Warning: I am able to write to the configuration file: /home/hikas0/public_html/websitetemplates/includes/configure.php. This is a potential security risk - please set the right user permissions on this file (read-only, CHMOD 644 or 444 are typical). You may need to use your webhost control panel/file-manager to change the permissions effectively. Contact your webhost for assistance.
Warning: The downloadable products directory does not exist: /home/hikas0/public_html/websitetemplates/download/. Downloadable products will not work until this directory is valid.
Yesterday Apple released an update for its QuickTime player. Several bugs are fixed including streaming media vulnerability that exploit code was available for from the end of November. The patch was released without any prior notification and is a true surprise for the QuickTime users. QuickTime 7.3.1 fixed the issues with three types of media files. Most long-awaited fix is the RTSP (Real-Time Streaming Protocol) flaw that was discovered by the researcher from Poland.
In addition to that, QuickTime 7.3.1 release includes the fix of buffer overflowing with QTL (QuickTime format). New release also includes fixes of unspecified amount of bugs that arise playing Flash files. Company mentioned that they disabled the handler for the Flash files with the exception for the files that are known to be safe.
Mac OS X users can update to the new version with the Software Update feature, while Windows users will need to download the patched version from Apple website or use update tools that come with Windows.