1 4 & 6. Merchant Web Page
|
|
|
- Basil Horn
- 10 years ago
- Views:
Transcription
1 ADVANCED FRAUD TOOLS While Vantiv already offers fraud detection tools in the form of a variety of Fraud Filters, we have entered into a partnership with ThreatMetrix, one of the foremost fraud prevention services in the world, to provide you additional options. The close integration of Vantiv and ThreatMetrix allows you to augment our filters by taking advantage of several ThreatMetrix fraud detection features. This only requires a simple modification to the code resident on your web page. You then process your transactions, as you would normally. The figure below provides a high level overview of the process. FIGURE 1 Advanced Fraud Tools Process Overview & 6 Consumer Merchant Web Page 1. The consumer accesses your web page to make a purchase. 2. Code on your web page makes a call to the ThreatMetrix servers initiating several fraud check mechanisms. At this time, you also supply a unique session Id to ThreatMetrix. Document Version: 1.7 1
2 Advanced Fraud Tools Modifications to Your Web Page While generated by you, each session Id must include a 5-character prefix, supplied by your Implementation Consultant, followed by a dash ("-"). The remainder of the session Id must be unique for each instance of the customer accessing your page. 3. The ThreatMetrix servers examine several properties of the consumer s device and method of access. This process is invisible to the consumer. 4. You submit a normal Authorization/Sale transaction, including the session ID you designated when making the call to the ThreatMetrix Server. If you are using LitleXML version 8.25 or above, you also have the option of submitting a Fraud Check transaction. This transaction type will retrieve the results of the ThreatMetrix checks without initiating an Auth/Sale. 5. We queries the ThreatMetrix servers for the results of their analysis. These results reflect how the information about the consumer device/connection captured in the ThreatMetrix database evaluates against rules and thresholds set in your merchant profile. All this information is distilled to a Device Reputation Score. 6. We return the Device Reputation Score in your LitleXML response message with one of three possible Review Statuses: Pass, Fail, or Review. On a status of Pass, we will proceed to the card network, which may still decline it. On a status of Fail, we will automatically decline the transaction and not pass it on to the card network (excluding Info Only mode described in Information Only Option on page 5). On a status of Review, we will also proceed to the card network, which may still either approve or decline it. If a transaction is declined, you do not need to take action; however, if approved, you must decide whether to allow the transaction to stand or to take action to reverse/void the transaction. MODIFICATIONS TO YOUR WEB PAGE For ThreatMetrix to gather information for analysis, you must add certain profiling tags (see Example below) to selected pages served by you web application. These tags allow ThreatMetrix to collect information by loading objects used for detection into the consumer s browser. These tags are invisible to the consumer and add only a fraction of a second to your page s rendering time. Once loaded, these objects require only 3-5 seconds to gather profiling information from the consumer device. Place the tags as early as possible on the page, inside the <body></body> tags of the page HTML. Example: ThreatMetrix Profiling Tags <!-Begin ThreatMetrix profiling tags below --> <!- Note: replace 'UNIQUE_SESSION_ID' with a uniquely generated handle Note: the value for 'ORG_ID' is a Vantiv supplied value 2 Document Version: 1.7
3 LitleXML Transactions Advanced Fraud Tools note: the pageid tag is not used at this time. the value for 'PAGE_ID' will default to 1 note: for production, replace 'h.online-metrix.net' with a local URL and configure your web server to redirect to'h.online-metrix.net' --> <script type="text/javascript" src=" PAGE_ID"></script> <noscript> <iframe style="width: 100px; height: 100px; border: 0; position: absolute; top: -5000px;" src=" D"></iframe> </noscript> <!- End profiling tags --> LITLEXML TRANSACTIONS To subject a transaction to the advanced fraud checks performed by ThreatMetrix and retrieve the results, you simply submit the <threatmetrixsessionid> element as part of your LitleXML Authorization (or Sale) transaction. This session Id is the same unique value you assigned and sent to ThreatMetrix when your web page called the application (designated as UNIQUE_SESSION_ID in the ThreatMetrix Profiling Tags example). When we receive an Authorization/Sale that includes the <threatmetrixsessionid>, our system automatically queries the ThreatMetrix platform for the associated results. The LitleXML response message includes the <advancedfraudresults> element containing the score and status and information about any triggered rules. The following two examples show a standard Authorization transaction, including a <threatmetrixsessionid> and a pass response. To bypass the ThreatMetrix fraud checks, simply omit the <threatmetrixsessionid> from the transaction. Example: Authorization including <threatmetrixsessionid> Element <litleonlinerequest version="8.25" xmlns=" merchantid="81601"> <authentication> <user>username</user> <password>password</password> </authentication> <authorization id="002" reportgroup="001601"> <orderid> _sessionid_app</orderid> <amount>1002</amount> <ordersource>ecommerce</ordersource> <billtoaddress> Document Version: 1.7 3
4 Advanced Fraud Tools LitleXML Transactions <name>john Doe</name> <addressline1>15 Main Street</addressLine1> <city>san Jose</city> <state>ca</state> <zip> </zip> <country>usa</country> <phone> </phone> </billtoaddress> <card> <type>mc</type> <number> </number> <expdate>1115</expdate> </card> <advancedfraudchecks> <threatmetrixsessionid>axxxxab999</threatmetrixsessionid> </advancedfraudchecks> </authorization> </litleonlinerequest> Example: Authorization Response including <advancedfraudresults> Element <litleonlineresponse version="8.25" xmlns=" response="0" message="valid Format"> <authorizationresponse id="002" reportgroup="001601"> <litletxnid> </litletxnid> <orderid> _sessionid_app</orderid> <response>000</response> <responsetime> t21:36:50</responsetime> <postdate> </postdate> <message>approved</message> <authcode>000003</authcode> <fraudresult> <avsresult>00</avsresult> <advancedfraudresults> <devicereviewstatus>pass</devicereviewstatus> <devicereputationscore>50</devicereputationscore> <triggeredrule>flashimagescookiesdisabled</triggeredrule> </advancedfraudresults> </fraudresult> </authorizationresponse> </litleonlineresponse> 4 Document Version: 1.7
5 Information Only Option Advanced Fraud Tools The other possible values for the <devicereviewstatus> element are fail, review, invalid_session, unavailable, and unknown_session. The <devicereputationscore> value can range from -100 to 100. The resulting pass, fail, or review value depends upon your profile settings. The <triggeredrule> element can occur multiple times, once for each rule triggered. INFORMATION ONLY OPTION If you wish to retain full control of the decision to accept or decline transactions, we offer the option of using the Advanced Fraud Tools in an Information Only mode. In this configuration, you receive the same information in the response as you would with the full implementation; however, we will not automatically decline transactions with a failing score. If the authorization is declined by the network, you can choose to recycle the transaction or do nothing. If an authorization with a failing score receives approval from the network, it would be up to you to reverse the authorization should you decide not to proceed with the transaction. This is similar to the case of an approved transaction that has a status of Review, but you decide not to proceed. Issuing an authorization reversal allows you to avoid any misuse of Auth fees otherwise imposed by the card networks. FRAUD CHECK TRANSACTION If you have coded to LitleXML V8.25 or above and wish to retrieve the Advanced Fraud results without introducing a Authorization or Sale transactions, use a Fraud Check transaction as shown in the example below. Fraud Check transactions are only supported as Online transactions. Example: Fraud Check Transaction <litleonlinerequest version="8.25" xmlns=" merchantid="81601"> <authentication> <user>username</user> <password>password</password> </authentication> <fraudcheck id="002" reportgroup="001601"> <advancedfraudchecks> <threatmetrixsessionid>asdfg-axxxxab999</threatmetrixsessionid> </advancedfraudchecks> </authorization> </litleonlinerequest> Document Version: 1.7 5
6 Advanced Fraud Tools Fraud Check Transaction Example: Fraud Check Response <litleonlineresponse version="8.25" xmlns=" response="0" message="valid Format"> <fraudcheckresponse id="002" reportgroup="001601"> <litletxnid> </litletxnid> <response>000</response> <message>approved</message> <responsetime> t21:36:50</responsetime> <advancedfraudresults> <devicereviewstatus>pass</devicereviewstatus> <devicereputationscore>50</devicereputationscore> <triggeredrule>flashimagescookiesdisabled</triggeredrule> </advancedfraudresults> </fraudcheckresponse> </litleonlineresponse> 6 Document Version: 1.7
Overview. How It Works
Overview Email is a great way to communicate with your alumni and donors. It s agile, it can be interactive, and it has lower overhead than print mail. Our constituents are also becoming more and more
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
ADVANCED FRAUD TOOLS TRIGGERED RULES
ADVANCED FRAUD TOOLS TRIGGERED RULES This document provides definitions of the triggered rules returned in the Advanced Fraud Results (advancedfraudresults element) section of the response message (see
MySagePay. User Manual. Page 1 of 48
MySagePay User Manual Page 1 of 48 Contents About this guide... 4 Getting started... 5 Online help... 5 Accessing MySagePay... 5 Supported browsers... 5 The Administrator account... 5 Creating user accounts...
Credomatic Integration Resources. Browser Redirect API Documentation June 2007
Credomatic Integration Resources Browser Redirect API Documentation June 2007 Table of Contents Methodology... 2 Browser Redirect Method (Browser to Server) FIG. 1... 2 API Authentication Parameters...
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part
Response Code Details
Section 4 Transaction Response If the original transaction was approved, and a value was passed in the duplicate window field, the payment gateway response will also include the authorization code for
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
Pay with Amazon Integration Guide
2 2 Contents... 4 Introduction to Pay with Amazon... 5 Before you start - Important Information... 5 Important Advanced Payment APIs prerequisites... 5 How does Pay with Amazon work?...6 Key concepts in
Embedding a Data View dynamic report into an existing web-page
Embedding a Data View dynamic report into an existing web-page Author: GeoWise User Support Released: 23/11/2011 Version: 6.4.4 Embedding a Data View dynamic report into an existing web-page Table of Contents
Tagging Guide: Website and Email Implementation. Contents
Tagging Guide: Website and Email Implementation Contents About This Guide... 2 Your CiteID... 2 Website Implementation... 2 Tag Placement... 2 Example... 3 Email Implementation... 5 DNS Setup... 5 Tag
Elavon Payment Gateway - Redirect Integration Guide
Elavon Payment Gateway - Redirect Integration Guide Version: v1.1 Table of Contents 1 About This Guide 3 1.1 Purpose 3 1.2 Audience 3 1.3 Prerequisites 3 1.4 Related Documents 3 2 Elavon Payment Gateway
AccountView. Single Sign-On Guide
AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)
OPENTABLE GROUP SEARCH MODULE GETTING STARTED ADD RESERVATIONS TO YOUR WEBSITE
ADD RESERVATIONS TO YOUR WEBSITE OPENTABLE GROUP SEARCH MODULE The group search module allows users to select a specific restaurant location from a list and search tables at that location. The code below
Merchant One Payment Systems Integration Resources. Direct Post API Documentation June 2007
Merchant One Payment Systems Integration Resources Direct Post API Documentation June 2007 Table of Contents Methodology... 2 Direct Post Method (Server to Server) FIG. 1... 2 Transaction Types... 3 Sale
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Virtual Contact Center
Virtual Contact Center NetSuite Integration Configuration Guide Version 8.0 Revision 1.0 Copyright 2014, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the contents
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
How To Use The Unify Intelligence Center On A Pc Or Macbook Or Macrocessor On A Computer Or Macosade On A Macbook (For Macro Recipebook) On A Mobile Device On A Web Browser On A Desktop Or
The Unified Intelligence Center interface is organized by dashboards. are web pages that display reports, scheduled reports, sticky notes, and web-based elements, such as URLs and web widgets, that are
Traitware Authentication Service Integration Document
Traitware Authentication Service Integration Document February 2015 V1.1 Secure and simplify your digital life. Integrating Traitware Authentication This document covers the steps to integrate Traitware
Implementation guide - Interface with the payment gateway PayZen 2.5
Implementation guide - Interface with the payment gateway PayZen 2.5 Document version 3.5 Contents 1. HISTORY OF THE DOCUMENT... 4 2. GETTING IN TOUCH WITH TECHNICAL SUPPORT... 6 3. DIFFERENT TYPES OF
My Sage Pay User Manual
My Sage Pay User Manual Page 1 of 32 Contents 01. About this guide..4 02. Getting started.4 Online help Accessing My Sage Pay Test Servers Live Servers The Administrator account Creating user accounts
CyberSource Secure Acceptance Web/Mobile
Title Page CyberSource Secure Acceptance Web/Mobile Configuration Guide October 2015 CyberSource Corporation HQ P.O. Box 8999 San Francisco, CA 94128-8999 Phone: 800-530-9095 CyberSource Contact Information
Three Step Redirect API V2.0 Patent Pending
Three Step Redirect API V2.0 Patent Pending Contents Three Step Redirect Overview... 4 Three Step Redirect API... 4 Detailed Explanation... 4 Three Step Transaction Actions... 7 Step 1... 7 Sale/Auth/Credit/Validate/Offline
Setting Up a CyberSource Web Payment Account
Setting Up a CyberSource Web Payment Account Contents Setting Up a CyberSource Web Payment Account... 1 Introduction... 1 Setting Up a CyberSource Account... 2 Get Username and Password... 2 Log in to
Analysis of the Australian Web Threat Landscape Christopher Ke, Jonathan Oliver and Yang Xiang
Analysis of the Australian Web Threat Landscape Christopher Ke, Jonathan Oliver and Yang Xiang Deakin University, 221 Burwood Highway, Burwood, Victoria 3125, Australia Trend Micro 606 St Kilda Road, Melbourne,
GENERAL ADMINISTRATION - SHOPPING CART
GENERAL ADMINISTRATION - SHOPPING CART Document Version 3.0 December 2014 For assistance, please message DRWP Client Services or call 0800 756 3350. Copyright 2014 Beanstream Internet Commerce. All rights
Bubble Code Review for Magento
User Guide Author: Version: Website: Support: Johann Reinke 1.1 https://www.bubbleshop.net [email protected] Table of Contents 1 Introducing Bubble Code Review... 3 1.1 Features... 3 1.2 Compatibility...
Payment Response Guide. Version 4.3 September 2012 Business Gateway
Version 4.3 September 2012 Business Gateway Table of Contents About this Book... 2 Copyright... 2 Introduction... 3 What is Payment Response?... 3 The Payment Response Process... 4 Reference... 5 Setting
Gateway Integration Specifications Credit Card Processing
Gateway Integration Specifications Credit Card Processing Version 3.2 Trine Commerce Systems, Inc. 2613 Wilson Street Austin, TX 78704 512-586-2736 [email protected] [email protected] Legal Notice
MasterCard In tern et Gateway Service (MIGS)
MasterCard Internet Gateway Service Master Card Inter nati onal MasterCard In tern et Gateway Service (MIGS) Virtual Payment Client Integration Guide Prepared By: Patrick Hayes Department: Principal Consultant,
Setting Up epayment Processing
CHAPTER 1 Setting Up epayment Processing This chapter includes an overview of epayment processing and discusses how to: Set up credit card types. Re-encrypt credit card, bank account numbers, Security
MasterCard In tern et Gatew ay Service (MIGS)
Master Card Inter national MasterCard In tern et Gatew ay Service (MIGS) MIGS Payment Client Reference Manual Prepared By: Patrick Hayes Department: Principal Consultant, ebusiness Solutions Date Written:
Server and Direct Shared Protocols
Server and Direct Shared Protocols IMPORTANT: Before reading this document, you should have read through the Server or Direct Protocol and Integration Guidelines that accompany it. These explain the terms
Network Merchants Inc (NMI) Integration Resources. Direct Post API Documentation April 2010
Network Merchants Inc (NMI) Integration Resources Direct Post API Documentation April 2010 Table of Contents Methodology... 2 Direct Post Method (Server to Server) FIG. 1... 2 Transaction Types... 3 Sale
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Virtual Contact Center
Virtual Contact Center MS Dynamics CRM Integration Configuration Guide Version 7.0 Revision 1.0 Copyright 2012, 8x8, Inc. All rights reserved. This document is provided for information purposes only and
We automatically generate the HTML for this as seen below. Provide the above components for the teaser.txt file.
Creative Specs Gmail Sponsored Promotions Overview The GSP creative asset will be a ZIP folder, containing four components: 1. Teaser text file 2. Teaser logo image 3. HTML file with the fully expanded
Self Testing with MoPub SDK
Self Testing with MoPub SDK What: SimpleAds Demo is an iphone and Android application that displays the three basic type of ads offered through MoPub Banner (320x50), MRect (300x200), and Interstitial
MONETA.Assistant API Reference
MONETA.Assistant API Reference Contents 2 Contents Abstract...3 Chapter 1: MONETA.Assistant Overview...4 Payment Processing Flow...4 Chapter 2: Quick Start... 6 Sandbox Overview... 6 Registering Demo Accounts...
Visa Checkout September 2015
Visa Checkout September 2015 TABLE OF CONTENTS 1 Introduction 1 Integration Flow 1 Visa Checkout Partner merchant API Flow 2 2 Asset placement and Usage 3 Visa Checkout Asset Placement and Usage Requirements
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
ANZ egate Virtual Payment Client
ANZ egate Virtual Payment Client Integration Notes Contents Purpose of notes 3 For enquiries and support 3 Contents of ANZ egate kit 3 Sample Codes 3 Bank Hosted, Merchant Hosted and Merchant Hosted with
CyberSource Credit Card Reason Codes
CyberSource Credit Card Reason Codes 100 Successful transaction. 101 The request is missing one or more required fields. 102 One or more fields in the request contains invalid data. 110 Only a partial
Administrator s Guide
SEO Toolkit 1.3.0 for Sitecore CMS 6.5 Administrator s Guide Rev: 2011-06-07 SEO Toolkit 1.3.0 for Sitecore CMS 6.5 Administrator s Guide How to use the Search Engine Optimization Toolkit to optimize your
Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008
Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether
itransact Gateway Recurring Billing Guide
itransact Gateway Recurring Billing Guide itransact Gateway Recurring Billing Guide Table of Contents 1. Version and Legal Information... 1 2. The Recurring Billing System... 2 3. Setting Up Recurring
Address Verification System (AVS) Checking
Address Verification System (AVS) Checking The Address Verification System (AVS) is a service provided by credit card Issuers intended to authenticate the Purchaser (Customer) as the authorized cardholder.
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Swedbank Payment Portal Implementation Overview
Swedbank Payment Portal Implementation Overview Product: Hosted Pages Region: Baltics September 2015 Version 1.0 Contents 1. Introduction 1 1.1. Audience 1 1.2. Hosted Page Service Features 1 1.3. Key
Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect
Introduction Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect This document describes the process for configuring an iplanet web server for the following situation: Require that clients
Example for Using the PrestaShop Web Service : CRUD
Example for Using the PrestaShop Web Service : CRUD This tutorial shows you how to use the PrestaShop web service with PHP library by creating a "CRUD". Prerequisites: - PrestaShop 1.4 installed on a server
A Java proxy for MS SQL Server Reporting Services
1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
Office 888-707-3030. Fax 888-300-3002
Office 888-707-3030 Fax 888-300-3002 1 Reseller Quick-Start Guide Table of Contents Reseller Account Setup Checklist 2 Domain & Name Servers 3 Payment Gateway(s) 4 Dedicated Email Servers 5 Landing Page
Virtual Contact Center
Virtual Contact Center MS Dynamics CRM Online Integration Configuration Guide Version 7.1 Revision 1.0 Copyright 2013, 8x8, Inc. All rights reserved. This document is provided for information purposes
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Google AdWords TM Conversion Tracking Guide
Google AdWords TM Conversion Tracking Guide CONTENTS INTRODUCTION TO CONVERSION TRACKING...2 PRODUCT DESCRIPTION...2 OVERVIEW...2 DEFINITION OF TERMS...3 ADDING THE CODE SNIPPET...4 CONVERSION TRACKING
To allow for more flexibility in where the widget can be placed on a web page, the display can be either vertical or horizontal:
Widget User Guide Version 1.2 Produced 2012-08-20 What is it? The KIS widget is a small web application that can be embedded within a web page and will display statistics from the KIS data set for a course.
Direct Payment Protocol Errors A Troubleshooter
Direct Payment Protocol Errors A Troubleshooter December 2011 This manual and accompanying electronic media are proprietary products of Optimal Payments plc. They are to be used only by licensed users
Portals and Hosted Files
12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines
Developing Web Views for VMware vcenter Orchestrator
Developing Web Views for VMware vcenter Orchestrator vcenter Orchestrator 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:...
Table of Contents Recommendation Summary... 3 Technical:... 3 Creative:... 3 Introduction... 4 Formatting Recommendations... 5 JavaScript:... 5 Forms:... 5 Background Tags and Colors:... 5 Html Text:...
itransact Gateway Fast Start Guide
itransact Gateway Fast Start Guide itransact Gateway Fast Start Guide Table of Contents 1. Version and Legal Information... 1 2.... 2 Quick Setup... 2 The Card Setup... 2 Order Form Setup... 3 Simple
How to set up a scoring algorithm and automatic email triggers for Qualtrics measures
How to set up a scoring algorithm and automatic email triggers for Qualtrics measures Purpose: This is a useful tool for prescreening participants for Sona. In Sona you can direct the participants to the
Introduction to Ingeniux Forms Builder. 90 minute Course CMSFB-V6 P.0-20080901
Introduction to Ingeniux Forms Builder 90 minute Course CMSFB-V6 P.0-20080901 Table of Contents COURSE OBJECTIVES... 1 Introducing Ingeniux Forms Builder... 3 Acquiring Ingeniux Forms Builder... 3 Installing
An idea on how to monitor growth of database tables in an system using Bischeck
An idea on how to monitor growth of database tables in an system using Bischeck Introduction Anders Håål [email protected] The background to this solution is a customer that has a need to monitor the
Fax User Guide 07/31/2014 USER GUIDE
Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section
How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)
NAME Windows Live Family Safety Company Microsoft Version 2012 Type of product Devices supported Operating systems Price* Client Computer Windows 7 (32 or 64 bit edition) Windows Vista Service Pack 2 Windows
How To Use The Rss Feeder On Firstclass (First Class) And First Class (Firstclass) For Free
RSS Feeder - Administrator Guide for OpenText Social Workplace and FirstClass Werner de Jong, Senior Solutions Architect 8 July 2011 Abstract This document is an administrator s guide to the installation
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
Skipjack Merchant Services Guide
Skipjack Merchant Services Guide COPYRIGHT INFORMATION Skipjack Financial Services and Skipjack Transaction Network are registered trademarks of the Bradley-Madison Company. It is the policy of Skipjack
Network Activity D Developing and Maintaining Databases
Network Activity D - Developing and Maintaining Databases Report D3.2.2 User Interface implementation Patricia KELBERT MNHN Paris BGBM Berlin July 2006-1- Table of Contents 1 Introduction... 4 2 Material
BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
Chapter 24: Creating Reports and Extracting Data
Chapter 24: Creating Reports and Extracting Data SEER*DMS includes an integrated reporting and extract module to create pre-defined system reports and extracts. Ad hoc listings and extracts can be generated
Adyen Merchant Manual. Version 1.10 Adyen B.V.
Adyen Merchant Manual Version 1.10 Adyen B.V. Introduction3 Table of Contents Introduction... 3 Audience...3 Changelog...3 1 Payment Life-cycle in the Adyen System... 4 What Happens to a Payment After
HTML Fails: What No One Tells You About Email HTML
HTML Fails: What No One Tells You About Email HTML 2 Today s Webinar Presenter Kate McDonough Campaign Manager at PostUp Worked with various ESPs: Constant Contact, Campaign Monitor, ExactTarget, Distribion
CUSTOMER Android for Work Quick Start Guide
Mobile Secure Cloud Edition Document Version: 1.0 2016-01-25 CUSTOMER Content 1 Introduction to Android for Work.... 3 2 Prerequisites....4 3 Setting up Android for Work (Afaria)....5 4 Setting up Android
5.1 Features 1.877.204.6679. [email protected] Denver CO 80202
1.877.204.6679 www.fourwindsinteractive.com 3012 Huron Street [email protected] Denver CO 80202 5.1 Features Copyright 2014 Four Winds Interactive LLC. All rights reserved. All documentation
PaperCut Payment Gateway Module CyberSource Quick Start Guide
PaperCut Payment Gateway Module CyberSource Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up, and testing the
Informz for Mobile Devices: Making Your Emails PDA and Phone-Friendly
Informz for Mobile Devices: Making Your Emails PDA and Phone-Friendly The use of personal digital assistants (PDAs) has increased exponentially since the early days of rudimentary Palm Pilots and similar
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea Bypass: History Explanation: What Is Going On Process: Things To Look For Demos: alert(1) Done Live (hopefully) CSP: Content Security
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Sage Pay Direct Integration and Protocol Guidelines 3.00. Published: 01/08/2014
Sage Pay Direct Integration and Protocol Guidelines 3.00 Published: 01/08/2014 Table of Contents Document Details 4 Version History 4 Legal Notice 4 1.0 Introduction 5 2.0 Overview of Direct Integration
Specify the location of an HTML control stored in the application repository. See Using the XPath search method, page 2.
Testing Dynamic Web Applications How To You can use XML Path Language (XPath) queries and URL format rules to test web sites or applications that contain dynamic content that changes on a regular basis.
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Authorize.NET Setup Guide
Savance Phone: 248-478-2555 Fax: 248-478-3270 www.savanceenterprise.com 2014 Table of Contents Overview 3 Obtain the Transaction Key 3 Configure Application Settings 4 Configure Webstore Settings 4 Example
ThreatMetrix Persona DB Technical Brief
ThreatMetrix Persona DB Technical Brief Private and Scalable Entity/Attribute Database Persona DB is part of the TrustDefender Cybercrime Prevention Platform from ThreatMetrix. It s an extensible, enterprise-accessible
Dashboard Builder TM for Microsoft Access
Dashboard Builder TM for Microsoft Access Web Edition Application Guide Version 5.3 5.12.2014 This document is copyright 2007-2014 OpenGate Software. The information contained in this document is subject
1: 2: 2.1. 2.2. 3: 3.1: 3.2: 4: 5: 5.1 5.2 & 5.3 5.4 5.5 5.6 5.7 5.8 CAPTCHA
Step by step guide Step 1: Purchasing a RSMembership! membership Step 2: Download RSMembership! 2.1. Download the component 2.2. Download RSMembership! language files Step 3: Installing RSMembership! 3.1:
