<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div><i><font class="Apple-style-span" face="Arial"><br></font></i></div><div><i><font class="Apple-style-span" face="Arial">Sent on behalf of the Computing and Networking Infrastructure group and the Cyber Security team</font></i></div><div><font class="Apple-style-span" face="Arial"><br></font></div><div><font class="Apple-style-span" face="Arial">Microsoft has just released the patch for the exploit of Microsoft Internet Explorer (IE) that is being used to infect unsuspecting users' computers with malicious software. Due to the nature of this patch, the CNI group will send it out to all Computer Center-managed Windows machines. If you work on one of these systems, please log out of all desktop computers at the end of your workday, but leave them powered on so that the patches can be installed. </font></div><div><font class="Apple-style-span" face="Arial"><br></font></div><div><font class="Apple-style-span" face="Arial">If you experience difficulties with your computer in the morning, reboot to see if that fixes the problem before calling the IT Division Helpdesk (x7155) for assistance.</font></div><div><font class="Apple-style-span" face="Arial"><br></font></div><div><font class="Apple-style-span" face="Arial">This patch will address the issue noted in the Sept. 19 all-hands email; However, the cyber security team asks that everyone continue to refrain from using Internet Explorer until after the patch has been installed. For more information, see the email: <a href="https://www.jlab.org/memo/2012_InternetExplorerMalware.html">https://www.jlab.org/memo/2012_InternetExplorerMalware.html</a></font></div><div><br></div><div><br></div><div><font class="Apple-style-span" face="Arial"><br></font></div><div><br></div></body></html>