{"version":"1.0","provider_name":"CompuClever","provider_url":"https:\/\/www.compuclever.com\/posts","author_name":"Andy Thompson","author_url":"https:\/\/www.compuclever.com\/posts\/author\/yida\/","title":"Java - The Hacked - CompuClever","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"LJSApFD5ZD\"><a href=\"https:\/\/www.compuclever.com\/posts\/java-the-hacked\/\">Java &#8211; The Hacked<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.compuclever.com\/posts\/java-the-hacked\/embed\/#?secret=LJSApFD5ZD\" width=\"600\" height=\"338\" title=\"&#8220;Java &#8211; The Hacked&#8221; &#8212; CompuClever\" data-secret=\"LJSApFD5ZD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"We explore in this article a contentious subject - Java. There are those that are very insistent that the benefits of Java do not outweigh the fact that this very popular technology and widely-used tool is a target for hackers and virus makers and they are exploiting it. However, it is because of the widespread use of Java on devices and web pages that makes it a target for hackers. As a result security flaws have been exploited and patches are created in an attempt to keep up with security. First, this article will describe what Java is and where it is used. Some examples of recent security exploits are provided, and then we will offer some solutions and recommendations.","thumbnail_url":"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/1_java-300x190.jpg"}