Blog Archive
-
▼
2010
(331)
-
▼
June
(130)
- amazing gadget
- Email Icon Hotmail On BlackBerry
- Nokia N9 has been leaked on the Internet
- Hangman Game for BlackBerry
- Pantech and Pantech Verizon Wireless announced Jest
- T-Mobile releases Samsung Samsung Vibrant GalaxyS ...
- WLM application for the iPhone successfully downlo...
- Google's Android phone will be the production of a...
- Microsoft Windows 7 Has Sold 150 Million Coffee
- U.S. Military Develops GPS-Based Missiles
- Obama's Twitter account breaker Punished 5 Months ...
- oooowonder
- travel gadget
- Intel Will Lower Rates processornya
- Students Demand $ 800 Sony Torts
- UK Anti-cheat Software Develop
- LASER
- When fused with Scooter Luggage
- Not Suitable for the 11 Finger Typing
- given gadget
- Tips for Choosing And Caring Keyboard
- Designed Touch Screen Samsung Fridge Can surfing
- Could Blind Looking Back With Glasses 'Magic'
- Greener gadgets
- Spy camera, Small and Sophisticated
- Developing countries would be a Electronic Waste D...
- GADGET shoW
- Domination Tumbangkan Netbook Notebook
- Past Present WordPress 3.0
- Online transactions in Indonesia Reached Rp 35 tri...
- U.S. Box-Office (June 18, 2010)
- HOT GAGGET
- Facebook Add Keys 'Like' in the remarks column
- for Mobile, 15 People Killed
- google
- payment via credit card.
- Facebook Beat Yahoo in the Field of Advertising
- Thanks to Google Adwords, Can Also Work, Men so po...
- Facebook member, Please Watch Video Click
- Sex Industry Changed Since The Facebook
- 30 Year PacMan, Google.com Forward
- Microsoft Will Change More Sophisticated Compared ...
- Blocked Youtube, Google Protest
- One Price, Online Shop 1.6 million Dollar Loss
- HTC Sprint 4G EVO Sold Out in America
- Weakness graphical features on EVO 4G
- Motorola A955 has been revealed Droid 2
- Android 2-2 FroYo updated immediately and myTouch ...
- Quickoffice applications now available for Android
- iPhone 4 already sold before the release
- Weaknesses Blackberry
- BlackBerry OS Update For BlackBerry 9520 Official ...
- BlackBerry OS Update For BlackBerry 9550 Official ...
- BlackBerry OS Update For BlackBerry 9630 Official ...
- BlackBerry 9800 Slider Rumor Will Become Renaming ...
- KIK Cross Platform Messaging Application For Black...
- Pinball Deluxe Game For BlackBerry
- Magic Picture Application For BlackBerry
- SanDisk makes flash for gamers
- Guitar Hero Game Released For iPhone
- Opera Beta has slid 10 06
- Symantec Antivirus is available for Android
- SUMO modem phone launched Fren
- Yahoo Launches Messenger Application in Indonesia One
- Google Earth is now also available for iPad
- A breaker iPad successfully pinned
- Apple's new Mac Mini into small chili
- Google Bring 400 000 Europe History Books
- Create a carving of Jesus Crying Blood restless
- NASA: Solar Storm Could Destroy Earth Year 2013
- Millions of Mobile Phone Virus Attack in China
- Trojans & Malware Now drill Amendment Social Netwo...
- Fake antivirus maker Truly Deceptive Intentions
- iPod Touch With Camera Appear on Internet
- Floppy Disk Immediate Retirement
- IBM Scientists Create World Soccer Sand Size
- Google will release a Web TV
- Meteorites Can Be Threat To Humans
- Wedding Couple wed robots in Japan
- Toshiba Laptop 3D & Netbook Released Android
- Nokia N8: Smartphone Entertainment with 12MP Camera
- At E3 2010, Microsoft said will release the Xbox Slim
- Planet 'Alien' Formed by Rapid
- Every Moon There BlackBerry 1000 Units Damaged
- Console Games 'Full Motion' E3 Domination
- Survey Results: 8 of 10 Children Ever See Porn Sites
- Travel gadget
- BLACKBERRY JAVELIN
- NOKIA 7210
- Tips & Tricks to Make Your Internet Super Fast
- news
- Be careful if your Laptop Service
- Ultra Mobile
- Tip: Avoid Secure Personal Data is stolen Increased
- 10 Things Most Wanted Lovers of Technology in the ...
- 9 Tips Healthy & Safe Game
- BeatifuL Phone
- Tips Extending Laptop Battery Life & Gadgets
- Internet Security 10 Facts You Need to Know
- Tips to Make Windows XP Pirated Become Legal
Ways Hackers steal credit card data This article is not intended to teach you how to steal credit card data, but we want to inform you so that later you can unavoidable from credit card data theft crimes. The terms of credit card crimes commonly termed "carding" since the Internet increased by hundreds of percent. Ironically, Indonesia is in the ranks of top 10 (at the time of the first rank) so that the credit card issue of the Bank-Bank Indonesia rejected when shopping online at sites abroad. It has also been experienced by the author in the game want to subscribe to foreign magazines with an online payment via credit card.
Hackers are very fond of this one crime, why? Because if just nge-hack or deface a website (change the display / website links) is something that it is pointless. And this could be the detection and perpetrators can be easily arrested if he entered the sites, which have a tracker (tracking programs ip / links) or LOG FILE (a file that records user activity / ip go to the website). If carding they can be free without a trace, and also sometimes after getting the data, they spread among hackers so difficult to track the first person to steal credit card data. Recent occurrence of terrorist websites in Indonesia are also registers of the carding.
There are several methods used by hackers in stealing credit cards, among others: 1. Packet sniffer, it is the fastest way to get any data. The concept of work they put enough program that can view or create a logging file from data sent by e-commerce website (online sales) that they seek. Generally, they target the websites that are not equipped with security encryption or sites that do not have good security.
2. Creating a program spyware, trojans, worms and the like which functions as a keylogger (keyboard loggers, program record keyboard activity) and this program is distributed by E-mail Spamming (put the file in the attachment), mirc (chat), messenger (Yahoo, MSN ), or specific sites with the icon or the lure of an attractive netter to download and open the file. This program will record all activity on your computer into a file, and will send it to an email hacker. Sometimes these programs can be run directly when you get into that in a hacker site or porn site.
3. Create a phishing site, which looks the same or similar sites such as the original site. example in Indonesia when the site click bca (www.klikbca.com), have experienced the same thing. the site looks the same as KlikBCA but made some different address as www.clikbca.com, www.kikbca.com, etc., so that the wrong type netter, will stray into those sites. Fortunately people who make these sites he did not mean evil. Now if a hacker who created tuh carding sites, get ready for your credit card deh would burst its banks.
4. Hacking into the e-commerce site is directly and stole all the data of its customers. This method is rather difficult and needs to be an expert hacker or hackers who have the experience to do so. In general they use injection method (insert scripts which can be run by the website / server) for sites that have a firewall. There are several ways injection among other commonly used html-injection and SQL injection. For sites that have no security or firewall, ready-ready-abisan dikerjain abis.
There is more to be done several ways hackers, but the ways above are the most common way a hacker to carding. Unusual ways will be explained later in another time. Crime does not just happen because there is intention of the perpetrator, but because of the opportunity, beware ... beware ...
Design by araba-cı | MoneyGenerator Blogger Template by GosuBlogger