible markings on batteries, accumulators and battery packs with the following information: the symbol of the crossed-out wheeled bin (in Annex II to the Directive); the capacity of the accumulator or the portable battery; the chemical symbols Hg, Cd and Pb if the batteries, accumulators or button cells contain over 0.0005% mercury, over 0.002% cadmium or over 0.004% lead. If the battery, accumulator or battery pack are too small, this information appears on the packaging.

The Member States must send the Commission reports on the implementation of the Directive and the measures they are taking to encourage developments affecting the impact of batteries and accumulators on the environment (including new recycling and treatment techniques) – the first report will cover the period until 26 September 2012; subsequent reports are to be produced every three years. On the basis of these reports, the Commission must publish its own report on the implementation of the Directive and its impact on the environment and the functioning of the internal market.

A review of the Directive will be carried out after the second round of reports from the Member States. The Commission will examine the appropriateness of further risk management measures, minimum collection targets and minimum recycling obligations, and if necessary propose amendments to the Directive.

Context

This Directive repeals and replaces Directive 91/157/EEC.

Several hundred thousand tonnes of industrial and portable batteries and accumulators are placed on the Community market every year. A wide range of metals are used, from mercury, lead and cadmium to nickel, copper, zinc, manganese and lithium.

Disposing of the waste from these products pollutes the atmosphere (in the case of incineration) and contaminates ground-cover and water (in the case of landfill or burial). Through appropriate rules it will be possible to reduce the environmental pollution from this waste. In addition, recycling the waste enables the recovery of thousands of tonnes of metals, including precious metals like nickel, cobalt and silver.

Because of the U.S. economy, numerous American businesses are laying off workers. But the truth is that numerous businesses desire to adapt to new graduates. Our analysis has demonstrated the availability of workers to get a modern school grad can not be produced precisely the death and destruction the mainstream media. Let's look at what you need to find a job at entry level.

1) You must ensure that you are in the right mindset to get a finding ofEntry-level job. You must realize that full-time "the cliché of the" old looking to get a job is real work, and try to be focused and ready to be persistent in your work. Our analysis has demonstrated the work is and you will find the right fit when they are persistent. But it is also very important that you contact the employer the right potential.

2) Although by definition, means entry level, you do not need experience, this is by far theTruth. Be sure to have some professional experience, if you desire to get an entry level position. It is desirable that you have experience in trying to get into. But how can you gain experience, if you see the first area.

3) During your study time, and your high school years in preparation for an entry level position, you should have to acquire work experience by doing some volunteer work in your area of interest. If youShow your potential employer that you really have a passion for your field of interest, there will be a much more competitive position to win at the level of employment in an entry. So hopefully at this point, you win some stage during high school and school or years, and though it might not be much, even a small amount of professional experience may be helpful.

What if you could not see, volunteering in your area of interest. You need documentation, other then the graduateddeserves that shows a potential employer that you have a passion for your area. You can write articles online, make a website, use sites like LinkedIn, ZoomInfo and Google profile. Facebook is probably not a good choice, because Facebook is like a diary, which will be opened only by people with permission. The point is that you have some online presence or documents showing your passion for your field of interest.

For those who have professional experience, make sure yourformer supervisor or manager of reference that can provide good jobs for you. If you have a competent, reliable workers with a good attitude, were then a former supervisor should have no problems regarding the provision of good jobs.

4) The next step is to write a resume or curriculum vitae, which differs from all others. The Curriculum Vitae (CV) is a detailed list of your academic performance, publications, presentations, professional activities,and honors. The CV is longer than the typical CV and can be produced up of two or more pages. A curriculum is usually only necessary if you are looking to get a faculty, analysis, clinical or scientific position. For other objects, you can create a resume.

But if you return a curriculum or should be, clearly shows the potential employers of a certain professional experience, directly away from or in connection with the work you are looking for. Includes both voluntary and unpaid work, is not on yourResume or CV. You do not need a professional to write a resume or CV for you. Today online utility that can produce a good resume or CV, and there are lots of online information on which to write.

In terms of recovery, some important points must be produced. Investigation has demonstrated that just had an interview for every 200 applications by the employer's average is granted. These data are for all levels of employment, not only for beginners. Investigation also shows thatThe application will be acquired quickly, instead of reading. Ten to 20 seconds is all the time you have to convince a potential employer to find out more. What does this mean? It 'important the most important features to you, like you, whether voluntary or involuntary job experience, have the top half of your resume.

5) When looking for businesses to send your CV, you have a list that is used by businesses that prefer to rent a large number of modern school must useGraduates. Go to 2009 Entry Level Employers that list at the top. This list includes businesses of all sizes and industries, and addresses the need for new talent, despite a difficult economic situation. At last count, the list consists of 384 businesses and offers an excellent starting point for graduates seeking employment.

In terms of number of entry-level recruitment is high on the list, Verizon Wireless, a telecommunications company. They expect to make 13 198 new recruits bythe ranks of school graduates for the year 2009. What a bad economy, not bad. The key is for businesses on the list to find the area of interest. There are businesses out there who prefer to hire graduates, and the doom and gloom the Main Stream Media will present for the general public, students of the availability of workers for the school, perhaps not as realistic as you think.

6) After you have set an excellent track record and send it toWould you take at work, you should immediately begin to prepare carefully for your interview. While you may not know the exact company that you may request an interview, almost all interviews consisting of most general questions can be found in almost all interviews. These are questions that can be prepared while waiting for the phone to ring. Doing a Google query, "as they prepare for interviews for the job" and you can easily find a list ofInterview questions.

When it comes to preparation for the interview, you should consider the work at the level of entry you look as if he were at a higher level. Prepare To prepare for your interview the same way as an oral examination. During the interview, be yourself, but try the best of who you are present.

7) Another very important point must be at work when it comes to interview in person. Why are you arecent school graduate, so you do not have a lot of work to talk about it, it is very important the interviewer is present, an enthusiastic attitude. In particular, you present yourself as someone who is hungry to learn and has a strong desire to advance within the company.

Finally, the basics of finding a voice in the world of work is the right attitude in looking for work, internships, resume and interview. The optimization of these elements leads to youSearch for career choice. While today the use and networking of the Internet results in a more efficient means to search for an item in hand, the need to optimize these basic elements has never changed and probably never when it comes to work. Good news is there are numerous businesses today that desire to hire the new graduate school. But given the current economic situation, the level of competition for job-entry is intense, and thenThe optimization of these elements is even more important.

Customer-Service-Job Counseling-Job

–>

–>

A thesis acknowledgement is included in an academic thesis paper, and its designation lies in thanking those people who have served a writer in creating the study and making an academic paper. This is an expression of gratitude to those that have presented the writer their support and help, as well as gave assistance and recommendations of major importance.

Who need to be presented this type of tribute? You may present your gratitude in your teachers, librarians, laboratory assistants, fellow college students, colleagues, or perhaps parents and friends. Nonetheless, the thesis acknowledgement isn’t meant to seem and sound like a testimonial speech at an awards ceremony. Rather, your thesis acknowledgement is a concise vote of thank you, which merely mentions those people who have been directly concerned in the thesis creation. There is also no need to say all those people who took part in the writer’s formation as being a scientist, a thinker, along with a researcher – beginning together with the nursery college teachers and parents. Only those that really served in some way together with the creation of this certain study paper need to be talked about in the thesis acknowledgement. But understand that you can’t point out only one person (for example, your Supervisor) in your thesis acknowledgement. It is recommended not to include acknowledgement page to the thesis if you have only one person to thank.

Thesis Acknowledgement Page Navigation Thesis Acknowledgement Sample
Useful Phrases for Thesis Acknowledgement
Thesis Dedication
How We Can Help
Master’s Thesis Acknowledgement
Thesis Acknowledgement Page Format

Thesis Acknowledgement Sample

When you write a thesis it involves a lot of hard work and effort. Also, you would have had many men and women helping you. It is only natural to acknowledge the people that made it possible. At the beginning of any thesis paper, after the copyright page and the dedication page, is the page of the acknowledgement.

Useful Phrases for Thesis Acknowledgement

When creating the thesis acknowledgement the writer can rely on certain generally accepted phrases which are used to express gratitude – in order for the acknowledgement not to sound too unprofessional or simple. A perfect thesis acknowledgement, as suggested by ProfEssays.com, could be something like:

It is with immense gratitude that I acknowledge the help and help of my Professor…
It gives me great pleasure in acknowledging the help and help of Professor…
I am indebted to my Professor, my parents and my classmates…
I wish to thank, first and foremost, my Professor and my parents…
I cannot find words to express my gratitude to…
This thesis would have remained a dream had it not been for…
I consider it an honor to work with…
I share the credit of my work with…
I am indebted to my many colleagues who supported me…
I would like to thank…
I owe my deepest gratitude to…
This thesis would not happen to be possible unless…

These are only a few of such phrases. The list is long; there are many ways to write thesis acknowledgements.

After you use phrases like this in your thesis acknowledgements bear in mind to specify why you are thankful to these men and women!

Thesis dedication

A thesis dedication is dedicated to someone who has played a major role in writing your thesis, in your career and in your life. It is a way of showing gratitude. You value their help and help, and want to present your appreciation by way of a thesis dedication.

ProfEssays.com can give you a few ways of writing a thesis dedication, although when you buy an essay from us you will get the works. We will help you with a dedication, an acknowledgement, bibliographies and all other things concerned in thesis writing, along together with the essay itself.

This thesis is dedicated to my parents who have presented me the opportunity of aneducation from the best institutions and help throughout my life.
This thesis is dedicated to my Professor Mr. XYZ who has been my friend, guide and philosopher.
I dedicate this thesis to my best friend who has always served me and believed that I could do it.
This thesis is dedicated to my wife and children who have always stood by me and dealt with all of my absence from many family occasions with a smile.

How We Can Help

ProfEssays.com is a professional custom essay and dissertation writing service provider. Our writing team consists of highly qualified experts from such countries as the US, UK, Canada and Australia. All of our custom papers are 100% written from scratch, fully cited and referenced. We also guarantee that your order will be completed on time.

Thesis Acknowledgement page is part of the package deal you get when you purchase a thesis from ProfEssays.com. A thesis will be designed with your specific instructions. You will only have to tell us whether you would like to have it right after the table of contents but before the Abstract, or at the end of the entire project.

We would take care and caution to settle all the nuances of your acknowledgements in a single page because, nevertheless important, your thesis need to not be made bulky by virtue of a gratifying ceremony. Writers at ProfEssays.com know that you are to be presented as being humble, but we ensure that we are not servile. As being a final assurance that you are in safe hands, we take care to place the copyright and dedication pages before the thesis acknowledgment page. ProfEssays.com is your essay writing resource to help you together with the writing of acknowledgements, dedications, indexes along together with the thesis itself.

We assure you that we would center the heading, ‘Acknowledgements,’ ensure equal margins on each side of the page, leave a four-line space below the heading. All of this really is done at lightning speed, and you would be surprised at the breathtaking prices that we offer! We are on our toes ‘round the clock to help you, so you are sure to emerge happily satisfied when you order an essay from us. See also thesis paper, thesis help or thesis online.

Being a leading website with punctuality and originality as its motto, we have grown from strength to strength and carved a niche for ourselves in the on-line essay writing industry.

ProfEssays.com writes term papers, essays, study papers, reports, admission papers, resumes, outlines and more. Whatever the subject we are effectively equipped to do it. We hand pick our writers from the best institutions, hence you can be assured of quality writing. Quality and originality is our guarantee to you.

Get professional help from ProfEssays.com, a leading essay writing resource. Since 2003, year after year, we have served hundreds of trusting college students. We believe that our clients are our strength and it is only with your help that we have grown multifold.

Writers at ProfEssays.com know that this would be recognition of the help presented to you by different men and women during your project.

We deliver all essays on time. We also undertake emergency deliveries within 8 hours. Our promptness is our strong point. We write original content, from scratch.
We assure you that all of our articles are original and creative. We offer our clients the utmost confidentiality. We charge a very reasonable price. We happen to be doing this since 2003. We have returning customers. We believe our writing experience is expressed in our popularity. We have qualified, certified writers on our panel. We have an anti-plagiarism policy, use the latest technology to check for plagiarism. We are available 24/7. ProfEssays.com offers free umpteen revisions until you are completely satisfied.

At ProfEssays.com, customer satisfaction is our priority and even comes before the monetary gains or losses we may incur. Your feedback is our stimulation to work better. Use ProfEssays.com as being a resource and get your hard work done by our experts. We are available for you at all times, day in, day out.

Master’s thesis acknowledgement

When you write a Master’s thesis, there are more men and women concerned with your work. The various departments with whom you interacted and who have stood by you have to be acknowledged. Usually a masters degree is completed over a period of 2-3 years, and so this means that you happen to be under the guidance of many professors and advisors.

A Master’s thesis acknowledgement will present your gratitude towards your professors and advisors. Apart from that the lab technicians, fellow college students and other staff of your university who have served you together with the writing, editing, drafting, design, technical and non- technical support, recommendations and guidance will also have to be acknowledged.

Thesis Acknowledgement Page Format

Usually the thesis acknowledgement page is placed after the copyright and the dedication page. The format of the thesis acknowledgement page is meant to be the same as of the entire paper – this includes the margins, headings, pagination and spacing. As for its position in the paper, it can be put before or after the abstract in the thesis, as well as at the very end of the paper, after the reference list.

A heading “Acknowledgements” in the center of the page giving in bold letters is required.
Begin your matter 4 inches below the heading.
Use gracious flowing language.
Don’t go overboard together with the gratitude. It need to be sincere.

Though it isn’t an essential part of a perfect thesis, yet a thesis acknowledgement page crafted and designed with precision and care need to leave a lasting impression on the reviewer. Just as we thank God ‘for our daily bread,’ you must present your gratitude to the people that have served you complete your theses in a separate section of your thesis. So we honor the presence of this page in the final document. This need to be a list of resources who you consulted for your study.

Your project could be a study that extended for a long time. You encountered all sorts of people that contribute to the successful completion of your thesis in their own certain way. Inside the thesis acknowledgement page of a thesis, you are sure to find an excellent opportunity to thank all of them. The list of men and women we would be thanking on your behalf  may include

Your friends and family
Your colleagues
The police department or any other public service department
The staff at the local library
Your teachers and supervisor

But bear in mind there exists no need to develop a long thesis acknowledgement, as it is meant to take no more than a single page (usually less).

The finer points of a thesis presentation is the thesis acknowledgement page, dedication page and the title page. These are as important as the thesis itself because giving credit where it’s due is very essential.

Note:ProfEssays.com is surely an outstanding custom writing company. We have over 500 expert writers with PhD and Masters level educations who are all ready to fulfill your writing needs, regardless of the academic level or study topic. Just imagine, you place the order before you go to sleep and in the morning an excellent, 100% unique essay! or term paper, written in strict accordance with your instructions by a professional writer is already in your email box! We understand the pressure college students are under to achieve high academic goals and we are ready help you because we love writing. By choosing us as your partner, you can achieve more academically and gain valuable time for your other interests. Place your order now!”

Tags: , ,

Online bill pay out large CheckFree.com explained the hijacking of its Website this month affected an estimated 160,000 men and women, a disclosure that provides the most comprehensive account nevertheless with the genuine dimensions and scope of the brazen variety of attack that experts say might grow to be much more widespread in 2009.

In a filing with Wisconsin’s Workplace of Privacy Protection, CheckFree explained at least 160,000 men and women could have visited the site throughout the nine-hour time period it was hijacked, which had redirected website visitors to a site in Ukraine. An analysis of that Ukranian site indicated that it was attempting to exploit recognized protection flaws in Adobe Acrobat and Adobe Reader, in an attempt to put in a variant with the the Gozi Trojan, which is between the most innovative password-stealing plans in use today.

CheckFree controls amongst 70 to 80 percent with the U.S. online bill pay out market place. Between the 330 sorts of expenses buyers can pay out by way of CheckFree are military credit score accounts, utility expenses, insurance payments, mortgage and loan payments.

CheckFree explained it’s got sent warning notices to about 5 million buyers that may have a very connection with CheckFree like a bill paying out agent. Between people notified by CheckFree was my editor, who occurred for being logging in to the site throughout the early early morning several hours with the attack on Dec. two. Her system didn’t get hit using the malware: She was browsing CheckFree’s site with a Mac.

One thing the organization has not disclosed — and which I have not read everywhere else nevertheless — is the fact that CheckFree’s e-mail systems also could happen to be hijacked throughout the attack.

This attack succeeded since hackers were capable to snag the credentials essential to gain access to CheckFree’s domain documents at Network Options, CheckFree’s domain registrar. The bad guys transformed CheckFree.com’s domain title system (DNS) documents to ensure any website visitors were pointed to the Ukrainian site.

But corporate e-mail systems also can be hijacked using this method, as they, too, depend on DNS settings to route incoming and outgoing e-mail. A source who is close to this investigation but who asked not to be named so as not to compromise his role shared with Security Resolve documents indicating the hijacking without a doubt affected CheckFree’s mail server DNS documents (often known as “mail exchange” or “MX” documents).

Normally, CheckFree.com’s MX documents level to mail2.checkfree.com, and mail1.checkfree.com, servers which might be assigned World wide web addresses of twelve.sixteen.164.sixty and 204.95.one hundred fifty.32, respectively.

But in accordance to servers utilised to passively keep an eye on changes to world-wide DNS documents, throughout the attack, the two of CheckFree.com’s MX documents were pointing to the same deal with in Ukraine (91.203.92.63). From a passive DNS query operate on CheckFree’s mail addresses shortly soon after the attack started:

DNS query Reply RR variety TTL Initial noticed Last seen

mail1.checkfree.com 91.203.92.63 A 7200 Tue, 02 Dec 2008
ten:sixteen:09 UTC Tue, 02 Dec 2008 ten:sixteen:09 UTC
mail2.checkfree.com 91.203.92.63 A 7200 Tue, 02 Dec 2008
ten:sixteen:sixteen UTC Tue, 02 Dec 2008 ten:sixteen:sixteen UTC

I asked CheckFree about this and they explained none of their incoming our outgoing e-mail was compromised.

“This has long been verified from reviewing the Network Options log,” explained Lori Stafford-Thomas, assistant vice president of exterior communications at Fiserv Corp., the Brookfield, Wis., parent of CheckFree. “Clients could have noticed their electronic mail to us queuing up since it couldn’t resolve to CheckFree.Com throughout this time but the electronic mail wasn’t redirected.”

That signifies that when the perpetrators of this crime didn’t intercept the e-mails routed from or destined to CheckFree.com, it’s only since the attackers failed to have the foresight to create a mail server on the Ukrainian deal with to intercept the missives. Had the attackers carried out so, they’d happen to be capable to read and reply to e-mails sent by CheckFree consumers.

Residence Help
Safety advisories Safety bulletin Flash Player update available to address safety vulnerabilities

Release date: October fifteen, 2008

Vulnerability identifier: APSB08-18

CVE range: CVE-2007-6243, CVE-2008-3873, CVE-2007-4324, CVE-2008-4401, CVE-2008-4503

Platform: All Platforms

Summary

Potential vulnerabilities have been recognized in Adobe Flash Player 9.0.124.0 and earlier that might let an attacker who efficiently exploits these possible vulnerabilities to bypass Flash Player safety controls. Adobe suggests consumers update to the most present edition of Flash Player available for their platform. Because of to the chance that these safety enhancements and changes may influence current content material, customers are recommended to critique this Adobe Developer Center article to ascertain if their content material is going to be impacted, and to begin implementing essential changes quickly to assist guarantee a seamless transition.

This update addresses the problem previously documented in Safety Advisory APSA08-08. The Flash Player ten.0.12.36 and Flash Player 9.0.151.0 updates also deal with the problems outlined in Safety Bulletins APSB08-20 and APSB08-22.

Revisions

November 17, 2008 – Bulletin up-to-date with data about the AIR one.5 update and Safety Bulletin APSB08-22
November 5, 2008 – Bulletin up-to-date with data about the Flash Player 9.0.151.0 update
October fifteen, 2008 – Bulletin very first created

Affected software versions

Adobe Flash Player 9.0.124.0 and earlier.

To confirm the Adobe Flash Player edition range, entry the About Flash Player web page, or right-click on Flash content material and pick "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.

Solution

Adobe suggests all consumers of Adobe Flash Player 9.0.124.0 and earlier versions upgrade to the newest edition ten.0.12.36 by downloading it from the Player Download Center, or by using the auto-update mechanism within the product when prompted.

For consumers who cannot update to Flash Player ten, Adobe has developed a patched edition of Flash Player 9, Flash Player 9.0.151.0, which can be downloaded from the following link.

Severity rating

Adobe categorizes this as a critical update and suggests impacted consumers upgrade to edition ten.0.12.36.

Details

Due to the chance that these safety enhancements and changes may influence current content material, customers are recommended to critique this Adobe Developer Connection article to ascertain if their content material is going to be impacted, and to begin implementing essential changes quickly to assist guarantee a seamless transition.

The Flash Player ten.0.12.36 and Flash Player 9.0.151.0 updates also deal with the problems outlined in Safety Bulletins APSB08-20 and APSB08-22.

This update addresses a possible ‘Clickjacking’ concern in Flash Player. Clickjacking is an concern in multiple web browsers that might let an attacker to lure a web browser user into unknowingly clicking on a link or dialog. This update helps prevent a Clickjacking attack on a Flash Player user’s camera and microphone. (CVE-2008-4503)

This update includes further changes to enhance Flash Player’s interpretation of cross-domain policy files. These changes could aid prevent privilege escalation attacks against web servers hosting Flash content material and cross-domain policy files. For more data, see the following section of the “Adobe Flash Player ten Safety Changes” Adobe Developer Connection article. (CVE-2007-6243)

This update introduces functionality to further mitigate a possible port-scanning concern. For more data, see the following Adobe Developer Connection article. (CVE-2007-4324)

This update introduces changes to the Clipboard API that will prevent possible ‘Clipboard attacks’. For more data, see the following section of the "Adobe Flash Player ten Safety Changes" Adobe Developer Center article. (CVE-2008-3873)

This update introduces changes to the FileReference upload and download APIs to require user interaction. For more data, see the following section of the “Adobe Flash Player ten Safety Changes” Adobe Developer Connection article. (CVE-2008-4401)

Affected software

Recommended participant update

Availability

Flash Player 9.0.124.0 and earlier

10.0.12.36

Player Download Center

Flash Player 9.0.124.0 and earlier – network distribution

10.0.12.36

Player Licensing

Flash Player 9.0.124.0 and earlier for Linux

10.0.12.36

Player Download Center

AIR one.1

AIR one.5

AIR Download Center

Flash CS4 Professional

10.0.12.36

Adobe Flash Player ten Update for Flash CS4 Professional

Flex 3

10.0.12.36

Flash Debug Player Updater

 

Acknowledgments

Adobe would like to thank Robert Hansen of SecTheory and Jeremiah Grossman of WhiteHat Safety, Eduardo Vela, Matthew Mastracci of DotSpots, and Liu Die Yu of TopsecTianRongXin for reporting the Clickjacking vulnerability and for working with us to assist protect our customers’ safety. (CVE-2008-4503)

Adobe would like to thank fukami of SektionEins for reporting the port-scanning concern. (CVE-2007-4324)

Tags: , ,

Try
PC Magazine Digital Edition:
Now Only $1.50/Month PCMag Utility Library
Subscribe for total access as well as a new file each and every month > > Free Email Newsletters
Sign Up for free email updates from PCMag: Daily news, new products, security, deals, DIY, and more > >
RSS Feeds
Get PCMag.com headlines on your desktop with RSS > > PCMag on Facebook
Connect with the PCMag Community on Facebook > > PCMag on Twitter
Follow our Editors, PCMag Coverages and blogs > >
Hands On with Windows 7’s XP Mode

The Windows 7 Release Candidate ships with a feature called Windows XP Mode (XPM) that has left longtime Windows users excited. XPM is designed to let users continue to run older XP-compatible applications, mostly special-purpose business programs, that won’t run smoothly (or won’t run at all) with Vista or Windows 7.

XPM sounds like the feature that finally kills off XP by persuading XP users to switch to Windows 7 without fear of incompatibilities.

In reality, the beta of XPM is a mixed bag of clever programming, appalling kludges, missed opportunities, and challenges to the ingenuity of even the most experienced Windows user. To be fair, however, this is indeed a beta, and we would hope quite a lot will change between now and the final release.

Microsoft designed XPM for small-business users, but I doubt that many of those users will be encouraged by the current beta, which can be downloaded, for free. Beta versions of both Microsoft Virtual Laptop and Windows XP Mode can be downloaded from http://www.microsoft.com/windows/virtual-pc/ on May 5th.

In this story I’ll describe how to setup XPM in the way that Microsoft recommends, with all its kludges and imperfections. Then I’ll describe some tips and tricks, based solely on my own experience, that will help make XPM work a bit better—tricks that Microsoft should have performed for you. Finally, I’ll talk about how the earlier versions of Apple’s OS X included a compatibility layer that got everything right that Microsoft gets wrong with XPM.

How XP Mode Is Supposed to Work
XPM lets you run older apps on the new OS by doing two things: First, XPM lets you use a brand new, improved version of Microsoft Virtual Laptop to run a complete, freely downloadable “virtual” copy of Windows XP that runs in a window that contains a Windows XP desktop—which appears in a window on the Windows 7 desktop.

Second, XPM lets you install applications into this virtual copy of Windows XP, in exactly the same way you install them in an ordinary XP setup. This means that you can run those applications seamlessly from the Windows 7 desktop, just as if they were standard Windows 7 applications. In this second “seamless” mode, you don’t see the Windows XP desktop. Instead, you see just the window that contains the XP-based application. The whole virtual Windows XP system is running invisibly in the background.

When you save a file from an application running in seamless mode under XPM, the file gets saved by default to the same Documents folder you use under Windows 7. But the seamless application runs so seamlessly that you can also save or open files on any drive or folder anywhere in your Windows 7 setup.

Whether you run Windows XP Mode as a seamless application window or a total XP desktop, you can use the Windows clipboard to transfer text and images between Windows 7 and any program that runs in XP Mode. You simply copy or cut and paste between two programs running under the two operating systems in exactly the same way you would copy or cut and paste between two programs running in the normal way under whatever Windows version you’re using now.

XPM is designed to run XP-compatible software that won’t run under Vista. This category includes, for example, older versions of Adobe’s software, such as Acrobat 7, which still works perfectly well under XP, and which cost-conscious businesses might prefer to retain rather than be forced to upgrade at a cost of hundreds of dollars per seat. Other XP-friendly products that Vista doesn’t like include older PIM applications such as my personal favorite, Instant Recall. Businesses may not want to buy new hardware either—such as printers that may have XP drivers but no drivers for Vista.

XPM runs just about any Windows software XP can run—probably the only exceptions will be a few games that detect that they’re being launched in a virtual machine and refuse to start. Unlike earlier versions of Microsoft Virtual Laptop, XPM can power USB peripherals such as cameras, MP3 players and other mobile devices, printers, and wireless network adapters. Also, unlike earlier versions of Virtual Laptop that could share only specified folders on the “host” system, XPM can access all the disks and drives used by your Windows 7 system.

Getting Started with Windows 7 XP Mode
To install XPM, you’ll need the right combination of hardware and software. Your hardware must include a CPU and motherboard that supports Hardware Virtualization Technology, sometimes known as VT-d, AMD-V, or Vanderpool. Most middle- and high-end systems sold in the past two years should be safe, but not all, and even some quad-core CPUs don’t support the necessary technology. Even if your system supports hardware virtualization, you may need to find the option in your system’s BIOS that switches it on. If you’re not certain whether your system supports Hardware Virtualization, visit this Microsoft Web page and download and run a CPU-identification utility from Intel or AMD that can tell you. The same page tells you how to switch on the necessary technology in many standard BIOSes. [[Editor’s Choice (05/06/09): We orginally reported that motherboards less than two years old should be safe, but later found that this was incorrect. We regret the error.]]

Your operating system must be Windows 7 Professional, Windows 7 Enterprise, or Windows 7 Ultimate. The currently downloadable Release Candidate installs Windows 7 Ultimate, so the RC version is ideal for testing XPM. Next, you’ll need to install a small 5MB update to the RC version, which you can find by visiting this Microsoft update page, where you can download Windows Virtual Laptop.

Finally, from the same Web page, you’ll need to download Windows XP Mode, which is a 445MB installer that expands into a 1GB virtual XP system. With both downloads, make sure to download the 32-bit or 64-bit version, depending on whether you’re running 32-bit or 64-bit Windows 7.

Your next step is to run the small Windows Virtual Laptop installer and, when prompted, restart your system. After that, you install Windows XP Mode. The installer will present you with a screen that says your XP Mode username will be “user” (you can’t change that) and prompts you to create a password. On the same dialog, you should mark a checkbox labeled “Remember credentials (recommended)” so you won’t be prompted to retype the password when XPM starts up. The next dialog will prompt you to turn on Automatic Updates, which you definitely should do, so that XPM will update itself without your intervention. Finally, after about ten minutes of background activity, a virtual Windows XP desktop will open in a window.

You’ll probably want to customize the desktop and Start Menu of your virtual XP system. For example, you’ll probably want to open the Control Panel, then Folder Options, and the View tab, and tell XP not to hide the extensions of known file types, so .DOC files will display in Explorer with the .DOC extension. You’ll probably also want to open the Display Control Panel, go to “Appearance,” then “Effects,” and turn on ClearType to smooth screen fonts.

You’ll also want to install a printer so that applications running in XPM can print to the same printer you use for Windows 7. If your printer is attached by a USB cable, all you need to do is go to the top-line menu of the virtual machine, click USB, and then click the line that reads “Attach” followed by the name of your printer. XP will need to install drivers for your printer, which you’ll provide either by inserting the installation CD that came with your printer, or by running the Internet Explorer browser in your virtual XP system, and finding, downloading, and installing the XP drivers for your printer.

&#151Next: Network Printing >

Tags: , ,