Saturday, October 24, 2009

How to hack Orkut Account Passwords

Orkut has became major social network in India and even abroad. So, naturally, www.orkut.com is becoming a target of hackers. There are many hacking tricks or hacks to hack orkut account passwords. So, i have listed most popular Orkut account password hacking tricks. Below, i have mentioned all Orkut account password hacking methods

Hack Orkut Account password:


1. Orkut Phishing:

As i have stated in all articles, Phishing is first priority to hack Orkut account passwords. Infact, it is most favorite method of orkut hackers. Here, you have to send a fake orkut login page (orkut phisher) to orkut friend and ask him to login to orkut account by this fake orkut login phisher. This orkut phisher is, ofcourse, prepared by you. When orkut friend logs in to orkut account by this orkut phisher, his orkut password is emailed to you and thus you can now hack his orkut account. I have added on how to make phisher in my article Hack email/orkut account by Phishing.

2. Keylogging :

This is most easy method ever found. Here, you have to install keylogger software on victim computer and give destination at which keylogger will send all passwords typed on friend's computer. And then keylogger will start recording all keystrokes on victim computer and send these passwords. This keylogging becomes more easy if you have physical access to victim computer. Even, remote keylogger installation can be done. You can use Ardamax keylogger to hack orkut account password.

3. Community links :

Many times, you are provided with community links in orkut scraps inviting you to join it. On clicking the link in orkut scrap, you are directed to orkut phisher explained above, ready to hack your orkut profile account.

4. Orkut Javascript hack :

This method became much famous in last year. Here, orkut victim is provided with some javascript (popularly called code) and is asked to copy paste this javascript code in his address bar for say changing his orkut theme. When victim does this, his orkut cookies are stolen and now orkut hacker can hack his orkut account using orkut cookies. I have written more on orkut cookie stealing in Hack Orkut account by Cookie stealing.

5. Orkut New Features :

I received an orkut scrap that looks like they are giving the user a choice of using new features for orkut with your ID and password, of course!! When user submits the orkut page, his ID and password is mailed to orkut hacker and thus his orkut account is hacked.


6. Primary email address hack :

If orkut hacker, by some means, hacks your gmail or yahoo account which you are using as primary email address, then this orkut hacker can easily hack your orkut account using "Forgot password" trick. He will simply ask orkut to send password reset email to your primary email address- which is already hacked. Thus, your orkut account password will be reset and orkut account hacked !!!

So, always remember to protect your orkut primary email address and try to keep unknown or useless mail id as your primary email address.

So friends, i hope you all are now knowing methods to hack orkut account passwords. I have tried to keep this orkut hacking article simple. If you have any comments or new methods on how to hack orkut account password, please mention it in comments section.

Enjoy HaCkInG.....

How To Hack Orkut ???


Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.


First Level - Security-SSL or 128 bit secured connection
Second Level – Google account checks for cookie in the sytem of user

Third Level – Google provides a redirection to the entered User information

Fourth Level – Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!
It is not an easy task to hack Orkut by breaking this security! But still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to protect your Orkut account being hacked.



Common Ways to Hack Orkut

1. Using Keyloggers is one of the Easiest Way to Hack an Orkut (or any other email) password. Keylogger programs can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden.

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an Orkut account.

A keylogger program is widely available on the internet. Some of the best ones are listed below

Win-Spy Monitor

Realtime Spy

A detailed information on Keylogger Hack can be found in my post Hacking an Email Account.

2. Phishing Attack is the most popular way of hacking/stealing other’s password. By using fake login pages it is possible to hack Orkut. Here the users land on a page where they are asked for their login information and they enter their Orkut username and password thinking it to be a real page but actually it is other way round. It submits all the entered details to the creator of the fake login page.

3. Orkut New Features: I have come across a page(fake page) that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When the user submit’s his/her Orkut login information through this page, there goes his ID and password mailed to the coder.

4. Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.

5. Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it. So be careful, javascripts can even be used to hack Orkut!

6. Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’. This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.

So a better thing would be to keep a very unknown or useless email ID of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker. Hence your Orkut account saved.

So, I hope that this post not only teaches you to hack Orkut but also to hack protect your Orkut account.

If you would like to share something, comment here and I will add up here with a credit to your name

The Case of the Ruined Roses

That was a neat program on UFO's," said Nina to her cousin Max as they walked down the street. "I think what really amazed me was that UFO's were reported as early as 1800."
"That's pretty hard to believe," said Max. "Anyway, do you really believe there are such things?" Nina started to answer when they heard a loud scream coming from Coach Thornton's house.
"Come on," shouted Max. They ran into the yard where the coach was staring at ten rose bushes that had been pulled from the ground.
"Look at that!" he demanded. "Just look at that."
"That's terrible," cried Nina. "Who could have done it?"
Coach Thornton looked disgusted. "I had to bench three of my best football players for cutting class. They were pretty mad at me."
"First thing, we'd better get these roses back in the ground," said Max. "Then we'll figure out who did it."
Nina and Max helped Coach Thornton replant the roses. Then he invited them in for milk and cookies.
"Now," said Nina. "Am I right? You benched Sam Cartland, Mike Brooks, and Alex Avery."
"And you lost the game," added Max.
The coach rubbed his eyes. "I know, but rules are rules."
"I'll bet one of them did it to get even," said Nina. "How about we nose around a little?"
"Let's see," said Max after they left. "Coach said the roses were all right when he looked out at nine. But shortly after ten, he found them pulled up."
"So, we check to see who doesn't have an alibi between nine and ten. Look!" Nina pointed. "There's Alex Avery over at the Dairy Bar."
Alex looked up as they came in. "Hi kids," he drawled.
"Hello, yourself," said Max. "We missed seeing you in the football game."
"That was a bummer all right. But I guess the coach didn't have any choice."
"Where you been all morning?" asked Nina.
"I've been right here since nine." He turned to the girl behind the counter. "Isn't that right, Amy?"
"Uh huh. You helped me carry in that heavy box."
"So you weren't anywhere near Coach Thornton's house?" asked Max.
Alex looked surprised. "No, I'm not mad at him, but I don't intend to visit him."
After they left, Nina looked down the street. "That's Sam Cartland's house. Let's see what he's been doing."
"What do you two want," growled Sam when he came to the door.
"Hey, lighten up, Sam," said Max. "Can we talk with you?"
"Sure, come on in." He pressed a button on his remote control and turned off his VCR. "I've been watching some football tapes to improve my game."
"We wondered what you were doing between nine and ten this morning," said Nina.
"I was right here watching that program on UFO's."
"That was a good program," said Nina. Remember when that guy from Roswell, New Mexico insisted he had been abducted?"
"Yeah," laughed Sam. "The one with the bushy hair. Funny how this has been going on for so long. That pilot, Kenneth Arnold, started it back in 1947 with the stuff he saw."
"Very interesting," said Max, trying not to look bored. "But we have to get going."
"Maybe we can find Mike Brooks working out at the gym," said Nina as they left.
"Probably," agreed Max.
They found him on the treadmill. "Hey, you two want to join down here? It's a great place to work out."
"Not right now," said Max. "We were wondering about what you were doing from nine to ten this morning."
"Right here. You can check the log book. Why?"
"Just curious," said Nina with a smile as they went back to the desk. Sure enough, Mike had signed in at five of nine.
This is great," Nina groaned. "They all have alibis."
"I'm not so sure of that," said Max.

Can you solve the case?

Whom does Max suspect?

Job description: Defense Attorney


The Defense Attorney is an advocate for the client. The client should be presented by the defense in the best possible light. While the defense attorney must zealously seek to help the client, it is important to never misrepresent the case.

To prepare the case, the Defense Attorney should be familiar with the aggravating and mitigating circumstances regarding the charge.

The Defense Attorney will stand when the Judge enters and leaves the courtroom. He will also stand when the jury enters and leaves the courtroom.

While the Prosecuting Attorney is questioning the defendant, the Defense Attorney may object if the prosecutor asks what seems to be an improper question. The Court will rule on the objection either by sustaining or by overruling the objection. The defendant is then required to answer or ignore the question.

The Defense Attorney should never argue with the opposing attorney but should address the bench (Judge) with necessary questions.

After the Prosecution has completed questioning the defendant, the Defense Attorney will stand and ask questions of the defendant that are designed to bring out mitigating factors in the case. These could be questions regarding the defendant's remorse or shame with this involvement in the offense, the fact that he has received some consequences at home for the behavior, or that he did not intend to become involved in this offense. These questions and the answers should justify the Defense's request for a lighter sentence than the one asked for by the prosecution.

After the Defense Attorney completes his questioning, he will rest the case. The Prosecution finishes closing argument, followed by the Defense Attorney's presentation of closing argument. The closing should be supported by evidence. The Defsnse Attorney can point out to the jury the facts which may influence them to consider a lighter sentence for his client.

Please remember to always return paperwork to the coordinator
at the end of each Teen Court session.

Criminal defense attorney

Criminal Defense Attorney Employment ? What You Need To Know

Are you looking for a career as a criminal defense attorney? This is definitely one field which you will never run short of work. With the crime rates rising everywhere in the world, criminal defense attorney employment will always offer a good deal. The criminal justice is a vast field of which criminal defense is only a very small part. Other aspects covered under this field are, criminal law, detectives, paralegals, investigators, criminal justice researchers and so on. There are many highly successful investigators and detectives who are the outcome of a stint with the justice department.

Criminal defense attorney ? the career

A criminal defense attorney is high on the wanted all over the world, not only in the USA. This is because there is no such place in this world where there are no crimes or criminals. In fact the criminal defense attorney is seen as special and highly demanding job both emotionally and psychologically and hence it is paid higher than any other branches of the law.


As a criminal defense attorney your job would be to defend people who are found accused by crimes and thereby prevent their conviction. Since almost always the cases are highly sensitive and involve the risk of extreme punishments the criminal defense attorney jobs are extremely demanding emotionally as it is challenging. This is because a criminal defense attorney is answerable not only to his/her client but also to his/ her peers and society at large.

It is the challenge of the criminal defense attorney employment that attracts some of the brightest minds into this field. Their job starts right after the arrest of the person accused of whatever crime he/ she is supposed to have committed. The criminal defense attorney would first try to release the person on bail while working out the best procedure to acquit his/ her if they would be brought for a trial. However, before the trial the criminal defense attorney would try their best to get the person discharged before a trial is called for. Once the trial starts, then the criminal defense attorney would really have to work hard for his or her salary as defending a person from any crime is quite difficult. The more difficult it is the sweeter is the taste of winning such a case.

Educational requirement for Criminal defense attorney

Any practicing attorney would need to first earn his or her license in order to practice any type of law in the USA and for this the Bar exam must be passed. This exam is also known as the Multi-State Bar Exam or in short MBE which differs from State to State. This means that if you ever move from one State to another and you want to practice in the new State, you would have to pass the MBE again to gain a license to practice there. This is because the law differs in certain aspects from State to State.

You would also need a bachelor?s or master?s degree and of course you would need to pass the law school as per the norms of the ABA (American Bar Association). You could also become a criminal defense attorney without attending the law school, if you are willing to undergo an apprenticeship under a leading criminal defense agency or criminal lawyer. However this option is open in a handful of States.

The subjects you would need to emphasize on to become a great criminal defense attorney would be sociology, composition and written communication in the justice environment, criminology and court procedure, general education requirements, psychology and/ or rehabilitation among others. Some other skills that you would need are police investigative work, security, juvenile delinquency, forensics, criminal investigations, and victim advocacy and so on.


Some of the leading law schools approved by the ABA where you can read about criminal defense are:

University of Phoenix
South University
Kaplan University
Everest College
Capella University
FMU Online
Grand Canyon University
Compensation for Criminal defense attorney

The average salary that criminal defense attorney employment would entail started at US $45,000 upwards. These were the statistics in 2004. This figure is almost double today which show the extreme potential of the criminal defense attorney jobs. This comes with all the perquisites such as medical benefits, retirement benefits and so on.

Criminal Defense Attorney

Company: Robert Half Legal

Location: Phoenix, AZ
Contact Information
Name: Recruiter
Apply to this job now
Job Description
Classification: Full-time

Compensation: $80000 to $130000 per year

A busy Phoenix law firm is looking to add an experienced criminal defense attorney to its team. The right candidate MUST have appellate experience and 3+ years criminal defense experience. The firm offers a competitive compensation package and a collegial work environment. Interested and qualified candidates should submit their resumes, in confidence, to Steven Deutsch at [Click Here to Email Your Resum�] or call 602-977-0505 to inquire about the position.

Located in major markets throughout North America, Robert Half Legal is the premier provider of legal professionals on a full-time, project and temporary basis to law firms and corporate legal departments. We offer our candidates challenging assignments, competitive compensation and benefits, and skills-enhancement training. Robert Half Legal is better at finding you challenging new career opportunities because we come from the legal industry ourselves, with a majority of our staffing executives holding JDs or other legal credentials. Additionally, we were just ranked number one in our industry on Fortune's list of America's Most Admired Companies. Call your local Robert Half Legal office at 1.800.870.8367 to discover more about this position. Robert Half Legal is an Equal Opportunity Employer. Apply for this job now or for more information and to view all our job opportunities visit www.roberthalflegal.com.


Job Requirements
Only candidates with an AZ bar license, criminal defense experience and appellate court experience will be considered.

Bout Attorney Job Search, Legal Cover Letter Writing

Find links to articles for the best advice on jobs. Adler and Manson are personal injury attorneys in Kansas City with over 25 years of experience. Information About How Helpful Internet Job Boards, Attorney Job Board And Advertisements, Legal Newspapers, Legal Advertisements When You Start Thinking About A Career Move. attorney's jobs that have changed hands since President Bush began his second term have been filled by the White House and Justice Department with trusted administration insiders.

That number is in dispute, as is Griffen's getting praise from Cummins for his job performance.

Information About Handling The Interview Scheduling Calls When The Phone Rings And About How To Handle The Interview Calls And About Attorney Job Search, Legal Cover Letter Writing, Legal Resume Writing. Clothing, Camouflage, Equipment and Accessories for Outdoor, Army, Security, Leisure, Hobbies, Sports, Jobs and much more. Alternatives give marketers the training needed to enhance their Talent and meet bigger challenges in the Marketing business. Chief in-house attorneys and general counsels at Apple Inc, Monster Worldwide Inc. If you're interested in criminal defense attorney salaries or have ever wondered what's it's really like to work as a criminal defense attorney in California (or anywhere else), then you don't want to miss this Salary Story. In many cases, the job of a trial attorney is to actually avoid the court system by handling settlements between parties. attorney jobs, according to documents and interviews.

Online anunturi gratuite Bucuresti auto imobiliare locuri de munca prestari servicii diverse. Contact Adler and Manson for a free evaluation. We help consumers find the best representation for their legal needs. Project Planner, Project Manager and all Project Jobs, Saudi Arabia Jobs, Qatar Jobs, International Jobs. About one-third of the nearly four dozen U.S. www.123-jobs.co.uk 123 Jobs- Job Site Directory, Links to job related sites, Search, Find, Get that job.

Consortium News reports that Tim Griffen, Karl Rove's buddy who got the plum US Attorney job when they fired Bud Cummins for no reason, evidently claimed on his resume that he prosecuted 40 cases while working for Cummins. San Diego criminal attorney Scott Pactor gave us the inside scoop on criminal defense attorney salaries and attorney jobs.

The Interviewing Process is Punctuated by Uncertainty. Attorney One is a free consumer service. companies violated laws in granting stock options to top execs are leading to mass resignations of corporate lawyers. Online advertising Bucharest Romania: auto, real estate, jobs, services. and at least 12 other firms reviewing their historical stock option practices have resigned or been dismissed.

Trial attorneys handle both civil and criminal cases that need to be brought to court to reach a solution. Marketing Jobs Ireland- Alternatives put Talented Marketers in touch with great marketing job opportunities in great companies. Information and resources for finding jobs and employment online.

Two of the major players in the ouster of federal prosecutors last year were themselves considered for U.S. Majorplayers.co.uk is an leading job provider for Advertising, Events, integrated marketing, client marketing, design, design management, office support HR to uk,Europe,USA,Australia.

We are providing these services Recruitment agencies in India,Recruitment agencies in Tamilnadu,Recruitment agencies in Coimbatore,Recruitment agencies in South India,Recruitment consultants in India,Recruitment Consultants in Coimbatore,Recruitment consultants in South India,Recruitment consultants in Tamilnadu,Recruitment agents India,Overseas placement services in India,Overseas recruiters India,Overseas recruiters Tamilnadu,Overseas recruiters Coimbatore, Overseas recruiters South India,adve. Law firms, Legal recruiters, Legal Jobs, Attorney Jobs. They have served thousands of customers and collected millions in settlements

Defense Attorney

How to become a Defense Attorney
Applicants to law school are required to have a bachelor's degree. A multi-disciplinary undergraduate background is recommended with courses that include the skills of communication (both speaking and writing), research, analyzing, and logical thinking. Applicants to law school are screened through their undergraduate grades, quality of undergraduate school, prior work experience, score on the Law School Admissions Test (LSAT), and occasionally, a personal interview. State approved schools exist, but as of 2006 there were 195 schools accredited by the American Bar Association. Competition for acceptance into law school is intense, with the number of applicants greatly outnumbering the slots available.

During the first half of law school, students study core courses such as constitutional law, civil procedure, and legal writing. During the second half, students usually select an area of specialty and often gain practical experience in school sponsored legal clinics and moot court competitions. After law school, attorneys must stay informed about developments affecting the practice of law. Forty-eight states currently have continuing education requirements for attorneys.

To practice law in any state or jurisdiction in the United States, an individual must pass an examination to be licensed, or admitted to its bar. Many states also require attorneys to pass a written ethics exam. In most cases, attorneys must pass these exams in each state they wish to practice. Federal courts also set their own qualifications for those practicing before them.

What does a Defense Attorney do?
Defense attorneys act as advocates for their clients within the legal system, which can take the form of offering evidence and arguments on the client's behalf in court. Attorneys also advise clients of their legal rights, obligations and options. They can suggest a particular course of action in a business or personal matter. In all circumstances, defense attorneys research the intent of the law and previous court rulings and analyze them for application to the client's specific situation. Although law libraries are still the mainstay of this research, more and more attorneys are turning to technology to supplement the research process.
What skills or qualities do I need to become a Defense Attorney?
Practicing law requires a high degree of individual responsibility and adherence to a strict code of ethics. Successful defense attorneys enjoy working with people and have excellent interpersonal skills that can win the trust and confidence of their clients and the public. Attorneys often analyze complex legal issues or new and unique problems. This requires creativity, reasoning abilities, and perseverance. Defense attorneys must be able to think quickly and speak in an easy and confident manner. Knowledge of courtroom procedures is also essential.
How much does a Defense Attorney make?
Earnings of defense attorneys can vary widely based on several factors including years of experience, and type, size, and location of their employer. Those who own their own practices generally make significantly less than those who are partners in a large firm. In 2006, the median annual earnings of all attorneys were $102,470 with the middle fifty percent earning between $69,910 and $145,600 per year.
Who are some influential professionals in this field?
Richard E. Wiley has been recognized by the National Law Journal as one of America's 100 most influential lawyers in each of the five years this list has been published. He is a partner at Wiley Rien where he heads the firm's Communication Practice. With 80 attorneys, this is the largest communications practice in the United States. In his role as chairman of the advisory committee to the Federal Communications Commission, Wiley has played an instrumental role in relaxing state regulations on mobile phones and creating the technical standards for high definition television. He has been recognized time and again for his expertise and contribution to the telecommunications industry. Some of his recent awards include the Award of Special Recognition from the Radio and Television News Directors Foundation in 2007 and the Chambers USA Award for Excellence in the area of telecommunications regulatory work in 2006.

William H. Neukom is the current president of the American Bar Association and the Chair of Preston Gates LLP in Seattle, Washington. His primary initiative as president of the American Bar Association is the World Justice Project. He spent seventeen years as the lead counsel for Microsoft Corporation, where he led the effort to establish and protect intellectual property rights. Neukom was instrumental in securing a victory in the Apple v. Microsoft Corporation and led Microsoft's defense against anti-trust claims from the United States government and the European Union.


What are some leading organizations in this field?
The American Bar Association was founded in 1878 in Soda Springs, Michigan and is currently headquartered in Chicago, Illinois. With over 400,000 members, this is the largest voluntary professional organization in the world. The mission of this organization is to be the national representation of the legal profession. The influence of the American Bar Association is rooted not only in the size of the organization (roughly half of all practicing lawyers in the United States), but also in its diversity. It provides law school accreditation, continuing legal education, programs to assist legal professionals, and initiatives to improve the legal system for the public.

The National Association for Law Placement, now known as NALP, was founded in 1971 in response to the need for a forum to discuss issues related to placement and recruitment of legal professionals. This organization is dedicated to providing career counseling and professional development aimed at increasing recruitment and retention of lawyers. NALP seeks to provide expert research and education for professional development, to cultivate ethical practices in the recruitment of lawyers, to promote all available job options for those seeking a career in the legal profession, and to advocate for diversity within the legal profession.
What are the top cities for Defense Attorney jobs?
The top cities for aspiring defense attorneys to find employment include New York City, Philadelphia, Pennsylvania, Miami and Fort Lauderdale Florida, and Houston, Texas.

Attorneys To Patent Those Special Inventions56

Not anybody would instinctively know what the laws for patents were. Companies specializing in electronics are very experienced in patents because they need to be able to protect the intellectual property rights of a particular invention or design. Patents are in place and can be acquired from the government by the inventor of the item. The patent stops any other companies from making, using, or selling the product without permission. The changes in the American government laws gives the patent twenty years from the time of application to the expiration of the patent and the product them belongs to freely be use by others.

Getting a patent can be a strenuous job that most do not want to deal with. Patent attorneys are there to help you with all things involved and make it easier for you. A patent attorney is the one assuming the responsibility for you and the invention and this is cause for mounds of paperwork and government dealings.

You might find out just what types of inventions are required to carry a patent. There are three areas of patents. They are:

1. Utility Patents - given to individuals or companies that has invented a new and functional process. This may include a new machine, product, or matter composition, like chemical makeup or ingredients. 2. Design Patents - for individuals who have created a new design or pattern of any kind. 3. Plant Patents - for individuals who have found a new breed or variation that was cultivated or breed on its own.

The normal person would thing a patent can be a complicated and therefore require a patent attorney with experience. Many would not want to be bothered with a difficult duty. Patent attorneys are a precious thing that can come in with a large fee and extra expenses for you to pay for the patent. Before deciding on which attorney to hire, you might want to provide yourself with a little safety and ensure that the fees for the lawyer are not going to cause you any profit cuts. If you are not going to make any money on the product with the attorney's fees and patent cost, you are wasting time. It can be a large and stressful task but if you are certain you have a great idea, call yourself a patent attorney soon. If you really believe, you could be the next great Bill Gates or Donald Trump. Great things worth having are those things you cannot get easily.

Lawyer Salary


It's difficult to pinpoint an exact number for the average salary earnings of a practicing lawyer, since the legal field is such a diverse field. Which field you choose to specialize in, as well as where you choose to practice law, can greatly impact your potential earnings
Average Lawyer Salaries

Another thing to keep in mind about the average salary for a lawyer is the fact that over 25% of the lawyers practicing today do so as self-employed attorneys, either through their own small practices or as partners in larger firms. Self-employed lawyers may be able to earn more outright through their hourly fees, but must also contend with self-employment taxes that go beyond those of traditional employees.

In 2006, the average annual salary of a lawyer was just over $100,000/year. The middle 50% of the lawyer salaries ranged from $70,000/year and $145,000/year, with even more diverse numbers on the lower and higher ends of the salary spectrum.
Featured Law School:


Imagine getting your law degree from the comfort of your own home, through a reputable online college. That dream can be a reality if you choose Concord Law School, the nation's first online law school.

Request information from Concord Law School...



With so many people graduating from law school every year, the competition to make it into a high-paying law firm is more intense than ever. The best way to maximize your earnings potential with your law degree is to specialize in a certain legal field and then carve out your niche in a company that needs that specific law degree.

The highest attorney salaries were those who went on to work in the management fields of different companies and enterprises – for example, lawyers providing legal counsel to manufacturing firms or electronics companies. The average salary of these lawyers was close to $130,000/year. However, it's important to note that there isn't always a legal tie-in to the work these lawyers are doing or how they are utilizing their law degree in their current positions.

The next highest group on the legal salary earnings spectrum is comprised of lawyers who work for the federal government and its legal services. These practicing lawyers averaged over $100,000/year, while lawyers who work for either their local or state governments were found at the lower end of the spectrum. In fact, these lawyers earned significantly less per year, with an average of just over $75,000/year. This disparity is enough to make prospective lawyers wonder what the difference between working for the federal government and the state government is – other than the nearly $45,000/year price difference.

The earning spread of those lawyers who are self-employed is far different and is primarily dependent on how long a lawyer has been practicing, what type of law they specialize in, and where the firm is located. For example, a private practice specializing in real estate and probate laws in rural areas isn't likely to have as much of an earnings potential as a medical malpractice firm in an urban area. Lawyers working in rural areas may encounter a resistance to legal interference that may significantly limit their available case load.

However, it's worth mentioning that these high salaries come with a heavy price tag. After spending an intense three years in law school, you may find yourself working long hours as a rookie lawyer. It's up to you to decide whether the joy you take from practicing law is enough to compensate for the physical and emotional stress you'll face when beginning your practice.

Attorneys' Title Guaranty Fund Announces VP Michael K. Brandt Recently Received Prestigious President's Award from the Illinois Land Title Association

ILTA President Kirk Sterling presented the award at the organization's annual meeting July 10, 2009, in East Peoria, IllinoisEast Peoria is a city in Tazewell County, Illinois, United States. The population was 22,638 at the 2000 census. East Peoria is part of the Greater Peoria MSA. It is home to many Caterpillar facilities.
..... Click the link for more information.. Founded more than 100 years ago, non-profit ILTA is the state trade association representing title agents, abstractors and underwriters in all 102 Illinois counties.

ILTA's President's Award is a special recognition given to individuals who took on additional work during the year to help the association achieve its goals.

"Mike co-chaired our legislative committee, which bears the enormous burden of reviewing all bills from both the Illinois SenateThe Illinois Senate is the upper chamber of the Illinois General Assembly, the legislative branch of the government of the state of Illinois in the United States. The body was created by the first state constitution adopted in 1818.
..... Click the link for more information. and the House that could impact the title business in Illinois," explained Kirk Sterling, who recently became the immediate past president of ILTA and is vice president/division manager with Old Republic National Title Insurance Company. "Mike's commitment to continue volunteering his extra time even after serving in the capacity as president of the ILTA shows that he is truly dedicated to our business and to our association."

Brandt is both a past president of the ILTA and 2005 winner of the organization's President's Award.

Sterling added, "Through Mike's efforts along with the rest of the Legislative Committee we were successful in introducing a 'Good Funds' Bill that will benefit all title companies doing business in Illinois."

The Good Funds Bill would provide protection for Illinois title insurance companies with respect to escrow transactions. If passed, it would require that all funds over a certain dollar amount originating from a single party to a real estate transaction be wired funds as opposed to personal or cashier's checks, thereby guaranteeing the transfer of funds without delay. It is also a fraud-protection measure. The funds would be unconditionally held in the escrow account for the closing agent to draw upon for disbursement DISBURSEMENT. Literally, to take money out of a purse. Figuratively, to pay out money; to expend money; and sometimes it signifies to advance money.
2. at the appropriate time.

Working from ATG's Champaign, IL office, Brandt oversees title insurance claims and legislative matters for ATG. In addition to his current responsibilities, Brandt has extensive experience in title underwriting. He started with ATG in 1984 after four years as a private practitioner in LaSalle-Peru, Illinois. Brandt earned his B.A. in 1975 from the University of Illinois at Urbana-Champaign Early years: 1867-1880
The Morrill Act of 1862 granted each state in the United States a portion of land on which to establish a major public state university, one which could teach agriculture, mechanic arts, and military training, "without excluding other scientific , and later received his J.D. (Magna Cum Laude cum lau·de
adv. & adj.
With honor. Used to express academic distinction: graduated cum laude; 25 cum laude graduates. , Order of the Coif An unincorporated national scholastic honor society in law. Its purpose is to foster excellence in legal scholarship and to recognize those who have attained high grades in law school or who have distinguished themselves in the teaching of law. ) in 1979 from the school's College of Law.

About Attorneys' Title Guaranty Fund, Inc.

Through its nearly 4,000 member attorneys across Illinois, southern Wisconsin and northern Indiana, ATG has presided over 2.5 million home closings and provided homebuyers with competitively priced title insurance since 1964. The only bar-related title insurance company based in Illinois, ATG has built a significant market share by providing excellent service at competitive prices. It has a financial stability rating of "A Prime Unsurpassed" from the independent ratings bureau, Demotech.

Friday, October 23, 2009

Hacker stole 130 million credit card details

US hacker who conspired with two Russian cyber criminals in a bid to steal 130 million credit card details could face up to 25 years in prison.

Albert Gonzalez and his Russian counterparts, who remain unnamed, used an SQL injection attack to get through firewalls protecting the payment systems of a number of US retailers, including 7-Eleven.

Eight Tips for Managing Higher Education Networks Security and Cost-Effectively: Download nowIt is thought they planned to intercept credit card details of the retailer's customers and then sell them on.

If found guilty, Gonzalez - who has previously helped the US Secret Service trace hackers and is already facing another hacking charge - could be slapped with 25 years in prison and a maximum fine of $500,000 (£300,000).

Computer Hacking and Identity Theft

Identity theft criminals come in all shapes and sizes these days. If you're ever unlucky enough to be a victim of identity theft, the culprit is far more likely to be a local meth user than a professional hacker. That said, most organized crimes gangs around the world are becoming much more involved in computer hacking. Computer identity theft can happen in a number of ways. Criminal organizations can use their own hackers, hire college students, or simply buy large amounts of stolen information from professional hackers. And the result is a spike in the number and size of reported data breaches by hackers:

More than 50 of the reported data breaches in the last year have been attributed to computer hacking.
Hacking accounted for the largest number of compromised personal records in the last 12 months, involving an estimated 43 million Americans.
Well-known brands that have lost data through computer hacking in the past 18 months include DSW Shoes, Polo Ralph Lauren, and BJ's Wholesale.
What happens to stolen credit card and social security numbers?
Much of the data stolen through computer hacking — including stolen credit card numbers and Social Security Numbers — will end up on a network of illegal trading sites where hackers and criminals from around the world will openly buy and sell large amounts of personal data for profit.

Stolen data networks have flourished in the open, with names like Network Terrorism Forum, Shadowcrew, Carderplanet, Dark Profits, and Mazafaka. The Shadowcrew network was believed to have more than 4,000 active members who made more than $5 million in less than two years trading 1.5 million stolen credit cards, before it was shut down.

A typical credit card hacking transaction on one of these sites might take place as follows:

Stolen credit card numbers and other personal information are posted for sale, either to be purchased or used in a "joint venture."
In a joint venture, other network members will use stolen numbers to purchase goods and send them to a drop site for pick-up by other members. The goods are then sold and the proceeds shared amongst the participants.
New or unproven sellers on the credit card hacking network are often required to prove their credibility by participating in a number of dummy runs to test that both the seller and the stolen cards are genuine.
Some credit card hacking sites will also include a rating system, where members can post feedback on the quality of stolen credit card numbers and other information offered for sale by members. And many of these computer identity theft sites will accept requests for specific types of stolen information and will also sell complete phishing websites and email templates so that even absolute beginners can easily run phishing scams with little technical knowledge.

There has also been a shift in the professional computer hacking community, where hackers who used to do it for the thrill or the fame are now doing it for profit. In the words of one hacker, "In the old days of hacking it was a bit like base-jumping the Chrysler building. All you got was a slap on the wrist and front page headline."

But now hackers are facing serious jail time for even the smallest hack and they want to make hacking worth the risk. In most cases, all they do is find the opening, commit identity theft, and then sell the stolen credit card numbers; or just find the credit card hacking opportunity and sell that information for others to do the stealing.

Another source of computer identity theft involves former employees hacking into the networks and computers of their old job, using either insider knowledge or password accounts that were never cancelled. For example, the thief who stole 30,000 credit records from his employer in New York committed the crime over a two-year period after he left the company. The cost of his crime was estimated at more than $100 million.

He simply used his insider knowledge and a password that someone forgot to cancel. And if employees are disgruntled or angry after they leave the business, maybe because they were fired, they may justify their actions by convincing themselves it's "just compensation" for money they should have been paid.

Opportunist hackers also continue to be a problem. These are amateurs and professionals who spend hours a day running random port scans on the Internet looking for unprotected home computers. When they find one, they'll often just poke around inside the network or computer to see what's worth taking, and these days they know that any personal or customer information on that computer will be of value to someone somewhere.

And with nearly 4,000 hacking sites on the web, any petty criminal can now learn how to become an accomplished hacker free of charge, and possibly earn a much better living for a lot less risk. The criminals who used to lurk in doorways armed with a crowbar now lurk in front of laptops armed with a chai latte. These guys know that it's much easier to break into a business through the Internet to commit identity theft than through a skylight, and there's no chance of being bitten by the owner's Doberman.

Small businesses computer systems are especially vulnerable to identity theft, because they usually offer easy and unguarded access to things like customer credit card records and employee payroll files. Most small businesses don't use or keep access logs, so even if their information has been stolen, they probably won't even know it.

How Computer Hacking Happens
Hacking attacks can be launched in a number of ways:

Attacking computers that don't have firewalls installed.
Installing keystroke loggers or other malicious code by hiding it in email attachments.
Exploiting browser vulnerabilities that have not been properly patched.
Exploiting weak or poorly protected passwords.
Hiding malicious code in downloads or free software.
Hiding malicious code in images on websites and waiting for unsuspecting users to click on them.
Employees or other trusted users simply accessing an unprotected computer.
Exploiting poorly installed networks, and especially wireless home networks.
So What Can You Do About Computer Hacking?
Make sure all computers you use in your home or business have the latest firewalls and anti-virus software installed.
Keep up-to-date with the latest patches, especially for your browser.
Use a good-quality anti-spyware solution, and scan your computers regularly for any pests.
Be careful about the types of websites you visit, what you click on, and what you download. And make sure that everyone who uses your computer understands the security risks and rules.
Scrutinize suspicious emails that may actually be phishing scams.
Visit the the Privacy Matters IdentitySM Learning Center for news feeds about the latest security breaches, scams and other threats to identity theft.

Hacker / security expert charged with massive credit card theft

Max Butler, who served time for hacking government networks, arrested on ID theft charges

A California man who served jail time for hacking hundreds of military and government computers nine years ago was charged yesterday with new computer crimes: stealing tens of thousands of credit card accounts by breaking into bank and card processing networks.

Max Ray Butler, 35 of San Francisco, a.k.a Max Vision, and also known by his online nicknames of Iceman, Digits and Aphex, was indicted Tuesday by a federal grand jury in Pittsburgh on three counts of wire fraud and two counts of transferring stolen identity information. Arrested last week in California, where he remains, Butler could face up to 40 years in prison and a $1.5 million fine if he is convicted on all five counts.

According to the indictment, Butler hacked multiple computer networks of financial institutions and card processing firms, sold the account and identity information he stole from those systems, and even received a percentage of the money that others made selling merchandise they'd purchased with the stolen card numbers. The U.S. Secret Service ran the investigation into the hacks and resulting scams, which took place between June 2005 and September of this year.

Butler was charged in Pittsburgh because he'd sold data on 103 credit card accounts to a Pennsylvanian who was cooperating with authorities.

He and others also operated a Web site used as a meeting place for criminals who bought and sold credit card and personal identity information. "As of September 5, 2007, Cardsmarket had thousands of members worldwide," the indictment read. Although the site was still online as of Wednesday morning, the forums had been deleted. A message posted by a forum administrator identified as achilous said he had erased the threads when news of Butler's arrest broke.

"Everybody who hasn't already done so, I would strongly advise that you delete all PMs you have saved," achilous advised. "Also, any unsecured data you have, now would be the time to make sure it is very strongly encrypted. These precautions seemed justified given the severity of the situation. It may only be a matter of time before a government agency takes over this forum, and I did not want them to get the raw SQL database containing all the threads and posts."

Although some documents in the case remain sealed, including one or more affidavits, news reports cited grand jury witnesses who had told of Butler selling tens of thousands of stolen credit card accounts. A former partner who had been arrested in May reportedly claimed that Butler supplied him with a thousand numbers each month for more than two years, according to the Pittsburgh Tribune-Review.

Your Credit Card Hacked? – Get over it!

Somebody just hacked into the computer systems of a major US retail firm and copied/swiped/viewed the VISA credit card numbers and purchasing information of approximately two million Canadians.

Um. So what?

OK, first, let’s review. Last week, it surfaced that hackers stole customer information from computer systems of TJX Cos., the U.S. parent firm of Canadian retailers Winners and HomeSense. Reports say as many as two million Canadian Visa card accounts were affected. The hack was discovered in mid-December and included transactions between 2003 and part of 2006.

There’s more. Another Canadian news item come to light last week when CIBC Asset Management said a backup computer file containing information about almost half a million of its Talvest Mutual Funds clients disappeared during an internal office move. CIBC said it appeared that none of the information was inappropriately accessed, but it was taking precautions to ensure its customers that their accounts would remain safe.

The actual theft or compromise of these systems isn’t news. It seems to happen a lot and makes for great headlines on slow days with non-technical reporters of the daily newspapers.

What IS news is when somebody actually uses your credit card and gets away with making a major transaction that YOU have to pay for. So far, I haven’t seen a single reported incident of where a regular, normal day-to-day Winners-VISA credit card carrier has been forced to pay for something that was purchased by the credit card hacking thief.

Not one.

However, let’s say somebody DID make a $700 purchase on your VISA card after obtaining the number illegally and the amount showed up on your next statement. Do you think you will pay it? Not a chance. You will call your MLA, MP, local mayor and hire Johnny Cochrane (well, maybe not THAT Johnny Cochrane) before you write the check for that; especially if you can easily demonstrate you didn’t make the purchase. Remember that any online purchase using a credit card contains the date, time and IP address of the purchaser. (And to coin a great Microsoft line: It’s not a bug! It’s a feature!)

Let’s take another example. How many of you have handed your credit card to a dozy, sinister looking waiter in a sleazy restaurant in Mexico or a dumpy bistro in Greece simply because the American Express logo was on the door? What is stopping that person from writing down your credit card number, expiry date and security code on the back or even photocopying your signature? Nothing.

Now, here’s the best part: Do you know why the thieves don’t use the credit card information? Answer: It is too hard to use, there is too much security and above all, it is way too easy for the enforcement agencies to catch the bad guys!

Having a list of stolen credit card numbers is the electronic equivalent of a regular bank robber who gets $10,000 in cash from an armed robbery. Generally the cash is stained with that secret dye the banks use for just such an occasion.

In other words, stealing data may be easy but using the data for profit is a different story. Rarely are they able to pull this off and even then it is insured; meaning the end users almost never gets hurt.

There’s a second aspect to all this; relating mostly to customer information and the security of such. Call me crazy but most run of the mill e-crooks find the buying habits of people quite boring. In fact, most of the time a system is hacked; it is by one company looking to gain an advantage over their competitor. In that case, you almost never hear of the hack.

Years ago, Sun Microsystems CEO Scott McNealy said “You have no privacy. Get over it.”

McNealy, no stranger to strong-but-true statements was absolutely correct then and maybe now, people will understand what he meant. He also should have said: “Get over it because nobody really cares about your data because they can’t do anything with it.”

Gregory B. Michetti of the Alberta-based systems integration firm Michetti Information Solutions, Inc. can be reached via www.michetti.com.

5m caught up in US credit card hack

5m caught up in US credit card hackBuzz up!
Digg it
David Teather in New York The Guardian, Wednesday 19 February 2003 Article historyA computer hacker has gained access to the credit card details of more than 5m Mastercard and Visa holders in the US, sparking fears of fraud on a potentially massive scale.

The two companies yesterday said the hacker had got the information by accessing the systems of an undisclosed third party firm which processes payments for retailers.

Both credit card firms said they had immediately informed the issuing banks after the problem was first detected two weeks ago. "This is not something regional, it was throughout the nation and could be any bank," said Visa spokesman, John Abrams.

The companies are working with US law enforcement officials to track down the culprit and discover how he or she managed to crack the system's security.

Identity theft and credit card fraud have become an increasing concern among consumers, particularly with the number of transactions now taking place online. But it is more common, as in this case, for fraudsters to attack host computers where credit card details are held on file by retailers rather than get access to them while the payments are being made over the internet.

None of the information in this hacking, which would include the credit card numbers, appears to have been used fraudulently so far. Around 2m Mastercard holders are affected and 3.4m Visa holders.

Plastic card fraud is booming in Britain - it has grown by 50 per cent in the past two years to £430m. As well as hacking into computer databases, common scams include copying card details when purchases are made, cards going missing in the post, or charging twice for items.

There are more than 560m Visa and Mastercards in circulation in the US. In a statement, Visa said: "High profile companies, government agencies, internet programs and websites will always be targeted by criminals.

"Visa and our vendors are no exception."

But the company tried to reassure customers. "Visa's fraud team immediately notified all affected card-issuing institutions and is working with the third-party payment processor to protect against the threat of a future intrusion."

The companies said customers would not be liable for charges incurred as a result of fraud.

Shocked that my credit card number was stolen

Wow, this is one of things you never expect to happen to you. Linode, where this blog is hosted, recently emailed me saying my monthly payment had been denied and I should contact my bank.

This morning I received a letter from the bank saying they had tried to call me and would I ring them which I did. After holding for what seems like an age I talked to a nice girl at the bank who told me there were suspicious transactions on the card:

1.Aug 30: 1 Euro spent at the iTunes store. Never used it. Alarm bells ringing.
2.Aug 31: 3 Euro at “Usenext”, whatever that is.
3.Sep 3: Various amounts (168 Euro, 48 Euro..) spent at Virginmedia on subscriptions.
Ouch, thankfully the bank caught it and I’m not out of pocket, but it’s frightening when you’re the victim of credit card fraud. I presume it was skimmed by the same guys who had impersonated repair men and modified credit card machines around the country that was widely reported last week. The card hardly ever gets used online. Cutting it up now.

Credit Card Fraud Representative at FiftyOne

Type: Full-time Experience: Associate Functions: Customer Service Industries: Apparel & Fashion Posted: September 30, 2009 Compensation: TBD Job Description
We are looking for a dynamic, motivated Credit Card Fraud Prevention Representative to join our rapidly expanding company. The primary goal for this role is to prevent fraudulent orders from being accepted and fulfilled by reviewing orders placed by international consumers. You will be using E4X proprietary software as well as third party systems to research and analyze suspicious orders and determine their validity.

The successful candidate will be part of the Merchant Services Team and will report to the Director of Merchant Services.

Responsibilities

- Research and analyzes customer transactions for possible cases of fraud
- Review client transactions using a pre defined set of rules to validate purchases and verify validity of transactions
- Identify valid or fraudulent transactions
- Contact international customers to verify purchases
- Resolve customer problems using a ticketing system
- Work with back office, vendors and partners to resolve problems
- Record problem and resolution details in the ticketing system
- Monitor voicemail, e-mail, messages, and related information for support inquiries.

Skills
Skills and Requirements

- Bachelor's degree
- 2-5 years previous credit card fraud prevention or investigation experience
- Experience in the following fields is essential: ecommerce, online payments, credit card processing, fraud screening and chargeback handling
- Must be detail oriented with strong analytical and organizational skills
- Go-getting problem solver with an ability to work simultaneously on various projects and bring problems to resolution independently
- Demonstrated ability to communicate orally and in writing in a clear, concise and courteous manner
- Skilled in the use of MS Office
- Good understanding of the ecommerce environment and online shopping
- Ability to coordinate a variety of activities and manage multiple priorities in a busy office
- Ability to work varying hours

To Apply

Interested candidates should submit their resume and an accompanying cover letter to careers@fiftyone.com, with the position being applied for in the subject of the email. At this time, only qualified candidates will be contacted for further consideration. Thank you for your interest in FiftyOne.

Company Description
About E4X & FiftyOne

Since 1999, E4X has been providing advanced multi-currency solutions to companies transacting across borders and have helped online retailers provide local currency pricing to customers in the different markets they served. In 2007, the E4X team answered the demand from the marketplace to expand that value proposition and be the single provider of a solution for all cross-border complexity by architecting its flagship product, FiftyOne.

FiftyOne builds on E4X's multi-currency legacy by delivering each of the remaining components of the cross-border fulfillment value chain: multicurrency website localization, product catalog classification, real-time landed cost calculation, low-cost global parcel fulfillment, full-service returns, international settlement and credit card fraud management.

FiftyOne is the most comprehensive full-service international e-commerce offering available to help U.S. merchants and their international customers transact effortlessly, and is powering the international expansion of such leading brands as Anthropologie, Brookstone, Overstock.com, Drugstore.com, Intermix, Saks Fifth Avenue, and many others.

Additional Information
Local candidates only, no relocation (Greater New York City Area).
No third party applications.
Job ID: 756902

Where can I find the Security Code?


Visa / MasterCard / JCB / Switch / Solo
Flip your card over and look at the signature box. You should see either the entire 16-digit credit card number or just the last four digits followed by a special 3-digit code. This 3-digit code is your Card Security Code.



American Express Credit Card Users
Look for the 4-digit code printed on the front of your card just above and to the right of your main credit card number. This 4-digit code is your Card Identification Number (CID). The CID is the four-digit code printed just above the Account Number.


What is the Security Code?
It is an important new Internet security feature that now appears on the back of most Visa / MasterCard / JCB / Switch / Solo cards, and on the front of American Express cards. This new code is a three or four-digit number which provides a cryptographic check of the information embossed on the card.
The security code helps validate that the customer placing the online order actually has the credit card in his/her possession, and that the credit/debit card account is legitimate.



How does my Security Code protect me?
The security code is only printed the card and it is not contained in the magnetic stripe information nor does it appear on sales receipts or billing statements - you must have the card in your possession in order to use this code.

Card Security Codes are not raised, so they are not scanned into standard credit card readers. In theory, these numbers are only visible to you. When you give your Card Security Code to a merchant, you assist the merchant in verifying that the order is being placed by you, the card holder. Also, it is illegal for merchants to keep records of your Security Code in any way. Merchants are only allowed to keep the Security Code for as long as it takes to bill your order. Once billing is complete, there must be no records of the code. Neither database storage nor physical document storage is allowed. BMT Micro follows these restrictions to the full extent.



Do I have to enter this Security Code?
If this code is printed on your card, YES, you must enter the code. Visa / MasterCard / JCB / Switch / Solo and American Express now require Internet stores to obtain the security code for all cards that have a code printed on them. In order for this transaction to be accepted and processed, you must enter this code if it's printed on your card. This is done for your protection.

***If your European or Asian credit card does not have a Security Code, you may enter the letter X or call/fax your order.



What if I cannot read my number?
If you cannot read the number on your card, enter the letter "I" as in "illegible" in the CVV field. This will let your bank know that the number is there, but cannot be read. Putting in an "X" instead of an "I" may cause your bank to deny the sale.

FAQ: What is the credit card security code?

FAQ Category: General

Version: AbleCommerce 5.x (all versions)

Applies to: Payment Processing

Last Update: 5/28/04



DETAILS

FAQ: What is the credit card security code?
The credit card Security Code, also called the Bank code or the Card Identification Number (CIN), is a special security code feature on the American Express, Diner's Club, Discover, MasterCard or Visa credit card.

By requiring the Security Code to be entered with the customer's credit card, you are verifying that the order is being placed by the card holder. The Security Code offers protection to the card holder as well. The Card Identification Number (CID) is not raised, so they are not scanned into standard credit card readers. In theory, these numbers are only visible to the card holder.




American Express
Look for the 4-digit code printed on the front of your card just above and to the right of your main credit card number. This 4-digit code is the credit card Security Code.

MasterCard
Flip your card over and look at the signature box. You should see a 16-digit credit card number followed by a special 3-digit code. This 3-digit code is the credit card Security Code.

Visa
Flip your card over and look at the signature box. You should see a 16-digit credit card number followed by a special 3-digit code. This 3-digit code is the credit card Security Code.

Discover
Flip your card over and look at the signature box. You should see a 16-digit credit card number followed by a special 3-digit code. This 3-digit code is credit card Security Code, like VISA and MasterCard.

Anatomy of Credit Card Numbers

Introduction
This is not an essay on credit cards per se. If that's what you're looking for, I recommend Joe Ziegler's excellent series Everything You Ever Wanted to Know about Credit Cards. This essay has a narrower focus -- to explore the anatomy of your credit card number, and to provide Java source code which determines if a given credit card number might be valid.

Specifications for credit card numbering have been drawn up by the International Standards Organization (ISO/IEC 7812-1:1993) and the American National Standards Institute (ANSI X4.13). These eminent organizations refuse to make their publications freely available on-line, and so the following information on the format of credit card numbers comes largely from an Internet Engineering Task Force (IETF) draft by Donald E. Eastlake 3rd, "ISO 7812/7816 Numbers and the Domain Name System (DNS)" (draft-eastlake-card-map-08, expires August 2001), available at the time of this writing at http://www.globecom.net/ietf/draft/draft-eastlake-card-map-08.html. I have not linked to this URL, because individual versions of IETF drafts are notoriously ephemeral.

Digit numbering in this essay is left to right. The "first" digit, therefore, means the leftmost digit.

Major Industry Identifier
The first digit of your credit card number is the Major Industry Identifier (MII), which represents the category of entity which issued your credit card. Different MII digits represent the following issuer categories:

MII Digit Value Issuer Category
0 ISO/TC 68 and other industry assignments
1 Airlines
2 Airlines and other industry assignments
3 Travel and entertainment
4 Banking and financial
5 Banking and financial
6 Merchandizing and banking
7 Petroleum
8 Telecommunications and other industry assignments
9 National assignment


For example, American Express, Diner's Club, and Carte Blanche are in the travel and entertainment category, VISA, MasterCard, and Discover are in the banking and financial category, and SUN Oil and Exxon are in the petroleum category.

Issuer Identifier
The first 6 digits of your credit card number (including the initial MII digit) form the issuer identifier. This means that the total number of possible issuers is a million (10 raised to the sixth power, or 1,000,000).

Some of the better known issuer identifiers are listed in the following table:

Issuer Identifier Card Number Length
Diner's Club/Carte Blanche 300xxx-305xxx,
36xxxx, 38xxxx 14
American Express 34xxxx, 37xxxx 15
VISA 4xxxxx 13, 16
MasterCard 51xxxx-55xxxx 16
Discover 6011xx 16


If the MII digit is 9, then the next three digits of the issuer identifier are the 3-digit country codes defined in ISO 3166, and the remaining final two digits of the issuer identifier can be defined by the national standards body of the specified country in whatever way it wishes.

Account Number
Digits 7 to (n - 1) of your credit card number are your individual account identifier. The maximum length of a credit card number is 19 digits. Since the initial 6 digits of a credit card number are the issuer identifier, and the final digit is the check digit, this means that the maximum length of the account number field is 19 - 7, or 12 digits. Each issuer therefore has a trillion (10 raised to the 12th power, or 1,000,000,000,000) possible account numbers.

If we consider the large number of potential customers and usurious interest rates charged by issuers, there is obviously a lot of money to be made in the credit card industry. In more civilized ages, people believed that usury was a grievous offense contrary to nature or a mortal sin, not an acceptable business practice (Aristotle, Politics 1.10; St. Thomas Aquinas, De Malo 13.4; Dante, Inferno 11.94-111; etc.).

Check Digit
The final digit of your credit card number is a check digit, akin to a checksum. The algorithm used to arrive at the proper check digit is called the Luhn algorithm, after IBM scientist Hans Peter Luhn (1896-1964), who was awarded US Patent 2950048 ("Computer for Verifying Numbers") for the technique in 1960. For details about Luhn's life, see

Biography on the American Society for Information Science and Technology's Web site, at http://www.asis.org/Features/Pioneers/luhn.htm.
Notes compiled by Susan K. Soy on "H.P. Luhn and Automatic Indexing" at http://www.gslis.utexas.edu/~ssoy/organizing/l391d2c.htm

Thanks to Aleksandar Janicijevic for directing me to information about H.P. Luhn.

The most succinct description of the Luhn algorithm I have found comes from the hacker publication phrack 47-8: "For a card with an even number of digits, double every odd numbered digit and subtract 9 if the product is greater than 9. Add up all the even digits as well as the doubled-odd digits, and the result must be a multiple of 10 or it's not a valid card. If the card has an odd number of digits, perform the same addition doubling the even numbered digits instead."

The bit about even and odd is a little confusing. The main point is that you don't want to double the check digit, and this can easily be done by starting with the check digit, going backwards, and doubling every other digit. See the source code below for details.

Examples
These examples are drawn from junk mail I received from credit card issuers in August 2001. Some of this junk mail contained glossy pictures of credit cards, and the sample numbers come directly from two of these pictures.

4408 0412 3456 7890
The first credit card offer showed a picture of a card with the number 4408 0412 3456 7890.

The Major Industry Identifier (MII) is 4 (banking and financial), the issuer identifier is 440804 (a VISA partner), the account number is 123456789, and the check digit is 0.

Let's apply the Luhn check to 4408 0412 3456 7890. In the following table,

The top row is the original number.
In the second row, we multiply alternate digits by 2. Don't multiply the check digit by 2.
In the third row, we force all digits to be less than 10, by subtracting 9 where necessary.
The bottom row contains the digits to be added together.

4 4 0 8 0 4 1 2 3 4 5 6 7 8 9 0
4 x 2 = 8 4 0 x 2 = 0 8 0 x 2 = 0 4 1 x 2 = 2 2 3 x 2 = 6 4 5 x 2 = 10 6 7 x 2 = 14 8 9 x 2 = 18 0
8 4 0 8 0 4 2 2 6 4 10 - 9 = 1 6 14 - 9 = 5 8 18 - 9 = 9 0
8 4 0 8 0 4 2 2 6 4 1 6 5 8 9 0

If we add all of the digits in the bottom row together, we get 67, which is not a multiple of 10, and therefore we conclude that the number 4408 0412 3456 7890 is an invalid credit card number.

By changing the check digit from 0 to 3, we arrive at the number 4408 0412 3456 7893, which does pass the Luhn check, since the sum of the digits in the bottom row would be 70, which is divisible by 10. 4408 0412 3456 7893 is, on the face of it, a valid credit card number.

4417 1234 5678 9112
The second credit card offer showed a picture of a card with the number 4417 1234 5678 9112.

The Major Industry Identifier (MII) is 4 (banking and financial), the issuer identifier is 441712 (a VISA partner), the account number is 345678911, and the check digit is 2.

Let's apply the Luhn check to 4417 1234 5678 9112, as we did in the previous example.

4 4 1 7 1 2 3 4 5 6 7 8 9 1 1 2
4 x 2 = 8 4 1 x 2 = 2 7 1 x 2 = 2 2 3 x 2 = 6 4 5 x 2 = 10 6 7 x 2 = 14 8 9 x 2 = 18 1 1 x 2 = 2 2
8 4 2 7 2 2 6 4 10 - 9 = 1 6 14 - 9 = 5 8 18 - 9 = 9 1 2 2
8 4 2 7 2 2 6 4 1 6 5 8 9 1 2 2

If we add all of the digits in the bottom row together, we get 69, which is not a multiple of 10, and therefore we conclude that the number 4417 1234 5678 9112 is an invalid credit card number.

By changing the check digit from 2 to 3, we arrive at the number 4417 1234 5678 9113, which does pass the Luhn check, since the sum of the digits in the bottom row would be 70, which is divisible by 10. 4417 1234 5678 9113 is, on the face of it, a valid credit card number.

Warning
These two credit card offers contained pictures with numbers which the Luhn check proved to be invalid. A change to their check digits made them ostensibly valid. But if I were you, I wouldn't try to charge anything with them.

Java Source Code
The following simple Java class is free for you to use as you wish, without any restrictions or guarantees.

//---------------------------------------------------------
// Checks for valid credit card number using Luhn algorithm
//---------------------------------------------------------

public abstract class LuhnCheck {

//--------------------------------
// Filter out non-digit characters
//--------------------------------

private static String getDigitsOnly (String s) {
StringBuffer digitsOnly = new StringBuffer ();
char c;
for (int i = 0; i < s.length (); i++) {
c = s.charAt (i);
if (Character.isDigit (c)) {
digitsOnly.append (c);
}
}
return digitsOnly.toString ();
}

//-------------------
// Perform Luhn check
//-------------------

public static boolean isValid (String cardNumber) {
String digitsOnly = getDigitsOnly (cardNumber);
int sum = 0;
int digit = 0;
int addend = 0;
boolean timesTwo = false;

for (int i = digitsOnly.length () - 1; i >= 0; i--) {
digit = Integer.parseInt (digitsOnly.substring (i, i + 1));
if (timesTwo) {
addend = digit * 2;
if (addend > 9) {
addend -= 9;
}
}
else {
addend = digit;
}
sum += addend;
timesTwo = !timesTwo;
}

int modulus = sum % 10;
return modulus == 0;

}

//-----
// Test
//-----

public static void main (String[] args) {
String cardNumber = "4408 0412 3456 7890";
boolean valid = LuhnCheck.isValid (cardNumber);
System.out.println (cardNumber + ": " + valid);
cardNumber = "4408 0412 3456 7893";
valid = LuhnCheck.isValid (cardNumber);
System.out.println (cardNumber + ": " + valid);
cardNumber = "4417 1234 5678 9112";
valid = LuhnCheck.isValid (cardNumber);
System.out.println (cardNumber + ": " + valid);
cardNumber = "4417 1234 5678 9113";
valid = LuhnCheck.isValid (cardNumber);
System.out.println (cardNumber + ": " + valid);
}

}

Credit Card Verification Code

The Security Code or Credit Verification Value (CVV) adds yet another level of security to your transactions. This code does not reveal any extra information to us about you or your company. It simply helps protect you from fraudulent abuse of your card by others. The 3-digit Security Code imprinted on the back of Visa, MasterCard, and DiscoverCard and the 4-digit code found on the front of American Express is used as part of the authorization process with the card issuer.

Please use the images below to locate the verification code for your card type.

Visa/Mastercard/Discover:

The verification code for Visa, Master Card, and Discover is a 3-digit number printed on the back of your card. It appears after the account number or last 4-digits of your account number, in the signature panel.

American Express:

The American Express verification code is a 4-digit number printed on the front of your card. It appears above and to the right of the embossed account number.

Note:
If you do not have a verification number, try another card or enter the number 000. The card holding bank will indicate if the code exists on the card. Failure to enter the code correctly is sufficient reason to not process your order.

Credit card Verification Code

What is a Credit Card Verification Code?

Credit Card verification codes (known as CVV2 for VISA and CVVC for MasterCard) are important safety features designed to protect your credit card accounts. The code is a three-digit number that appears at the end of the account number on the back of the credit card. It helps us validate that our customer, presumably the legitimate cardholder, has the actual card in their possession when making an online purchase or using our printable order form.

How to find the Credit Card Verification Code.

The Credit Card Verification Code is located on the back of your credit card in the signature strip. Find the series of numbers printed in the signature strip (where you signed your card). At the right end of the number is a group of three digits; these three digits are your Credit Card Verification Code. (Please see example below.)



How does the Credit Card Verification Code protect the use of my Credit Card?

The Credit Card Verification Code is not encoded into the magnetic strip on your card, so it is not picked up by card readers and, since it is not part of your account number, it will not be printed on any sales receipts or billing statements. You must have the card in your possession to see and use
the code. When we process the charge with your bank, they check the code to see if it is correct. This validates that our customer had the credit card in their possession when they placed the order.


What if part of the Credit Card Verification Code is not legible?

On some cards, the printing for the Credit Card Verification Code may be worn away or be smudged or illegible. If you can't read the Credit Card Verification Code, try using another card that has a legible code. Otherwise, contact your bank and ask them to provide you with the Credit Card Verification Code for your card. They will most likely send you a new credit card with a legible, but different, Verification Code. (Each time your bank issues new card, they print a different Credit Card Verification Code on the card.)

A password for your credit cards


As banks face an end-of-year deadline to strengthen online authentication, one company believes it holds the right card to customer security--a one-time-password.
Los Angeles-based Innovative Card Technologies, or InCard, has found a way to build a display, battery and password-generating chip into a card, such as a credit card. The technology competes with tokens, such as those sold by RSA Security, Vasco and VeriSign.

"We took a form factor that was awkward and fat and miniaturized it," Alan Finkelstein, InCard's chief executive officer, said in an interview. "The current tokens are clumsy and can only do one thing well, issue the one-time password. Our card can be your credit card, your employee ID card and give you access to buildings."

Just like the tokens, the card, called a DisplayCard, generates passwords that can be used to validate online logins or transactions, for example when banking online. The cards offer an extra level of security, in addition to the traditional login name and password. Some banks, such as online broker ETrade Financial, have provided high-net customers with tokens for some time.

The InCard product comes as financial services companies are under increasing pressure to improve the security of online transactions. The Federal Financial Institutions Examination Council recommended last October that banks introduce multiple-factor authentication by the end of 2006.


Video: Password on a credit card
Company creates new online authentication method
It took InCard four years to develop the card, Finkelstein said. The company combined technology from a Taiwanese display maker, a U.S. battery manufacturer and a French security team, he said. A Swiss partner, NagraID, owns the rights to the process to combine the pieces and actually manufacture the technical innards of the card.

The biggest development challenges were the ability to bend the card, power consumption and thickness, Finkelstein said. The result is a card that's as thin and flexible as a regular credit card and is guaranteed to work for three years and 16,000 uses. "Which is about 15 times a day, seven days a week," Finkelstein said.

One card, two chips
In the near future, InCard plans to present a card that has two chips, both inside the card. One will generate the password and the other will store personal information, such as details on the last transaction or balance information, he said.

InCard is in talks with various banks and credit card organizations around the globe to get its invention into the market, but it can't announce any deals yet. Visa, however, has already agreed to evangelize the technology to its banks, Finkelstein said.

InCard is well-connected in the banking world. Chairman John Ward previously served as CEO of American Express Bank and held senior positions at Chase Manhattan Bank.

One possible barrier to InCard's success is the price of its card. A credit card with a one-time password generator costs just over $10, much more than the approximately 40 cents it costs to produce a plain card and $5 for a traditional password-generating key fob.

However, InCard says it believes it can overcome that obstacle. Sealing, addressing and mailing a token adds about $5 in cost, according to Finkelstein. "Banks know how to deploy cards in mass numbers...if you combine everything, we're pretty much compatible in cost."

U.S. banks haven't in the past been prepared to pay for tokens and distribute the security gadgets among their customers. The FFIEC recommendation might change that, though there are several options beyond one-time passwords that meet its two-factor authentication definition.

InCard closely controls the rights to produce the one-time-password cards. The card is ready for mass production, according to the company, which plans to license the technology to other players so more cards can be manufactured when needed, Finkelstein said.

About a year and a half from now, InCard expects 5 million of its cards to be in use. The company predicts banks and brokerage firms will hand them out to their best customers

Free Credit Card Numbers


Disclaimer: Do not use any credit card numbers, except your own, to use on the internet. It’s illegal to use other people’s credit card numbers to purchase your own stuffs. Free credit card numbers featured in this post is written purely to test one’s knowledge to see if these are valid. It should be viewed from a purely academic perspective.

Credit card is a mystery combination of random numbers that allows you to purchase something without taking out cash from your pocket, magic eh? But do you know how those numbers are calculated? If they are not valid, how can you detect it? Easy, just apply the Luhn check and you will start to discover those fake credit card numbers!

1. Starting with the check digit (Which is the last digit of a credit card), double the value of every second digit (from right to left). E.g. For a 16 digit credit card number, double the 15th, 13th, 11th, 9th…digits (Digits in odd places). It sums up to a total of eight numbers.

2. If doubling of a number results in a two digit number, add up the digits to get a single digit number. This will result in eight single digit numbers.

3. Now, replace the digits in the odd places of the original credit card number with these new single digit numbers and you will get a new 16 digit number.

4. Add up all the digits in this new number. If the final total is perfectly divisible by 10, then the credit card number is valid (Luhn check is satisfied), else it is invalid.

Yeah, I know it’s a bit confusing, that’s why I have created more examples using these images, have a look and you will understand it very soon:

First example was done using a MasterCard credit card :



Note that the credit card number starts with the letter 5, so that means the card is issued by MasterCard. To determine whether it’s a valid credit card number, I have included the image together with the workout

As what you have seen, the total sum of the credit card numbers using the doubled digits is 66, which means it cannot be divided completely by 10, thus it is invalid.

Let’s take another example using a Visa credit card :


As what you have seen, the total sum of the credit card numbers using the doubled digits is 35, which means it cannot be divided completely by 10, thus it is invalid.

ENDING

If you have made this far, here are some additional points to be remembered. Free credit card numbers don’t mean that you can use it to purchase items anywhere, these are experiments for E-Commerce owners to test if their system is fully functional. Millions, billions or even trillions of numbers can be generated using the Luhn Check. If you successfully get one working number, you still need to type in the CVV and personal details to verify that you are the owner of the credit card, so work harder and apply for a credit card

Think you have learned what I have taught you? Try these test from Paypal and see if you can get all the answers correct.

Credit Card Test Numbers

Helpful info from PayPal: a list of fake credit card patterns with valid checksums for different banks.

Useful for retailers looking for valid CC patterns for testing carts and such. The numbers below intentionally do not work. They cannot be used to buy things. If you’re here looking for CC numbers to commit scams, you’re in the wrong place.

Credit Card Testing Patterns
(note: you cannot buy anything with these, they do not work)
American Express 378282246310005
American Express 371449635398431
American Express Corporate 378734493671000
Australian BankCard 5610591081018250
Diners Club 30569309025904
Diners Club 38520000023237
Discover 6011111111111117
Discover 6011000990139424
JCB 3530111333300000
JCB 3566002020360505
MasterCard 5555555555554444
MasterCard 5105105105105100
Visa 4111111111111111
Visa 4012888888881881
Visa 4222222222222
Dankort (PBS) 76009244561
Dankort (PBS) 5019717010103742
Switch/Solo (Paymentech) 6331101999990016