Youtr IT support colleagues may tell you that they have to remove software called Apple QuickTime from your school computers , because Apple has decided to withdraw support for it on PCs, and that this means you can no longer use your Early Start discs or Network materials,
Why Apple's decision affects Early Start users
Ordinary DVDs and Audio CDs from Early Start are not affected, but most other materials rely on QuickTime components to deliver a multimedia presentation.
The [[oblem affects PCs - Mac OSX versions of QuickTime are still being supported by Apple.
Last week (12/04/2016) two vulnerabilities were discovered in Apple QuickTime for Windows application.
At time of writing there are no recorded active attacks using vulnerabilities. However, as neither these nor any new vulnerabilities will be patched you should be taking steps to remove QuickTime from your Windows computers.
Historically, QuickTime was a popular component of many education focused applications and as such its removal needs to be planned. Below is some advice on how to tackle this removal.
There are two options you should consider:
1. Remove QuickTime for Windows
This is the best security option, having a product that has known vulnerabilities, with more being discovered, with access to the Internet is a security risk that can only be dealt with completely by removal of the risk. However, there is a risk that some older packages with multimedia in them or websites using QuickTime movies may stop working, causing an interruption to teaching and learning. If you are confident that no older packages exist or you are happy to accept the risk then removal is the best policy. If any videos have been stored in .MOV format (the QuickTime standard) then these can still be played by many modern video players such as VLC (freeware).
2. Upgrade QuickTime for Windows to 7.7.9
This addresses all bar two of the known vulnerabilities in QuickTime for Windows and removes the browser plugin, so online QuickTime content will not work but local applications dependent on QuickTime will continue to work. You will still have two vulnerabilities (at current count) but these could only be exploited within the school network you would not be vulnerable to malicious websites but could still be vulnerable to email attachments or viruses/malware brought in via USB stick for example. This should only be a temporary measure to address the problem packages on your network.
More Information
New Community Connect® 4 (CC4) networks will no longer receive QuickTime at the time of installation.
Why Apple's decision affects Early Start users
Ordinary DVDs and Audio CDs from Early Start are not affected, but most other materials rely on QuickTime components to deliver a multimedia presentation.
The [[oblem affects PCs - Mac OSX versions of QuickTime are still being supported by Apple.
Last week (12/04/2016) two vulnerabilities were discovered in Apple QuickTime for Windows application.
At time of writing there are no recorded active attacks using vulnerabilities. However, as neither these nor any new vulnerabilities will be patched you should be taking steps to remove QuickTime from your Windows computers.
Historically, QuickTime was a popular component of many education focused applications and as such its removal needs to be planned. Below is some advice on how to tackle this removal.
There are two options you should consider:
1. Remove QuickTime for Windows
This is the best security option, having a product that has known vulnerabilities, with more being discovered, with access to the Internet is a security risk that can only be dealt with completely by removal of the risk. However, there is a risk that some older packages with multimedia in them or websites using QuickTime movies may stop working, causing an interruption to teaching and learning. If you are confident that no older packages exist or you are happy to accept the risk then removal is the best policy. If any videos have been stored in .MOV format (the QuickTime standard) then these can still be played by many modern video players such as VLC (freeware).
2. Upgrade QuickTime for Windows to 7.7.9
This addresses all bar two of the known vulnerabilities in QuickTime for Windows and removes the browser plugin, so online QuickTime content will not work but local applications dependent on QuickTime will continue to work. You will still have two vulnerabilities (at current count) but these could only be exploited within the school network you would not be vulnerable to malicious websites but could still be vulnerable to email attachments or viruses/malware brought in via USB stick for example. This should only be a temporary measure to address the problem packages on your network.
More Information
New Community Connect® 4 (CC4) networks will no longer receive QuickTime at the time of installation.
Early Start can sort you out with new materials that don't have this vulnerabilty problem.
Just phone or email to check this out - ,
Contact details HERE..
Just phone or email to check this out - ,
Contact details HERE..