Following safe tips to all credit card consumer.

- For consumer candidate, after receiving new card, ascertains to sign the card as soon as possible, after received. Noted account number and bank number to report if in a moment card loses or stolen.

- In choosing PIN, ascertains chooses which is easy not is guessed, like username, telephone number, date of bearing or pool from altogether.

- Doesn't have ever noted number PIN. If having to noted, doesn't save have ever in purse, bag, or itself card. The pin Number also do not ever be advised to whoever, either to police, and also consumer bank branch. Only consumer x'self knowing it.

- If happened losing of card, soon reports to bank of issue. Consumer also is expected makes report written or police report.

- Protects credit card as protecting hard cash. Doesn't depart from card is any place. Doesn't have ever leaved the card at the time of transaction. Ascertains consumer to get the card returns transaction having taken steps.

-Investigating voucher is including result of transaction amounts at the time of signature, keeps transaction evidence and retrieval ATM. Investigating you monthly invoice, especially as of pot is clean haves the day off.

-Ascertains disbursement of consumer equal to transaction evidence kept. Doesn't have ever given the card number through telephone, except if when consumer in pursuance of transaction with company which know,or when consumer x'self firstly contacts them.

-Takes a care if giving consumer credit card number through telephone. Asking for written evidence from the company. If feeling forced by seller telemarketing, consumer hopes taking a care and properly suspicious. Doesn't have ever given except to account number when payment. Doesn't have ever given information of x'self if using the card, besides about document identity.

-Knowing who so ever using card property of consumer. If when card borrowed by member of family ( husband/wife, parents ) without or in the affirmative consumer, consumer must be in control of all transactions which they do.

1. Didn't go shopping otherwise needs

This often is impinged by feeling has ' money ' we tend to going shopping anything which we will. celullar phone, camera, food, etc. without minding our standard actually. As a result, your credit invoice exceeds limit and us incapable of paying.

2. How much money which real we have after cut by all disbursement of routine.


for the things the salary direct cut for various disbursement must, knows how much level of remaining money. For example salary after cut by installment payment of home, installment payment of car, electrics, telephone, water, and daily shopping of home. After known to be level, hence doesn't apply credit card to exceed money remaining the.

3. Soon our invoice payee.

Doesn't get taken bank with interest which was said only 2%. Because 2% only if we pay for ontime. If we came late, hence they will be synchronized to us various other penalty fines.

4. Neglectless with limit.

Frequently we are heedless is our card limit and bank also frequently pampers us by adding our card limit. If wes own limit $ 700 in 1 card, hence if only we apply 90% limit, hence didn't surprise if each month minimum we must prepare money $ 65 to pay for a minimum of payment. Mean, if we had no salary remainder of fund more than the number, didn't try to apply card limit we are ultra vires rest of the emolument.

5. Soon cut ultra vires credit card if it is or not in control.

That we is not phising applies again credit card, hence our credit card cut. And settles the payment monthly normally, but didn't ask credit card again.

This article in informing to be protected from theft victim of credit card data.

Badness of ordinary credit card in term " carding" since existence of internet increased of hundreds gratuity.
The hackers aspires after once this badness, why? Because if only did “ hack” website or deface be thing there is no the profit. And this thing can in detection and arsonist can be catched, if site which in enters has TRACKER ( detector program IP/link) or LOG FILE ( file note activity user/IP is stepping into website).

If carding they can go without footstep after getting the data,they will propagate data between hacker so that difficult to be traced first person who is stealing credit card data.

Some ways applied by hacker in stealing credit card :

1.Sniffer Packet, this way is fastesd way to get data any kind. The activity concept they enough using program which can see or makes logging file from data sent by website e-commerce ( online sale) . In general they set on website which is not is equiped by security encryption or site which is not has security not safe.

2.Made program spyware, trojan, worm and the functioning conspecific become keylogger ( keyboard logger), program notes keyboard activity. Anything which you type to codified. This program disseminated through via E-mail Spamming ( file trojan in attachment), messenger ( yahoo, MSN), or certain site with icon or interesting display of netter to do download and opens the file. This program will note all you computer activities into a file, and will send it to hacker enamel. Sometime this program can be implemented direct if you to step into sites which in making hacker or adult/phorno sites.

** Initial sign is your computer in infiltration is: internet and speed of computer would increasingly slow, if you opened taskmanager will emerge ill defined files.

3. Makes phising site , that is conspecific site or looks like site the original. With link is looking like the original but wrong. example of in Indonesia at the time situs click bca www.klikbca.com, have ever experienced the thing. This site the display same as klikbca but the address is made some different like.

4. Last, this high level: unloads site e-commerce directly and steals all data of the customer clients. This rather difficult way and needs hacker expert or hacker which have been experience of to do. Them uses method injection ( input script which can be implemented by site/server and opens security for its. Then open security and safety system in server and all data can be read.

There are some way done the hackers, but above way is way that is most commonly is done hacker for carding.

Victim is not only happened because there are intention from the perpetrator, but caused by opportunity, attentive... attentive...

;;
 
Template by: Abdul Munir | Blog Layout4all