RSS Feed
Latest Updates
New Year Sale Offer: 15% Discount on ALL Products & Services
Posted by Samiya Tariq on 16 January 2018 05:46 PM

Dear Valued Customer,

Nexus Technologies Brings First Sale of 2018 with FLAT 15% Discount on ALL Products & Services w.e.f 17th Jan’ 2018.

Products & Services


Promo Code

Nexus Cloud











.pk Domains (Local & International)

VPS & Dedicated Server

SSL Certificates

Web Development

Reseller Hosting

Business Hosting

Email Hosting

* Mentioned Promo Code can be used while processing order in Cart for All International or Pakistan Based Linux/Windows package.

For details, please visit our website:

               You can order Right Now:


Thank you!

Nexus Technologies - Smart Solutions for Smart People

Islamabad | Karachi | Rawalpindi | Lahore | Peshawar

Website: | UAN: 0300-0341140 | Toll Free: 0800 10100

Head office: 051-2222885, 051-2222885, 051-2222886, 051-2294763, 051-2294764

Islamabad: 051-2804123, 051-2804124

Rawalpindi: 051-4932379, 051-4932380

Lahore: 042-35913985, 042-35913986

Karachi: 021-34801912, 021-34801832

Peshawar: 091-5603103, 091-5603104

Email: | | |

Note: Payment/Order Confirmation automatically confirms customer declaration to accept All Terms, Conditions & Polices of Nexus Technologies



Read more »

Vulnerabilities: Spectre & Meltdown - Nexus Technologies
Posted by Muslim KHAN on 09 January 2018 03:17 PM

Vulnerabilities: Meltdown and Spectre

Vulnerabilities have recently been discovered for Intel, AMD and ARM processors. These vulnerabilities could allow unauthorized individual to access sensitive data.

Meltdown and Spectre are two recently uncovered flaws that can create issues in a variety of mainstream computer processors; Intel, AMD, and ARM all have experienced concerns relating to Meltdown and Spectre. Additionally, major technology manufacturers, like Apple and Microsoft, have expressed concerns over the potential vulnerability. The issue revolves around speculative execution, which is how modern computer processors maximize performance.

Responses from Manufacturers

The three biggest processor manufacturers affected by Meltdown and Spectre, Intel, ARM, and AMD, have each come out with responses to these vulnerabilities. While each of these companies is experiencing issues, Intel is affected by the largest amount of processors being impacted.

Being hit with the most affected processors, Intel’s response to Meltdown and Spectre was anticipated highly, since processors from the last decade (or more) may be affected by these vulnerabilities. Initial statements from Intel were a bit broad, sweeping over the true issues and merely acknowledging that they exist.

However, Intel has since come out with a whitepaper addressing mitigation techniques to be used when safeguarding against Spectre vulnerabilities. Additionally, there are already mitigation factors being implemented for future Intel-based chips, reducing the potential of this exploit being used on newer chips.

AMD has also released a statement, addressing the belief that their chips are not as susceptible to the vulnerabilities as other chip manufacturers. About a week before the announcement regarding Meltdown and Spectre occurred, there was an attempt by AMD to keep the information private until patches had been released. Additionally, at the end of 2017, a patch was released that excluded many AMD chips from Meltdown, which gives the suggestion that AMD was aware of the vulnerability.

ARM, compared to Intel and AMD, approached the vulnerability and creating a response in a different way. Avoiding public relations announcements, ARM released a technically sound whitepaper, which addressed concerns about patches for Meltdown and safeguarding against array attacks; ARM provided samples showing how to guard against these attacks as well. Although ARM is not currently developing a solution for Spectre, they do state their chips have existing systems that help invalidate or temporarily disable branch predictors

Here is a list of update procedures for some of the most popular operating systems:

- Windows Server
- Ubuntu
- CentOS
- Debian

Official CVE report
- CVE-2017-5754
- CVE-2017-5753
- CVE-2017-5715

If you wish to get more information on the current situation, you can visit the official responses from each respective vendor:




Our team is closely monitoring the situation to provide a solution as quickly as possible.



Nexus Support

Helpdesk Support:

Email: | | UAN 0300-0341140

Read more »