Java Runtime Environment 7 Update 11

Java software allows you to run applications called "applets" that are written in the Java programming language. These applets allow you to have a much richer experience online than simply interacting with static HTML pages.

Java Plug-in technology, included as part of the Java  Runtime Environment, Standard Edition (JRE), establishes a connection between popular browsers and the Java platform. Java allows applications to be downloaded over a network and run within a guarded sandbox. Security restrictions are easily imposed on the sandbox. Many cross platform applications also require Java to operate properly. This update includes several performance improvements.

Release notes:

Reminder
If you have disabled Java in the Java Control Panel, you will need to manually re-enable it after installing this release. You can find the check box in the Security tab of the Java Control Panel. If you have previously disabled Java Plugin in the browser, you will need to manually re-enable it after installing this release. In Firefox, you can do this in the Add Ons -> Plugin screen. In Internet Explorer, this functionality is located in Tools -> Manage Add-ons.

Bug Fixes

In addition, the following change has been made:

Default Security Level Setting Changed to High

  • The default security level for Java applets and web start applications has been increased from "Medium" to "High". This affects the conditions under which unsigned (sandboxed) Java web applications can run. Previously, as long as you had the latest secure Java release installed applets and web start applications would continue to run as always. With the "High" setting the user is always warned before any unsigned application is run to prevent silent exploitation.

Download 32-bit: Java Runtime Environment 7 Update 11 | 30.0 MB (Freeware)
Download 64-bit: Java Runtime Environment 7 Update 11 | 31.4 MB (Freeware)
Download: JavaRa 2.0
Release Notes: >> Click Here <<
View: Java Website

Report a problem with article
Previous Story

Valve: In-game store has made more money than direct Team Fortress 2 sales

Next Story

Kim Dotcom shows off Mega's file upload-download accelerator

14 Comments

Commenting is disabled on this article.

Why does there always have to be some one making a dip stick comment like this?

I'll add my own dipstick comment then.

I'd install java BEFORE I ever installed Chrome!! Unless it was SRWare Chrome, that is!!

Between this thing and flash, or Adobe Reader, I wonder which is the worst as far as insecure garbage?

I built a new computer 2 months ago and somehow managed to overlook installing Java (something I would normally do as a matter of course). Since all of the websites I commonly use (including banking) were working okay I only realised this when the recent security alert came out and I went to disable it. Obviously I've not missed having it so I don't think I'll bother installing now.

java is a great big security bug. They sooner people stop using java on websites and in standalone applications the better off we will all be.

And its taken a directive from the US government to its citizens to stop using Java, before Oracle pulled its finger out and released a fix. Oracle seem to place a very low priority on doing anything with Java. Shame they are now its owners/custodians