nisser wrote:is anyone else having major trouble with this crappy website in the past week or so. Changing a stock ticker is like pulling out teeth; it simply won't do it unless you refresh the page and start over.
is anyone else having major trouble with this crappy website in the past week or so. Changing a stock ticker is like pulling out teeth; it simply won't do it unless you refresh the page and start over.
nisser wrote:Exactly! It's so frustrating. It also has the most annoying set-up. If you mouse over any of those titles while you are trying to just move the cursor to type in a stock ticker, a pulldown comes down to frustrate you!!
I've noticed that lately the when browsing that site that MSIE has a tendency to freeze
active wrote: Warning: The latest Java update is a problem for the use of the real time tracker functions. The tracker window pops up but will not be populated with data.
You will have to go back from _10 to the previous update _7
squash500 wrote:Tdw also suggested I lower my adobe reader to the 7.0 version
like_to_retire wrote:I switched back to Update 7 from Update 10 of Java... I'm sure they'll eventually work it out.
Bylo Selhi wrote:squash500 wrote:Tdw also suggested I lower my adobe reader to the 7.0 versionlike_to_retire wrote:I switched back to Update 7 from Update 10 of Java... I'm sure they'll eventually work it out.
Yabbut maybe not in our lifetimes. The current version of Adobe Acrobat Reader is 9.x. The 7.x version is now at least 2 or 3 years old. Even 8.x is now almost 2 years old.
Worse, what are you going to do if someone else tells you that to run their software or view their website you need JRE V5 U10 and/or Acrobat 8.x or higher?
Don't accept this sort of bullshit from TDW. Complain, complain, complain! Otherwise this amateur hour by Dr. Ed's IT people will get even worse.
Peculiar_Investor wrote:I wonder what happens if/when a security breach happens when you are using out of date software. Will they still honor their security pledge?
Sun has released alerts to address multiple vulnerabilities affecting the Sun Java Runtime Environment. The most severe of these vulnerabilities could allow a remote attacker to execute arbitrary code.
The Sun Java Runtime Environment (JRE) allows users to run Java applications in a browser or as standalone programs. Sun has released updates to the Java Runtime Environment software to address multiple vulnerabilities.
Sun released the following alerts to address these issues:
* 244986 : The Java Runtime Environment Creates Temporary Files That Have "Guessable" File Names
* 244987 : Java Runtime Environment (JRE) Buffer Overflow Vulnerabilities in Processing Image Files and Fonts May Allow Applets or Java Web Start Applications to Elevate Their Privileges
* 244988 : Multiple Security Vulnerabilities in Java Web Start and Java Plug-in May Allow Privilege Escalation
* 244989 : The Java Runtime Environment (JRE) "Java Update" Mechanism Does Not Check the Digital Signature of the JRE that it Downloads
* 244990 : A Buffer Overflow Vulnerability in the Java Runtime Environment (JRE) May Allow Privileges to be Escalated
* 244991 : A Security Vulnerability in the Java Runtime Environment (JRE) Related to Deserializing Calendar Objects May Allow Privileges to be Escalated
* 245246 : The Java Runtime Environment UTF-8 Decoder May Allow Multiple Representations of UTF-8 Input
* 246266 : Security Vulnerability in Java Runtime Environment May Allow Applets to List the Contents of the Current User's Home Directory
* 246286 : Security Vulnerability in the Java Runtime Environment With Processing RSA Public Keys
* 246346 : A Security Vulnerability in Java Runtime Environment (JRE) With Authenticating Users Through Kerberos May Lead to a Denial of Service (DoS)
* 246366 : Security Vulnerabilities in the Java Runtime Environment (JRE) JAX-WS and JAXB Packages may Allow Privileges to be Escalated
* 246386 : A Security Vulnerability in Java Runtime Environment (JRE) With Parsing of Zip Files May Allow Reading of Arbitrary Memory Locations
* 246387 : A Security Vulnerability in the Java Runtime Environment may Allow Code Loaded From the Local Filesystem to Access LocalHost
The impacts of these vulnerabilities vary. The most severe of these vulnerabilities allows a remote attacker to execute arbitrary code.
The secondary part of the complaint will be why can't I use FF
active wrote:The secondary part of the complaint will be why can't I use FF
I use Firefox and the tracker works fine.
active wrote:Now if you call TD technical support and you are on Firefox you have a challenge. They just keep going down the checklist of IE and refuse to understand that Firefox has different tabs under Tools. They talk to you like you are a 10 year old.
I've had generally poor results with that at TDW. There seems to be a culture there that customers are only supposed to talk to front line staff while everyone else at TDW is supposed to be insulated from us. It's as if we're not worthy to talk to a compliance officer, bond trader, programmer, etc. regardless of our need and/or ability to discuss our issue with them directly. This gets even more frustrating when the middle-persons subtract value from the communications process because they simply don't understand what's being discussed. (IBM used to have that attitude until they suffered their near-death experience in the mid-90s. I hope it doesn't take something like that to wake up TDW's management.)Peculiar_Investor wrote:I've had the experience -- but it usually changes when I tell them that I've done software development and customer support. Tell them you you don't want the scripted answers, and would like to deal with someone who is interested in working on resolving the customer's problem.
Perhaps because some of them really are at a 10-year old's maturity level?Sometimes you need to talk to them like they are the 10 year old.
There are no stupid questions but sometimes there are stupid answers. I hope this isn't one of those timesactive wrote:(Stupid?) question:
If you download and install the update, then disable the next-gen Java plug-in you should still get whatever else they included in the Security Update, e.g. fixes to security and other bugs as described here. Don't worry if you don't understand everything therein. I don't either.What is the difference (for XP) between not downloading the update in the first place and downloading it, but disabling it?
like_to_retire wrote:Good work Peculiar_Investor.....