Day: June 26, 2018

  • If you have a Pentium III, for example, you may no longer be able to install Win7 Monthly Rollups or Security-only patches, in spite of Microsoft’s promise to support you until January 2020. It’s all about SSE2 and some retroactively fudged documentation. Will anybody notice? If your PC doesn’t run Streaming Single Instructions Multiple Data (SIMD) Extensions 2, you apparently won’t be getting any more Win7 patches. At least, that’s what I infer from some clandestine Knowledge Base documentation changes made in the past few days. Even though Microsoft says it’s supporting Win7 until January 14, 2020, if you have an older machine — including any Pentium III — you’ve been blocked, and there’s nothing you can do about it. Computer World Microsoft did something like this with Windows XP when it was getting close to end of life.
  • Chinese tech giant Tencent has announced it’s joined the Linux Foundation as a platinum member. Tencent is one of a few companies to offer the highest level of support to the Linux Foundation. Other tech companies in this stable include IBM, Microsoft, and Intel, as well as fellow Chinese titan Huawei. As part of the deal, Tencent will take a chair on the Foundation’s board of directors. It has also promised to offer “further support and resources” to the Foundation’s efforts. So far, this has taken the form of Tencent donating several pieces of its software. The Next Web This is huge for the Linux Foundation I wonder what Linus thinks of this addition.
  • Recompiling is unlikely to be a catch-all solution for a recently unveiled Intel CPU vulnerability known as TLBleed, the details of which were leaked on Friday, the head of the OpenBSD project Theo de Raadt says. The details of TLBleed, which gets its name from the fact that the flaw targets the translation lookaside buffer, a CPU cache, were leaked to the British tech site, The Register; the side-channel vulnerability can be theoretically exploited to extract encryption keys and private information from programs. Former NSA hacker Jake Williams said on Twitter that a fix would probably need changes to the core operating system and were likely to involve “a ton of work to mitigate (mostly app recompile)”. ITWire This is coming from a former hacker that’s not good.
  • June 26, 2018

    How Payment Gateways Work

    In all probability, you’ve benefited from a modern payment technology, perhaps without even knowing it. If you’re launching an e-commerce business, you’ve heard about payment gateways and how they’re essential to your operations. Here’s how payment gateways work. Payment Gateways in a Nutshell Think of them as a bridge over which you’ll securely transfer information from a website server — or a physical store’s point-of-sale (POS) machine — to a payment processor. Gateways provide screening tools to enhance security. These include: Address Verification System (AVS) Delivery Address Verification Card Verification Value (CVS) Identity Morphing Detection Geolocation Computer Finger Printing Technology In addition to fraud-prevention, payment gateways accomplish the following actions. Payment Encryption: For payment data on your server to be securely transmitted to your bank, payment gateways encrypt all the information they send. This helps protect online transactions protected from cyber criminals. Authorization: Payment gateways also act as a sleuth, confirming the validity of a transaction. In addition to transactions being securely sent to a merchant bank for processing, the gateway also sends the data to a card issuer, such as Visa, or MasterCard. Note: This is how credit card companies make a hefty sum on processing fees. The credit card’s issuing bank is also sent the transaction data, choosing either to approve or deny the transaction. In the latter case, a reason will be included such as “insufficient funds,” or “suspected fraud.” Holds or freezes on the credit card can also cause a transaction to be denied. Finishing the Order: After getting authorization from the payment processor, the payment gateway is again responsible for interpreting and securely sending this information back to the server. This is where the payment page thanks your customer for your order. In most cases, all of this happens in three seconds or less. You...