Wednesday, August 1, 2012

Security Threats, Important Information Every Computer User Should Know [aboutcomputer99.blogspot.com]

Security Threats, Important Information Every Computer User Should Know [aboutcomputer99.blogspot.com]

Question by Kat:D: How did businesses take credit card information before computers? Well it's for math homework and the information should be from the internet and I can't find the answer on google. Best answer for How did businesses take credit card information before computers?:

Answer by stitched2jc
they used one of those hand held machines that used carbon paper and you put the card on the top and slide something over it and the paper copies the card

Answer by StephenWeinstein
There have been computers since before there were credit cards. Before stores had computers and magnetic strip readers, they used pieces of paper. Multiple copies were made (originally using carbon paper, later using carbonless copies when it was discoverd that used carbon paper was being used to commit fraud). The store kept one copy, the customer kept one copy, and the bank kept one copy. The banks had to manually enter the information from the paper into the bank's computers.

Answer by pvreditor
The two previous answers are partly correct. Here is the procedure when I worked in stores in the 1970s: 1. The customer handed a credit card to a store clerk. 2. The clerk placed the card into a small imprinting machine, then fitted a credit card form over the credit card. 3. The clerk moved a slider from one side of the imprinting machine to the other. This printed the credit card information and the store's information onto the paper credit card form. 4. The clerk hand wrote the purchase information onto the credit card form. 5. The clerk called a toll-free phone number and gave credit card and purchase information to a person who worked for the bank. (This took less than a minute, usually.) The bank employee would approve or disapprove. If approved, the clerk had to write an approval number on the credit card form. 5. The customer signed the form. 6. If it's a carbonless form, the clerk tore off the customer's copy of the form and handed it to the customer. If the form had carbons, the clerk pulled the carbons out and disposed of them. Then the clerk gave the customer his/her copy. Somehow, this system worked for lots of purchases and there was no more credit card fraud then than there is now. It was definitely a slower process, however. Hope that helps!

Answer by Sgt Big Red
To set the record straight, so far pvredito is correct. Computers WERE NOT around before credit cards!!!! Credit cards were available back in the 60's but were mostly gasoline or store cards. Long before the computer came along.

Answer by My Take on It
Oh wow! I remember those days and actually had to use one of these machines that you would place the credit card in...then you would put the credit card slip over the card..then you would run this handle like thing over then back across the slip and card. There was carbon paper between the slips that would make duplicate copies. You would then pull it out, fill in the amount and things they bought, add the tax and total it up. Next, hand it to the customer to sign. Usually had to view their drivers license too, to see if it was them. In the old days, if the amount was over $ 50, you had to get on the phone and talk to a LIVE person (wow, not automation back in the 70s and 80s!) to get the amount verified and get a code to put on the slip that they actually had the funds available on their card! If all went ok, you tore off the middle slip (copy) for the customer and gave that to them with their purchase. The other two copies were for the store records and one you had to mail to the credit card company in order to get paid! Wow! That was a long time ago!

[information on computers]

See more from the AT&T Archives at techchannel.att.com A semi-futurist film about the growth and potential of computers and communications combining in The Information Age. The film puts forth that developments like digital television, speech recognition, and speedy networks might combine in ways to help humanity that wasn't believed possible before the 1980s. This 1985 film contains an early use of the term "information superhighway" รข€" the origins of the term are still unclear. Al Gore claims to have used the term "information highway" in a presentation around 1978, artist Nam Jun Paik referred to a "superhighway" of data back in 1974, and Ralph Lee Smith's book on cable television from 1972 used the term "electronic communications highway" in the subtitle. But, until we digitize every piece of print and voice matter for the 20th century, this reference, from Newsweek in 1983, may have to stand as the earliest spec ific reference (and yes, it is entirely about AT&T's largest 1980s projects) "This year alone, AT&T will install 15000 miles of glass fibers in commercial systems across the country. Two information superhighways being built of fiber-optic cable will link Boston, New York, Philadelphia and Washington, DC, in a 776-mile system on the East Coast, and Sacramento, Oakland and Los Angeles on the West Coast. In 1984 the video and voice signals for television broadcasts of the Los Angeles Olympics will race through fiber-optic systems buried beneath the city streets ...

aboutcomputer99.blogspot.com Looking Ahead to the Information Age in 1985: AT&T Archives

It is just a couple of weeks to go for a new year and you certainly have loads of planning for the forthcoming year. Well, in this festive season, you certainly don't want to fall into problems like identity theft and other security issues. So, it is better to be well informed about the security threats before they create any unwanted situation. In this article we have discussed about some of the most dangerous information security threats. Learn about them and enhance your computer security.

Computer viruses are considered as one of the most well known computer security threat. This is a program which is written to alter the way a computer operates. And it is obviously without the permission or knowledge of the PC user. A virus replicates and executes itself and damages the files and folders of the computer.

There are varieties of malicious objects online and Malware is one of them. You will be astonished to know that malware was rated as the second highes t ranked threat to the businesses by Perimeter E-Security. Hackers and cyber criminals use varieties of methods to install malware on the user's computer. This is used to break into computer systems of the user to steal, change or destroy information. If proper measures are not taken your bank account details and other important information like credit card details, etc. could be misused by them.

Spyware is another serious computer security threat. Once installed, these programs start monitoring your online activities. They also have potential to install programs without the consent of the user and capture personal information. To combat spyware threats and stay safe online, it is suggested to consult a spyware removal service provider.

To offer you sleepless nights, hackers use wide selection of malicious objects and Trojan horses are commonly used. Unlike viruses Trojans it do not replicate and spread like a virus. These programs come with the disguise of pictu res and PowerPoint presentations. Once the program is run, a virus is placed on your PC to allow a hacker to gain access to your computer. These types of Trojans are called Remote Access Trojans (RATs). You will be amazed to know that more than 50% of all spam (unsolicited email) is sent from home or work computers are compromised by RATs.

Now the million dollar question is how you can protect your computer as well as your online identity and crucial information from all these malicious objects. Well, there are plenty of options to combat all these. Firstly, you can install antivirus software, firewalls, etc. If you are not familiar with all these, you can take help from a remote computer support providers.

Recommend Security Threats, Important Information Every Computer User Should Know Articles

0 comments:

Post a Comment