Commentary Logo
Japan Island disputes in SE Asia    World War III Alarm Anti-Islam video and anti-US sentiment    Skull Say no to brainwashing

       peace and anti-war Israel Iran strike imminent    sanctions as a result of nuclear tests Sanctions on Iran and workarounds    black lightning bolt India's massive blackout

Snapshots of news
Gearheads and mastheads
Home  •  About this site  •  How did we once fight corruption in colonial Hong Kong?
 •  Historical US administrative thoughts  •  USA versus colonial Hong Kong
 •  Anti-corruption review of Nigeria  •  Procurement monitoring in Nigeria
 •  Syndicated news  •  Usman's blog  •  Anti-graft news  •  Socialist news

 Thursday, December 13 2018 2:51am Hongkong Time

Posted Jan 14, 2013

Back to Blog Index   

Download Java 7 Update 11 Offline Installers

Oracle has released a new version of Java 7 Update 11. The direct download links to the offline installers are included at the end of this article.

Java Runtime Environment (JRE) allows users to run programs and applications programmed in Java language. Java became popular because of its portability. Programs developed in Java could be run on any platform including the mobile platforms. When Java was with Sun, it was developing leaps and bounds but then Oracle bought Java.

Java 7 Update 11

Since Oracle bought Java, it has been in crisis. We receive news about critical vulnerabilities in Java every now and then. The latest zero-day vulnerability was discovered a few days ago. The exploit was discovered in Java 7 update 10. The security firm Alienvault has already confirmed that the exploit is already being used by many websites to silently install malware and even ransomeware in drive-by download attacks.

The security exploit has already been added to Blackhole and Nuclear Pack exploit kits which are popular among hackers for exploiting.

Quickly responding, Oracle has released Java 7 Update 11 which fixes these exploits and vulnerabilities. You can read more about the security exploit in the issue CVE-2013-0422. Here is the summary of the security exploit and its fix released by Oracle:

This Security Alert addresses security issues CVE-2013-0422 (US-CERT Alert TA13-010A – Oracle Java 7 Security Manager Bypass Vulnerability) and another vulnerability affecting Java running in web browsers. These vulnerabilities are not applicable to Java running on servers, standalone Java desktop applications or embedded Java applications. They also do not affect Oracle server-based software.

The fixes in this Alert include a change to the default Java Security Level setting from “Medium” to “High”. With the “High” setting, the user is always prompted before any unsigned Java applet or Java Web Start application is run.

Although most of the browser vendors including Google Chrome, Firefox and Apple as a whole have disabled Java in their respective browsers but if you are using Java on your computer, it is highly recommended that you update to the latest version of Java 10 Update 11 to keep yourself safe from the latest vulnerability.

If you have already installed Java, you may want to go to Java control panel and see which version of Java you are running currently.

Java 7 update 10

If you are not running Java 7 Update 11, you may download it from the links below. All the links are direct download links to complete offline installers.

Download Java 7 Update 11 for Windows 64-bit [31.44 MB ]

Download Java 7 Update 11 for Windows 32-bit [30.02 MB ]

Download Java 7 Update 11 for Mac OS X 64-bit [50.31 MB]

Download Java 7 Update 11 for Linux 64-bit [44.61 MB]

Download Java 7 Update 11 for Linux 32-bit [45.86 MB ]

For more platforms and downloads, you may visit this Java SE Runtime Environment 7u11 page.

Java 7 Update 11 Portable runtime environment is also available for download from Portableapps.

Download Java 7 Update 11 Offline Installers is a post from: Technize.NET

The post Download Java 7 Update 11 Offline Installers appeared first on Technize.NET.

Back to Blog Index   

© Usman Khurshid. Reproduced with permission of the copyright owner.


  08/05   How to Manually Remove Virus From USB Flash Drive without Formatting
  08/05   Avast 8 Free Antivirus Direct Download Links
  14/01   Download Java 7 Update 11 Offline Installers
  24/12   Download Offline Installers For Bitdefender Free Antivirus
  11/10   Security Vulnerability Found In Firefox 16 Allows Attackers User Site Visit History
  03/10   4.5 Million Routers Hacked Silently
  30/09   Download Avira Free Antivirus 2013 With Social Networks Protection
  28/09   Download Avira Free Antivirus 2013 With Social Networks Protection
  24/09   Toolbar Removal Tools
  14/09   Download F-Secure Internet Security 2013 With 3 Months Free License
  13/09   Download Bitdefender 2013 Offline Installers With 1 Year Free License
  12/09   2 Ways To Uninstall/Remove AVG Antivirus 2013
  08/09   AVG Antivirus 2013 Free Offline Installer Download Links
  01/06   Hide Files Inside Other Files Using Windows Security Software
  29/05   McAfee SiteAdvisor Plus 2012 Free 6 Months Subscription
  16/05   Hide Files Inside Images With Veneer File Masking Software
  07/05   Download McAfee Antivirus Plus 2012 With Free License
  04/05   PasswordG: Generate Secure And Complex Passwords In Windows









Usman Khurshid is a network consultant who works in a mixed environment of Windows and Linux platforms. He studies about the latest advancements in computer technology and shares his views on this technology blog.

Email Usman at usman {at} technize {dot} com

Commentary and reflection pages by Raymond Cheng, PhD DPA FRSA

  Main • Commentary   Special Foci • Syndicated News | Corruption | Socialism | GuanXi

  Health Related • Traditional Chinese Medicine   Others • OXLL

© 1997-2018 The Commentary, Office of Dr Raymond Cheng. All rights reserved. Copyright of selected news articles, the headlines and logos belongs to the respective entities. Read disclaimer

Digital platform powered by Wyith Limited, Wyith Institute. Wyith Limited and Wyith Institute are associated businesses operated by the Office of Dr Raymond Cheng • Dr Raymond Cheng & Partners Ltd and The Commentary Ltd.

Home  •  About this site  •  How did we once fight corruption in colonial Hong Kong?
 •  Historical US administrative thoughts  •  USA versus colonial Hong Kong
 •  Anti-corruption review of Nigeria  •  Procurement monitoring in Nigeria
 •  Syndicated news  •  Usman's blog  •  Anti-graft news  •  Socialist news

Contact the editor at raymond {dot} cheng {at} kellogg {dot} oxon {dot} org

The RendezvousBuildersCommentatorsContributorsReadersResearchers
Reflection Pages • Miscellaneous Stuff
The difference between instant evaluation and improving recognition – November 20
Freddy Krueger revisited: Politically correct education? – October 23
From the evaluator's perspective: Justified conclusions and decisions – October 8
Online and distance-learning degrees from the evaluator's perspective – September 25
The moment fake degrees turned recognized and appraised – September 9

Photo credits for top title bar, from left to right: Iza H (Work), Lukasz Gumowski (Blue balls), Marcin Bania (Smiling and naked), Lautaro Gonda (Milan station), Jan Abt (Girl taking a picture), Daniel Tang (Hot switch), Barbara Henry (Moriah reading), Ralf Herrmann (Checkmate II), Marko Roeper (Led #4), Ian Russell (Girl in downtown LA).
Note: Animated GIF graphics and clipart obtained from,,, and Sketches, cartoons and other handdrawings courtesy of Alice-the-Artist.

Special Alert! This is *NOT* the American Jewish Committee's Commentary Magazine! Special notice! This is not the American Jewish Committee's Commentary Magazine nor are we in any way affiliated with them. To visit AJC's magazine, please go to instead, thank you for your attention.
Memo with pin Technical memos for members
Receiving using Gmail | Sending using Gmail
0x800ccc0e | 0x800ccc19 | 0x800ccc79

This site is best viewed with Microsoft® Internet Explorer 6.0 or above, minimum 1024x768 16M color-depth resolution. The Commentary Group and its personnel do not endorse external sites and are not responsible for the content of these websites. All external sites will open in a new browser window.

COUNT ON THE STATISTICS  100% Towels (c) Daniel Chittka
Photo © Daniel Chittka

This new section contains some interesting statistics in bribe and corruption, please check back for more as we pile up our numbers!

It's statistics time!  Using n-gram: kickback, graft, bribe and corruption - Comparison of their historical occurrences from 1810 to 2009 A.D.

  The word guanxi (collocation) and meanings of bribe: Deeply rooted, disgusting, sad endings

Search for a domain name - no obligation!
 enter a name, word or phrase
 choose an extension
 click go!
Looking for a good book (c) Doug Logan
Photo © Doug Logan
tagged by area of interestBY AREA OF INTEREST
Pragmatics: Politeness trends from the historical perspective of global trade
Computer mediated communications: Social network – Came riding the waves of amazing coincidences
Language acquisition:
A critique on "A corpus driven study of the potential for vocabulary learning through watching movies"

Grammatical analysis: "When a linguist stumbled upon a Buttonwood"
Lexicon and the corpus: "John Sinclair's lexical items – an introduction"
tagged by regionBY REGION • Anything AsiaUS Presence in Asia
ChinaTaiwanHong Kong and MacauJapanKoreaSingaporeMalaysiaPhilippinesPakistanIndiaAfghanistan0 • Vietnam, Laos, Cambodia, Thailand and MyanmarTimor-Leste and IndonesiaMongoliaNew Zealand and Australia
tagged by topicsBY TOPIC • BiofuelRhino and elephant poachingAmerican movies hit China marketChina Internet censorshipChina's outward FDI opportunitiesGlobal rice yield
GLUCK ON SOCIALISM AND CHINA Asia (c) Robert Churchill
Photo © Robert Churchill

Professor Sidney Gluck (c) Sandi BachomI am honored to have obtained Professor Sidney Gluck's (right) permission to allow me to repost here some of his work and interview related to China and socialism. Professor Gluck is professor emertius at the New School University in New York. A classical Marxist, Gluck has been studying China for 60 years in history and modern development. He has lectured all over the U.S. and still welcomes engagement at the age of 94 – photo © Sandi Bachom


COMING 2019 – COMPUTING CORPUS Active Network Hub (c) Phil Sigin-Lavdanski
Photo © Phil Sigin-Lavdanski

Oh, please do not get me wrong. This new section is not about computers, electronics or any engineering stuff, but rather I am currently constructing a new corpus based on Spectrum, the monthly publication from the Institute of Electrical and Electronics Engineers USA, from July 2007 to date. Having been a member for over 20 years since 1992, I am always fascinated by some of the terms scientists use when they talk about or envision their new inventions or methodologies. How many of them eventually come into practice? Could there be some insights we could possibly derive, from the linguistics perspective?


This website is published and designed by Raymond Cheng, PhD DPA and reflects only his personal views and opinions in his individual capacity. It does not represent the views and opinions of his firm, employer(s), students, etc., and is not in any way sponsored or endorsed by any other thrid parties. Click here to read my full disclaimer

Share on Twitter  Add to Facebook  Share on LinkedIn  +1 on Google