U.S.A.: Sorry, We’re Not Signing the ITU Treaty


The United States laid down the law on December 13, 2012: No dice, ITU.

An official statement by Terry Kramer sealed the deal, and the U.S. ambassador had this to say to those in attendance at the World Conference on International Telecommunications: “It is with a heavy heart and a sense of missed opportunities that the U.S. must communicate that it is not able to sign the agreement in the current form.”

The proposed ITU treaty revisions included many deeply troubling limitations to the Internet. If passed, the self-contained global network we know and love would become, essentially, answerable to the United Nations.

Hence, this is a big deal for the world. The U.S. and its allies drew a line in the sand, and this bold move has brought the entire summit to a screeching halt. For those who need a little refresher course, let’s look at what exactly the ITU is, who’s fighting back, and what all this means for the future of the Web.

The ITU Conference: What’s Going On

The International Telecommunication Union (ITU) is one part of the United Nations. Its just wrapped up a meeting hosted in Dubai, and almost 2,000 delegates from all over the globe were in attendance. The core goal of the meeting was to revise the International Telecommunication Regulations (ITRs). This treaty has been around since the 1980s, and according to a May 2012 Vanity Fair article, “The sprawling document, which governs telephone, television, and radio networks, may be extended to cover the Internet, raising questions about who should control it, and how.”

That grim forecast played out just as predicted in Dubai. A few countries offered up proposals that would allow the UN sweeping new power to regulate the Internet. However, the United States and its allies fiercely opposed such a plan. In fact, U.S. Ambassador Terry Kramer has been speaking out publicly against the inclusion of an Internet provision in the treaty even before the conference began.
According to Kramer in a recent briefing, “[The] U.S. cannot sign revised telecommunications regulations in their current form.” He went onto note, “[The] ITR should be a high-level document, and the scope of treaty does not extend to the Internet.” [Source: u-s-announces-will-not-sign-itu-treaty-period-7000008769/">ZDNet.com]

Kramer also pointed out, the “world community is at a crossroads of its collective view of the Internet. … [The] US will continue to uphold and advance the multi-stakeholder model of Internet governance. … The Internet has given the world unimaginable economic and social benefits during these past 24 years – all without UN regulation.”
The U.S. and its allies essentially have taken the stance that the private sector and the government-free Internet at large have a say in this matter as well, and it’s not the UN’s place to dabble with the architecture of the Web.

The Future of the Free and Open Internet

Governments were not the only ones opposing the proposed ITU treaty revisions. Internet companies went to bat to fight the proposal as well, and Google was of course the most vocal (and influential) of the bunch.
Anyone remember Google’s very public protest against the SOPA/ PIPA bills earlier this year? The search giant is the ultimate champion of a free and open Internet. Yes, Google’s motives may stem from self-interest (and money), but it is nevertheless impressive to see a private company fight so adamantly for freedom. G even set up a special page on its own domain to inform the public about the dangers of the proposed revisions to the existing treaty:

Image 1:

Image 2:



Google’s rallying cry was perhaps an influential factor in the decision of the US and its allies to oppose the signing. According to Google, the proposed changes to the ITU treaty had the potential to increase censorship and threaten innovation as we know it on the Web. In fact, some of the suggested proposals would have even permitted oppressive governments to censor legitimate speech or, even worse, allow them to cut off Internet access entirely.

Google pointed out that other proposals involved requiring services like YouTube, Facebook, and Skype to pay brand new “tolls” simply to reach people across national borders.
The worst part about all of this was the secrecy with which the talks took place. The treaty and proposals were all kept very hush-hush, and we the people did not get a vote. Luckily, the U.S. and its allies stepped up and did the right thing. For now, the free and open Internet is safe. For now.

This doesn’t mean we’re out of the woods yet – expect plenty more wars like this one to play out more frequently as the years wear on. It’s up to the citizens of the world to make their voices heard to protect this beautiful virtual society of ours, the one we’ve all worked so hard to build together.
Read More >>

Iran Stages Cyber Warfare Drill Alongside Hormuz Naval Exercise



Iranian forces have conducted a cyber-warfare drill for the first time as their naval forces conducts major exercises in the Strait of Hormuz, testing a brand new air defense missile system.

The Iranian navy has staged a cyber-attack against the computer network of its defene forces in order to simulate a hack or a virus infiltration of a foreign aggressor, the English language Iran Daily reported, quoting Rear Admiral Amir Rastegari.

The Rear Admiral continued that the fake cyber-attack was successfully blocked by Iranian forces.

Tehran has developed military and civil cyber units in the past few years to counter cyber-attacks on its nuclear sites, oil and industrial facilities, its communications network and banking systems.

Tehran has allegedly been attacked by the Fame, Stuxnet and Gauss viruses, which managed to gather sensitive information about Iranian equipment and have hampered the work of its nuclear centrifuges. The US and Israel have been tacitly implicated in the virus attacks.


Naval exercises are also taking place in the Strait of Hormuz and the Gulf of Oman, which Iranian military officials have stressed are for showing off the country’s “defensive naval capabilities and sending a message of peace and friendship to regional countries.”

Several submarine based missiles were tested during the attack, according to Iranian media sources. These included an Iranian made air defence system called Raad, or Thunder and domestically produced hovercraft.

Iran says the Raad system is more advanced than the Russian one it replaced and can knock out fighter jets, cruise missiles and drones at a height of up to 23 km.


Tehran has been trying to build up a self-sufficient military in particular its navy since 1992,as Iran believes any future conflict will be fought on the sea and in the air.

The drills come at the same time as the West is increasing pressure on Iran over its nuclear program which it suspects is aimed at producing a bomb. Iran insists it is purely for the peaceful production of electricity.

The west has slapped sanctions on Iran for its nuclear program which they maintain is for the production of nuclear weapons. The west argues that imposing sanctions will make it harder for Iran to acquire the money and materials to develop a bomb. Iran has threatened to retaliate by closing the Strait of Hormuz.

December 31, 2012

Read More >>

Revealed: The Internet’s Biggest Security Hole


Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.

The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination.

The demonstration is only the latest attack to highlight fundamental security weaknesses in some of the internet’s core protocols. Those protocols were largely developed in the 1970s with the assumption that every node on the then-nascent network would be trustworthy.  The world was reminded of the quaintness of that assumption in July, when researcher Dan Kaminsky disclosed a serious vulnerability in the DNS system. Experts say the new demonstration targets a potentially larger weakness.

"It’s a huge issue. It’s at least as big an issue as the DNS issue, if not bigger," said Peiter "Mudge" Zatko, noted computer security expert and former member of the L0pht hacking group, who testified to Congress in 1998 that he could bring down the internet in 30 minutes using a similar BGP attack, and disclosed privately to government agents how BGP could also be exploited to eavesdrop. "I went around screaming my head about this about ten or twelve years ago…. We described this to intelligence agencies and to the National Security Council, in detail."

The man-in-the-middle attack exploits BGP to fool routers into re-directing data to an eavesdropper’s network.

Anyone with a BGP router (ISPs, large corporations or anyone with space at a carrier hotel) could intercept data headed to a target IP address or group of addresses. The attack intercepts only traffic headed to target addresses, not from them, and it can’t always vacuum in traffic within a network — say, from one AT&T customer to another.

The method conceivably could be used for corporate espionage, nation-state spying or even by intelligence agencies looking to mine internet data without needing the cooperation of ISPs.
BGP eavesdropping has long been a theoretical weakness, but no one is known to have publicly demonstrated it until Anton "Tony" Kapela, data center and network director at 5Nines Data, and Alex Pilosov, CEO of Pilosoft, showed their technique at the recent DefCon hacker conference. The pair successfully intercepted traffic bound for the conference network and redirected it to a system they controlled in New York before routing it back to DefCon in Las Vegas.

The technique, devised by Pilosov, doesn’t exploit a bug or flaw in BGP. It simply exploits the natural way BGP works.

"We’re not doing anything out of the ordinary," Kapela told Wired.com. "There’s no vulnerabilities, no protocol errors, there are no software problems. The problem arises (from) the level of interconnectivity that’s needed to maintain this mess, to keep it all working."

The issue exists because BGP’s architecture is based on trust. To make it easy, say, for e-mail from Sprint customers in California to reach Telefonica customers in Spain, networks for these companies and others communicate through BGP routers to indicate when they’re the quickest, most efficient route for the data to reach its destination. But BGP assumes that when a router says it’s the best path, it’s telling the truth. That gullibility makes it easy for eavesdroppers to fool routers into sending them traffic.

Here’s how it works. When a user types a website name into his browser or clicks "send" to launch an e-mail, a Domain Name System server produces an IP address for the destination. A router belonging to the user’s ISP then consults a BGP table for the best route. That table is built from announcements, or "advertisements," issued by ISPs and other networks — also known as Autonomous Systems, or ASes — declaring the range of IP addresses, or IP prefixes, to which they’ll deliver traffic.

The routing table searches for the destination IP address among those prefixes. If two ASes deliver to the address, the one with the more specific prefix "wins" the traffic. For example, one AS may advertise that it delivers to a group of 90,000 IP addresses, while another delivers to a subset of 24,000 of those addresses. If the destination IP address falls within both announcements, BGP will send data to the narrower, more specific one.

To intercept data, an eavesdropper would advertise a range of IP addresses he wished to target that was narrower than the chunk advertised by other networks. The advertisement would take just minutes to propagate worldwide, before data headed to those addresses would begin arriving to his network.
The attack is called an IP hijack and, on its face, isn’t new.

But in the past, known IP hijacks have created outages, which, because they were so obvious, were quickly noticed and fixed. That’s what occurred earlier this year when Pakistan Telecom inadvertently hijacked YouTube traffic from around the world. The traffic hit a dead-end in Pakistan, so it was apparent to everyone trying to visit YouTube that something was amiss.

Pilosov’s innovation is to forward the intercepted data silently to the actual destination, so that no outage occurs.

Ordinarily, this shouldn’t work — the data would boomerang back to the eavesdropper. But Pilosov and Kapela use a method called AS path prepending that causes a select number of BGP routers to reject their deceptive advertisement. They then use these ASes to forward the stolen data to its rightful recipients.
"Everyone … has assumed until now that you have to break something for a hijack to be useful," Kapela said. "But what we showed here is that you don’t have to break anything. And if nothing breaks, who notices?"

Stephen Kent, chief scientist for information security at BBN Technologies, who has been working on solutions to fix the issue, said he demonstrated a similar BGP interception privately for the Departments of Defense and Homeland Security a few years ago.

Kapela said network engineers might notice an interception if they knew how to read BGP routing tables, but it would take expertise to interpret the data.

A handful of academic groups collect BGP routing information from cooperating ASes to monitor BGP updates that change traffic’s path. But without context, it can be difficult to distinguish a legitimate change from a malicious hijacking. There are reasons traffic that ordinarily travels one path could suddenly switch to another — say, if companies with separate ASes merged, or if a natural disaster put one network out of commission and another AS adopted its traffic. On good days, routing paths can remain fairly static. But "when the internet has a bad hair day," Kent said, "the rate of (BGP path) updates goes up by a factor of 200 to 400."

Kapela said eavesdropping could be thwarted if ISPs aggressively filtered to allow only authorized peers to draw traffic from their routers, and only for specific IP prefixes. But filtering is labor intensive, and if just one ISP declines to participate, it "breaks it for the rest of us," he said.

"Providers can prevent our attack absolutely 100 percent," Kapela said. "They simply don’t because it takes work, and to do sufficient filtering to prevent these kinds of attacks on a global scale is cost prohibitive."
Filtering also requires ISPs to disclose the address space for all their customers, which is not information they want to hand competitors.

Filtering isn’t the only solution, though. Kent and others are devising processes to authenticate ownership of IP blocks, and validate the advertisements that ASes send to routers so they don’t just send traffic to whoever requests it.

Under the scheme, the five regional internet address registries would issue signed certificates to ISPs attesting to their address space and AS numbers. The ASes would then sign an authorization to initiate routes for their address space, which would be stored with the certificates in a repository accessible to all ISPs. If an AS advertised a new route for an IP prefix, it would be easy to verify if it had the right to do so.
The solution would authenticate only the first hop in a route to prevent unintentional hijacks, like Pakistan Telecom’s, but wouldn’t stop an eavesdropper from hijacking the second or third hop.

For this, Kent and BBN colleagues developed Secure BGP (SBGP), which would require BGP routers to digitally sign with a private key any prefix advertisement they propagated. An ISP would give peer routers certificates authorizing them to route its traffic; each peer on a route would sign a route advertisement and forward it to the next authorized hop.

"That means that nobody could put themselves into the chain, into the path, unless they had been authorized to do so by the preceding AS router in the path," Kent said.
The drawback to this solution is that current routers lack the memory and processing power to generate and validate signatures. And router vendors have resisted upgrading them because their clients, ISPs, haven’t demanded it, due to the cost and man hours involved in swapping out routers.

Douglas Maughan, cybersecurity research program manager for the DHS’s Science and Technology Directorate, has helped fund research at BBN and elsewhere to resolve the BGP issue. But he’s had little luck convincing ISPs and router vendors to take steps to secure BGP.

"We haven’t seen the attacks, and so a lot of times people don’t start working on things and trying to fix them until they get attacked," Maughan said. "(But) the YouTube (case) is the perfect example of an attack where somebody could have done much worse than what they did."
ISPs, he said, have been holding their breath, "hoping that people don’t discover (this) and exploit it."
"The only thing that can force them (to fix BGP) is if their customers … start to demand security solutions," Maughan said.

(Image: Alex Pilosov (left) and Anton "Tony" Kapela demonstrate their technique for eavesdropping on internet traffic during the DefCon hacker conference in Las Vegas earlier this month.
(Wired.com/Dave Bullock)
Read More >>

Hack Obtains 9 Bogus Certificates for Prominent Websites; Traced to Iran

In a fresh blow to the fundamental integrity of the internet, a hacker last week obtained legitimate web certificates that would have allowed him to impersonate some of the top sites on the internet, including the login pages used by Google, Microsoft and Yahoo e-mail customers.

The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo Group, which he used to request eight SSL certificates for six domains: mail.google.com, www.google.com, login.yahoo.com, login.skype.com, addons.mozilla.org and login.live.com.

The certificates would have allowed the attacker to craft fake pages that would have been accepted by browsers as the legitimate websites. The certificates would have been most useful as part of an attack that redirected traffic intended for Skype, Google and Yahoo to a machine under the attacker’s control. Such an attack can range from small-scale Wi-Fi spoofing at a coffee shop all the way to global hijacking of internet routes.

At a minimum, the attacker would then be able to steal login credentials from anyone who entered a username and password into the fake page, or perform a “man in the middle” attack to eavesdrop on the user’s session.

Comodo CEO Melih Abdulhayoglu calls the breach the certificate authority’s version of the Sept. 11 terror attacks.

“Our own planes are being used against us in the C.A. [certificate authority] world,” Abdulhayoglu told Threat Level in an interview. “We have to up the bar and react to these new threat models. This untrusted DNS infrastructure cannot be what drives the internet going forward. If DNS was trusted, none of this would have been an issue.”

Comodo says the attacker was well prepared, and appeared to have a list of targets at the ready when he logged into the company’s system and began requesting certificates.
In addition to the bogus certificates, the attacker created a ninth certificate for a domain of his own under the name “Global Trustee,” according to Abdulhayoglu.

Abdulhayoglu says the attack has all the markings of a state-sponsored intrusion rather than a criminal attack.
“We deal with [cybercriminals] all day long,” he said. But “there are zero footprints of cybercriminals here.”

“If you look at all these domains, every single one of them are communications-related,” he continued. “My personal opinion is that someone is trying to read people’s e-mail communications. [But] the only way for this attack to work [on a large scale] is if you have access to the DNS infrastructure. The certificates on their own are no use, unless they have access to the DNS infrastructure itself, which a state would.”

Though he acknowledges that the attack could have originated anywhere, and been routed through Iranian servers as a proxy, he says Iranian president Mahmoud Ahmadinejad’s regime is the obvious suspect.
Out of the nine fraudulent certificates the hacker requested, only one — for Yahoo — was found to be active. Abdulhayoglu said Comodo tracked it, because the attackers had tried to test the certificate using a second Iranian IP address.

All of the fraudulent certificates have since been revoked, and Mozilla, Google and Microsoft have issued updates to their Firefox, Chrome and Internet Explorer browsers to block any websites from using the fraudulent certificates.

Comodo came clean about the breach this week, after security researcher Jacob Appelbaum noticed the updates to Chrome and Firefox and began poking around. Mozilla persuaded Appelbaum to withhold public disclosure of the information until the situation with the certificates could be resolved, which he agreed to do.
Abdulhayoglu told Threat Level that his company first learned of the breach from the partner that was compromised.

The attacker had compromised the username and password of a registration authority, or R.A., in southern Europe that had been a Comodo Trusted Partner for five or six years, he said. Registration authorities are entities that are authorized to issue certificates after conducting a due-diligence check to determine that the person or entity seeking the certificate is legitimate.

“We have certain checks and balances that alerted the R.A. [about the breach], which brought it to our attention,” he said. “Within hours we were alerted to it, and within hours we revoked everything.”
It’s not the first time that the integrity of web certificates has come into question.

Security researcher Moxie Marlinspike showed in 2009 how a vulnerability in the way that web certificates are issued by authorities and authenticated by web browsers would allow an attacker to impersonate any trusted website with a legitimately issued certificate.

Photo: Iranian President Mahmoud Ahmadinejad gestures as he talks at a 2006 news conference. (Misha Japaridze/AP)
Read More >>

Google Discovers Fraudulent Digital Certificate Issued for Its Domain

Santa wasn’t the only one sneaking around on Christmas Eve this year. Google says that someone was caught trying to use an unauthorized digital certificate issued in its name in an attempt to impersonate Google.com for a man-in-the-middle attack.

Google revealed in a blog post Thursday that its Chrome web browser detected the certificate being used late on the evening of Dec. 24 and immediately blocked it.
The unauthorized certificate was created after a Trusted Root certificate authority in Turkey, Turktrust, issued intermediate Certificate Authority certificates to two entities last year that should not have received them. Turktrust told Google that it issued the two CA certificates by mistake, inadvertently giving the two entities certificate authority status.

With CA status, the two entities could then generate digital certificates, like a trusted certificate authority, for any domain. These digital certificates could then be misused to intercept traffic intended for that domain in order to steal log-in credentials or read communication.
Google did not identify the two entities who were issued CA certificates, but Microsoft identified them in a blog post as *.EGO.GOV.TR, a Turkish government agency that operates buses and other public transportation in that country, and http://e-islam.kktcmerkezbankasi.org, a domain that does not currently resolve to anything.

The unauthorized Google.com certificate was generated under the *.EGO.GOV.TR certificate authority and was being used to man-in-the-middle traffic on the *.EGO.GOV.TR network. Google’s spokesman said the unauthorized Google certificate was created sometime in early December, fourteen months after Turktrust issued the CA certificate to *.EGO.GOV.TR.

The *.google.com certificate, a so-called wild-card certificate, would have allowed whoever was using it to intercept and read any communication that passed from users on the *.EGO.GOV.TR network to any google.com domain, including encrypted Gmail traffic.

Google engineers have updated Chrome’s revocation list to block any other unauthorized certificates that might have been issued by the two companies. Google also notified Microsoft and Mozilla so that they could update their browsers to block certificates from these companies. Mozilla said in a blog post that it was also suspending Turktrust from inclusion in its trusted root certificate list pending further investigation into how the mixup occurred.

This is at least the third time that a fraudulent certificate for Google has been issued. In 2011, a hacker was able to trick a certificate authority in Europe, Comodo Group, into issuing him fraudulent certificates for domains belonging to Google, Microsoft and Yahoo.

A couple of months later, intruders broke into the network of Dutch certificate authority DigiNotar and were able to issue themselves more than 200 fraudulent certificates, including one for Google.

Read More >>

Apple said to be eyeing new display tech for next iPhone

Apple's use of the so-called "in-cell" touch technology in the iPhone 5 could be short-lived, according to a new report that claims the company is already eyeing alternatives for its next iPhone model.
Citing supply chain rumors, The China Times (translation) says Apple is currently evaluating technology called Touch On Display from Innolux, the company formerly named Chimei Innolux which Apple last year listed as one of its component suppliers.

The reason for the change, the report claims, is due to interference with the current in-cell technology where both the display and touch are embedded in the same panel. By comparison, the Touch On technology offers "good" touch sensitivity with minimal thickness, something that's become increasingly import as mobile phones get thinner.

Display technology has been a major feature of the iPhone since Apple's first model, which at 3.5-inches was considerably larger than most competing smartphones when it was released. Apple later increased the pixel density while keeping the 3.5-inch size, technology it called the Retina Display. That same technology ended up on the iPad and high-end versions of Apple's MacBook Pro notebooks.

The display continues to be one of the most expensive parts of the iPhone. A virtual teardown by IHS iSuppli in September estimated the combined display and touch screen to cost Apple $44, putting it well ahead of the components for wireless antennas, NAND flash memory, and the A-series processor.
Rumors have swirled in recent weeks that Apple is preparing an intermediary upgrade to the iPhone 5 for release as soon as this spring. Alleged shots of its rear casing cropped up last month on a French technology blog that's been known to get accurate shots of Apple components in the past. Topeka Capital Markets analyst Brian White this week said that he expects the company to roll out a "5S" model in May or June with "more color patterns and screen sizes," similar to what Apple offers on its latest iPod Touch models.

Read More >>

Google protects Internet search recipe while agreeing to other changes to end antitrust probe

SAN FRANCISCO — Google has settled a U.S. government probe into its business practices without making any major concessions on how the company runs its Internet search engine, the world’s most influential gateway to digital information and commerce.
Thursday’s agreement with the Federal Trade Commission covers only some of the issues raised in a wide-ranging antitrust investigation that could have culminated in a regulatory crackdown that re-shapes Internet search, advertising and mobile computing.


But that didn’t happen, to the relief of Google and technology trade groups worried about overzealous regulation discouraging future innovation. The resolution disappointed consumer rights groups and Google rivals such as Microsoft Corp., which had lodged complaints with regulators in hopes of legal action that would split up or at least hobble the Internet’s most powerful company.
Google is still trying to settle a similar antitrust probe in Europe. A resolution to that case is expected to come within the next few weeks.

After a 19-month investigation, Google Inc. placated the FTC by signing a consent decree requiring the company to charge “fair, reasonable and non-discriminatory” prices to license hundreds of patents deemed essential to the operations of mobile phones, tablet computers, laptops and video game consoles.
The requirement is meant to ensure that Google doesn’t use patents acquired in last year’s $12.4 billion purchase of Motorola Mobility to thwart competition from mobile devices running on software other than Google’s Android system. The products vying against Android include Apple Inc.’s iPhone and iPad, Research in Motion Ltd.’s BlackBerry and Microsoft’s Windows software.

Google also promised to exclude, upon request, snippets copied from other websites in capsules of key information shown in response to search requests. The company had insisted the practice is legal under the fair-use provisions of U.S. copyright law. Nonetheless, even before the settlement, Google already had scaled back on the amount of cribbing, or “scraping,” of online content after business review site Yelp Inc. lodged one of the complaints that triggered the FTC investigation in 2011.

In another concession, Google pledged to adjust the online advertising system that generates most of its revenue so marketing campaigns can be more easily managed on rival networks.

Google, though, prevailed in the pivotal part of the investigation, which delved into complaints that the Internet search leader has been highlighting its own services on its influential results page while burying links to competing sites. For instance, requests for directions may turn up Google Maps first, queries for video might point to the company’s own site, YouTube, and searches for merchandise might route users to Google Shopping.

Although the FTC said it uncovered some obvious instances of bias in Google’s results during the investigation, the agency’s five commissioners unanimously concluded there wasn’t enough evidence to take legal action.

Google protects Internet search recipe while agreeing to other changes to end antitrust probe

Federal Trade Commission (FTC) Chairman Jon Leibowitz speaks during a news conference at FTC in Washington, Thursday, Jan. 3, 2013, to announce that Google is agreeing to license certain patents to mobile phone rivals and stop a practice of including snippets from other websites in its search results as part of a settlement to end a 19-month investigation in the search leader’s business practices.


“Undoubtedly, Google took aggressive actions to gain advantage over rival search providers,” said Beth Wilkinson, a former federal prosecutor that the FTC hired to help steer the investigation. “However, the FTC’s mission is to protect competition, and not individual competitors.”

Two consumer rights groups lashed out at the FTC for letting Google off too easily.

 Read More >>

How To Run Java On Windows 8


Temporary Solution For Running Java SE Runtime Environment On All Version Of Windows 8,
Both x86 (32 bits)
&
x64 (64 bits) Systems


From past experience it seems that Java SE Runtime Environment Does Not Properly Works On Windows 8 Operating System. Here I will provide a simple solution that works.

First, Please Remote ALL Other Versions Of Java Installed On Your System Then Reboot Your System.

Second, Download Java SE Windows x86 Offline (jre-6u38-windows-i586.exe) For 32 Bits (x86)
For 64 Bits (x64 System)

Then Reboot Your Computer & That Should Work!

Please Note: 
DO NOT Update Java SE Runtime Environment Until There Is A Working, Stable Version For Windows 8.

Hope It Helps, Paid Technical Support Is Also Available For This & Many Other Issues

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More