Skip Headers
Oracle® Java ME Embedded Getting Started Guide for the Windows Platform
Release 8 EA 2 for NetBeans on Windows
E48511-01
  Go To Table Of Contents
Contents
Go To Index
Index

Previous
Previous
 
Next
Next
 

Beta Draft: 2014-02-15

B Installation and Runtime Security Guidelines

The Oracle Java ME SDK 8 EA 2 requires an execution model that makes certain network resources available for emulator execution. These required resources might include - but are not limited to - a variety of communication capabilities between product components.


Note:

the Oracle Java ME SDK 8 EA 2 installation and runtime system is fundamentally a developer system. It is not designed to guard against any malicious attacks from outside intruders.


During execution, the Oracle Java ME SDK 8 EA 2 architecture can present an insecure operating environment to the platform's installation file system, as well as its runtime environment. For this reason, it is critically important to observe the precautions outlined in these guidelines when installing and running the Oracle Java ME SDK 8 EA 2.

Maintaining Optimum Network Security

To maintain optimum network security, Oracle Java ME SDK 8 EA 2 can be installed and run in a ”closed” network operating environment, where the Oracle Java ME SDK 8 EA 2 system is not connected directly to the Internet. Or, it can be connected to a secure company Intranet environment that can reduce unwanted exposure to malicious intrusion.

An example of an Oracle Java ME SDK 8 EA 2 requirement for an Internet connection is when wireless functionality requires a connection to the Internet to support communications with the wireless network infrastructure that is part of an Oracle Java ME SDK 8 EA 2 application execution process. Whether or not an Internet connection is required depends on the particular application running on Oracle Java ME SDK 8 EA 2. For example, some applications can use an HTTP connection.

In any case, if the Oracle Java ME SDK 8 EA 2 is open to any network access you must observe the following precautions to protect valuable resources from malicious intrusion: