Powered by Deep Web Technologies
Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

2

V-196: Microsoft Security Bulletin Advance Notification for July 2013  

Energy.gov (U.S. Department of Energy (DOE))

Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada).

3

U-124: Microsoft Security Bulletin Advance Notification for March 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24: Microsoft Security Bulletin Advance Notification for March 24: Microsoft Security Bulletin Advance Notification for March 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 March 14, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is

4

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

5

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

6

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

7

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

8

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

9

U-164: Microsoft Security Bulletin Advance Notification for May 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

64: Microsoft Security Bulletin Advance Notification for May 64: Microsoft Security Bulletin Advance Notification for May 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 May 8, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address

10

U-103: Microsoft Security Bulletin Advance Notification for February 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: Microsoft Security Bulletin Advance Notification for 03: Microsoft Security Bulletin Advance Notification for February 2012 U-103: Microsoft Security Bulletin Advance Notification for February 2012 February 15, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for February 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for February 2012. Microsoft has posted 6 Critical Bulletins and 5 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a

11

U-078: Microsoft Security Bulletin Advance Notification for January 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

78: Microsoft Security Bulletin Advance Notification for January 78: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical Bulletins and 6 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on January 11, 2012, at 11:00 AM Pacific Time (US & Canada).

12

U-057: Microsoft Security Bulletin Advance Notification for December 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Microsoft Security Bulletin Advance Notification for 57: Microsoft Security Bulletin Advance Notification for December 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 December 9, 2011 - 12:00pm Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2011. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

13

T-645: Microsoft Security Bulletin Advance Notification | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification 5: Microsoft Security Bulletin Advance Notification T-645: Microsoft Security Bulletin Advance Notification June 13, 2011 - 3:45pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on June 14, 2011. PLATFORM: Windows Operating System and Components, Microsoft Office Suites and Software, Microsoft Server Software, Microsoft Developer Tools and Software and Microsoft Security Software ABSTRACT: Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any

14

T-717: Microsoft Security Bulletin Summary for September 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Security Bulletin Summary for September 2011 7: Microsoft Security Bulletin Summary for September 2011 T-717: Microsoft Security Bulletin Summary for September 2011 September 14, 2011 - 9:30am Addthis PROBLEM: Summary of Microsoft security bulletins released on September 13, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Summary for September 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: CVE-2011-1984 - MS11-070 WINS Local Elevation of Privilege Vulnerability CVE-2011-1991 - MS11-071 Windows Components Insecure Library Loading Vulnerability CVE-2011-1986 - MS11-072 Excel Use after Free WriteAV Vulnerability CVE-2011-1987 - MS11-072 Excel Out of Bounds Array Indexing Vulnerability

15

T-620: Microsoft Security Bulletin Advance Notification for May 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-620: Microsoft Security Bulletin Advance Notification for May T-620: Microsoft Security Bulletin Advance Notification for May 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011 May 10, 2011 - 7:00am Addthis PROBLEM: Microsoft released 2 bulletins to address vulnerabilities involving Microsoft Windows Server and Microsoft Office. This Microsoft Bulletin contains 1 Critical vulnerability and 1 Important vulnerability which require a restart after the applied patches. PLATFORM: Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2, Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based

16

U-145: Microsoft Security Bulletin Summary for April 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Summary for April 2012 5: Microsoft Security Bulletin Summary for April 2012 U-145: Microsoft Security Bulletin Summary for April 2012 April 11, 2012 - 9:30am Addthis PROBLEM: Microsoft Security Bulletin Summary for April 2012 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, ABSTRACT: Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). reference LINKS: Microsoft Security Bulletin Security Bulletin Summary Archive

17

V-108: Microsoft Security Bulletin Advance Notification for March 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for March 8: Microsoft Security Bulletin Advance Notification for March 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 March 11, 2013 - 12:46am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

18

V-042: Microsoft Security Bulletin Advance Notification for December 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Security Bulletin Advance Notification for 2: Microsoft Security Bulletin Advance Notification for December 2012 V-042: Microsoft Security Bulletin Advance Notification for December 2012 December 7, 2012 - 3:30am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems,

19

V-130: Microsoft Security Bulletin Advance Notification for April 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Microsoft Security Bulletin Advance Notification for April 0: Microsoft Security Bulletin Advance Notification for April 2013 V-130: Microsoft Security Bulletin Advance Notification for April 2013 April 10, 2013 - 12:18am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for April 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

20

V-108: Microsoft Security Bulletin Advance Notification for March 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for March 8: Microsoft Security Bulletin Advance Notification for March 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 March 11, 2013 - 12:46am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-235: Microsoft Security Bulletin Advance Notification for August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for August 5: Microsoft Security Bulletin Advance Notification for August 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 August 14, 2012 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for August 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

22

U-278: Microsoft Security Bulletin Advance Notification for October 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for October 8: Microsoft Security Bulletin Advance Notification for October 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 October 10, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for October 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

23

U-209: Microsoft Security Bulletin Advance Notification for July 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Security Bulletin Advance Notification for July 9: Microsoft Security Bulletin Advance Notification for July 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 July 10, 2012 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

24

V-175: Microsoft Security Bulletin Advance Notification for June 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for June 5: Microsoft Security Bulletin Advance Notification for June 2013 V-175: Microsoft Security Bulletin Advance Notification for June 2013 June 11, 2013 - 12:12am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

25

U-235: Microsoft Security Bulletin Advance Notification for August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for August 5: Microsoft Security Bulletin Advance Notification for August 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 August 14, 2012 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for August 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

26

U-278: Microsoft Security Bulletin Advance Notification for October 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for October 8: Microsoft Security Bulletin Advance Notification for October 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 October 10, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for October 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

27

U-256: Microsoft Security Bulletin Advance Notification for September 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Security Bulletin Advance Notification for 6: Microsoft Security Bulletin Advance Notification for September 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 September 11, 2012 - 6:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for September 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

28

V-042: Microsoft Security Bulletin Advance Notification for December 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Security Bulletin Advance Notification for 2: Microsoft Security Bulletin Advance Notification for December 2012 V-042: Microsoft Security Bulletin Advance Notification for December 2012 December 7, 2012 - 3:30am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems,

29

U-256: Microsoft Security Bulletin Advance Notification for September 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Security Bulletin Advance Notification for 6: Microsoft Security Bulletin Advance Notification for September 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 September 11, 2012 - 6:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for September 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

30

V-064: Microsoft Security Bulletin Advance Notification for January 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft Security Bulletin Advance Notification for January 4: Microsoft Security Bulletin Advance Notification for January 2013 V-064: Microsoft Security Bulletin Advance Notification for January 2013 January 8, 2013 - 1:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

31

U-189: Microsoft Security Bulletin Advance Notification for June 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Security Bulletin Advance Notification for June 9: Microsoft Security Bulletin Advance Notification for June 2012 U-189: Microsoft Security Bulletin Advance Notification for June 2012 June 13, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

32

V-154: Microsoft Security Bulletin Advance Notification for May 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft Security Bulletin Advance Notification for May 4: Microsoft Security Bulletin Advance Notification for May 2013 V-154: Microsoft Security Bulletin Advance Notification for May 2013 May 13, 2013 - 12:47am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

33

V-023: Microsoft Security Bulletin Advance Notification for November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Advance Notification for 3: Microsoft Security Bulletin Advance Notification for November 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 November 13, 2012 - 2:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for November 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

34

U-209: Microsoft Security Bulletin Advance Notification for July 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

209: Microsoft Security Bulletin Advance Notification for July 209: Microsoft Security Bulletin Advance Notification for July 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 July 10, 2012 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

35

V-023: Microsoft Security Bulletin Advance Notification for November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Advance Notification for 3: Microsoft Security Bulletin Advance Notification for November 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 November 13, 2012 - 2:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for November 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

36

U-189: Microsoft Security Bulletin Advance Notification for June 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Microsoft Security Bulletin Advance Notification for June 89: Microsoft Security Bulletin Advance Notification for June 2012 U-189: Microsoft Security Bulletin Advance Notification for June 2012 June 13, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

37

V-130: Microsoft Security Bulletin Advance Notification for April 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Microsoft Security Bulletin Advance Notification for April 30: Microsoft Security Bulletin Advance Notification for April 2013 V-130: Microsoft Security Bulletin Advance Notification for April 2013 April 10, 2013 - 12:18am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for April 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

38

U-033: Microsoft Security Bulletin Summary for November 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Summary for November 2011 3: Microsoft Security Bulletin Summary for November 2011 U-033: Microsoft Security Bulletin Summary for November 2011 November 10, 2011 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Summary for November 2011. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems

39

U-009:Microsoft Security Bulletin Summary for October 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09:Microsoft Security Bulletin Summary for October 2011 09:Microsoft Security Bulletin Summary for October 2011 U-009:Microsoft Security Bulletin Summary for October 2011 October 12, 2011 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Summary for October 2011 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2. ABSTRACT: Microsoft released 8 bulletins to address vulnerabilities. This Microsoft bulletin contains 2 critical vulnerabilities. reference LINKS: Microsoft Security Bulletin Summary for October 2011 Security Bulletin Summary October Archive IMPACT ASSESSMENT: High Discussion: For more details regarding the Microsoft October 2011 bulletins, please see follow link for CVE details. You can find more information located under the "Affected Software and Download Locations" section using the following

40

V-088: Microsoft Security Bulletin Advance Notification for February 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for 8: Microsoft Security Bulletin Advance Notification for February 2013 V-088: Microsoft Security Bulletin Advance Notification for February 2013 February 11, 2013 - 12:27am Addthis PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-190: Microsoft Security Bulletin MS12-037 - Critical | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Microsoft Security Bulletin MS12-037 - Critical 0: Microsoft Security Bulletin MS12-037 - Critical U-190: Microsoft Security Bulletin MS12-037 - Critical June 13, 2012 - 3:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-037 - Critical PLATFORM: Internet Explorer 8.x ABSTRACT: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. LINKS: Microsoft Security Bulletin MS12-037 - Critical Secunia Advisory SA49412 IMPACT ASSESSMENT: High Discussion: The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who

42

U-032: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Microsoft Security Bulletin Windows TCP/IP MS11-083 - 32: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical U-032: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical November 9, 2011 - 1:00pm Addthis PROBLEM: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems

43

U-127: Microsoft Security Bulletin MS12-020 - Critical | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-127: Microsoft Security Bulletin MS12-020 - Critical U-127: Microsoft Security Bulletin MS12-020 - Critical U-127: Microsoft Security Bulletin MS12-020 - Critical March 16, 2012 - 9:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-020 - Critical PLATFORM: Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2, Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows 7 for x64-based Systems Service

44

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

45

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024...

46

T-724: Microsoft Security Advisory: Fraudulent digital certificates...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing...

47

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 17, 2012 October 17, 2012 V-004: Oracle Critical Patch Update Advisory - October 2012 October 2012 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. October 16, 2012 V-003: Suse Update For Mozillafirefox - Critical An update that fixes 25 vulnerabilities is now available. October 12, 2012 V-001: Mozilla Security vulnerabilities Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities October 10, 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 Microsoft Security Bulletin Advance Notification for October 2012. Microsoft has posted 1 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of

48

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15, 2012 15, 2012 U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target August 14, 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 Microsoft Security Bulletin Advance Notification for August 2012. Microsoft has posted 5 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on August 15, 2012, at 11:00 AM Pacific Time (US & Canada). August 14, 2012 U-234: Oracle MySQL User Login Security Bypass Vulnerability

49

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on March

50

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12, 2012 12, 2012 U-146: Adobe Reader/Acrobat Multiple Vulnerabilities Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive information, and compromise a user's system. April 11, 2012 U-145: Microsoft Security Bulletin Summary for April 2012 Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). April 10, 2012 U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site

51

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2013 11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets July 10, 2013 V-196: Microsoft Security Bulletin Advance Notification for July 2013 Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada). July 9, 2013 V-195: RSA Authentication Manager Lets Local Users View the Administrative

52

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-127: Microsoft Security Bulletin MS12-020 - Critical Vulnerabilities in Remote Desktop Could Allow Remote Code Execution March 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability

53

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13, 2013 13, 2013 V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 11, 2013 V-175: Microsoft Security Bulletin Advance Notification for June 2013 Microsoft Security Bulletin Advance Notification for June 2013. Microsoft has posted 1 Critical Bulletin and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" June allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on June 12, 2013, at 11:00 AM

54

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13, 2011 13, 2011 T-645: Microsoft Security Bulletin Advance Notification Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any detection tools relevant to the updates. June 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the

55

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2012 11, 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12, 2012, at 11:00 AM Pacific Time (US & Canada). September 11, 2012 U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Apache Wicket September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities

56

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12, 2011 12, 2011 U-058: Apache Struts Conversion Error OGNL Expression Injection Vulnerability Apache Struts Conversion Error OGNL Expression Injection Vulnerability. December 9, 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada). December 8, 2011 U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

57

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

58

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 13, 2012 September 13, 2012 U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code RSA BSAFE SSL-C Multiple Vulnerabilities September 12, 2012 U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code A remote user can cause arbitrary code to be executed on the target user's system. September 11, 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12,

59

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 10, 2012 July 10, 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 Microsoft Security Bulletin Advance Notification for July 2012. Microsoft has posted 3 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on July 11, 2012, at 11:00 AM Pacific Time (US & Canada). July 10, 2012 U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system July 2, 2012 U-203: HP Photosmart Bug Lets Remote Users Deny Service A vulnerability was reported in HP Photosmart. A remote user can cause

60

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23, 2011 23, 2011 T-586: Microsoft Advisory about fraudulent SSL Certificates Microsoft Advisory about fraudulent SSL Certificates. March 22, 2011 T-585: Mac OS X v10.6.7 Security Update 2011-001 Mac OS Update: Mac OS 10.6.7 fixes multiple vulnerabilities in the following release. This update can be installed on non-startup volumes, but you should only do this if the current startup volume has already been updated to Mac OS X Server v10.6.7. The simplest way to avoid issues from an improper installation is to start up from the volume that you wish to update. March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2013 January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 10, 2013 V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat January 9, 2013 V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code Security updates available for Adobe Flash Player January 8, 2013 V-064: Microsoft Security Bulletin Advance Notification for January 2013 Microsoft Security Bulletin Advance Notification for January 2013 . Microsoft has posted 2 Critical Bulletins and 5 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of

62

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2011 11, 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. July 8, 2011 T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker. July 7, 2011

63

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc | Department...  

Office of Environmental Management (EM)

Microsoft Word - SMailSecureWeb-BasedEmailv3 2.doc Microsoft Word - SMailSecureWeb-BasedEmailv3 2.doc Instructions for Using Secure Email via Outlook Web Access More...

64

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2012 19, 2012 V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability November 16, 2012 V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions Two vulnerabilities were reported in RSA Data Protection Manager. November 15, 2012 V-025: Bugzilla Multiple Cross Site Scripting and Information Disclosure Vulnerabilities Bugzilla Multiple Vulnerabilities November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice November 13, 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 Microsoft Security Bulletin Advance Notification for November 2012. Microsoft has posted 4 Critical Bulletins and 1 Important Bulletins.

65

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2012 10, 2012 U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. May 9, 2012 U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. May 8, 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may

66

White Paper: CA and Microsoft for Interoperable, Secure Web Business  

E-Print Network (OSTI)

White Paper: CA and Microsoft for Interoperable, Secure Web Business Enablement Author: Dave, and improve outreach to business partners and customers. This white paper reviews how solutions from CA (CA SiteMinder, CA Federation Manager) and Microsoft (Active Directory Federation Services (formerly code

Narasayya, Vivek

67

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user can redirect users to arbitrary sites. Solution: The vendor has issued a fix. A patch matrix is available in the vendor's advisory. Microsoft Security Bulletin MS11-100...

68

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 19, 2013 March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 15, 2013 V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. March 14, 2013 V-111: Multiple vulnerabilities have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. March 11, 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 Microsoft Security Bulletin Advance Notification for March 2013. Microsoft

69

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2011 14, 2011 T-717: Microsoft Security Bulletin Summary for September 2011 Microsoft Security Bulletin Summary for September 2011. September 14, 2011 T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 13, 2011 T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. September 12, 2011 T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 8, 2011

70

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

71

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

72

T-688: McAfee Security Bulletin - McAfee SaaS Endpoint Protection...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

on the target user's system. PLATFORM: Endpoint Protection 5.2.1 and prior versions ABSTRACT: McAfee Security Bulletin - McAfee SaaS Endpoint Protection update fixes multiple...

73

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

74

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

75

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 11, 2011 April 11, 2011 T-599: Microsoft April 2011 Security Bulletin Release Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. April 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle

76

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to...

77

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to...

78

V-133: Microsoft pulls Patch Tuesday security fix | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft pulls Patch Tuesday security fix 3: Microsoft pulls Patch Tuesday security fix V-133: Microsoft pulls Patch Tuesday security fix April 14, 2013 - 6:00am Addthis PROBLEM: Microsoft pulls Patch Tuesday security fix PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

79

V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Microsoft Windows NAT Driver ICMP Packet Handling Denial of 7: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability August 14, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in the Windows NAT Driver PLATFORM: Windows Server 2012 ABSTRACT: This security update resolves a vulnerability in the Windows NAT Driver in Microsoft Windows REFERENCE LINKS: Secunia Advisory SA54420 Security Tracker ID 1028909 Microsoft Security Bulletin MS13-064 CVE-2013-3182 IMPACT ASSESSMENT: Medium DI SCUSSION: The vulnerability is caused due to an error within the Windows NAT Driver when handling ICMP packets and can be exploited to cause the system to stop responding IMPACT: Denial of Service SOLUTION: Vendor has released a security update

80

U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

36: Microsoft JScript and VBScript Engine Integer Overflow Lets 36: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code August 15, 2012 - 7:00am Addthis PROBLEM: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 5.8 ABSTRACT: Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target REFERENCE LINKS: technet.microsoft.com/en-us/security/bulletin/ms12-056 http://www.securitytracker.com/id/1027392 CVE-2012-2523 Impact assessment: Medium Discussion: Vulnerability was reported in Microsoft JScript and VBScript. A remote user can cause arbitrary code to be executed on the target user's system. A

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Microsoft Word - LLNL Security Clearances Final 121108a _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Clearances at Lawrence Livermore National Laboratory and Sandia National Laboratory-California INS-O-09-01 December 2008 U.S. Department of Energy Office of Inspector General Office of Inspections and Special Inquiries Inspection Report Department of Energy Washington, DC 2 0 5 8 5 December 11, 2008 MEMORAliDUM FOR ADMINISTRATQR, NATIONAL NUCLEAR SECURITY ADMINISTRATION CHIEF HEALTH: SAFETY AbD, SECURITY OFFICER FROM: Christopher R. Sharpley . Deputy hlspector General for investigations and h~spections - , . - " SUBJECT: INFORMATION: inspection Report on "Security Clearances at Lawrence Livemore National Laboratory and Sandia National Laboratory-California" BACKGROUND Department of Energy facilities, including those managed by the National Nuclear Security

82

Microsoft Word - Critical Infrastructure Security and Resilience Month.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of the Press Secretary For Immediate Release October 31, 2013 Presidential Proclamation -- Critical Infrastructure Security and Resilience Month, 2013 CRITICAL INFRASTRUCTURE SECURITY AND RESILIENCE MONTH, 2013 - - - - - - - BY THE PRESIDENT OF THE UNITED STATES OF AMERICA A PROCLAMATION Over the last few decades, our Nation has grown increasingly dependent on critical infrastructure, the backbone of our national and economic security. America's critical infrastructure is complex and diverse, combining systems in both cyberspace and the physical world -- from power plants, bridges, and interstates to Federal buildings and the massive electrical grids that power our Nation. During Critical Infrastructure Security and Resilience Month, we

83

Microsoft Word - Data Classification Security Framework V5.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

888P Unlimited Release Printed July 2007 Security Framework for Control System Data Classification and Protection Bryan T. Richardson and John Michalski Prepared by Sandia National...

84

Microsoft Word - NSTB_AMI_SecurityConsiderationsV4.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SANDIA REPORT SAND2007-7327 Unlimited Release Printed November 2007 Advanced Metering Infrastructure Security Considerations Raymond C. Parks Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Advanced Metering Infrastructure Security Considerations 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

85

Microsoft Word - SecureFuelsReport2011_DRAFT2.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secure Fuels from Domestic Secure Fuels from Domestic Resources ______________________________________________________________________________ Profiles of Companies Engaged in Domestic Oil Shale and Tar Sands Resource and Technology Development Prepared by INTEK, Inc. For the U.S. Department of Energy * Office of Petroleum Reserves Naval Petroleum and Oil Shale Reserves Fifth Edition: September 2011 5 th Edition Secure Fuels From Domestic Resources ii September 2011 Fifth Edition Note to Readers Regarding the Revised Edition (September 2011) This report was originally prepared for the U.S. Department of Energy in June 2007. The report and its contents

86

Microsoft Word - Data Classification Security Framework V5.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

888P 888P Unlimited Release Printed July 2007 Security Framework for Control System Data Classification and Protection Bryan T. Richardson and John Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Security Framework for Control System Data Classification and Protection 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

87

Microsoft Word - Security_Group_Minutes_041806_Final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/2006 1 5/2006 1 TEC Security Topic Group Tuesday, April 18, 2006 11:00 a.m. to 12:00 p.m. EST Group Chair: Alexander Thrower, DOE/OCRWM Participants: Bob Halstead, Nevada Agency for Nuclear Projects; Pricilla Bumbaca, DOE/OCRWM; Scott Field, Western Interstate Energy Board; Angela Kordyak and Martha Crosland, DOE/OGC; Rick McDermott, South Carolina Law Enforcement Division; John Giarusso, Council of State Governments - Northeast; James McNeill, Rob Patrick, and Bruce Kynaston, California Highway Patrol; Larry Stern, Commercial Vehicle Safety Alliance; Sarah Wochos, Frank Moussa, and Don Flater, Council of State Governments - Midwest; and Aubrey Godwin, Arizona Radiation Regulatory Agency. DOE support contractors also participated on the call.

88

Microsoft Word - Security_Group_Minutes_022106_Final _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3/2006 1 3/2006 1 U. S. Department of Energy (DOE) Transportation External Coordination Working Group (TEC) Security Topic Group Conference Call February 21, 2006 Group Chair: Alex Thrower, DOE/OCRWM Participants: Larry Stern, Commercial Vehicle Safety Alliance; Aubrey Godwin, Arizona Radiation Regulatory Agency; Bill Reese, Idaho State Police; Steve Schnoebelen and James McNeill, California Highway Patrol; Bob Fronczak, Association of American Railroads; Lisa Janairo, Don Flater, and Tim Runyon, Council of State Governments (CSG)-Midwest; Jim Baranski and Ed Wilds, CSG- Northeast; Harry Hopes, CSX; Scott Field, Western Interstate Energy Board; Christian Einberg, DOE/OCRWM; Conrad Smith, CSG - Eastern Regional Office; Bob Halstead, Nevada Agency for Nuclear Projects; and Helena Zyblikewycz, AFL-CIO.

89

Microsoft Word - 08-02-06 Security Lessons Learned TEC Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, Final 1 DOE Spent Nuclear Fuel Transportation: Lessons Learned from Security Planning and Execution OCRWM has reviewed lessons learned from past high visibility Spent Nuclear...

90

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 13, 2012 June 13, 2012 U-190: Microsoft Security Bulletin MS12-037 - Critical This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. June 12, 2012 U-188: MySQL User Login Security Bypass and Unspecified Vulnerability An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. June 11, 2012 U-187: Adobe Flash Player Multiple Vulnerabilities Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an

91

Microsoft Word - 08-02-06 Security Lessons Learned TEC Security Topic Group.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, Final 6, Final 1 DOE Spent Nuclear Fuel Transportation: Lessons Learned from Security Planning and Execution OCRWM has reviewed lessons learned from past high visibility Spent Nuclear Fuel (SNF) and other radioactive material shipping campaigns. The objective was to identify trends and commonalities from past DOE shipping campaigns, which could be considered when planning for the development and operation of a national transportation system to fulfill requirements of the Nuclear Waste Policy Act (NWPA). The study examined specific planning, business, institutional and operating practices that have been identified by DOE, its transportation contractors, and stakeholders as important issues that arise repeatedly. In addition, lessons learned or activities/actions which were found not to be

92

2011 Microsoft Corporation. All rights reserved. Reposting of content without explicit permission is forbidden.  

E-Print Network (OSTI)

with the familiarity of a Microsoft Office experience; consolidated intranet sites; secure and simplified business

Hunt, Galen

93

U-034: Fraudulent Digital Certificates Could Allow Spoofing ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar U-033: Microsoft Security Bulletin Summary for November 2011 V-133: Microsoft pulls Patch Tuesday security fix...

94

Microsoft Word - Security CC 8-17-06 _9-07-06_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Other Topics of Interest to the STG from the Work Plan Obtain guidance from OCRWM security and licensing offices on what materials can be developed for the security...

95

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 16, 2011 May 16, 2011 T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks The software does not properly filter HTML code from user-supplied input before displaying the input. May 13, 2011 T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user. May 10, 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011

96

Microsoft Word - Social Media Security Guidelines-v01-A.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidelines for Secure Use of Social Media by Guidelines for Secure Use of Social Media by Federal Departments and Agencies Information Security and Identity Management Committee (ISIMC) Network and Infrastructure Security Subcommittee (NISSC) Web 2.0 Security Working Group (W20SWG) Version 1.0 September 2009 This document is publicly releasable Guidelines for Secure Use of Social Media by Federal Departments and Agencies Page 2 Intended Audience This document is intended as guidance for any federal agency that uses social media services to collaborate and communicate among employees, partners, other federal agencies, and the public. Note: The Federal CIO Council does not endorse the use or imply preference for any vendor commercial products or services mentioned in this document.

97

Microsoft Word - OPC Security WP 3 _Version 1-3c_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

intrinsically secure intrinsically secure po box 178 #5 - 7217 Lantzville rd lantzville, bc canada v0r 2h0 office 250.390.1333 fax 250.390.3899 www.byressecurity.com Digital Bond suite 130 1580 sawgrass corp pkwy sunrise, FL 33323 office 954.315.4633 www.digitalbond.com OPC Security Whitepaper #3 Hardening Guidelines for OPC Hosts PREPARED BY: Digital Bond British Columbia Institute of Technology Byres Research November 13, 2007 OPC Security WP 3 (Version 1-3c).doc OPC Security Whitepaper #3 Hardening Guidelines for OPC Hosts OPC Security WP 3 (Version 1-3c).doc ii November 2007 Revision History Revision Date Authors Details 0.7 May 15, 2006 E. Byres, M Franz, Draft internal review version 1.0 May 31, 2006 E. Byres, J. Carter, M Franz Draft for controlled public review

98

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UCAIUG: AMI-SEC-ASAP UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents. 5 6 This document provides substantial supporting information for the use of these requirements 7 including scope, context, constraints, objectives, user characteristics, assumptions, and 8

99

JC3 Bulletin Archive  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bulletin-archive Office of bulletin-archive Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-237: TYPO3 Security Bypass Vulnerabilities http://energy.gov/cio/articles/v-237-typo3-security-bypass-vulnerabilities security-bypass-vulnerabilities" class="title-link">V-237: TYPO3 Security Bypass Vulnerabilities

100

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Microsoft Word - Security Topic Group Notes 3-14-06.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Notes from Security Topic Group Meeting Notes from Security Topic Group Meeting March 14, 2006 Alex Thrower (OCRWM/ONT) welcomed the attendees to the Security Topic Group meeting and introduced new participants. He then initiated a brief discussion of two documents that had been submitted to members for review and comment - the current version of the Topic Group Workplan and the minutes from the most recent (February 21, 2006) conference call. He indicated that some comments had already been received and incorporated and he welcomed any additional comments. Mr. Thrower discussed the issue of security clearances within the TEC context. He acknowledged that there is a basic tension between the concept of TEC as an open forum and some security-related topics; however, he reiterated DOE's position that TEC will remain an

102

Microsoft Word - Secure ICCP Implementation Rpt SAND format V5.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

345 345 Unlimited Release Printed June 2007 Secure ICCP Integration Considerations and Recommendations John T. Michalski, Andrew Lanzone, Jason Trent, and Sammy Smith Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Secure ICCP Integration Considerations and Recommendations 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the

103

Microsoft Word - Security TG Work Plan 8-7-06.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2006 7/2006 Page 1 of 5 WORK PLAN FOR THE DOE TEC SECURITY TOPIC GROUP (STG) Status: Active DOE Leads: Office of Civilian Radioactive Waste Management (OCRWM), Office of Logistics Management (OLM), Alex Thrower Start Date: September 21, 2004 Purpose: The purpose of the Security Topic Group (STG) is to assist the Office of Civilian Radioactive Waste Management (OCRWM) in developing an approach for effective safeguards and security of nuclear waste shipments to Yucca Mountain, Nevada. This approach will incorporate best practices and lessons learned from previous domestic and international nuclear waste shipments, with special emphasis on substantive contributions from the State, Tribal, and local governments that will be involved in these shipments.

104

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Bulletin Summary for September 2011. September 14, 2011 T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability Google SketchUp v8.x - '.DAE' File...

105

Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability under Contract DE-AC05-76RL01830 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned

106

Microsoft Word - PNNL-17116 PNNL_Securing_WAMS_final no ouo.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 6 Securing Wide Area Measurement Systems M.D. Hadley J.B. McBride T.W. Edgar L.R. O'Neil J.D. Johnson June 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability under Contract DE-AC05-76RL01830 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned

107

Security  

Energy.gov (U.S. Department of Energy (DOE))

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

108

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41 - 18950 of 28,905 results. 41 - 18950 of 28,905 results. Article U-103: Microsoft Security Bulletin Advance Notification for February 2012 Microsoft Security Bulletin Advance Notification for February 2012. Microsoft has posted 6 Critical Bulletins and 5 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on February 15, 2012, at 11:00 AM Pacific Time (US & Canada). http://energy.gov/cio/articles/u-103-microsoft-security-bulletin-advance-notification-february-2012 Article U-209: Microsoft Security Bulletin Advance Notification for July 2012 Microsoft Security Bulletin Advance Notification for July 2012. Microsoft

109

T-586: Microsoft Advisory about fraudulent SSL Certificates | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

586: Microsoft Advisory about fraudulent SSL Certificates 586: Microsoft Advisory about fraudulent SSL Certificates T-586: Microsoft Advisory about fraudulent SSL Certificates March 23, 2011 - 3:05pm Addthis PROBLEM: Microsoft just released an advisory alerting its customers that a total of 9 certificates were issued using the leaked/stolen CA certificated from Comodo. PLATFORM: These certificates affect the following Web properties: login.live.com mail.google.com www.google.com login.yahoo.com (3 certificates) login.skype.com addons.mozilla.org "Global Trustee" ABSTRACT: Microsoft Advisory about fraudulent SSL Certificates. reference LINKS: Microsoft Security Advisory: 2524375 ISC 2011-03-23 Security updates IMPACT ASSESSMENT: High Discussion: Microsoft is aware of nine fraudulent digital certificates issued by Comodo, a certification authority present in the Trusted Root Certification

110

JC3 Bulletin Archive | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Bulletin Archive Bulletin Archive JC3 Bulletin Archive RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 6, 2013 V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability A vulnerability has been reported in the CentralAuth extension for MediaWik that allows people to bypass certain security restrictions September 5, 2013 V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously A vulnerability was reported in Cisco Mobility Services Engine where a remote user can login anonymously. September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

111

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

112

Reporting with Microsoft Excel  

Science Journals Connector (OSTI)

Excel is Microsofts frontline reporting software. Starting originally as a commercial spreadsheet application, it has become much more.

Randal Root; Caryn Mason

2012-01-01T23:59:59.000Z

113

Safety Bulletin  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bulletin Bulletin Offtce 01 Health. Safety and Sa<:urtty Events Beyond Design Safety Basis Analysis No. 2011-01 PURPOSE This Safety Alert provides information on a safety concern related to the identification and mitigation of events that may fall outside those analyzed in the documented safety analysis. BACKGROUND On March 11 , 2011 , the Fukushima Daiichi nuclear power station in Japan was damaged by a magnitude 9.0 earthquake and the subsequent tsunami. While there is still a lot to be learned from the accident · about the adequacy of design specifications and the equipment failure modes, reports from the Nuclear Regulatory Commission (NRC) have identified some key aspects of the operational emergency at the Fukushima Daiichi nuclear power station.

114

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

115

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

116

JC3 Medium Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

medium-impact-assessment-bulletins medium-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-237: TYPO3 Security Bypass Vulnerabilities http://energy.gov/cio/articles/v-237-typo3-security-bypass-vulnerabilities security-bypass-vulnerabilities" class="title-link">V-237: TYPO3 Security Bypass Vulnerabilities

117

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007  

E-Print Network (OSTI)

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007 FUTURE THREATS John.maurushat@unsw.edu.au ABSTRACT `Aren't you just giving the virus writers ideas?' Research into future security threats begin to examine how far security research can go in terms of looking at future threats, particularly

Aycock, John

118

Imperial Valley Campus Bulletin  

E-Print Network (OSTI)

Imperial Valley Campus Bulletin 2011­2012 #12;#12;BULLETIN THE IMPERIAL VALLEY CAMPUS 2011-2012 SAN 2011-2012 It is with great pleasure that we present the 2011- 2012 Bulletin of the Imperial Valley higher education to the students of Imperial Valley. During this time we have evolved from an institution

Gallo, Linda C.

119

T-547: Microsoft Windows Human Interface Device (HID) Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

547: Microsoft Windows Human Interface Device (HID) Vulnerability 547: Microsoft Windows Human Interface Device (HID) Vulnerability T-547: Microsoft Windows Human Interface Device (HID) Vulnerability February 1, 2011 - 3:20am Addthis PROBLEM Microsoft Windows Human Interface Device (HID) Vulnerability. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. reference LINKS: Security Lab: Reference CVE-2011-0638 CVE Details: Reference CVE-2011-0638 Mitre Reference: CVE-2011-0638

120

E-Print Network 3.0 - analytical resources securely Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Computational Science Collection: Mathematics 28 ITL BULLETIN FOR OCTOBER 2010 CYBER SECURITY STRATEGIES FOR THE SMART GRID: PROTECTING THE Summary: Standards, Release 1.0....

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

122

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 27, 2011 September 27, 2011 T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. September 22, 2011 T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing Microsoft has released a Microsoft security advisory about this issue for IT professionals. September 21, 2011 T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target

123

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18, 2013 18, 2013 V-137: Apple Mac OS X update for Java Apple has issued an update for Java for Mac OS X April 17, 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 Several vulnerabilities addressed in this Critical Patch Update affect multiple products April 16, 2013 V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. April 15, 2013 V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. April 14, 2013 V-133: Microsoft pulls Patch Tuesday security fix Microsoft has recommended that an update released in the latest Patch Tuesday be removed, after users reported incidents of the "blue screen of

124

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2013 14, 2013 V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability This security update resolves a vulnerability in the Windows NAT Driver in Microsoft Windows August 12, 2013 V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 7, 2013 V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities

125

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

126

JC3 Medium Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks September 3, 2013 V-233: Red Hat update for JBoss Fuse This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS. August 28, 2013 V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

127

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

128

U-182: Microsoft Windows Includes Some Invalid Certificates | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

82: Microsoft Windows Includes Some Invalid Certificates 82: Microsoft Windows Includes Some Invalid Certificates U-182: Microsoft Windows Includes Some Invalid Certificates June 4, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Microsoft Windows. A remote user may be able to spoof code signing signatures. PLATFORM: Version(s): XP SP3, 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1; and prior service packs ABSTRACT: The operating system includes some invalid intermediate certificates. The vulnerability is due to the certificate authorities and not the operating system itself. Reference Links: Security tracker ID 1027114 GENERIC-MAP-NOMATCH Vendor Advisory IMPACT ASSESSMENT: High Discussion: The invalid certificates and their thumbprints are: Microsoft Enforced Licensing Intermediate PCA: 2a 83 e9 02 05 91 a5 5f c6

129

Monthly Project Bulletin: July 2012  

Energy.gov (U.S. Department of Energy (DOE))

This document contains the Guidelines for Home Energy Professionals Project bulletin for the month of July 2012.

130

Monthly Project Bulletin: August 2012  

Energy.gov (U.S. Department of Energy (DOE))

This document contains the Guidelines for Home Energy Professionals Project bulletin for the month of August 2012.

131

Monthly Project Bulletin: October 2012  

Energy.gov (U.S. Department of Energy (DOE))

This document contains the Guidelines for Home Energy Professionals Project bulletin for the month of September 2012.

132

Monthly Project Bulletin: April 2012  

Energy.gov (U.S. Department of Energy (DOE))

This document contains the Guidelines for Home Energy Professionals Project bulletin for the month of April 2012.

133

Monthly Project Bulletin: June 2012  

Energy.gov (U.S. Department of Energy (DOE))

This document contains the Guidelines for Home Energy Professionals Project bulletin for the month of June 2012.

134

Monthly Project Bulletin: May 2012  

Energy.gov (U.S. Department of Energy (DOE))

This document contains the Guidelines for Home Energy Professionals Project bulletin for the month of May 2012.

135

Monthly Project Bulletin: September 2012  

Energy.gov (U.S. Department of Energy (DOE))

This document contains the Guidelines for Home Energy Professionals Project bulletin for the month of September 2012.

136

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 15600 of 28,905 results. 91 - 15600 of 28,905 results. Article U-078: Microsoft Security Bulletin Advance Notification for January 2012 Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical Bulletins and 6 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on January 11, 2012, at 11:00 AM Pacific Time (US & Canada). http://energy.gov/cio/articles/u-078-microsoft-security-bulletin-advance-notification-january-2012 Event National Gay and Lesbian Pride Month The story of America's Lesbian, Gay, Bisexual, and Transgender (LGBT) community is the story of our fathers and sons, our mothers and daughters,

137

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01 - 20410 of 28,905 results. 01 - 20410 of 28,905 results. Article V-042: Microsoft Security Bulletin Advance Notification for December 2012 Microsoft Security Bulletin Advance Notification for December 2012. Microsoft has posted 5 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on December 12, 2012, at 11:00 AM Pacific Time (US & Canada). http://energy.gov/cio/articles/v-042-microsoft-security-bulletin-advance-notification-december-2012 Article Top 10 Things You Didn't Know About Concentrating Solar Power Sharing our top facts tied to one the most important players in the

138

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

139

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

140

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. September 26, 2011 T-726:Linux-2.6 privilege escalation/denial of service/information leak Vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. September 23, 2011 T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. September 22, 2011 T-724: Microsoft Security Advisory: Fraudulent digital certificates could

142

Microsoft Word - test | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

test Microsoft Word - test Microsoft Word - test More Documents & Publications Interested Parties - WAPA Public Comment InterestedPartiesCOPSCoWAPA040309.pdf Microsoft Word -...

143

Final Information Quality Bulletin for Peer Review | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Final Information Quality Bulletin for Peer Review Final Information Quality Bulletin for Peer Review Final Information Quality Bulletin for Peer Review Final Information Quality...

144

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS June 28, 2013 V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability The vulnerability addresses the possibility of a heap overflow condition June 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 19, 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 Multiple vulnerabilities were reported in Oracle Java. June 14, 2013 V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and

145

Sustainability Bulletin Clothing Collection  

E-Print Network (OSTI)

Sustainability Bulletin April 2014 #12;Upcoming Clothing Collection March 3-April 14 Hunter Lovins on Wednesday, April 23rd from 11am-2pm brought to you by EAP and the Office of Environmental Sustainability will be in the Campus Center Ballroom to highlight other aspects of well-being such as health, nutrition, sustainability

Kidd, William S. F.

146

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 6, 2012 November 6, 2012 V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities Two vulnerabilities were reported in Apache Tomcat October 23, 2012 V-008: Debian Security Advisory Debian update for bind9 October 22, 2012 V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service). October 18, 2012 V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users

147

Alternative Fuels Data Center: Technology Bulletins  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Technology Bulletins Technology Bulletins to someone by E-mail Share Alternative Fuels Data Center: Technology Bulletins on Facebook Tweet about Alternative Fuels Data Center: Technology Bulletins on Twitter Bookmark Alternative Fuels Data Center: Technology Bulletins on Google Bookmark Alternative Fuels Data Center: Technology Bulletins on Delicious Rank Alternative Fuels Data Center: Technology Bulletins on Digg Find More places to share Alternative Fuels Data Center: Technology Bulletins on AddThis.com... Technology Bulletins The Alternative Fuels Data Center provides technology bulletins to inform transportation industry decision makers about technological breakthroughs, issues, and news about alternative fuels and advanced vehicles. For more information, read: E15 Approved for Use in 2001 and Newer Vehicles Updated 2/11

148

Bulletin of the Metchnikoff Institute of the Ukraine  

Science Journals Connector (OSTI)

... THE Metchnikoff Institute of the Ukraine has commenced the issue of a monthly bulletin (Bulletin de Vlnstitut Metchnikoff) devoted in ...

1936-08-29T23:59:59.000Z

149

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

150

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

151

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

152

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

153

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 1, 2011 March 1, 2011 T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. February 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 25, 2011 T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow

154

SRS - 2004 Environmental Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

4 Environmental Bulletins 4 Environmental Bulletins All documents in PDF and require Adobe Acrobat Reader January 7, 2004 Volume 15; Number 1 January 8, 2004 Volume 15; Number 2 February 5. 2004 Volume 15; Number 3 February 11, 2004 Volume 15; Number 4 February 23, 2004 Volume 15; Number 5 February 27, 2004 Volume 15; Number 6 March 17, 2004 Volume 15; Number 7 March 18, 2004 Volume 15; Number 8 April 5, 2004 Volume 15; Number 9 April 7, 2004 Volume 15; Number 10 April 19, 2004 Volume 15; Number 11 April 30, 2004 Volume 15; Number 12 June 1, 2004 Volume 15; Number 13 June 14, 2004 Volume 15; Number 14 June 22, 2004 Volume 15; Number 15 July 13, 2004 Volume 15; Number 16 August 9, 2004 Volume 15; Number 17 August 23, 2004 Volume 15; Number 18 September 1, 2004 Volume 15; Number 19

155

SRS - Environmental Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Environmental Bulletins 1 Environmental Bulletins All documents in PDF and require Adobe Acrobat Reader December 26, 2011 Volume 23; Number 31 November 14, 2011 Volume 23; Number 30 October 31, 2011 Volume 23; Number 29 October 25, 2011 Volume 23; Number 28 October 21, 2011 Volume 23; Number 27 September 26, 2011 Volume 23; Number 26 September 22, 2011 Volume 23; Number 25 September 14, 2011 Volume 23; Number 24 September 12, 2011 Volume 23; Number 23 August 29, 2011 Volume 23; Number 22 August 29, 2011 Volume 23; Number 21 August 03, 2011 Volume 23; Number 20 June 27, 2011 Volume 23; Number 19 June 23, 2011 Volume 23; Number 18 June 20, 2011 Volume 23; Number 17 May 25, 2011 Volume 23; Number 16 May 19, 2011 Volume 23; Number 15 April 20, 2011 Volume 23; Number 14 April 15, 2011 Volume 23; Number 13

156

SRS - 2003 Environmental Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

3 Environmental Bulletins 3 Environmental Bulletins All documents in PDF and require Adobe Acrobat Reader January 22, 2003 Volume 14; Number 1 February 6, 2003 Volume 14; Number 2 February 7, 2003 Volume 14; Number 3 February 10, 2003 Volume 14; Number 4 February 17, 2003 Volume 14; Number 5 March 10, 2003 Volume 14; Number 6 April 7, 2003 Volume 14, Number 7 April 28, 2003 Volume 14, Number 8 May 9, 2003 Volume 14; Number 9 May 14, 2003 Volume 14, Number 10 June 9, 2003 Volume 14, Number 11 June 24, 2003 Volume 14, Number 13 June 25, 2003 Volume 14, Number 14 July 21, 2003 Volume 14; Number 17 July 21, 2003 Volume 14; Number 18 August 8, 2003 Volume 14; Number 19 August 7, 2003 Volume 14; Number 20 August 11, 2003 Volume 14; Number 21 August 28, 2003 Volume 14; Number 22 September 4, 2003 Volume 14; Number 23

157

SRS - 2002 Environmental Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

2 Environmental Bulletins 2 Environmental Bulletins All documents in PDF and require Adobe Acrobat Reader January 15, 2002 Volume 13; Number 1 February 7, 2002 Volume 13; Number 2 February 28, 2002 Volume 13; Number 3 March 4, 2002 Volume 13; Number 4 March 6, 2002 Volume 13; Number 5 April 5, 2002 Volume 13; Number 6 April 10, 2002 Volume 13; Number 7 April 18, 2002 Volume 13; Number 8 June 7, 2002 Volume 13; Number 9 June 10, 2002 Volume 13; Number 10 June 18, 2002 Volume 13; Number 11 July 8, 2002 Volume 13; Number 12 September 4, 2002 Volume 13; Number 14 September 25, 2002 Volume 13; Number 15 October 7, 2002 Volume 13; Number 16 October 25, 2002 Volume 13; Number 17 November15, 2002 Volume 13; Number 18 December 5, 2002 Volume 13; Number 19 December 16, 2002 Volume 13; Number 20

158

SRS - 2006 Environmental Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

6 Environmental Bulletins 6 Environmental Bulletins All documents in PDF and require Adobe Acrobat Reader December 1, 2006 Volume 17; Number 24 November 24, 2006 Volume 17; Number 23 November 15, 2006 Volume 17; Number 22 November 3, 2006 Volume 17; Number 21 October 16, 2006 Volume 17; Number 20 September 18, 2006 Volume 17; Number 19 August 23, 2006 Volume 17; Number 18 August 28, 2006 Volume 17; Number 17 August 23, 2006 Volume 17; Number 16 August 16, 2006 Volume 17; Number 15 July 28, 2006 Volume 17; Number 14 June 30, 2006 Volume 17; Number 13 June 15, 2006 Volume 17; Number 12 June 14, 2006 Volume 17; Number 11 June 2, 2006 Volume 17; Number 10 May 18, 2006 Volume 17; Number 9 April 5, 2006 Volume 17; Number 8 March 22, 2006 Volume 17; Number 7 March 6, 2006 Volume 17; Number 6

159

SRS - 2007 Environmental Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

7 Environmental Bulletins 7 Environmental Bulletins All documents in PDF and require Adobe Acrobat Reader December 31, 2007 Volume 18; Number 31 December 13, 2007 Volume 18; Number 30 December 7, 2007 Volume 18; Number 29 November 19, 2007 Volume 18; Number 28 November 14, 2007 Volume 18; Number 27 October 10, 2007 Volume 18; Number 26 October 4, 2007 Volume 18; Number 25 October 1, 2007 Volume 18; Number 24 September 11, 2007 Volume 18; Number 23 September 7, 2007 Volume 18; Number 22 August 16, 2007 Volume 18; Number 21 August 14, 2007 Volume 18; Number 20 August 8, 2007 Volume 18; Number 19 August 2, 2007 Volume 18; Number 18 June 28, 2007 Volume 18; Number 17 June 12, 2007 Volume 18; Number 16 June 6, 2007 Volume 18; Number 15 May 30, 2007 Volume 18; Number 14 May 9, 2007 Volume 18; Number 13

160

SRS - 2008 Environmental Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

8 Environmental Bulletins 8 Environmental Bulletins All documents in PDF and require Adobe Acrobat Reader December 18, 2008 Volume 19; Number 26 December 15, 2008 Volume 19; Number 25 December 10, 2008 Volume 19; Number 24 December 2, 2008 Volume 19; Number 23 November 20, 2008 Volume 19; Number 22 November 17, 2008 Volume 19; Number 21 October 9, 2008 Volume 19; Number 20 October 6, 2008 Volume 19; Number 19 August 18, 2008 Volume 19; Number 18 August 4, 2008 Volume 19; Number 17 July 15, 2008 Volume 19; Number 16 July 9, 2008 Volume 19; Number 15 June 24, 2008 Volume 19; Number 14 June 16, 2008 Volume 19; Number 13 June 4, 2008 Volume 19; Number 12 May 13, 2008 Volume 19; Number 11 April 24, 2008 Volume 19; Number 10 March 20, 2008 Volume 19; Number 9 March 13, 2008 Volume 19; Number 8

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

JC3 Bulletin Archive  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

SW Washington, DC 202-586-0166 en V-237: TYPO3 Security Bypass Vulnerabilities http:energy.govcioarticlesv-237-typo3-security-bypass-vulnerabilities

162

Monthly Project Bulletin: November/December 2012  

Energy.gov (U.S. Department of Energy (DOE))

This document contains the Guidelines for Home Energy Professionals Project bulletin for the months of November/December 2012.

163

Towards Fully Automatic Placement of Security Sanitizers and Declassifiers  

E-Print Network (OSTI)

in this space has focused on finding missing sanitizers and was performed on relatively small ap- plicationsTowards Fully Automatic Placement of Security Sanitizers and Declassifiers Benjamin Livshits Fully Automatic Placement of Security Sanitizers and Declassifiers Benjamin Livshits Microsoft Research

Livshits, Ben

164

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 22, 2011 December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. December 20, 2011 U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. December 19, 2011 U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. December 16, 2011 U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code A remote user can cause the target application to execute arbitrary code on

165

Microsoft Word - Political Activity and the Federal Employee...  

Office of Environmental Management (EM)

Microsoft Word - Political Activity and the Federal Employee.doc Microsoft Word - Political Activity and the Federal Employee.doc Microsoft Word - Political Activity and the...

166

Microsoft Word - Horizon Wind Energy Comments.docx | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Microsoft Word - Horizon Wind Energy Comments.docx Microsoft Word - Horizon Wind Energy Comments.docx Microsoft Word - Horizon Wind Energy Comments.docx More Documents &...

167

Microsoft Word - AL2005-14.doc | Department of Energy  

Office of Environmental Management (EM)

4.doc Microsoft Word - AL2005-14.doc Microsoft Word - AL2005-14.doc More Documents & Publications Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all sections.doc Microsoft Word -...

168

Microsoft Word - AL2004-02.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4-02.doc Microsoft Word - AL2004-02.doc Microsoft Word - AL2004-02.doc More Documents & Publications Microsoft Word - AL2005-02.doc flash2004-07.pdf Microsoft Word - AL-Omnibus FY...

169

Microsoft Word - AL2005-02.doc | Department of Energy  

Energy Savers (EERE)

2.doc Microsoft Word - AL2005-02.doc Microsoft Word - AL2005-02.doc More Documents & Publications Microsoft Word - AL2004-02.doc Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all...

170

Health and Wellbeing The Microsoft External Research  

E-Print Network (OSTI)

Health and Wellbeing The Microsoft External Research Division within Microsoft Research partners to support every stage of the research process. Efforts are focused in four research areas--including Health about their health. Microsoft External Research http://research.microsoft.com/en-us/ collaboration

Oxford, University of

171

Technical Bulletins | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Bulletins Technical Bulletins For questions regarding the content of Technical Bulletins, contact webmaster. All documents are PDFs. TB # Title Date TB-54 Dose Calculations using MARS for Bremsstrahlung Beam Stops and Collimators in APS Beamline Stations 8/31/10 TB-53 Insertion Devices: Magnetic Measurements and Tuning--Part 1 - Magnetic Sensors and Measurement Techniques 10/1/10 TB-52 2006 XSD Scientific Software Workshop - Survey Responses 8/25/06 TB-51 2006 XSD Scientific Software Workshop Report 10/31/06 TB-50 Thermal Analysis of the Components of the Insertion Device Front Ends FEv1.2 and FEv1.5 7/1/05 TB-49 A New Magnetic Field Integral Measurement System 1/1/05 TB-48 LCLS Prototype Undulator Report 1/1/04 TB-47 XFD Progress Report 12/1/02 TB-46 LCLS - The First Experiments 9/1/02

172

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_INITIAL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ITIALENTRYOFCOMPETENCYINFORMATION.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialINITIALENTRYOFCOMPETENCYINFORMATION.doc Microsoft Word - APRIL 2009 PMCDP...

173

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_REVIEW...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

REVIEWUPDATECOMPETENCYINFORMATION.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialREVIEWUPDATECOMPETENCYINFORMATION.doc Microsoft Word - APRIL 2009 PMCDP...

174

SAFETY BULLETIN September 4, 2014  

E-Print Network (OSTI)

SAFETY BULLETIN September 4, 2014 Ebola Virus Update The Department of Environmental Health & Safety has been monitoring the on-going Ebola outbreak that is currently affecting countries in Western Africa. At this point, it is important to stress that there are currently no cases of Ebola in Canada

Abolmaesumi, Purang

175

Bulletin No. 233 Ergonomic Hazards of the  

E-Print Network (OSTI)

July, 2004 Bulletin No. 233 Ergonomic Hazards of the Seated Posture Ergonomic Hazards of the Seated it is possible for these injuries to heal themselves when the ergonomic hazard is removed, cases do exist where;PAGE 2 ERGONOMIC HAZARDS of the SEATED POSTURE BULLETIN NO. 233 Ergonomic interventions to reduce

Martin, Jeff

176

Final Information Quality Bulletin for Peer Review  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

04 04 OFFICE OF MANAGEMENT AND BUDGET Final Information Quality Bulletin for Peer Review INTRODUCTION This Bulletin establishes that important scientific information shall be peer reviewed by qualified specialists before it is disseminated by the federal government. We published a proposed Bulletin on September 15, 2003. Based on public comments, we published a revised proposal for additional comment on April 28, 2004. We are now finalizing the April version, with minor revisions responsive to the public's comments. The purpose of the Bulletin is to enhance the quality and credibility of the government's scientific information. We recognize that different types of peer review are appropriate for different types of information. Under this Bulletin, agencies are granted broad

177

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mozilla Firefox and Thunderbird. December 20, 2011 U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability Successful exploitation may allow execution of arbitrary code...

178

Nature Bulletin Table of Contents  

NLE Websites -- All DOE Office Websites (Extended Search)

Table of Contents: Table of Contents: Here is our table of contents for the Forset Preserve District of Cook Country Nature Bulletins. To search, go to the Natuere Bulletin's Search Engine and type in your topic. You can also use your browser's "FIND" command to search the 750+ article titles here for a specific subject! Fish Smother Under Ice Coyotes in Cook County Tough Times for the Muskrats Wild Geese and Ducks Fly North Squirrels Spring Frogs Snapping Turtles A Phenomenal Spring Good People Do Not Pick Wildflowers Fire is the Enemy of Field and Forest Crows Earthworms Bees Crayfish Floods Handaxes and Knives in the Forest Preserves Ant Sanctuary Conservation Mosquitoes More About Mosquitoes Fishing in the Forest Preserve Our River Grasshoppers Chiggers Ticks Poison Ivy Fireflies

179

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

180

a microsoft white paper Drilling for new Business Value  

E-Print Network (OSTI)

a microsoft white paper Drilling for new Business Value How innovative oil and gas companies Technical Strategist, Oil & Gas and Mining, Microsoft Adil Soofi, Enterprise Architect, Microsoft Ernie Perez, Enterprise Architect, Microsoft #12;a microsoft white paper Drilling for new B usiness Value 2

Bernstein, Phil

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

from Microsoft's Bill Gates. Summer  

NLE Websites -- All DOE Office Websites (Extended Search)

with backing from Microsoft's Bill Gates. Summer fun (pages 4-5) All aboard a bus or train and tour Y-12 and the Secret City. August 2012 Visit us Many phrases can be used to...

182

Securing SQL Server: Protecting Your Database from Attackers, 2 edition  

Science Journals Connector (OSTI)

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server ...

Denny Cherry

2012-07-01T23:59:59.000Z

183

Microsoft Local Language Program Customer Case Study  

E-Print Network (OSTI)

, the program develops native language interface packs that run on top of standard Microsoft Office software older than 15 years who can read and write). Project The development of Microsoft Language Interface-speaking environment. In conjunction with the Microsoft Local Language Program, the Nigerian Government has now found

Narasayya, Vivek

184

T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Prenotification Security Advisory - Adobe Acrobat & Adobe 4: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates June 10, 2011 - 3:16pm Addthis PROBLEM: Prenotification Security Advisory - Adobe Updates Available Tuesday, June 14, 2011 PLATFORM: Adobe : Security Vulnerabilities Published In 2011, Severity Rating System for Security Bulletins Adobe Reader X (10.0.1) and earlier versions for Windows Adobe Reader X (10.0.3) and earlier versions for Macintosh Adobe Reader 9.4.3 and earlier versions for Windows and Macintosh Adobe Acrobat X (10.0.3) and earlier versions for Windows and Macintosh Adobe Acrobat 9.4.3 and earlier versions for Windows and Macintosh ABSTRACT: A prenotification Security Advisory has been posted in regards to the

185

Microsoft Word - securlst  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Issues The following checklist is intended to provide system owners, project managers, and other information system development and maintenance professionals with guidance in preparation for identifying the security issues during the acceptance activities. Initiation of acceptance activities begins with successful completion of the system testing. Preparation for system acceptance is generally characterized as a process to ensure everything is in place to begin the acceptance process activities. The Preacceptance Checklist Security Issues Checklist helps to ensure that all necessary security activities have been completed. Rev: 09/02 1 Preacceptance Checklist SEM Reference Comments " The system sensitivity and essentiality has been identified as

186

Microsoft Word - AL2000-01.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

0-01.doc Microsoft Word - AL2000-01.doc Microsoft Word - AL2000-01.doc More Documents & Publications ALFAL 99-01 Department of Energy No Microsoft Word - al2005...

187

Microsoft Word - Section 311 AL FAL Feb 17 2010 | Department...  

Office of Environmental Management (EM)

Section 311 AL FAL Feb 17 2010 Microsoft Word - Section 311 AL FAL Feb 17 2010 Microsoft Word - Section 311 AL FAL Feb 17 2010 More Documents & Publications Microsoft Word -...

188

Microsoft Word - AL2008-05.doc | Department of Energy  

Office of Environmental Management (EM)

5.doc Microsoft Word - AL2008-05.doc Microsoft Word - AL2008-05.doc More Documents & Publications EXECUTIVE ORDER 13514 Microsoft Word - AL 2010-07 Acquistion Letters Remaining in...

189

Microsoft Word - AL-ARRASafetyALREDO3 | Department of Energy  

Office of Environmental Management (EM)

ARRASafetyALREDO3 Microsoft Word - AL-ARRASafetyALREDO3 Microsoft Word - AL-ARRASafetyALREDO3 More Documents & Publications Microsoft Word - AL-ARRASafetyALREDO3.doc DOE Handbook:...

190

Microsoft Word - AL2007-01.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AL2007-01.doc Microsoft Word - AL2007-01.doc Microsoft Word - AL2007-01.doc More Documents & Publications Microsoft Word - Rev5functionalaccountabilityimplementationplan..doc...

191

Microsoft Word - al93-4.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3-4.doc Microsoft Word - al93-4.doc Microsoft Word - al93-4.doc More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities Microsoft Word...

192

V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Struts DefaultActionMapper Redirection and OGNL 0: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities July 18, 2013 - 6:00am Addthis PROBLEM: Two weaknesses and multiple vulnerabilities have been reported in Apache Struts PLATFORM: Apache Struts 2.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions REFERENCE LINKS: Secunia Advisory SA54118 Apache Security Bulletin S2-16 Apache Security Bulletin S2-17 CVE-2013-2248 CVE-2013-2251 IMPACT ASSESSMENT: High DISCUSSION: 1) Input passed via the "redirect:" and "redirectAction:" prefixing parameters is not properly verified in the DefaultActionMapper class

193

NHTSA's Office of Defects Investigation (ODI) - Technical Service Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

NHTSA's Office of Defects Investigation (ODI) - Technical Service Bulletins NHTSA's Office of Defects Investigation (ODI) - Technical Service Bulletins System (TSBS) - Downloadable file Manufacturing Data/Tools Research/Tech Services Apps Challenges Blogs Let's Talk Manufacturing You are here Data.gov » Communities » Manufacturing » Data NHTSA's Office of Defects Investigation (ODI) - Technical Service Bulletins System (TSBS) - Downloadable file Dataset Summary Description The Technical Service Bulletins data contains summaries of the Manufacturers' Technical Service Bulletins by single year, make and model. An optional item of Vehicle Component may be also available. (The data does not contain all the service bulletins generated by a manufacturer. Bulletins for safety recalls in general are not included, and also bulletins which may not pertain to a defect may not be included.)

194

Green Bulletin Information for pest management professionals and pesticide applicators  

E-Print Network (OSTI)

Vol. 3 l No. 3 l May 2013 Green Bulletin Information for pest management professionals subscription to the Green Bulletin at http://www.ipm.ucdavis.edu/greenbulletin! What Can Landscape Managers Do

Ishida, Yuko

195

April 2012 ARRA Energy Assurance Planning Bulletin Available | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ARRA Energy Assurance Planning Bulletin Available ARRA Energy Assurance Planning Bulletin Available April 2012 ARRA Energy Assurance Planning Bulletin Available April 2, 2012 - 2:15pm Addthis The Department released the April 2012 issue of the ARRA Energy Assurance Planning Bulletin (EAPB). The ARRA EAPB is issued quarterly to provide information on energy assurance planning resources, upcoming events, training opportunities, and important grant deliverable dates. This is the tenth issue of the EAP Bulletin; previous issues are available for download. Addthis Related Articles January 2012 ARRA Energy Assurance Planning Bulletin Available July 2012 ARRA Energy Assurance Planning Bulletin Available April 2012 ARRA Energy Assurance Planning Bulletin Available LM's New Role for the DOE Title X Reimbursement Program

196

Physics Degree Requirements 2008-2010 Bulletin  

E-Print Network (OSTI)

Physics Degree Requirements 2008-2010 Bulletin Interdisciplinary Option Student: ___________________ Advisor: ________________ Option: ________________ Updated 2/8/08 Physics Required Cr Gr Taken PHYS 137 1) Physics Electives (3 cr; 253 and 300) PHYS _____ ___ ___ ______ PHYS _____ ___ ___ ______ PHYS

Dyer, Bill

197

Physics Degree Requirements 2008 -2010 Bulletin  

E-Print Network (OSTI)

Physics Degree Requirements 2008 -2010 Bulletin Professional Option Student: __________________________ Advisor: ____________________________ Updated 2/8/08 Physics Required Cr Gr Taken PHYS 137 1 ___ ______ PHYS 461 4 ___ ______ PHYS 490 3 ___ ______ Subtotal 47 (C- or better required) Physics Electives (8 cr

Dyer, Bill

198

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bulletins on May 8, 2012, at 11:00 AM Pacific Time (US & Canada). May 7, 2012 U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and...

199

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

200

T-613: Microsoft Excel Axis Properties Remote Code Execution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis...

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T-557: Microsoft Office Excel Office Art Object Parsing Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability...

202

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of...

203

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability...

204

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_ROTATION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialROTATIONWITHINDUSTRY.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialROTATIONWITHINDUSTRY.doc...

205

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_ESTABLISHI...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ESTABLISHINGAPROFILE.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialESTABLISHINGAPROFILE.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS...

206

Microsoft Word - PMCDP Knowledge Diagram Updates March 26 2009...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Knowledge Diagram Updates March 26 2009.doc Microsoft Word - PMCDP Knowledge Diagram Updates March 26 2009.doc Microsoft Word - PMCDP Knowledge Diagram Updates March 26 2009.doc...

207

EERE Template for Microsoft Word Document Standard Cover and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EERE Template for Microsoft Word Document Standard Cover and Second Page EERE Template for Microsoft Word Document Standard Cover and Second Page This template was designed for...

208

Microsoft Word - NSRC precompetitive User Agreement amended 1...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NSRC precompetitive User Agreement amended 1-18-07.doc Microsoft Word - NSRC precompetitive User Agreement amended 1-18-07.doc Microsoft Word - NSRC precompetitive User Agreement...

209

Microsoft Word - 564M_Biomass_Project Descriptions FINAL 120409...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

564MBiomassProject Descriptions FINAL 120409 Microsoft Word - 564MBiomassProject Descriptions FINAL 120409 Microsoft Word - 564MBiomassProject Descriptions FINAL 120409 More...

210

Microsoft PowerPoint - IGCA Training 2011-OPAM | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IGCA Training 2011-OPAM Microsoft PowerPoint - IGCA Training 2011-OPAM IGCA Inventory Data Collection Tool Training 2011 Microsoft PowerPoint - IGCA Training 2011-OPAM More...

211

Microsoft PowerPoint - 03 Wyss Economic Outlook [Compatibility...  

Office of Environmental Management (EM)

03 Wyss Economic Outlook Compatibility Mode Microsoft PowerPoint - 03 Wyss Economic Outlook Compatibility Mode Microsoft PowerPoint - 03 Wyss Economic Outlook Compatibility...

212

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...  

Office of Environmental Management (EM)

Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents & Publications Slide 1 LPP Risk Management Plan...

213

Microsoft Word - Fact Sheet Environment 100808 FINAL.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environment 100808 FINAL.doc Microsoft Word - Fact Sheet Environment 100808 FINAL.doc Microsoft Word - Fact Sheet Environment 100808 FINAL.doc More Documents & Publications...

214

1991 OCRWM bulletin compilation and index  

SciTech Connect

The OCRWM Bulletin is published by the Department of Energy, Office of Civilian Radioactive Waste Management, to provide current information about the national program for managing spent fuel and high-level radioactive waste. The document is a compilation of issues from the 1991 calendar year. A table of contents and an index have been provided to reference information contained in this year`s Bulletins.

NONE

1992-05-01T23:59:59.000Z

215

OCRWM Bulletin, summer/fall 1994  

SciTech Connect

This publication consists of two parts, OCRWM Bulletin, and Of Mountains & Science which is about the Yucca Mountain project. The OCRWM bulletin provides information about OCRWM activities, program update to Congress, reorganization, training provided on OCRWM database, OCRWM calendar, and exhibit schedule for 1994. Recent activities at the Yucca Mountain project such as the arrival of the tunnel boring machines is presented in layman`s term.

NONE

1994-10-01T23:59:59.000Z

216

Colorado School of Mines Graduate Bulletin 2007-08  

E-Print Network (OSTI)

Colorado School of Mines Graduate Bulletin 2007-08 nitelluBetaudarGseniMfoloohcSodaroloC80-7002 #12;Colorado School of Mines 20072008 Graduate Bulletin #12;To CSM Graduate Students: This Bulletin is for your use as a source of continuing reference. Please save it. Published by Colorado School of Mines, Golden

217

The California State University Imperial Valley Campus Bulletin  

E-Print Network (OSTI)

2010­2011 The California State University Imperial Valley Campus Bulletin #12;BULLETIN THE IMPERIAL VALLEY CAMPUS 2010-2011 SAN DIEGO STATE UNIVERSITY 720 HEBER AVENUE CALEXICO, CALIFORNIA 92231 the 2010 2011 Bulletin of the Imperial Valley Campus of San Diego State University. Its publication

Gallo, Linda C.

218

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

219

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

220

Microsoft Word - NPNS  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Engineering Nonproliferation and National Security (NPNS) The NPNS applies technical expertise to address global security threats. The focus is on finding and implementing practical solutions in order to realize nonproliferation and national security policy objectives. Technical Nonproliferation Policy Support (TNPS) deals with the strategic threat posed by the spread of weapons of mass destruction. Terrorist groups and rogue states will go to great lengths to acquire nuclear weapons and other WMDs. History shows that these groups exploit international commercial markets to acquire the materials, equipment, and technology for the clandestine facilities needed to build these weapons. TNPS activities comprise both technical proliferation analysis, from the macro (regime) level to the micro

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

222

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2011 , 2011 T-547: Microsoft Windows Human Interface Device (HID) Vulnerability Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. January 31, 2011 T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. January 28, 2011 T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code A vulnerability was reported in RealPlayer. A remote user can cause

223

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCPIP MS11-083 - Critical Windows TCPIP stack keeps track of UDP packets within memory. November 9, 2011 U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...

224

January 2012 ARRA Energy Assurance Planning Bulletin Available | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 2012 ARRA Energy Assurance Planning Bulletin Available January 2012 ARRA Energy Assurance Planning Bulletin Available January 2012 ARRA Energy Assurance Planning Bulletin Available January 3, 2012 - 12:00pm Addthis The Department released the January 2012 issue of the ARRA Energy Assurance Planning Bulletin (EAPB). The ARRA EAPB is issued quarterly to provide information on energy assurance planning resources, upcoming events, training opportunities, and important grant deliverable dates. This is the ninth issue of the EAP Bulletin; previous issues are available for download. Addthis Related Articles April 2012 ARRA Energy Assurance Planning Bulletin Available July 2012 ARRA Energy Assurance Planning Bulletin Available LaDoris (Dot) Harris is the Director of the Office of Economic Impact and Diversity. Women @ Energy: Dot Harris

225

Microsoft Word - Document in Microsoft Internet Explorer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Status of the Mixed Oxide Fuel Status of the Mixed Oxide Fuel Fabrication Facility DOE/IG-0713 December 2005 STATUS OF THE MIXED OXIDE FUEL FABRICATION FACILITY TABLE OF CONTENTS MOX Facility Design Costs Details of Finding 1 Recommendations 5 Comments 6 Appendices Objective, Scope, and Methodology 9 Prior Audit Reports 11 Management Comments 12 MOX Facility Design Costs Page 1 Details of Finding Design and The audit disclosed that the cost of the Mixed Oxide Fuel Construction Budget Facility (MOX) will significantly exceed the amounts reported to Congress. As of July 2005, the National Nuclear Security Administration's (NNSA's) unvalidated estimate for the design and construction of the MOX Facility was about $3.5 billion, which is

226

Microsoft Word - Intellectual Property Provisions _NRD-1003_...  

Office of Environmental Management (EM)

& Publications Intellectual Property Provisions (NRD-115) Nonresearch and Development D:WebGCCurrentMaterialtechtransGNP-1003.PDF&0; Microsoft Word - Flash2006-47JulyDeviate...

227

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Robert Baldwin Robert Baldwin A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: March 29, 2010 Robert Baldwin, who first joined the Lab on December 12, 1955, as an associate me-chanical engineer, and left the Alternating Gradient Synchro-tron as a mechanical engineer on August 25, 1972, died at 85 on December 23, 2008. He had joined the Reactor Division as a senior project engineer on August 22, 1983, and retired on August 31, 1993 as a senior technical specialist. Robert Baldwin's parents were Robert Dodge Baldwin and Edna Post. He was preceded in death by his brother, Edward, and son, Joshua. He is survived by his wife Nancy, his sons Phillip, Lloyd and Enoch, and granddaughters Annapurna and Sequoia, and his sister Margaret Wilson.

228

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Stephen Eiseman Stephen Eiseman A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: May 30, 2012 Stephen Eiseman Stephen Eiseman, who joined the Alternating Gradient Synchrotron Department as a development engineer III on January 6, 1969, and transferred to the Physics Department in 1982, where he was promoted to senior research engineer. He left the Lab on September 30, 1997, and died at 69 on April 5, 2009. Additional In Memoriam sent by Kathryn Eiseman: Stephen E. Eiseman, a retired Electronics Engineers from Brookhaven Lab passed away on April 5, 2009. Steve was 69 years old and is survived by his wife of 45 years, Jane Reinfeld Eiseman, his daughter Kathryn, son William and three grandchildren.

229

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Arie van Steenbergen Arie van Steenbergen A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: March 23, 2009 Arie van Steenbergen, a former NSLS Deputy Department Chairman who helped bring the facility to fruition, died on January 2, 2009. He was 81. Van Steenbergen was born in 1928 in The Netherlands and attended Delft Technological University, with intentions to become an engineer. According to Brookhaven Historian Bob Crease, while at the university's library one day, van Steenbergen came across an issue of the Review of Scientific Instruments devoted to Brookhaven's Cosmotron and became so fascinated by the machine that he bought a personal copy of the issue that he kept for years to come.

230

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Seymour "Sam" Lindenbaum Seymour "Sam" Lindenbaum A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: September 25, 2009 Sam Lindenbaum, whose distinguished career in BNL's Physics Department spanned 45 years, died on August 17, 2009. He made numerous and diverse contributions to physics, beginning with the development of the Cosmotron's first differential gas Cerenkov counters - particle selection devices still in use today - soon after he arrived at BNL and concluding with theoretical research related to measurements performed by the STAR collaboration just before his death. Born in New York City, Lindenbaum earned a bachelor's degree in physics from Princeton University in 1945 and a master's degree and Ph.D. in physics from Columbia University in 1949 and 1951, respectively. He was a research associate at Nevis Cyclotron Laboratories 1946-1951.

231

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Frank L. Magnani Frank L. Magnani A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: July 10, 2008 The following article about her husband Frank Magnani was submitted by Dorothy Magnani. It is reproduced here by courtesy of The PRESS of Manorville and The Moriches. The article is by Jennett Meriden Russell. Manorville luminary remembered fondly Magnani among first firefighters Frank L. Magnani's final ride was a long and rich one. With his coffin draped with an American flag, the last surviving charter member of the Manorville Fire Department, who died last Thursday at the age of 90, was carried in the back of a vintage fire truck on Monday to all the places he knew well, and which he influenced throughout his long life.

232

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Masaki Suenaga Masaki Suenaga A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: May 26, 2009 Masaki Suenaga Masaki Suenaga, BNL Senior Scientist Emeritus in the Condensed Matter Physics & Materials Science Department (CMPMSD), died on February 13, 2009. During his 37-year career at BNL, Suenaga made distinguished contributions to the field of superconductivity and superconductor materials, which can transmit electrical current with no loss of energy. Suenaga retired from the Laboratory in 2006, but continued his research on a part-time basis until he was hospitalized in January, after a long battle with leukemia. Suenaga spent much of his early career studying the superconductor niobium-tin, and his research resulted in a process to make the first industrial niobium-tin superconducting wire for use in high-field magnets.

233

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

John H. Marburger III John H. Marburger III A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: August 11, 2011 John Marburger Former BNL Director John ("Jack") H. Marburger III - a physicist who also served as President of Stony Brook University, Science Advisor to the President, and Director of the Office of Science and Technology Policy - died at his home in Port Jefferson, NY, on July 28, 2011, after four years of treatment for non-Hodgkin's lymphoma. Under his leadership, BNL commissioned the Relativistic Heavy Ion Collider (RHIC) and advanced a range of scientific programs and industrial partnerships, achieved ISO14001 certification of its environmental management system, and established a Community Advisory Council that fostered significantly improved support among neighbors and other stakeholders.

234

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Robert Bruce Marr Robert Bruce Marr A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: August 5, 2010 Robert Marr, who joined the BNL Physics Department as a research associate on May 11, 1959, and retired from the Department of Applied Science (DAS) as a senior physicist on September 30, 1995, died at 78 on April 26, 2010. He moved to the Applied Mathematics Department as an associate physicist in May 1961, and rose to senior physicist with tenure by 1968. On February 3, 1975, he became Applied Mathematics' Acting Department Chair and Chair on December 1. After three years, he returned to research, moving to DAS in October 1988. Post-retirement, he worked on a guest senior physicist from February 1, 1996, until December 9, 2003.

235

Technology applications bulletins: Number one  

SciTech Connect

Martin Marietta Energy Systems, Inc. (Energy Systems), operates five facilities for the US Department of Energy (DOE): the Oak Ridge National Laboratory (ORNL), which is a large, multidisciplinary research and development (R and D) center whose primary mission is energy research; the Oak Ridge Y-12 Plant, which engages in defense research, development, and production; and the uranium-enrichment plants at Oak Ridge; Paducah, Kentucky; and Portsmouth, Ohio. Much of the research carried out at these facilities is of interest to industry and to state or local governments. To make information about this research available, the Energy Systems Office of Technology Applications publishes brief descriptions of selected technologies and reports. These technology applications bulletins describe the new technology and inform the reader about how to obtain further information, gain access to technical resources, and initiate direct contact with Energy Systems researchers.

Koncinski, W. Jr. (ed.)

1989-02-01T23:59:59.000Z

236

E-Print Network 3.0 - african cancer bulletin Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

cancer bulletin Search Powered by Explorit Topic List Advanced Search Sample search results for: african cancer bulletin Page: << < 1 2 3 4 5 > >> 1 This Time... The American...

237

Microsoft Word - Document1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

BY THE UNITED STATES DEPARTMENT OF BY THE UNITED STATES DEPARTMENT OF ENERGY AND THE DEPARTMENT OF NATURAL RESOURCES CANADA We affirm our commitment, on behalf of the United States and Canada, to collaborate on accelerating the development of the hydrogen economy as part of our broadening cooperation on energy. We aim to enhance the security of energy supply, increase diversity of energy sources, and improve local and global environmental quality. Our cooperation will contribute to laying the scientific, technical, legal, and regulatory framework needed to accelerate the commercial penetration and trade of emissions-free hydrogen technology worldwide, in cars, buildings, portable applications and power generation, to secure to our citizens the abundant, secure, and clean energy required to

238

Microsoft Word - Chapter 11.doc  

National Nuclear Security Administration (NNSA)

and Stockpile Stewardship, National Security Technologies, Data provided on septic tanks at NTS, April 8. NSTec (National Security Technologies LLC), 2010i, Personal...

239

U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28: Microsoft Windows win32k.sys TrueType Font Parsing 28: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability November 7, 2011 - 8:15am Addthis PROBLEM: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability. PLATFORM: Microsoft Windows 7 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows Server 2008 Microsoft Windows Storage Server 2003 Microsoft Windows Vista Microsoft Windows XP Home Edition Microsoft Windows XP Professional ABSTRACT: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. reference LINKS:

240

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

JC3 High Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

high-impact-assessment-bulletins high-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities http://energy.gov/cio/articles/v-215-networkminer-directory-traversal-and-insecure-library-loading-vulnerabilities V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities

242

JC3 Low Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

low-impact-assessment-bulletins low-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-207: Wireshark Multiple Denial of Service Vulnerabilities http://energy.gov/cio/articles/v-207-wireshark-multiple-denial-service-vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities

243

CS55N: Ten Ideas in Computer Security Fall 2005 Course Project  

E-Print Network (OSTI)

://research.microsoft.com/users/jpincus/beyond-stack-smashing.pdf · http://www.phrack.org/phrack/56/p56-0x0e · http://www.securityfocus.com/archive/1/7480 Web Site Security. Write a report describing at least five ideas in exploiting web site weaknesses. Propose a single

Boneh, Dan

244

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

245

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

246

T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow  

NLE Websites -- All DOE Office Websites (Extended Search)

65: Vulnerability in Microsoft Malware Protection Engine Could 65: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability February 25, 2011 - 7:40am Addthis PROBLEM: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability. PLATFORM: Microsoft Malware Protection Engine Last version of the Microsoft Malware Protection Engine affected by this vulnerability: Version 1.1.6502.0 This version is the last version of the Microsoft Malware Protection Engine that is affected by the vulnerability. First version of the Microsoft Malware Protection Engine with this vulnerability addressed:Version 1.1.6603.0 If the version of the Microsoft Malware Protection Engine is equal to or

247

Colorado School of Mines Undergraduate Bulletin 2001-2002 1 School of Mines  

E-Print Network (OSTI)

Colorado School of Mines Undergraduate Bulletin 2001-2002 1 Colorado School of Mines 2001 ­ 2002 Undergraduate Bulletin #12;2 Colorado School of Mines Undergraduate Bulletin 2001-2002 To CSM Students This Bulletin is for your use as a source of continuing reference. Please save it. Published by Colorado School

248

Colorado School of Mines Graduate Bulletin 1999-2000 1 School of Mines  

E-Print Network (OSTI)

Colorado School of Mines Graduate Bulletin 1999-2000 1 Colorado School of Mines 1999-2000 Graduate Bulletin #12;2 Colorado School of Mines Graduate Bulletin 1999-2000 To CSM Graduate Students This Bulletin is for your use as a source of continuing reference. Please save it. Published by Colorado School of Mines

249

Colorado School of Mines Graduate Bulletin 2001-2002 1 School of Mines  

E-Print Network (OSTI)

Colorado School of Mines Graduate Bulletin 2001-2002 1 Colorado School of Mines 2001-2002 Graduate Bulletin #12;2 Colorado School of Mines Graduate Bulletin 2001-2002 To CSM Graduate Students This Bulletin is for your use as a source of continuing reference. Please save it. Published by Colorado School of Mines

250

Colorado School of Mines Undergraduate Bulletin 1999-2000 1 School of Mines  

E-Print Network (OSTI)

Colorado School of Mines Undergraduate Bulletin 1999-2000 1 Colorado School of Mines 1999-2000 Undergraduate Bulletin #12;2 Colorado School of Mines Undergraduate Bulletin 1999-2000 To CSM Students This Bulletin is for your use as a source of continuing reference. Please save it. Published by Colorado School

251

Brasenose College Library Bulletin Trinity 2013  

E-Print Network (OSTI)

Old Cloisters is now available for use as a reading room. Library protocol applies to this space Term. Library protocol applies to this space and seats may not be reserved. There are some scheduledBrasenose College Library Bulletin Trinity 2013 Welcome back to the busiest term of the academic

Oxford, University of

252

Brasenose College Library Bulletin Trinity 2012  

E-Print Network (OSTI)

as a reading room. Library protocol applies to this space and seats may not be reserved. You may useBrasenose College Library Bulletin Trinity 2012 Welcome back to the busiest term of the academic year. With this in mind there are some important reminders concerning working in the library. Working

Oxford, University of

253

School of Medicine BULLETIN OF YALE UNIVERSITY  

E-Print Network (OSTI)

recycled paper for the School of Medicine and the per- manent archive of the Bulletin of Yale University Yale University Resources and Services 80 A Global University 80 Cultural and Social Resources 81 of International Students and Scholars 87 Resource Oce on Disabilities 88 Resources on Sexual Misconduct 88

254

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Iuliu Stumer Iuliu Stumer A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: May 22, 2009 Physicist Iuliu Stumer, a BNL guest scientist who had worked at the Lab for 34 years, died on February 3, 2008. He was 65. After obtaining his M.Sc. and Ph.D. at Tel Aviv University, Stumer joined the Omega group in the Physics Department as a research associate on September 18, 1973. His first major experiment brought him to Fermi National Accelerator Laboratory to help measure high transverse momentum neutrals. Soon after, he was stationed at CERN, Switzerland, where he participated in experiments R806 and R807 at the Intersecting Storage Ring (ISR) collider. There he was involved in pioneering work on liquid argon calorimeters, becoming one of the world experts in the analysis of liquid argon data and in understanding the subtle behavior of these calorimeters.

255

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Robert J. Walton Robert J. Walton A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: October 2, 2008 Robert J. Walton, 82, of East Patchogue passed into eternal peace at home on July 26, 2008 while surrounded by his beloved wife of 61 years Evelyn and his 4 children. Bob was born April 1926 in Mt. Vernon, NY to May and Francis Walton. He is survived by his wife Evelyn; brother Francis Walton and wife Helen; children Gordon Walton and wife Maria, Russell Walton and wife Judy, Debora Greene, and Pamela Esposito and companion Lee; 12 grandchildren, Jennifer and husband Matt Masur, Jeremy Walton and wife Kerry, Michael Walton and wife Sabina, Laura Walton and companion Andrew, Jason Walton and companion Ashley, Chris Walton and companion Amanda, Craig Walton, Eva Esposito, Michael Esposito, Tami Greene and companion Billy, Janelle Greene and Derek Greene and 7 great-grandchildren Abby Walton, Andrew Robert Walton, Ben Walton Masur, Bernard Walton Masur, Jordan Walton, Alexander Rhodes and Michael Rhodes.

256

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

George Harris George Harris A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: October 2, 2008 George Harris, who joined the Plant Engineering Division as a janitor on January 8, 1962, became a painter in 1966, and a painter A in 1974, died on July 9, 2008. He was 76. He had retired on July 13, 1993. ***** Rod di Girolamo adds some fond memories of George Harris George was the first full time painter added to the AGS Experimental Area Operations Group we had assigned full time; 21 riggers, 2 carpenters, 3 electricians, 1 A/C person 2 welders and several Custodians who supported and worked with the approximately 40 Technicians comprising the EAO "Team." George had a very big smile, and everyone was "brother." He didn't know the words "No" or Can't do it." The tougher the job, the bigger his smile.

257

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Richard D. Baulch, Jr. Richard D. Baulch, Jr. A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: June 2, 2009 Richard Baulch, Jr., who first joined the Supply & Materiel Division as a warehouseman on October 2, 1961, died at age 69 on December 31, 2008. He had left BNL as a stores clerk on March 1, 1968, then re-joined as a patrolman trainee on October 14, 1968. In April 1982, he was named Police Captain; and he left the Lab on May 22, 1991. ***** Richard Baulch, 69, of Cape Carteret, N.C., formally of Speonk, N.Y., died on December 24,2008, at Craven Regional Medical Center in New Bern, N.C. A memorial service was held at St. Mildred Catholic Church in Swansboro, N.C., and his burial, with military honors in memory of his service in the U.S. Air Force, was held at Coastal Carolina State Veterans Cemetery.

258

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Hugh Brown Hugh Brown A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: September 12, 2012 Hugh Brown Hugh Brown, who joined the Accelerator Department on May 14, 1956, as an assistant physicist, and retired as a senior physicist with tenure on November 30, 1996, died at 83 on August 25, 2012. Internationally recognized as an authority on particle beam optics, he and colleagues designed beams at the Alternating Gradient Synchrotron for three experiments that earned Nobel Prizes. After retirement, he remained a guest scientist until September 30, 2001. The following obituary is provided by Elise Brown. Hugh Needham Brown, 83, of Brookhaven, NY died at his residence on August 25, 2012. He was born September 12, 1928, in Champaign, IL, to Carrie Needham and Hugh Alexander Brown. He grew up in Urbana, IL and attended the University of Illinois, where he earned a B.S., M.S., and Ph.D. in physics. He was drafted into the US Army in 1954 and served two years at the Aberdeen Proving Grounds, MD, where he taught Physical Science to officers and studied shock waves.

259

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Henry Farrell Henry Farrell A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: March 15, 2010 Farrell Henry Farrell, who joined the Alternating Gradient Synchrotron Department as an intermediate technician on July 18, 1960, and was named a technical supervisor I in 1980, died at age 87 on August 7, 2009. He retired from BNL on June 30, 1984. Henry Farrell is survived by his daughter, Susan Young of the Environmental Protection Division at BNL, Douglas Farrell, a physician in Philadelphia; and Lawrence Farrell, a retired teacher of the Brentwood School District. Harry Farrell was recognized for other important contributions to the Long Island community, especially through his long service to the Ronkonkoma Fire Department. He joined the department on January 21, 1957, and also served as Corresponding Secretary, 1960-61; Lieutenant, 1961-63; Captain, 1964-65, and Engineer, 1966-67.

260

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Thomas Wesley Burrows Thomas Wesley Burrows A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: July 16, 2008 Thomas Burrows of the Energy Sciences & Technology Department's National Nuclear Data Center (NNDC), died on July 1, 2008. He was 65. Burrows had joined the NNDC on September 9, 1974, as an assistant physicist. He was named physicist on October 1, 1979 ***** Full Text Thomas W. Burrows, a long-time scientist at the National Nuclear Data Center, Brookhaven National Laboratory, passed away on July 1, 2008. He died of cancer which was not diagnosed until it was too late. Tom was born in Janesville, Wisconsin and received his B.S. (1965) and Ph.D. (1972) from the University of Wisconsin, Madison, WI. He was part of the prestigious physics group headed by Dr. H. Heinz Barschall who was also his thesis adviser. He was a Nuclear Information Research Associate at the University of Kentucky for two years (1972-1974) under a national program sponsored by the National Academy of Sciences and the National Science Foundation. He joined the National Nuclear Data Center (NNDC) at Brookhaven National Laboratory (BNL) in September 1974 and worked there since then.

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Allen N. Goland Allen N. Goland A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: April 5, 2010 Allen N. Goland, BNL, died suddenly at his home in Port Jefferson, Long Island, New York on January 14, 2010. Dr. Goland retired from BNL as a Senior Scientist in 1996, but remained active in research as a Guest Senior Scientist, and Consultant at BNL, and as Adjunct Professor, Dept. of Materials, Science and Engineering at Stony Brook University. Goland joined the Physics Dept at BNL in 1963 and became Group Leader of the Particle/Solid Interactions Group in 1973. His international reputation was built largely upon his innovative approach to the study of defects in solids. He participated in one of the first successful applications of using a large computer to simulate the effects of an energetic particle impacting a solid lattice of atoms, thereby producing radiation damage. Goland oversaw the installation of an electron accelerator for the production of fundamental defects in materials, and proceeded to lead new efforts in x-ray scattering, internal friction, and positron-annihilation spectroscopy to investigate the properties of these defects. In 1982 he moved to the Department of Applied Sciences where he held several senior positions including Deputy Chairman.

262

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Thomas Wesley Burrows Thomas Wesley Burrows A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: January 27, 2009 Dysart Ravenhall, who joined the Applied Mathematics Department on January 31, 1955, as a technician C, rose to Science Computer Operators Manager in 1974, and retired as Assistant Manager for Scientific Computer Services on November 16, 1981, died on December 23, 2008. He was 76. Dysart Alan Ravenhall, 76, of Oxbow Road, Lake Pleasant, died December 23rd, 2008, at home with his loving family by his side. Born on August 5, 1932, in Hackensack, NJ, he was the son of Dysart and Mabel Borgersen Ravenhall. He was a graduate of Sayville High School and a college graduate of Adelphi and Hofstra University. Al was a United States Army Veteran serving during the Korean War from 1953 to 1954 and had attended the Coast Guard Academy. He was employed by Brookhaven National Laboratory on Long Island, New York, as a manager of the Computer Department, from 1954 to 1979.

263

Microsoft Word - coop cover  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Improvements Needed in the Improvements Needed in the Department's Emergency Preparedness and Continuity of Operations Planning DOE/IG-0845 January 2011 Department of Energy Washington, DC 20585 January 3, 2011 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Improvements Needed in the Department's Emergency Preparedness and Continuity of Operations Planning" BACKGROUND The Department of Energy's diverse mission is directly related to helping resolve many of the energy, environmental, and nuclear security challenges that face the Nation. As a consequence, the Department's operations involve dangerous substances such as nuclear and hazardous materials. In this context, the Department must: (i) ensure that it can

264

Microsoft Word - ARRA cover  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy Office of Inspector General Office of Audit Services Audit Report Selected Aspects of the Commonwealth of Pennsylvania's Efforts to Implement the American Recovery and Reinvestment Act Weatherization Assistance Program OAS-RA-11-02 November 2010 Department of Energy Washington, DC 20585 November 1, 2010 MEMORANDUM FOR THE ASSISTANT SECRETARY FOR ENERGY EFFICIENCY AND RENEWABLE ENERGY FROM: George W. Collard Assistant Inspector General for National Security and Energy Audits Office of Inspector General SUBJECT: INFORMATION: Report on "Selected Aspects of the Commonwealth of Pennsylvania's Efforts to Implement the American Recovery and Reinvestment Act Weatherization Assistance Program" BACKGROUND The Department of Energy's (Department) Weatherization Assistance Program (Weatherization

265

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

266

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Jane Setlow Jane Setlow A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: April 5, 2010 Jane (Kellock) Setlow died on March 4, 2010, in Shoreham, NY. Jane was born in Washington, DC and had lived in New York, Philadelphia, Connecticut, Tennessee, and for the last 35 years in Shoreham. She was a graduate of the Baldwin School in Bryn Mawr, PA, and received their Lifetime Achievement Award in 1996. She graduated Phi Beta Kappa from Swarthmore College in 1940 at age 20 on a full scholarship, with a degree in Psychology. She was also captain of the field hockey team and starred on the basketball team. After having four children, she went to graduate school at Yale and received a Ph.D. in Biophysics in 1959. She worked as a Biologist and Senior Geneticist in the Biology Division of Oak Ridge National Laboratory (ORNL) from 1960 to 1974 on various aspects of DNA damage, DNA repair, and DNA recombination in bacteria and yeast. She continued this work as a senior geneticist with tenure in the Biology Division at Brookhaven National Laboratory (BNL) from 1974 until her formal retirement in 1993. She then continued to work at Brookhaven as a guest senior geneticist until her full retirement in 2007. During her long research career she published more than 125 papers and from 1979 to 2007 was the co-editor and then the editor of the long running series of yearly books on genetic engineering published by Plenum Press.

267

The Bulletin - BNL's Weekly Newspaper  

NLE Websites -- All DOE Office Websites (Extended Search)

Victoria McLane Victoria McLane A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z In Memoriam Home | Bulletin Home Posted: October 21, 2011 Victoria McLane Victoria McLane, who joined the Department of Nuclear Energy as a physics associate IV on February 12, 1962, left in November 1963, returned in May, 1964, and retired as a senior physics associate on January 3, 2005, died at 71 on August 13, 2011. In addition to her scientific contributions, she was a founding member of Brookhaven Women in Science and contributed significantly to its organization and success. A remembrance of Vicki McLane by colleague and friend Harriet Martin, BNL retiree Vicki McLane spent almost all of her working years at BNL. She was hired by the late Sol Pearlstein to work at the National Nuclear Data Center, which started out known as the Sigma Center in 1952 and evolved into an international nuclear data bank as nuclear energy became widely used. In 2002, the group celebrated its "Golden Jubilee," and Vicki, by then was known to all those who worked in nuclear data centers throughout the world and at the IAEA - the International Atomic Energy Agency, which is an arm of the U.N. When Vicki retired, she continued to travel around the world consulting with the nuclear data centers on maintenance and retrieval of nuclear data for energy purposes, and to establish standards for data collection.

268

Microsoft Word - FIREARMSONAIRCRAFTfinal070604.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Unauthorized Handguns on National Unauthorized Handguns on National Nuclear Security Administration Aircraft DOE/IG-0654 July 2004 UNAUTHORIZED HANDGUNS ON NATIONAL NUCLEAR SECURITY ADMINISTRATION AIRCRAFT TABLE OF CONTENTS OVERVIEW Introduction and Objectives 1 Observations and Conclusions 2 DETAILS OF FINDINGS Handguns in Aviation Facility 3 Inadequate Controls 4 RECOMMENDATIONS 6 MANAGEMENT COMMENTS 6 INSPECTOR COMMENTS 6 APPENDICES A. Scope and Methodology 7 B. Management Comments 8 Overview Page 1 Unauthorized Handguns on National Nuclear Security Administration Aircraft INTRODUCTION AND Within the Department of Energy (DOE), the National Nuclear OBJECTIVES Security Administration's (NNSA's) Office of Secure

269

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

people to bypass certain security restrictions. October 17, 2012 V-004: Oracle Critical Patch Update Advisory - October 2012 October 2012 Critical Patch Update, security...

270

Microsoft Word - Document2  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Grant Descriptions and Contact Information 2 Grant Descriptions and Contact Information Energy Security and Electric Industry Restructuring Forum With partial funding from DOE, the Consumer Energy Council of America convened a blue-ribbon group of electric industry including state legislators, regulators, and energy officials; Federal officials; consumer and environmental representatives; Congressional staff; and academic experts to build a consensus set of electric policy recommendations for public officials. The consensus set of recommendations was published in the April 2003 report Positioning the Consumer for the Future: A Roadmap to an Optimal Electric Power System. Download the 36-page Executive Summary. In addition, FY2000 grants to the National Council on Electricity Policy, the

271

Microsoft Outlook - Memo Style  

Gasoline and Diesel Fuel Update (EIA)

Garris, Pete Garris, Pete <Garris@WAPA.GOV> Sent: Monday, May 06, 2013 7:07 PM To: ERS2014 Cc: Clark, Kim; Buck, Darren; Johnson, Steven; Linke, Lloyd; Moulton, Ron Subject: Form EIA-930 form, ''Balancing Authority Operations Report Rebecca The EIA is creating an overlapping (redundent) reporting process. BAs already provide this information to the RC, FERC (FERC 714) and on their (BA's) OASIS. Much, if not all of the requested information could be obtained directly from the Regional Reliability Organization's Relibility Coordinator (RC). Two comments: 1) the EIA should consider importing the data directly from the RC a much more efficient and "cleaner" process. This should eliminate the imposition of additional system requirements, process requirements, security requirements and

272

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

273

Microsoft Word - FORM46002.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2.doc Microsoft Word - FORM46002.doc Microsoft Word - FORM46002.doc More Documents & Publications DOE F 4600.2 ATTACHMENT FLASH 2011-46(6) Attachment FY2011-63 OPAM...

274

Microsoft Word - AL2003-04.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Word - AL2003-04.doc Microsoft Word - AL2003-04.doc More Documents & Publications Microsoft Word - AL2006-08.doc AL2004-01r2.pdf City of Tulare Renewable Biogas Fuel Cell Project...

275

Microsoft Word - EERE PSRP 7 23 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EERE PSRP 7 23 2010 Microsoft Word - EERE PSRP 7 23 2010 Microsoft Word - EERE PSRP 7 23 2010 More Documents & Publications Office of Energy Efficiency and Renewable Energy Program...

276

Microsoft Word - Final MR AL.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Final MR AL.doc Microsoft Word - Final MR AL.doc Microsoft Word - Final MR AL.doc More Documents & Publications DOE F 4220.23 Weighted Guidelines Weighted Guidelines...

277

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

278

July 2012 ARRA Energy Assurance Planning Bulletin Available  

Energy.gov (U.S. Department of Energy (DOE))

The Department released the July 2012 issue of the ARRA Energy Assurance Planning Bulletin (EAPB). The ARRA EAPB is issued quarterly to provide information on energy assurance planning resources, upcoming events, training opportunities, and important grant deliverable dates. This is the eleventh issue of the EAP Bulletin; previous issues are available for download.

279

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

280

Microsoft Word - Los Alamos National Security, LLC_SUPP LIFE...  

NLE Websites -- All DOE Office Websites (Extended Search)

with your employer. The guaranteed issue amount is the amount of Insurance that you may elect without providing Am I guaranteed evidence of insurability. coverage? If you are newly...

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Microsoft Word - Los Alamos National Security, LLC_SUPP DISABILITY...  

NLE Websites -- All DOE Office Websites (Extended Search)

weekly and eligible for Supplemental Disability insurance. When can I enroll? You must elect coverage within 31 days of your date of hire. When is it effective? Coverage goes into...

282

Security Specialist  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

283

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

284

Global security  

SciTech Connect

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

285

Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

286

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

287

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

288

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

289

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

290

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

291

RESOURCES BIOMASS & BIOFUELS MRS BULLETIN VOLUME 33 APRIL 2008 www.mrs.org/bulletin Harnessing Materials for Energy  

E-Print Network (OSTI)

Conversion of Cellulosic Biomass to Ethanol The overall approach to converting cellulosic biomass to ethanol381 RESOURCES · BIOMASS & BIOFUELS MRS BULLETIN · VOLUME 33 · APRIL 2008 · www.mrs.org/bulletin · Harnessing Materials for Energy What Is Cellulosic Biomass? Although ethanol is now made from the sugars

California at Riverside, University of

292

Microsoft, libraries and open source  

SciTech Connect

We are finally starting to see the early signs of transformation inscholarly publishing. The innovations we've been expecting for years areslowly being adopted, but we can also expect the pace of change toaccelerate in the coming 3 to 5 years. At the same time, many of ritualsand artifacts of the scholarly communication lifecycle are still rooted ina centuries-old model. What are the primary goals of scholarlycommunication, and what will be the future role of librarians in thatcycle? What are the obstacles in information flow (many of our owndesign) that can be removed?Is the library profession moving fast enough to stay ahead of the curve...or are we ever going to be struggling to keep up? With the advent of thedata deluge, all-XML workflows, the semantic Web, cloud servicesand increasingly intelligent mobile devices - what are the implicationsfor libraries, archivists, publishers, scholarly societies as well asindividual researchers and scholars? The opportunities are many - butcapitalizing on this ever-evolving landscape will require significantchanges to our field, changes that we are not currently well-positioned toenact. This talk will map the current scholarly communication landscape -highlighting recent exciting developments, and will focus on therepercussions and some specific recommendations for the broader field ofinformation management.About the speaker:Alex Wade is the Director for Scholarly Communication within Microsoft'sExternal Research division, where he oversees several projects related toresearcher productivity tools, semantic information capture, and theinteroperability of information systems. Alex holds a Bachelor's degree inPhilosophy from U.C. Berkeley, and a Masters of Librarianship degree fromthe University of Washington.During his career at Microsoft, Alex has managed the corporate search andtaxonomy management services; has shipped a SharePoint-based document andworkflow management solution for Sarbanes-Oxley compliance; and served asSenior Program Manager for Windows Search in Windows Vista and Windows 7.Prior to joining Microsoft, Alex held Systems Librarian, EngineeringLibrarian, Philosophy Librarian, and technical library positions at theUniversity of Washington, the University of Michigan, and U.C. Berkeley.Web: http://research.microsoft.com/en-us/people/awade/

None

2010-04-26T23:59:59.000Z

293

Microsoft, libraries and open source  

ScienceCinema (OSTI)

We are finally starting to see the early signs of transformation inscholarly publishing. The innovations we've been expecting for years areslowly being adopted, but we can also expect the pace of change toaccelerate in the coming 3 to 5 years. At the same time, many of ritualsand artifacts of the scholarly communication lifecycle are still rooted ina centuries-old model. What are the primary goals of scholarlycommunication, and what will be the future role of librarians in thatcycle? What are the obstacles in information flow (many of our owndesign) that can be removed?Is the library profession moving fast enough to stay ahead of the curve...or are we ever going to be struggling to keep up? With the advent of thedata deluge, all-XML workflows, the semantic Web, cloud servicesand increasingly intelligent mobile devices - what are the implicationsfor libraries, archivists, publishers, scholarly societies as well asindividual researchers and scholars? The opportunities are many - butcapitalizing on this ever-evolving landscape will require significantchanges to our field, changes that we are not currently well-positioned toenact. This talk will map the current scholarly communication landscape -highlighting recent exciting developments, and will focus on therepercussions and some specific recommendations for the broader field ofinformation management.About the speaker:Alex Wade is the Director for Scholarly Communication within Microsoft'sExternal Research division, where he oversees several projects related toresearcher productivity tools, semantic information capture, and theinteroperability of information systems. Alex holds a Bachelor's degree inPhilosophy from U.C. Berkeley, and a Masters of Librarianship degree fromthe University of Washington.During his career at Microsoft, Alex has managed the corporate search andtaxonomy management services; has shipped a SharePoint-based document andworkflow management solution for Sarbanes-Oxley compliance; and served asSenior Program Manager for Windows Search in Windows Vista and Windows 7.Prior to joining Microsoft, Alex held Systems Librarian, EngineeringLibrarian, Philosophy Librarian, and technical library positions at theUniversity of Washington, the University of Michigan, and U.C. Berkeley.Web: http://research.microsoft.com/en-us/people/awade/

None

2011-10-06T23:59:59.000Z

294

Microsoft SQL Server 6.0{reg_sign} Workbook  

SciTech Connect

This workbook was prepared for introductory training in the use of Microsoft SQL Server Version 6.0. The examples are all taken from the PUBS database that Microsoft distributes for training purposes or from the Microsoft Online Documentation. The merits of the relational database are presented.

Augustenborg, E.C.

1996-09-01T23:59:59.000Z

295

Office of Quality Assurance: Newsletters and Bulletins  

NLE Websites -- All DOE Office Websites (Extended Search)

Quality Assurance Newsletters and Bulletins Quality Assurance Newsletters and Bulletins The Quality Assurance Exchange is a forum for the exchange of ideas and the sharing of experience related to QA issues among DOE field offices, contractors, and DOE headquarters. Readers are strongly encouraged to contribute articles on the implementation of QA requirements, on lessons learned and to offer suggestions. Please forward your input to duli.agarwal@hq.doe.gov. If your contact information has changed or if you would like to receive the QA Exchange Newsletter, forward the following information to qaexchange@hq.doe.gov. Name Phone Number E-mail address Federal or Contractor personnel DOE Organization or company name and site name, if applicable Quality Assurance Exchange August 2012, Volume 8 Issue 1

296

California State Fire Marshal Information Bulletin  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

California State Fire Marshal California State Fire Marshal Information Bulletin April 27, 2009 INFORMATION REGARDING PLACEMENT OF E85 FUEL DISPENSING EQUIPMENT ON STATE OWNED OR STATE LEASED FACILITIES In an effort to assist interested parties with criteria addressing E85 dispensing equipment, the Office of the State Fire Marshal (OSFM) is providing this informational bulletin. E85 is the acronym for an alcohol-blended gasoline fuel that contains between 15 to 85 percent ethanol (alcohol). Presently, there are over 10,000 gas service stations in California selling petroleum fuels (gasoline and diesel); and the number of stations dispensing E85 fuel continues to increase. The California Fire Code (CFC) and Title 19 of the California Code of Regulations (CCR) require all fuel-dispensers to be listed and labeled by an approved testing

297

2008-2010 Bulletin Industrial Engineering Curriculum  

E-Print Network (OSTI)

2008-2010 Bulletin M171Q (4) MATH 181Q Industrial Engineering Curriculum FRESHMAN Fall Spring M172Q (4) MATH 182Q SOPHOMORE JUNIOR SENIOR M273Q (4) MATH 224Q Fall Spring M274 (4)* MATH 225 I&ME 364 * (3) Fall Spring I&ME 422 (3) Fall Spring I&ME 477 (3) I&ME 354 (3) I&ME 454 (3) I&ME 434 (3) PHYS 211

Dyer, Bill

298

2010-2012 Bulletin Industrial Engineering Curriculum  

E-Print Network (OSTI)

2010-2012 Bulletin M 171Q (4) MATH 181Q Industrial Engineering Curriculum FRESHMAN Fall Spring M 172Q (4) MATH 182Q SOPHOMORE JUNIOR SENIOR M 273Q (4) MATH 224Q Fall Spring M 274 (4)* MATH 225 EIND 364 (3)* I&ME 364 Fall Spring EIND 422 (3) I&ME 422 Fall Spring EIND 477 (3) I&ME 477 EIND 354 (3) I

Dyer, Bill

299

Microsoft Word - IG-0658.rtf  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protective Force Response to a Security Incident at Sandia National Laboratory, California DOE/IG-0658 August 2004 Sunday, February 8, 2004 The 1-ton truck that breached the Sandia and Lawrence Livermore National Laboratories' security perimeter. SOURCE: SANDIA SECURITY OFFICE 1 time of the incident, the barriers were not up, as called for in the procedures, and security personnel could not activate them; and * Despite this incident, NNSA Federal and contractor security officials did not approve the use of the barrier activation procedures until May 2004, approximately 10 months after the installation of the barriers was completed. We could find no satisfactory explanation for the extended delay in implementing the totality of the $4.9 million in security

300

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Microsoft Word - Blue Cover _2_  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit Services Audit Services Audit Report National Nuclear Security Administration's Construction of a Radiological/Nuclear Complex for Homeland Security DOE/IG-0775 September 2007 2 * Effectively monitored project status; and, * Effectively communicated project status to senior Department of Energy and Homeland Security officials. In addition, without validation, the Nevada Site Office accepted the assurance of its contractor, Bechtel Nevada, that the project was on schedule and within budget despite early warning signs to the contrary. Our examination of the project further determined that management and coordination responsibilities between the Department and Homeland Security were not clearly defined

302

Microsoft Word - TFC-0009.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Support Operations, Office of Health, Safety and Security (Deputy Chief). Upon referral of this appeal from the Office of Hearings and Appeals, the Deputy Chief reviewed the...

303

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 15260 of 26,764 results. 51 - 15260 of 26,764 results. Download SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY http://energy.gov/oe/downloads/securing-oil-and-natural-gas-infrastructures-new-economy Article Apartment Hunting with an Eye to Energy Savings: Part I Apartment hunting can be a long and stressful process. Finding that right place is difficult, let alone finding the right place with the right price. http://energy.gov/energysaver/articles/apartment-hunting-eye-energy-savings-part-i Article T-533: Microsoft January 2011 Security Bulletin Release Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical.

304

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

305

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

306

Security In Information Systems  

E-Print Network (OSTI)

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

307

Microsoft Word - July 2008 PMCDP Module CHRIS ESS Tutorial.doc...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - July 2008 PMCDP Module CHRIS ESS Tutorial.doc Microsoft Word - July 2008 PMCDP Module CHRIS ESS Tutorial.doc Microsoft Word - July 2008 PMCDP Module CHRIS ESS...

308

Microsoft PowerPoint - IGCA Training 2010 v3 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IGCA Training 2010 v3 Microsoft PowerPoint - IGCA Training 2010 v3 Microsoft PowerPoint - IGCA Training 2010 v3 More Documents & Publications IGCA Training 2012 Microsoft...

309

Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report 111.doc Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report 111.doc Microsoft Word - NNSA...

310

Microsoft Word - AL-ARRAGAODeviation 6.12.09.doc | Department...  

Energy Savers (EERE)

ARRAGAODeviation 6.12.09.doc Microsoft Word - AL-ARRAGAODeviation 6.12.09.doc Microsoft Word - AL-ARRAGAODeviation 6.12.09.doc More Documents & Publications Microsoft Word -...

311

Microsoft PowerPoint - Nov 2009 PI Org Chart (web) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft PowerPoint - Nov 2009 PI Org Chart (web) Microsoft PowerPoint - Nov 2009 PI Org Chart (web) PI Organization chart Microsoft PowerPoint - Nov 2009 PI Org Chart (web) More...

312

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

313

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. February 14, 2011 T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote

314

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

315

Microsoft Word - IG-0691.rtf  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Access Controls at the Y-12 Security Access Controls at the Y-12 National Security Complex DOE/IG-0691 June 2005 that the Office of Independent Oversight and Performance Assurance (OA) augment its security review processes to address these issues. MANAGEMENT REACTION Management concurred in our findings and recommendations and committed to taking necessary corrective actions. NNSA, for example, stated that it would make all of its site office managers aware of the findings at Y-12 to ensure that steps are taken, if necessary, to improve facility access controls. The Office of Security and Safety Performance Assurance, OA's parent organization, informed us that access controls have been a recognized weakness across the Government and that much work is being done to prevent reoccurrences of the types of issues identified in this report.

316

RINGS Registration and Security  

E-Print Network (OSTI)

Windows 98 100 22 -78 -78.00% Microsoft Windows ME 60 10 -50 -83.33% Microsoft Windows 2000 85 47 -38 -44.71% Microsoft Windows XP 2983 3419 436 12.75% Linux 2 15 13 86.67% Mac OS 216 373 157 42.09% Xbox 16 16 100.00% Xbox 360 8 8 100.00% PS2 3 3 100... permission from the author. ^kpo=ae`m Advanced Network Services Registry Developed by NTS Software Engineering Team LDAP Based Java Core Very Flexible Dustin Brown Software Engineer Copyright The University of Kansas 2006. This work...

Brown, Dustin

2006-06-15T23:59:59.000Z

317

Initial CTBT international monitoring system security findings and recommendations  

SciTech Connect

An initial security evaluation of the proposed International Monitoring System (IMS) suggests safeguards at various points in the IMS to provide reliable information to the user community. Modeling the IMS as a network of information processing nodes provides a suitable architecture for assessing data surety needs of the system. The recommendations in this paper include the use of public-key authentication for data from monitoring stations and for commands issued to monitoring stations. Other monitoring station safeguards include tamper protection of sensor subsystems, preservation of data (i.e. short-term archival), and limiting the station`s network services. The recommendations for NDCs focus on the need to provide a backup to the IDC for data archival and data routing. Safeguards suggested for the IDC center on issues of reliability. The production of event bulletins should employ {open_quotes}two-man{close_quotes} procedures. As long as the data maintains its integrity, event bulletins can be produced by NDCs as well. The effective use of data authentication requires a sound key management system. Key management systems must be developed for the authentication of data, commands, and event bulletins if necessary. It is recommended that the trust placed in key management be distributed among multiple parties. The recommendations found in this paper offer safeguards for identified vulnerabilities in the IMS with regard to data surety. However, several outstanding security issues still exist. These issues include the need to formalize and obtain a consensus on a threat model and a trust model for the IMS. The final outstanding security issue that requires in-depth analysis concerns the IDC as a potential single point of failure in the current IMS design.

Craft, R.L.; Draelos, T.J.

1996-08-01T23:59:59.000Z

318

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

319

Personnel Security  

Directives, Delegations, and Requirements

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

320

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Office of Environmental Management (EM)

727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

322

Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA,...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management...

323

Microsoft Word - FOA 0000131 Final 10-11-09.docx | Department...  

Energy Savers (EERE)

Word - FOA 0000131 Final 10-11-09.docx More Documents & Publications Recovery Act: Clean Coal Power Initiative Microsoft Word - vDE-FOA-0000042.rtf Microsoft Word -...

324

Personnel Security  

Directives, Delegations, and Requirements

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

325

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SecurID two-factor authentication products June 8, 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 This Critical Patch Update contains 17 new security fixes...

326

2013 China Latin America Economic Bulletin Rebecca Ray and Kevin P. Gallagher  

E-Print Network (OSTI)

2013 China ­ Latin America Economic Bulletin Rebecca Ray and Kevin P. Gallagher The China-Latin America Economic Bulletin is an annual note that summarizes and synthesizes trends in the burgeoning China-Latin America economic

Dennett, Daniel

327

E-Print Network 3.0 - awareness bulletin number Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Sample search results for: awareness bulletin number Page: << < 1 2 3 4 5 > >> 1 Marketing Bulletin, 2003, 14, Article 2 Reprinted from Marketing Research On-Line, 1996, 1,...

328

V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability 7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability July 11, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Adobe ColdFusion PLATFORM: The vulnerability is reported in version 10 for Windows, Macintosh, and Linux ABSTRACT: The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets REFERENCE LINKS: Secunia Advisory SA54024 Adobe Security Bulletin APSB13-19 Stackoverflow.com CVE-2013-3350 IMPACT ASSESSMENT: High DISCUSSION: The hotfix resolves a vulnerability that could permit an attacker to invoke public methods on ColdFusion Components (CFC) using WebSockets IMPACT: Security Bypass

329

Microsoft Word - qa_aoss  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Automated Office Systems Support Automated Office Systems Support Quality Assurance Plan A Model DRAFT December 1996 United States Department of Energy Office of Nonproliferation and National Security I Title Page Document Name: Automated Office Systems Support Quality Assurance Plan - A Model Publication Date: Draft, December 1996 Contract Number: DE-AC01-95AD34277 Project Number: TA No.: SS-NN1-02-7-02 CDSI No.: 3021 Prepared by: Computer Data Systems, Inc. Kim Wandersee Approval John Greenhill Office of Nonproliferation and National Security United States Department of Energy Office of Nonproliferation and National Security I Table of Contents Executive Summary i Introduction i Purpose i

330

Microsoft Word - Blue Report Cover  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environment and Worker Safety Environment and Worker Safety Control Systems at the National Nuclear Security Administration's Kansas City Plant DOE/IG-0839 September 2010 Department of Energy Washington, DC 20585 September 20, 2010 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Environment and Worker Safety Control Systems at the National Nuclear Security Administration's Kansas City Plant" SUMMARY The Department of Energy's National Nuclear Security Administration's Kansas City Plant is located within the Bannister Federal Complex in Kansas City, Missouri, which also houses the General Services Administration and other agencies. Current and former employees and families

331

Quality Assurance Newsletters and Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Quality Assurance Newsletters and Bulletins Quality Assurance Newsletters and Bulletins Quality Assurance Newsletters and Bulletins Quality Assurance Newsletters and Bulletins QAExchangeJan2007_pic.jpg The Quality Assurance Exchange is a forum for the exchange of ideas and the sharing of experience related to QA issues among DOE field offices, contractors, and DOE headquarters. Readers are strongly encouraged to contribute articles on the implementation of QA requirements, on lessons learned and to offer suggestions. Please forward your input to duli.agarwal@hq.doe.gov. If your contact information has changed or if you would like to receive the QA Exchange Newsletter, forward the following information to qaexchange@hq.doe.gov. Name Phone Number E-mail address Federal or Contractor personnel DOE Organization or company name

332

Eisenhower Consortium Bulletin 12 September 1982 RIPARIAN HABITATS AND RECREATION  

E-Print Network (OSTI)

Eisenhower Consortium Bulletin 12 September 1982 RIPARIAN HABITATS AND RECREATION recreational pressures on these ecotones between water and surrounding uplands are forcing management agencies and Recreational History ............................................... 4 Impacts to Riparian Ecosystems

333

2797Bulletin of the American Meteorological Society 1. Introduction  

E-Print Network (OSTI)

and associated length scales, boundary layer formulation, runoff generation, and groundwa- Modeling Root Water2797Bulletin of the American Meteorological Society 1. Introduction Within atmospheric modeling properties may directly affect the atmospheric boundary layer. Deforestation experi- ments showed

Jackson, Robert B.

334

Fishery Bulletin Index Energetics 125 Energy consumption rates 332  

E-Print Network (OSTI)

655 Fishery Bulletin Index Energetics 125 Energy consumption rates 332 Volume 103(1­4), 2005 Apodichthys flavidus 476 Coral reefs 360 Food habits 445, 626 Argentina 482 Correspondence analysis 256

335

ITL BULLETIN FOR NOVEMBER 2013 ITL RELEASES PRELIMINARY CYBERSECURITY FRAMEWORK  

E-Print Network (OSTI)

ITL BULLETIN FOR NOVEMBER 2013 ITL RELEASES PRELIMINARY CYBERSECURITY FRAMEWORK The Information a Preliminary Cybersecurity Framework for public review and comment. ITL developed the framework based is developing the framework under Executive Order 13636, Improving Critical Infrastructure Cybersecurity, which

336

Bulletin of Tibetology: Volume 31 Seminar Volume Press Release  

E-Print Network (OSTI)

was rcleast':d by the Hon;bJe Cultural Mlllistcr who virtue of 1m high positIon lS also the Vlclgh thClr 116 Bulletin of Tibetology precept and practice and expressed his...

Namgyal Institute of Tibetology

1995-01-01T23:59:59.000Z

337

SDSU GRADUATE BULLETIN 2014-2015 175 General Information  

E-Print Network (OSTI)

SDSU GRADUATE BULLETIN 2014-2015 175 General Information The College of Education offers graduate and technology, postsec- ondary educational leadership and instruction, reading education, secondary curriculum and research underlying educational practice as preparation for positions in higher education, school

Gallo, Linda C.

338

Microsoft Word - m470.4-5  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Safety Office of Security and Safety Performance Assurance Approved: 08-26-05 PERSONNEL SECURITY U.S. DEPARTMENT OF ENERGY Office of Security and Safety Performance Assurance DOE M 470.4-5 DOE M 470.4-5 08-26-05 1 PERSONNEL SECURITY 1. PURPOSE. This Manual establishes the overall objectives and requirements for the Personnel Security Program in the U.S. Department of Energy (DOE), including the National Nuclear Security Administration (NNSA).

339

Microsoft Word - CCPPI.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

If elements andor attachments of an application for a loan under Section 136 of the Energy Independence and Security Act of 2007 (the U.S. Department of Energy's DOE...

340

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Energy Security Council  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

342

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

343

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

344

Information Security  

Directives, Delegations, and Requirements

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

345

Information Security  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

346

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network (OSTI)

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

347

Tag: Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

348

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

349

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

350

Security Conditions  

Directives, Delegations, and Requirements

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

351

Personnel Security  

Directives, Delegations, and Requirements

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

352

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

353

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

354

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

355

Microsoft Word - AL2006-11.doc | Department of Energy  

Office of Environmental Management (EM)

Contract Without Full and Open Competition and Site and Utilization Management Planning Subject: Cost and Price Analysis Microsoft Word - Policy Flash 2010-67 Attachment 1...

356

Microsoft Word - al96-09.doc | Department of Energy  

Energy Savers (EERE)

Contract Without Full and Open Competition and Site and Utilization Management Planning Subject: Cost and Price Analysis Microsoft Word - Policy Flash 2010-67 Attachment 1...

357

Microsoft Word - PeerReview_SAR.doc | Department of Energy  

Energy Savers (EERE)

- PeerReviewCCSP.doc Microsoft Word - Cross Reference Matrix Introduction.doc DRAFT NEPA Guidance on Consideration of the Effects of Climate Change and Greenhouse Gas Emissions...

358

Microsoft PowerPoint - Tsinghua Slideshow final for distribution...  

Energy Savers (EERE)

Documents & Publications Microsoft PowerPoint - Final translated version of Tsinghua Speech Idaho Operations AMWTP Fact Sheet Heating Ventilation and Air Conditioning Efficiency...

359

Microsoft Word - 338M_Geothermal_Project_Descriptions | Department...  

Energy Savers (EERE)

Word - 338MGeothermalProjectDescriptions More Documents & Publications Microsoft Word - 564MBiomassProject Descriptions FINAL 120409 564MBiomassProjects.pdf Slide 1...

360

Microsoft PowerPoint - WH Energy and Climate Stakeholders 10...  

Office of Environmental Management (EM)

& Publications Rising Electricity Costs: A Challenge For Consumers, Regulators, And Utilities US-China Clean Energy Forum 2010 Microsoft PowerPoint - CHUGrid Week 9-21-09...

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Microsoft Word - CERFDOE Final Report - 071204.doc | Department...  

Energy Savers (EERE)

Microsoft Word - CERFDOE Final Report - 071204.doc More Documents & Publications Integrated Project Team RM DOE EIR FM.doc Proposed Data Elements for PARS II Web Application...

362

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file. Impact: An attacker can exploit...

363

Microsoft PowerPoint - PaulGottliebTechTransfer | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft PowerPoint - PaulGottliebTechTransfer More Documents & Publications Alliance For Sustainable Energy AllianceForSustainableEnergy-Letter.pdf Government Practices...

364

Microsoft Word - ADM 18.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 ADM 18 O:\IM-23\Schedules\ADM Schedules\ADM 18.doc Rev 1 June 2007 DEPARTMENT OF ENERGY ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS June 2007 Revision 1 Protection program records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive unclassified information, special nuclear materials, nuclear weapons, other Government property); to protect Departmental facilities from unauthorized entry, sabotage, or loss; to ensure the adequacy of protective measures at privately-owned plants given security cognizance by the Department; and to determine eligibility for access authorization of individuals employed by DOE or its contractors.

365

Microsoft Word - position.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

Director Director Lawrence L ivermore N ational L aboratory The University of California and Lawrence Livermore National Security, LLC (LLNS) invite nominations and applications for the position of Director of Lawrence Livermore National Laboratory (www.llnl.gov). LLNL is a national security laboratory managed by LLNS for the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA). The Laboratory was e stablished i n 1 952 a nd i s l ocated 4 9 m iles s outheast o f S an F rancisco i n L ivermore, C alif. LLNS is a limited liability company, the members of which include the University of California, Bechtel N ational, I nc., B WX T echnologies, I nc., a nd U RS E nergy & C onstruction, I nc. T he L aboratory Director is the President of the LLC, reports

366

Microsoft Word - BLUE REPORT COVER  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Follow-up Audit of the National Follow-up Audit of the National Nuclear Security Administration's W76 Nuclear Warhead Refurbishment Program DOE/IG-0870 September 2012 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 September 26, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: "Follow-up Audit of the National Nuclear Security Administration's W76 Nuclear Warhead Refurbishment Program" BACKGROUND The Department of Energy's National Nuclear Security Administration is responsible for ensuring that the Nation's nuclear weapons stockpile continues to meet National defense requirements. As part of that effort, NNSA is refurbishing the aging W76 nuclear warhead with

367

Microsoft Word - STIP 11732.doc  

Office of Scientific and Technical Information (OSTI)

31 31 Preliminary Benchmarking Efforts and MCNP Simulation Results for Homeland Security Robert B. Hayes, PhD, CHP, PE Senior Scientist Remote Sensing Laboratory Las Vegas, NV 89193 hayesrb@nv.doe.gov Keywords: Monte Carlo, Benchmark, Detector, Homeland Security, Testing Executive Summary It is shown in this work that basic measurements made from well defined source detector configurations can be readily converted in to benchmark quality results by which Monte Carlo N-Particle (MCNP) input stacks can be validated. Specifically, a recent measurement made in support of national security at the Nevada Test Site (NTS) is described with sufficient detail to be submitted to the American Nuclear Society's (ANS) Joint Benchmark Committee (JBC) for consideration as a radiation measurement

368

Microsoft PowerPoint - Enhancements_Schreiber  

Office of Environmental Management (EM)

Security Communications Protocol Ad Hoc Working Group 2014 Annual Meeting of the National Transportation Lt. Carla Schreiber Nebraska State Patrol Security Communications...

369

Microsoft Word - Coverpage.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Securing Cyberspace Securing Cyberspace for the 44 th Presidency A Report of the CSIS Commission on Cybersecurity for the 44 th Presidency Cochairs: Representative James R. Langevin Representative Michael T. McCaul Scott Charney Lt. General Harry Raduege, USAF (Ret) Project Director: James A. Lewis Center for Strategic and International Studies Washington, DC December 2008 About CSIS In an era of ever-changing global opportunities and challenges, the Center for Strategic and International Studies (CSIS) provides strategic insights and practical policy solutions to decisionmakers. CSIS conducts research and analysis and develops policy initiatives that look into the future and anticipate change. Founded by David M. Abshire and Admiral Arleigh Burke at

370

Microsoft Word - IG-0660.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Internal Controls Over the Accountability Internal Controls Over the Accountability of Computers at Sandia National Laboratory, New Mexico DOE/IG-0660 August 2004 This inspection complements similar work performed by the Office of Inspector General at several other DOE sites. MANAGEMENT REACTION Management concurred with our recommendations and has taken or initiated corrective actions. Management's comments are provided in their entirety in Appendix B of the report. We found management's comments to be responsive to our report. Attachment cc: Deputy Secretary Administrator, National Nuclear Security Administration Under Secretary for Energy, Science and Environment Director, Office of Security and Safety Performance Assurance Director, Policy and Internal Controls Management

371

Microsoft Word - NTSFIREARMS021105.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Nevada the Nevada Test Site DOE/IG-0674 February 2005 UNAUTHORIZED HANDGUNS ON THE NEVADA TEST SITE TABLE OF CONTENTS OVERVIEW Introduction and Objectives 1 Observations and Conclusions 2 DETAILS OF FINDINGS Handguns on the Nevada Test Site 3 Property Controls 4 Issuance of Firearms 4 RECOMMENDATIONS 6 MANAGEMENT COMMENTS 7 INSPECTOR COMMENTS 7 APPENDICES A. Scope and Methodology 8 B. Management Comments 9 Overview Page 1 Unauthorized Handguns on the Nevada Test Site INTRODUCTION AND Within the Department of Energy (DOE), the National Nuclear OBJECTIVES Security Administration's (NNSA's) Office of Secure Transportation (OST) is responsible for providing the safe and

372

POLICY BULLETIN: POL-5 - Declassification Instruction "25X1-human" |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POLICY BULLETIN: POL-5 - Declassification Instruction "25X1-human" POLICY BULLETIN: POL-5 - Declassification Instruction "25X1-human" POLICY BULLETIN: POL-5 - Declassification Instruction "25X1-human" Provides instructions on the appropriate action to take when classification guide topics or source documents cite "25X1-human" declassification instructions. Policy Bulletin 5, Declassification Instruction "25X1-human" More Documents & Publications The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, October 1, 2012, Volume 3 No. 4 The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, July 1 2010, Volume 1 No. 3 The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, April 1 2011, Volume 2 No. 2

373

JC3 Bulletin Archive | Department of Energy  

Energy Savers (EERE)

certain security restrictions and to conduct spoofing attacks September 3, 2013 V-233: Red Hat update for JBoss Fuse This fixes multiple vulnerabilities, which can be exploited...

374

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive information, and compromise a user's system. April 11, 2012...

375

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

virtual system. June 14, 2012 U-191: Oracle Java Multiple Vulnerabilities The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are...

376

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical...

377

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

an unsuspecting user to follow a malicious URI. October 25, 2011 U-019: Oracle Critical Patch Update Advisory - October 2011 October 2011 Critical Patch Update, security...

378

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

does not properly validate unreferenced URLs. January 18, 2012 U-083:Oracle Critical Patch Update Advisory - January 2012 Critical Patch Update contains 78 new security fixes...

379

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

statement February 16, 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 This Critical Patch Update contains 21 new security...

380

U-070:Redhat krb5 Critical Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70:Redhat krb5 Critical Security Update 70:Redhat krb5 Critical Security Update U-070:Redhat krb5 Critical Security Update December 28, 2011 - 8:30am Addthis PROBLEM: redhat krb5 Critical Security Update PLATFORM: RHEL Desktop Workstation (v. 5 client) Red Hat Desktop (v. 4) Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux Desktop (v. 5 client) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) ABSTRACT: Vulnerability can be exploited by malicious people to compromise a vulnerable system. REFERENCE LINKS: RHSA-2011:1851-2 MITKRB5-SA-2011-008 Secunia Advisory: SA47357 Secunia Advisory: SA47359 RH Bugzilla: 770325 CVE-2011-4862 JC3-CIRC Tech Bulletin U-069 IMPACT ASSESSMENT: High Discussion: krb5 telnet daemon is not enabled by default in any version of Red Hat

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

382

The ARRA EAP Energy Assurance Planning Bulletin  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

JULY 9, 2012 THE AMERICAN RECOVERY AND REINVESTMENT ACT VOLUME 3, NUMBER 3 JULY 9, 2012 THE AMERICAN RECOVERY AND REINVESTMENT ACT VOLUME 3, NUMBER 3 Need to Know DOE/OE National Energy Assurance Conference Action Items Final Energy Assurance Plans and Reporting Deadlines News from the States California Approves Energy Efficiency Standards Energy Assurance Success Stories Heber Light & Power Takes Lead on Local EA Planning Upcoming Events NASEO/NARUC Environmental Protection & Clean, Reliable Energy Conference "Camp NARUC" GFIRST 2012 Conference Energy Utility Basics Course Guidance from PTI Know the Primary Contacts and Related Partners Alice Lippert, EAP Program Manager Alice.Lippert@hq.doe.gov DOE/OE Website http://www.oe.energy.gov Welcome to the eleventh issue of the quarterly Energy Assurance Planning Bulletin, a service

383

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

384

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

385

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

386

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2013 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 26, 2013 V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability A security issue and a vulnerability have been reported in the Login Security module for Drupal June 25, 2013 V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability Apache has acknowledged a vulnerability in Apache OpenOffice SDK June 24, 2013 V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks A vulnerability was reported in Google Chrome.

387

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2011 20, 2011 T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. January 19, 2011 T-537: Oracle Critical Patch Update Advisory - January 2011 A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required because of interdependencies by those security patches. Critical Patch Updates are cumulative. January 18, 2011 T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on

388

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

389

Transportation Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

390

The Bulletin Vol. 60 - No. 23 July 14, 2006  

NLE Websites -- All DOE Office Websites (Extended Search)

Bulletin Bulletin July 14, 2006 CALENDAR OF LABORATORY EVENTS * The BERA Sales Office is located in Berk- ner Hall and is open weekdays from 9 a.m. to 3 p.m. For more information on BERA events, contact Andrea Dehler, Ext. 3347, or Christine Carter, Ext. 2873. * Additional information for Hospitality Committee events may be found at the Lollipop House and the laundry in the apartment area. * The Recreation Building (Rec. Hall) is lo- cated in the apartment area. * Contact names are provided for most events for more information. * Calendar events flagged with an asterisk (*) have an accompanying story in this week's Bulletin. New X-Ray Delivery Method Could Improve Radiation Therapy (cont'd) - EACH WEEK - Weekdays: Free English for Speakers Of Other Languages Classes Beginner, Intermediate, Advanced classes. Various times. All are wel- come. Learn English, make friends.

391

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

392

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

393

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

394

Microsoft Word - Agenda 071910.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cybersecurity for Energy Delivery Systems Cybersecurity for Energy Delivery Systems 2010 Peer Review July 20-22, 2010 Westin Alexandria ● Alexandria, VA Tuesday, July 20 - Day 1 Time Activity Host/Presenter 7:30 - 8:30 am Registration and Continental Breakfast 8:30 - 8:45 am Welcome from Program Manager Carol Hawk 8:45 - 9:00 am Introductions and Instructions Katie Jereza Best Practices/Standards Development 9:00 - 9:30 am Advanced Security Acceleration Project for the Smart Grid (ASAP-SG) Oak Ridge National Laboratory 9:30 - 10:00 am Lemnos Interoperable Security EnerNex Corporation 10:00 - 10:30 am Trustworthy Wireless for Critical Infrastructure Sites Oak Ridge National Laboratory 10:30 - 11:00 am BREAK Best Practice Design/Configuration

395

Microsoft Word - Cover Sheet - 020711  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

II: Comment Response Document II: Comment Response Document COVER SHEET RESPONSIBLE AGENCY: United States (U.S.) Department of Energy (DOE), National Nuclear Security Administration (NNSA) TITLE: Final Site-Wide Environmental Impact Statement for the Y-12 National Security Complex (DOE/EIS-0387) (Final Y-12 SWEIS) CONTACT: For further information on this SWEIS, For general information on the DOE contact: National Environmental Policy Act (NEPA) process, contact: Pam Gorman Carol Borgstrom, Director Y-12 SWEIS Document Manager Office of NEPA Policy and Compliance, GC-54 Y-12 Site Office U.S. Department of Energy 800 Oak Ridge Turnpike 1000 Independence Avenue, SW Suite A-500 Washington, DC 20585 Oak Ridge, TN 37830 (202) 586-4600 (865) 576-9903 or leave a message at 1-800-472-2756

396

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

397

Security for grids  

SciTech Connect

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

398

Solidification/stabilization of organics and inorganics. Engineering bulletin  

SciTech Connect

The engineering bulletin on solidification refers to techniques that encapsulate hazardous waste into a solid material of high structural integrity. Encapsulation involves either fine waste particles (microencapsulation) or a large block or container of wastes (macroencapsulation). Stabilization refers to techniques that treat hazardous waste by converting it into a less soluble, mobile, or toxic form. Solidification/Stabilization processes utilize one or both of these techniques. The bulletin provides information on the technology applicability, the technology limitations, a description of the technology, the types of residuals produced, site requirements, the latest performance data, the status of the technology, and sources of further information.

Not Available

1992-09-01T23:59:59.000Z

399

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

22, 2012 22, 2012 V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service). October 19, 2012 V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. October 18, 2012 V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions. October 17, 2012

400

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2011 26, 2011 T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. July 25, 2011 T-675: Apple Laptop Battery Interface Lets Local Users Deny Service Apple Laptop Battery Interface Lets Local Users Deny Service July 22, 2011 T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vulnerability in a security advisory and released software updates. June 1, 2011 T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could...

402

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

403

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

404

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

405

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

406

Personnel Security Activities  

Directives, Delegations, and Requirements

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

407

Security | Department of Energy  

Energy Savers (EERE)

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

408

Security & Privacy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

409

Microsoft Word - 2011-YIR-043012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 2012 April 2012 Year-in-Review: 2011 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S. Department of Energy DOE / OE / ISER ii 2011 YIR For Further Information This report was prepared by the Office of Electricity Delivery and Energy Reliability under the direction of Patricia Hoffman, Assistant Secretary, and William Bryan, Deputy Assistant Secretary. Specific questions about this report may be directed to Alice Lippert, Senior Technical Advisor (alice.lippert@hq.doe.gov). Contributors include Rick Tidball, Kevin DeCorla-Souza, and Laura Gehlin. DOE / OE / ISER 1 2011 YIR Contents 1. Introduction ..................................................................................................................................... 4

410

Microsoft Word - IG-0681.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inquiries Inquiries Inspection Report Concerns Regarding a Non-Viable (Dead) "Anthrax Spore" Research Project at the Oak Ridge National Laboratory DOE/IG-0681 March 2005 CONCERNS REGARDING A NON-VIABLE (DEAD) "ANTHRAX SPORE" RESEARCH PROJECT AT THE OAK RIDGE NATIONAL LABORATORY TABLE OF CONTENTS OVERVIEW Introduction and Objective 1 Observations and Conclusions 2 DETAILS OF FINDINGS Background 3 Authorization 3 Security Issues 4 OBSERVATIONS 6 RECOMMENDATIONS 7 MANAGEMENT COMMENTS 8 INSPECTOR COMMENTS 8 APPENDICES A. Scope and Methodology 10 B. Management Comments 11 Overview Page 1 Concerns Regarding a Non-Viable (Dead) "Anthrax Spore" Research Project at the Oak Ridge National

411

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

412

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," OMB No. 1905-0057" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Expiration Date: 7/31/2016" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Version No: 2013.002" "ANNUAL REPORT OF THE ORIGIN OF NATURAL GAS LIQUIDS PRODUCTION"

413

Microsoft Word - Y-12 Special Inquiry ELECTRONIC  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Review of the Compromise of Review of the Compromise of Security Test Materials at the Y-12 National Security Complex DOE/IG-0875 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 26, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Report on "Review of the Compromise of Security Test Materials at the Y-12 National Security Complex" BACKGROUND Following the July 28, 2012, security breach at the Y-12 National Security Complex (Y-12), the Department of Energy's Office of Health, Safety and Security (HSS) was tasked with conducting a comprehensive inspection of the site's security organization. The inspection, initiated on

414

1 MICROSOFT.COM/CITIZENSHIP Microsoft on the Topic: Environmental Sustainability  

E-Print Network (OSTI)

. Microsoft is working with leading organizations around the globe to help increase the value that our to protect the environment, conserve natural resources, and safeguard the health and safety of our employees and indirect impact on the environment. A few examples include: · Data Center Operations: We are working

Narasayya, Vivek

415

1 Microsoft's Top 10 Business Practices for Environmentally Sustainable Datacenters Microsoft's Top 10 Business Practices for  

E-Print Network (OSTI)

outcomes include: Using information technology (IT) to improve energy efficiency; Accelerating--along with Microsoft's commitment to share best practices with the rest of the datacenter industry--this paper presents incentives to datacenter managers, not just for uptime, but also for improving energy efficiency as measured

Chaudhuri, Surajit

416

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

417

Now Available: July 2011 issue of the Energy Assurance Planning Bulletin  

Energy.gov (U.S. Department of Energy (DOE))

This quarter's issue of the Energy Assurance Planning Bulletin highlights upcoming DOE/OE Regional Exercises, Recipient Action Items, and success stories.

418

257IIT Graduate Bulletin 2006-2008 Institute of Psychology  

E-Print Network (OSTI)

257IIT Graduate Bulletin 2006-2008 Institute of Psychology Institute of Psychology Life Sciences Building 3101 S. Dearborn St. Chicago, IL 60616 312.567.3500 psychology@iit.edu www Lam The Institute of Psychology offers graduate programs in Clinical, Industrial/Organizational (I

Heller, Barbara

419

Cities Programme Stakeholder Bulletin No. 2 (Nov 2007)  

E-Print Network (OSTI)

of energy efficiency initiatives are already underway, and recent extreme weather has provided motivation the last stakeholder meeting held in July. This bulletin, reports in more detail on recent progress made considerable potential for Tyndall work to inform strategic policy decisions. Page 1 of 4 #12;Personal

Watson, Andrew

420

OCRWM Bulletin: Westinghouse begins designing multi-purpose canister  

SciTech Connect

This publication consists of two parts: OCRWM (Office of Civilian Radioactive Waste Management) Bulletin; and Of Mountains & Science which has articles on the Yucca Mountain project. The OCRWM provides information about OCRWM activities and in this issue has articles on multi-purpose canister design, and transportation cask trailer.

NONE

1995-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

A Monthly Safety Bulletin The Office of the NASA  

E-Print Network (OSTI)

A Monthly Safety Bulletin from The Office of the NASA Aviation Safety Reporting System, P.O. Box 189, Moffett Field, CA 94035-0189 http://asrs.arc.nasa.gov/ ASRS Recently Issued Alerts On... Opening program. It therefore asked NASA to act as the independent third party that would administer the program

422

A Monthly Safety Bulletin from The Office of the NASA  

E-Print Network (OSTI)

is not noted in aircraft's POH [Pilot's Operating Handbook] and has not been properly communicatedA Monthly Safety Bulletin from The Office of the NASA Aviation Safety Reporting System, P.O. Box 800 flight crew, accumulation of deicing fluid in an Auxiliary Power Unit (APU) after takeoff led

423

SDSU GRADUATE BULLETIN 2012-2013 309 Mathematics  

E-Print Network (OSTI)

SDSU GRADUATE BULLETIN 2012-2013 309 Mathematics In the Department of Mathematics and Statistics In the College of Sciences OFFICE: Geology/Mathematics/Computer Science 413 TELEPHONE: 619-594-6191 Chair of Department: Richard A. Levine, Ph.D. Faculty Mathematics and Applications Ricardo Carretero, Ph.D., Professor

Gallo, Linda C.

424

NANOTECHNOLOGY 4 NOVEMBER 2004 NanotechnologyE-Bulletin  

E-Print Network (OSTI)

NANOTECHNOLOGY 4 NOVEMBER 2004 NanotechnologyE-Bulletin Three-dimensional nanofabrication for many areas of nanotechnology. An indirect approach to 3D uses the repeti- tive application of steps structures. #12;NANOTECHNOLOGY 4 NOVEMBER 2004 source and the size of the phase mask limit the dimensions

Rogers, John A.

425

Physics Division ESH Bulletin 99-2 OPERATIONAL IMPERATIVES  

E-Print Network (OSTI)

be found in the Institutional Plan. · · · · · · · · Conduct all operations with due regard for the health and conduct all operations in a safe and environmentally responsible manner . Adhere to the highestPhysics Division ESH Bulletin 99-2 OPERATIONAL IMPERATIVES: NOT JUST FOR MANAGERS In the course

426

483Bulletin of the American Meteorological Society 1. Introduction  

E-Print Network (OSTI)

483Bulletin of the American Meteorological Society 1. Introduction The marine stratocumulus1 transit from the ITCZ to San Diego as an ad hoc use of the ship and its instruments for the remaining 8 days of ship time. Since TEPPS was designed as an ITCZ experiment, the ship was not equipped with many

Houze Jr., Robert A.

427

Bulletin, Fire Prevention Measures For Cutting, Welding, And Related Activities  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this Bulletin is to summarize existing DOE and industry requirements, standards,and guidelines that are applicable to hot work and related activities that represent a significant fire risk to DOE and contractor personnel, programs, and facilities. [DOE/EH-0196 Issue No.97-3

428

2359Bulletin of the American Meteorological Society 1. Introduction  

E-Print Network (OSTI)

2359Bulletin of the American Meteorological Society 1. Introduction A devastating flash flood in Fort Collins, Colorado, on 28 July 1997 resulted in 5 deaths, 62 injuries re- quiring hospitalization frequencies. Significant flooding oc- curred in about half the city, with the most serious events taking place

Collett Jr., Jeffrey L.

429

Department of Biosystems and Agricultural Engineering BAE BULLETIN  

E-Print Network (OSTI)

on the Renewable Bioenergy Systems study abroad program in Sweden and Germany stand on top of the Smurfit KappaDepartment of Biosystems and Agricultural Engineering BAE BULLETIN Annual Review 2014 Integrating Engineering and Biology since 1906 Food Quality, Safety and Biosecurity Renewable Bioenergy Systems

430

Department of Biomedical Engineering IIT Graduate Bulletin 2006-2008  

E-Print Network (OSTI)

104 Department of Biomedical Engineering IIT Graduate Bulletin 2006-2008 Department of Biomedical.iit.edu/~biomed Chair: Vincent Turitto The Department of Biomedical Engineering confers a doc- toral degree in biomedical engineering (Ph.D. in Biomedical Engineering). Currently, ten faculty members hold tenure- track

Heller, Barbara

431

ITL BULLETIN FOR JUNE 2014 ITL FORENSIC SCIENCE PROGRAM  

E-Print Network (OSTI)

ITL BULLETIN FOR JUNE 2014 ITL FORENSIC SCIENCE PROGRAM Barbara Guttman, Software and Systems.S. Department of Commerce Digital forensics is the process used to acquire, preserve, analyze, and report, and statistics, the ITL Forensic Science program advances the measurements and standards infrastructure

432

U-117: Potential security vulnerability has been identified with certain HP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Potential security vulnerability has been identified with 7: Potential security vulnerability has been identified with certain HP printers and HP digital senders U-117: Potential security vulnerability has been identified with certain HP printers and HP digital senders March 5, 2012 - 7:00am Addthis PROBLEM: The vulnerability could be exploited remotely to install unauthorized printer firmware. PLATFORM: Select HP printers and Digital Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. reference LINKS: Vendor Advisory CVE-2011-4161 Previous JC3 Advisory Bulletin IMPACT ASSESSMENT: High Discussion: The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, 4xxx, 5550, 9500, CMxxxx, CPxxxx, and Enterprise CPxxxx;

433

Microsoft Word - securitycorefunction20080514 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY CORE FUNCTION SECURITY CORE FUNCTION AND DEFINITION REPORT Prepared by: EnerNex Corporation 170C Market Place Blvd Knoxville, TN 37922-2337 USA (865) 691-5540 www.enernex.com Version 1 May 13, 2008 Table of Contents 1 SUMMARY .............................................................................................................. 3 1.1 PROBLEM STATEMENT ..................................................................................................................................... 3 1.2 VISION ............................................................................................................................................................. 4 2 SECURITY FUNCTION TABLE ............................................................................... 6

434

Microsoft Word - Blue Cover.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security National Nuclear Security Administration's Refurbishment of the B61 DOE/IG-0697 August 2005 REPORT ON THE NATIONAL NUCLEAR SECURITY ADMINISTRATION'S REFURBISHMENT OF THE B61 TABLE OF CONTENTS Project Management Controls Over the B61 Refurbishment Details of Finding..............................................................................1 Recommendations ............................................................................5 Comments..........................................................................................6 Appendices 1. Objective, Scope, and Methodology.............................................7 2. Related Reports.............................................................................9

435

Microsoft Word - Final Cover.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security National Nuclear Security Administration's Implementation of the 2003 Design Basis Threat DOE/IG-0705 October 2005 SPECIAL REPORT ON THE NATIONAL NUCLEAR SECURITY ADMINISTRATION'S IMPLEMENTATION OF THE 2003 DESIGN BASIS THREAT TABLE OF CONTENTS Implementation of the Design Basis Threat Details of Finding ...........................................................................................1 Recommendations...........................................................................................9 Comments .....................................................................................................10 Appendices 1. Objective, Scope, and Methodology........................................................11

436

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

437

BULLETIN OF MARINE SCIENCE. 87(2):251274. 2011 doi:10.5343/bms.2010.1089  

E-Print Network (OSTI)

biodiversity and (2) sustain pro- #12;BULLETIN OF MARINE SCIENCE. VOL 87, NO 2. 2011252 ductive fisheriesBULLETIN OF MARINE SCIENCE. 87(2):251­274. 2011 doi:10.5343/bms.2010.1089 251Bulletin of Marine Science © 2011 Rosenstiel School of Marine and Atmospheric Science of the University of Miami Bridging

438

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

439

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

440

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

442

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 T-636: Wireshark Multiple Flaws Let Remote Users Deny Service Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. June 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges

443

Personnel Security Program Manual  

Directives, Delegations, and Requirements

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

444

Personnel Security Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

445

Office of Security Assistance  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

446

Microsoft Word - PSH-12-0098.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Personnel Security Hearing ) Personnel Security Hearing ) ) Filing Date: July 26, 2012 ) ) Case No.: PSH-12-0098 __________________________________________) Issued: _______________ Hearing Officer Decision _______________ Richard A. Cronin, Jr., Hearing Officer: This Decision concerns the eligibility of XXXXXXXXXXXXXXXX ("the Individual") to hold a Department of Energy (DOE) access authorization. 1 For the reasons detailed below, I find that the Individual's suspended access authorization should be restored. I. BACKGROUND The Individual is a contractor employee at a DOE facility who has possessed a security clearance since 1979. Exhibit (Ex.) 10 at 43. In January 2012, the Local Security Office (LSO) received an incident report indicating that the Individual had received a security infraction for failure to

447

Microsoft Word - IG-0716-Rept 011906..doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Department of Energy Office of Inspector General Office of Inspections and Special Inquiries Inspection Report Security Clearance Terminations and Badge Retrieval at the Lawrence Livermore National Laboratory DOE/IG-0716 January 2006 SECURITY CLEARANCE TERMINATIONS AND BADGE RETRIEVAL AT THE LAWRENCE LIVERMORE NATIONAL LABORATORY TABLE OF CONTENTS OVERVIEW Introduction and Objectives 1 Observations and Conclusions 1 DETAILS OF FINDINGS Security Badges 4 Categorization of Unrecovered Badges 4 DOE Security Clearance Database 5 Livermore Database 5 Security Termination Statements 6 Out-Processing Procedures 6 Other Personnel 7 Performance Measures 8

448

Microsoft Word - IG-0662 REPORT.rtf  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2004 DOE/IG-0662 SEPTEMBER 2004 EVALUATION REPORT ON THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM - 2004 TABLE OF CONTENTS Cyber Security Program Details of Finding ...................................................1 Recommendations and Comments ........................7 Appendices 1. Objective, Scope, and Methodology..................8 2. Related Reports ...............................................10 CYBER SECURITY PROGRAM Page 1 Details of Finding Program Our evaluation established that the Department of Energy Improvements (Department) had taken steps to strengthen its cyber security program and implemented countermeasures to reduce network

449

Microsoft PowerPoint - Kosinski  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advanced Research Projects Advanced Research Projects Agency - Energy (ARPA-E) Shane Kosinski Research Opportunities with the DOE for HBCUs July 9, 2009 2 Background on ARPA-E Rising Above the Gathering Storm, 2006 (National Academies) * Establish an Advanced Research Projects Agency for Energy (ARPA-E) * "Creative, out-of-the-box, transformational" energy research * Spinoff Benefit - Help educate next generation of researchers * Secretary Chu (then Director of Berkeley National lab) on committee America COMPETES Act, 2007 * Authorizes the establishment of ARPA-E American Recovery and Reinvestment Act of 2009 (Recovery Act) * $400M provided for ARPA-E * President Obama launches ARPA-E in a speech at NAS on April 27, 2009 3 Background on ARPA-E Mission * To "enhance the economic and energy security of the US"

450

Microsoft Word - Summary.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Summary To submit questions regarding this CMRR-NF SEIS, or to request a copy, please contact: AVAILABILITY OF THE FINAL SUPPLEMENTAL ENVIRONMENTAL IMPACT STATEMENT FOR THE NUCLEAR FACILITY PORTION OF THE CHEMISTRY AND METALLURGY RESEARCH BUILDING REPLACEMENT PROJECT AT LOS ALAMOS NATIONAL LABORATORY, LOS ALAMOS, NEW MEXICO (CMRR-NF SEIS) Printed with soy ink on recycled paper John Tegtmeier, EIS Document Manager Los Alamos Site Office National Nuclear Security Administration U.S. Department of Energy 3747 West Jemez Road Los Alamos, NM 87544 Telephone: 505-665-0113 Conceptual Drawing CMRR Facility Past Present Future Past Final Supplemental Environmental Impact Statement for the Nuclear Facility Portion of the Chemistry and Metallurgy Research Building Replacement Project

451

Microsoft PowerPoint - Goodwin  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Business Innovation Research (SBIR) and Business Innovation Research (SBIR) and Small Business Technology TRansfer (STTR) Dave Goodwin DOE SBIR/STTR Office Physical Scientist HBCU Meeting July 9, 2009 DOE Mission Support 1. Advancing the Nation's Economic and Energy Security. 2. Promoting Scientific and Technological Innovation. 3. Ensuring the Environmental Clean-Up of the National Nuclear Weapons Complex. 2 Overview (1 of 3) $1.7 billion invested by DOE (since 1992), in over 7,000 grants, generated over 15,000 person-years of jobs. $2.4 billion in sales from 60% of Phase II companies, in addition to DOE Mission Needs; e.g., from FY05 thru FY07, the Phase II 172 companies generated 17,933 total jobs. National Conference, Nov 2-5, Reno, www.unr.edu/sbir- sttr2009/index.html. National Academy of Sciences (NAS) University Industry

452

Microsoft Office Outlook - Memo Style  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Stephen Browning Stephen Browning Sent: Thursday, September 23, 2010 2:52 PM To: SmartGridPolicy Subject: Smart Grid RFI: Addressing Policy and Logistical Challenges Dear Mr Li and the department. By way of background illustration, I attach two of my documents on Future Power Systems which look at the Smart Enterprise and the Smart Customer. The papers look at the system from the perspective of the Power system in Great Britain but I hope the principles outlined may be of some help to you. Another of my papers goes into the need to model different proposed configurations of Future Power Systems (Main Generation, Demand including Customer Reaction and Local generation, Transmission and Distribution) to determine the investment and value (Energy/Power Security, Emissions

453

Microsoft Word - confirmation20010605.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Jeanne Lopatto, 202/586-4940 Jeanne Lopatto, 202/586-4940 June 5, 2001 DOE Announces Confirmation of Presidential Appointees WASHINGTON, DC - The Department of Energy announced today that the United States Senate has confirmed key presidential nominees to the department. "I am pleased and excited about those who will be joining me here at the Energy Department. Each of them will serve as a vital part of DOE's commitment to helping Americans deal with the energy crisis as well as securing our energy future," Secretary of Energy Spencer Abraham said. Among those confirmed are Francis Blake, Deputy Secretary of Energy; Robert Card, Under Secretary of Energy; Bruce Carnes, Chief Financial Officer; David Garman, Assistant Secretary of Energy for Energy Efficiency and Renewable Energy; Lee Sarah Liberman Otis, General Counsel.

454

Microsoft PowerPoint - 15.1615_Cost Estimating Panel | Department...  

Office of Environmental Management (EM)

615Cost Estimating Panel Microsoft PowerPoint - 15.1615Cost Estimating Panel Microsoft PowerPoint - 15.1615Cost Estimating Panel More Documents & Publications Contractor SOW...

455

Microsoft Word - DOE Trade Secrets Rule Summary v 2.docx | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Trade Secrets Rule Summary v 2.docx Microsoft Word - DOE Trade Secrets Rule Summary v 2.docx Microsoft Word - DOE Trade Secrets Rule Summary v 2.docx More Documents &...

456

File:Microsoft PowerPoint - FINAL How to capture data from Wind...  

Open Energy Info (EERE)

Microsoft PowerPoint - FINAL How to capture data from Wind For Schools CAES energy site.pdf Jump to: navigation, search File File history File usage Metadata File:Microsoft...

457

Microsoft Word - dDE-FOA-0000116.rtf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - dDE-FOA-0000116.rtf Microsoft Word - dDE-FOA-0000116.rtf More Documents & Publications Recovery Act - Geothermal Technologies Program:Ground Source Heat Pumps...

458

Microsoft PowerPoint - 15.1130_Jeff Baker_Final Ultra-High Efficiency...  

Office of Environmental Management (EM)

130Jeff BakerFinal Ultra-High Efficiency Commercial Buildings Microsoft PowerPoint - 15.1130Jeff BakerFinal Ultra-High Efficiency Commercial Buildings Microsoft PowerPoint -...

459

Microsoft Word - Turbine Manufactures MOU FINAL_5-31-08_.doc...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Turbine Manufactures MOU FINAL5-31-08.doc Microsoft Word - Turbine Manufactures MOU FINAL5-31-08.doc Microsoft Word - Turbine Manufactures MOU FINAL5-31-08.doc More Documents...

460

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432-2000  

E-Print Network (OSTI)

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432 "Import". #12;Configure Microsoft Outlook 2011 for Mac HMS Help Desk Outlook 2011 for Mac HMS Help Desk: (617) 432-2000 3 · Select

Blackwell, Keith

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432-2000  

E-Print Network (OSTI)

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432 2011 for Mac HMS Help Desk: (617) 432-2000 2 · Create a new". #12;Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432

Blackwell, Keith

462

Microsoft Word - vDE-FOA-0000042.rtf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Word - vDE-FOA-0000042.rtf Microsoft Word - vDE-FOA-0000042.rtf Microsoft Word - vDE-FOA-0000042.rtf More Documents & Publications Recovery Act: Clean Coal Power Initiative...

463

Microsoft Word - AL-Consolidated Approps FY 2008 as of feb 21...  

Office of Environmental Management (EM)

Consolidated Approps FY 2008 as of feb 21 2008 final.doc Microsoft Word - AL-Consolidated Approps FY 2008 as of feb 21 2008 final.doc Microsoft Word - AL-Consolidated Approps FY...

464

Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all sections...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Omnibus FY 2009 Apr 22 2009 all sections.doc Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all sections.doc Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all sections.doc More...

465

Microsoft PowerPoint - 2009.10.27 Bridge Inspection Follow-up...  

Energy Savers (EERE)

Inspection Follow-up Microsoft PowerPoint - 2009.10.27 Bridge Inspection Follow-up More Documents & Publications Slide 1 Slide 1 Microsoft Word - Issue FY2009 Q4 Draft 20090910.doc...

466

Microsoft Word - Agenda F&I Update 090804.doc | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Agenda F&I Update 090804.doc Microsoft Word - Agenda F&I Update 090804.doc More Documents & Publications Agenda Slide 1 Microsoft Word - Issue FY2009 Q4 Draft 20090910.doc...

467

Microsoft PowerPoint - 12 Holman White PM Conference 2010 Rev...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Holman White PM Conference 2010 Rev 2 revised Microsoft PowerPoint - 12 Holman White PM Conference 2010 Rev 2 revised Microsoft PowerPoint - 12 Holman White PM Conference 2010...

468

Microsoft Word - nDE-FOA-0000051.rtf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

nDE-FOA-0000051.rtf Microsoft Word - nDE-FOA-0000051.rtf Microsoft Word - nDE-FOA-0000051.rtf More Documents & Publications Weatherization Formula Grants - American Recovery and...

469

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

470

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

471

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

472

Cyber Security & Smart Grid  

E-Print Network (OSTI)

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

473

SRNL Science and Innovation - National Security  

NLE Websites -- All DOE Office Websites (Extended Search)

air observations; National Weather Service (NWS) text forecasts, discussions, and severe weather bulletins; world-wide coverage of high resolution satellite imagery; domestic...

474

Microsoft Word - AL2008-06.doc | Department of Energy  

Energy Savers (EERE)

Word - AL2008-06.doc Microsoft Word - AL2008-06.doc More Documents & Publications Chapter 9 - Contracting Qualifications AttachmentFlash2011-81(3).pdf AcqGuide9pt2.doc&0;...

475

IN-SPIRE: Creating a Visualization from Microsoft Outlook  

ScienceCinema (OSTI)

IN-SPIRE can harvest text from Microsoft Outlook e-mail messages via a simple drag-and-drop mechanism. This is great for mailing lists or systems that send search results via e-mail.

None

2012-12-31T23:59:59.000Z

476

Microsoft Word - Policy Flash 2010-81 Attachment 1 | Department...  

Energy Savers (EERE)

Flash 2010-81 Attachment 1 Microsoft Word - Policy Flash 2010-81 Attachment 2 Policy Flash 2014-13 AL 2014-03: Allowability of Contractor Litigation Defense and Settlement Costs...

477

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

478

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

479

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

480

T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Security Advisory for Adobe Flash Player, Adobe Reader and 7: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat March 14, 2011 - 4:05pm Addthis PROBLEM: There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an email attachment. PLATFORM: Windows, Macintosh, Linux and Solaris ABSTRACT: A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.13 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris operating systems, Adobe Flash Player 10.1.106.16 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1)

Note: This page contains sample records for the topic "microsoft security bulletin" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

482

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

483

Security Policy, Guidance & Reports  

Energy.gov (U.S. Department of Energy (DOE))

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

484

DOE-Flex Bulletin-Worker Injury While on a DOE-Flex Arrangement |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE-Flex Bulletin-Worker Injury While on a DOE-Flex Arrangement DOE-Flex Bulletin-Worker Injury While on a DOE-Flex Arrangement DOE-Flex Bulletin-Worker Injury While on a DOE-Flex Arrangement This bulletin responds to questions that have surfaced regarding DOE's liability for an injury to an employee while working at an alternative workplace, particularly at home. It is the position of the DOE Office of General Council that the case decision cited in this document should be relied upon as the prevailing administrative law at this time. DOE-Flex Bulletin-Worker Injury While on a DOE-Flex Arrangement Responsible Contacts Bruce Murray HR Policy Advisor E-mail bruce.murray@hq.doe.gov Phone 202-586-3372 More Documents & Publications Desk Reference on DOE-Flex The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning

485

Microsoft Word - PSH-13-0029.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of: Personnel Security Hearing ) of: Personnel Security Hearing ) ) Filing Date: March 7, 2013 ) ) Case No.: PSH-13-0029 ) __________________________________________) Issued: July 1, 2013 _______________ Hearing Officer Decision _______________ Steven L. Fine, Hearing Officer: This decision concerns the eligibility of XXXXXX (hereinafter referred to as "the Individual") to obtain a security clearance under the regulations set forth at 10 C.F.R. Part 710, entitled "Criteria and Procedures for Determining Eligibility for Access to Classified Matter or Special Nuclear Material." For the reasons set forth below, I conclude that the Individual's security clearance should not be restored. I. BACKGROUND The Individual failed to meet his financial and legal obligations dating back to at least 2005,

486

Microsoft Word - 1751a.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

the right to request additional enrollment information, including, but not limited to, birth certificates, tax documentation, social security numbers, and any other information...

487

Microsoft Word - Equipment-Training List  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Training - GE-CYBERSEC Laboratory Standard - HP-IND-220 Nanotechnology in the Workplace-Nano Workers - TQ-NC-HS2 Ambient Scanning Probe Microscope -...

488

Microsoft Word - Badging and Facility Info  

Office of Environmental Management (EM)

Subgroup Spring 2015 Meeting Page 1 Sponsor: EA-10 and EFCOG Host: Brian Barbero, NSTec Regulatory Enforcement Program Manager National Security Technologies, LLC Where:...

489

Microsoft Word - Training Curriculum.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

4 Training Curriculum Month Course Title Module Lesson Hours January Tactical OC Intermediate Force Training 4 February Report Fit for Duty 1 Personnel Security 1...

490

Microsoft Word - Chapter 9_021411  

National Nuclear Security Administration (NNSA)

regulatory restrictions, and compatibility issues related to U.S. Department of EnergyNational Nuclear Security Administration (DOENNSA) missions. The total acreage...

491

Microsoft PowerPoint - Advances_Singley  

Office of Environmental Management (EM)

(GTRI) Federally Funded Voluntary Security Enhancements For High-Risk Radiological Material Defense Nuclear Nonproliferation U.S. DEPARTMENT OF ENERGY 4 Prior Results...

492

Microsoft PowerPoint - Enhancements_Wangler  

Office of Environmental Management (EM)

www.energy.govEM 1 Transportation Security Michael Wangler Office of Packaging and Transportation National Transportation Stakeholders Forum Bloomington, Minnesota May 14, 2014...

493

Information Security Policy Policy Title Information Security Policy  

E-Print Network (OSTI)

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

494

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

495

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

17, 2012 17, 2012 U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. February 16, 2012 U-105:Oracle Java SE Critical Patch Update Advisory Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. February 16, 2012 U-104: Adobe Flash Player Multiple Vulnerabilities Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. February 15, 2012

496

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-616: PHP Stream Component Remote Denial of Service Vulnerability PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable. May 4, 2011 T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect. May 3, 2011 T-614: Cisco Unified Communications Manager Database Security Vulnerability The vulnerability is due to unspecified errors in the affected software that may allow the attacker to perform SQL injections. An authenticated,

497

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 22, 2013 February 22, 2013 V-097: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. February 21, 2013 V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. February 20, 2013 V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Oracle Java.

498

Safety Bulletin 2005-08: Safe Management of Mercury (Hg)  

NLE Websites -- All DOE Office Websites (Extended Search)

SAFETY & HEALTH SAFETY & HEALTH SAFETY & HEALTH BULLETIN Assistant Secretary for Environment, Safety & Health * U.S. Department of Energy * Washington, DC 20585 Safe Management of Mercury (Hg) DOE/EH-0697 Issue No. 2005-08 June 2005 PURPOSE This Bulletin provides information on a safety concern that may impact operations at Department of Energy (DOE) facilities. Specifically, the concern is the safe handling of mercury and mercury compounds. BACKGROUND Mercury is found in small amounts in thermometers, manometers, and barometers and in larger quantities at DOE facilities - ranging from amounts found in scientific equipment to tons in remediation waste at burial sites and hundreds of tons at the DOE stockpile storage facility in Oak Ridge.

499

JC3 High Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 5, 2013 V-211: IBM iNotes Multiple Vulnerabilities IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability August 2, 2013 V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated,

500

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS November 7, 2012 V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let