Buying online has become in this era of the things that facilitate the lives of many, and this has flourished and spread of e-commerce in the last decade, largely, as you can and become easily request a book or a piece of electronic gift or to pay utility bills from the water and electricity and mobile and fixed telephone, and many other things that can be purchased online through the e-payment.
However, some people still do not trust these electronic services, as often hear about the accreditation card theft and theft of the balance of a person or a person with the purchase of the card without his knowledge, and this is actually exists, and on this subject I will talk about procurement methods e-procurement and risk through credit cards issued and tips for safe buying through credit cards issued.
Ways purchase online:
There are a lot of methods that enable the customer to purchase online, but unfortunately most of us is not applicable in many Arab countries, and in the following simplified explanation for some of these ways:
1. Payment by credit cards issued (Credit Cards), and is the most dangerous fact that the procurement process be put card number and security number on the back of the card, and general information about the buyer, which can easily be used by third parties in the event of lost this card
2. bank transfers (Wire Transfer), and is the transfer from your bank account to the person or company that buys them, and is way more secure than its predecessor, but the consequent commissions Money large bank, and does not fit the purchases that are of small value.
3. remittances through transfer companies such as Western Union Company, and is a safe way, but like its predecessor Amoltha large and do not fit small operations.
3. Payment by phone (Pay by phone) or fax: and is a service available in some countries, as you can purchase by calling a particular phone number, are adding additional cost to your bill, but when you use this service you must ask for this commission Contact.
4. Payment by check: You may purchase converts a check, but if the check will be sent to another country is the time needed to reach, and the time of the exchange, and also needs you an extra effort to send the check, and most of the companies on the Internet does not accept checks, and on this the way The least prevalent.
5. Payment via dedicated Internet electronic accounts: such payment by the Arab cashews, and many English services such as Mona poker and Alaigauld and Allaeberta Reserve and Albay Paul and other payment methods show and some of them disappear for lack of credibility and guarantee all of these companies , and in addition to the lack of credibility of some of them, you will face several problems in working with these companies, and is the commission conversion multiplier, first to the service, and then commission the purchase, but these services may be a solution in some countries where the difficult sales and buy online easily, such as Syria, for example.
Purchase by credit cards issued:
The purchase by the accreditation of the easiest and more ways to purchase online cards prevalent, as are the procurement process put the card number and the expiration of the account holder and the name and address of the date and security number (consisting of 3 or 4 digits back of the card) and is symbolized by the CVV or CVC or CVV2
All these information can be found on the often card except for the title, and most of the companies met with the parent company to match the address listed with the address written on the card and sometimes call you to match information and to confirm Achara process problem comes if skipped these questions with answers are correct as it happens in the event of theft identity.
We note here that the lack of security here be present because of easy access to your data from the card, and the following are some of the methods used by thieves to get your information.
Identity Theft (Identity theft):
Sarko able to steal the identities of your reliance card information in several ways, and I remember some of them here and later prevention methods.
Spam that link to your e-mail often contain offers to buy drugs or cheap programs, when Maholtkm purchase through the links in these messages, you are you are granting your information for free for identity thieves, Badkhalkm each payment process in their details, and are therefore collecting this information and making purchases through your cards. (Read more about spam).
Spyware and recorders keystrokes and some viruses: and are malicious programs often grown in your devices via the Internet, and sometimes by people with permission to access to your devices, and these programs logs keystrokes, which can contain your passwords credit your cards and numbers in case you are bought from the Internet, and some of these programs allow her employer access to your files and check them and copy them, and on this Valoman be secure in your desk top of the form in which these behaviors Sazl shortly.
Espionage and devices that can be installed at the entrance of the keyboard, and the purpose of recording keystrokes, and spread reports in the past to warn of the presence of these pieces in Internet cafes, and the following are several types of recorders keys: KeyShark_Hardware_Keyloggerkeyghost-usb-keylogger strikes
keylogger
Direct observation by surveillance cameras, as if using the computer in a public place and the camera monitors the keyboard you have to know the keys used in the input.
Stolen card information in the purchase or shops points, as should be monitored well card and prevent sellers in these stores from recording or photographing your card and take their information.
Ways to protect your card from being stolen:
It is noted in the case of the theft of card information that the error is often the result of the protection of computer error, and for this you should follow these steps to secure your card information theft
1. You should not trust ads that connects you to the Internet via e-mail, and on this you should not purchase any product announcement receive via e-mail, but from a store you trust him and declares that it is possible to send advertising messages containing links to the presentations.
2. The selection of stores where security certificates for your purchase, and these security certificates in the form of buttons recognized the writing and contain such as the protection of sites:
VBV_logo
3. that the page where you enter the purchase data on worker recognized layer of security to be, ie, that the site in the address bar starts with https instead of http, and you will find at the site then a button containing security information such as VeriSign Secured, not only this, but press the button to make sure it contains information about the location in which you buy it and the button is not copied from another site.
verisign-logo
4. You protect your computer from viruses and recorders of keystrokes, and has explained the methods of protection from viruses and advised an excellent program on the following link: protect your computer from viruses and hack
5. You should not use your credit cards or banking information from public agencies in order to preserve the privacy of these cards from theft different ways.
6. You do not store your bank on your computer to protect it from interference and theft by Almokhtrven or by hackers.
7. If you are using your computer at work atmosphere or your surroundings a number of people, and you want to maintain your privacy, you protect your computer with a password, and log off or switch user in case you want a little bit away from the computer, and then appear to Mtzvelin request to put the word password to continue and access to a computer.
8. If you purchased the card from stores or POS careful not to copy the card information and the absence of suspicious devices on the communication device.
Purchase of the Internet is an important feature to ease, and any of us can be used safely, and if followed these steps you will have gone a long way in protecting yourself and your account.
However, some people still do not trust these electronic services, as often hear about the accreditation card theft and theft of the balance of a person or a person with the purchase of the card without his knowledge, and this is actually exists, and on this subject I will talk about procurement methods e-procurement and risk through credit cards issued and tips for safe buying through credit cards issued.
Ways purchase online:
There are a lot of methods that enable the customer to purchase online, but unfortunately most of us is not applicable in many Arab countries, and in the following simplified explanation for some of these ways:
1. Payment by credit cards issued (Credit Cards), and is the most dangerous fact that the procurement process be put card number and security number on the back of the card, and general information about the buyer, which can easily be used by third parties in the event of lost this card
2. bank transfers (Wire Transfer), and is the transfer from your bank account to the person or company that buys them, and is way more secure than its predecessor, but the consequent commissions Money large bank, and does not fit the purchases that are of small value.
3. remittances through transfer companies such as Western Union Company, and is a safe way, but like its predecessor Amoltha large and do not fit small operations.
3. Payment by phone (Pay by phone) or fax: and is a service available in some countries, as you can purchase by calling a particular phone number, are adding additional cost to your bill, but when you use this service you must ask for this commission Contact.
4. Payment by check: You may purchase converts a check, but if the check will be sent to another country is the time needed to reach, and the time of the exchange, and also needs you an extra effort to send the check, and most of the companies on the Internet does not accept checks, and on this the way The least prevalent.
5. Payment via dedicated Internet electronic accounts: such payment by the Arab cashews, and many English services such as Mona poker and Alaigauld and Allaeberta Reserve and Albay Paul and other payment methods show and some of them disappear for lack of credibility and guarantee all of these companies , and in addition to the lack of credibility of some of them, you will face several problems in working with these companies, and is the commission conversion multiplier, first to the service, and then commission the purchase, but these services may be a solution in some countries where the difficult sales and buy online easily, such as Syria, for example.
Purchase by credit cards issued:
The purchase by the accreditation of the easiest and more ways to purchase online cards prevalent, as are the procurement process put the card number and the expiration of the account holder and the name and address of the date and security number (consisting of 3 or 4 digits back of the card) and is symbolized by the CVV or CVC or CVV2
All these information can be found on the often card except for the title, and most of the companies met with the parent company to match the address listed with the address written on the card and sometimes call you to match information and to confirm Achara process problem comes if skipped these questions with answers are correct as it happens in the event of theft identity.
We note here that the lack of security here be present because of easy access to your data from the card, and the following are some of the methods used by thieves to get your information.
Identity Theft (Identity theft):
Sarko able to steal the identities of your reliance card information in several ways, and I remember some of them here and later prevention methods.
Spam that link to your e-mail often contain offers to buy drugs or cheap programs, when Maholtkm purchase through the links in these messages, you are you are granting your information for free for identity thieves, Badkhalkm each payment process in their details, and are therefore collecting this information and making purchases through your cards. (Read more about spam).
Spyware and recorders keystrokes and some viruses: and are malicious programs often grown in your devices via the Internet, and sometimes by people with permission to access to your devices, and these programs logs keystrokes, which can contain your passwords credit your cards and numbers in case you are bought from the Internet, and some of these programs allow her employer access to your files and check them and copy them, and on this Valoman be secure in your desk top of the form in which these behaviors Sazl shortly.
Espionage and devices that can be installed at the entrance of the keyboard, and the purpose of recording keystrokes, and spread reports in the past to warn of the presence of these pieces in Internet cafes, and the following are several types of recorders keys: KeyShark_Hardware_Keyloggerkeyghost-usb-keylogger strikes
keylogger
Direct observation by surveillance cameras, as if using the computer in a public place and the camera monitors the keyboard you have to know the keys used in the input.
Stolen card information in the purchase or shops points, as should be monitored well card and prevent sellers in these stores from recording or photographing your card and take their information.
Ways to protect your card from being stolen:
It is noted in the case of the theft of card information that the error is often the result of the protection of computer error, and for this you should follow these steps to secure your card information theft
1. You should not trust ads that connects you to the Internet via e-mail, and on this you should not purchase any product announcement receive via e-mail, but from a store you trust him and declares that it is possible to send advertising messages containing links to the presentations.
2. The selection of stores where security certificates for your purchase, and these security certificates in the form of buttons recognized the writing and contain such as the protection of sites:
VBV_logo
3. that the page where you enter the purchase data on worker recognized layer of security to be, ie, that the site in the address bar starts with https instead of http, and you will find at the site then a button containing security information such as VeriSign Secured, not only this, but press the button to make sure it contains information about the location in which you buy it and the button is not copied from another site.
verisign-logo
4. You protect your computer from viruses and recorders of keystrokes, and has explained the methods of protection from viruses and advised an excellent program on the following link: protect your computer from viruses and hack
5. You should not use your credit cards or banking information from public agencies in order to preserve the privacy of these cards from theft different ways.
6. You do not store your bank on your computer to protect it from interference and theft by Almokhtrven or by hackers.
7. If you are using your computer at work atmosphere or your surroundings a number of people, and you want to maintain your privacy, you protect your computer with a password, and log off or switch user in case you want a little bit away from the computer, and then appear to Mtzvelin request to put the word password to continue and access to a computer.
8. If you purchased the card from stores or POS careful not to copy the card information and the absence of suspicious devices on the communication device.
Purchase of the Internet is an important feature to ease, and any of us can be used safely, and if followed these steps you will have gone a long way in protecting yourself and your account.
0 التعليقات:
إرسال تعليق