Skip Headers
Oracle® Java ME Embedded Getting Started Guide for the Windows Platform
Release 3.4
E35132-03
  Go To Table Of Contents
Contents
Go To Index
Index

Previous
Previous
 
Next
Next
 

C Installation and Runtime Security Guidelines

The Oracle Java ME Embedded requires an execution model that makes certain networked resources available for emulator execution. These required resources might include - but are not limited to - a variety of communication capabilities between Oracle Java ME SDK components.


Note:

the Oracle Java ME Embedded installation and runtime system is fundamentally a developer system. It is not designed to guard against any malicious attacks from outside intruders.


During execution, the Oracle Java ME Embedded architecture can present an insecure operating environment to the platform's installation file system, as well as its runtime environment. For this reason, it is critically important to observe the precautions outlined in these guidelines when installing and running the Oracle Java ME Embedded.

Maintaining Optimum Network Security

To maintain optimum network security, Oracle Java ME Embedded can be installed and run in a “closed” network operating environment, where the Oracle Java ME Embedded system is not connected directly to the Internet. Or, it can be connected to a secure company Intranet environment that can reduce unwanted exposure to malicious intrusion.

An example of an Oracle Java ME SDK requirement for an Internet connection is when wireless functionality requires a connection to the Internet to support communications with the wireless network infrastructure that is part of an Oracle Java ME SDK application execution process. Whether or not an Internet connection is required depends on the particular application running on Oracle Java ME Embedded. For example, some applications can use an HTTP connection.

In any case, if the Oracle Java ME Embedded is open to any network access you must observe the following precautions to protect valuable resources from malicious intrusion: