What to Do If You Are a Victim of Credit Card Fraud

Credit card fraud is on the increase in many places where credit card is used for transactions. The most unfortunate thing is that credit card fraudsters are becoming more and more skillful and sophisticated such that even the most careful and security conscious credit card user is not safe from the activities of these fraudulent individuals. Although, a number of software applications such as binchecker and EMV chip have been introduced in order to checkmate such evil, there is a need for you to be on the alert and protect your credit card against any form of fraud. If you are a victim of credit card fraud, you don’t have to panic over it, the moment you discover that. Here are steps you should take when you are a victim of credit card fraud.

Report immediately to your credit card company

The first thing you should do is to report the fraud to your credit card company. This step is very crucial especially if the fraudster has not utilised your credit card for any transaction. If you make a report to your credit card company about any fraud on your credit card, the law in most jurisdictions and the Fair Credit Billing Act forbid the credit card company from charging you for any unauthorised transaction made with your card from the time the report is made. But if you fail to make any report about the credit card fraud, you are responsible for any transactions made via through your card.

Change your online passwords

To play safe, once you notice that you have fallen victim of credit card fraud, the second step you should take is to change your login details which include your passwords and usernames. You should also change your PIN numbers for all your banking accounts, credit cards and online store accounts. With these changes, the fraudster will not be able to do any other thing with your account. If you have the CardNavSM by CO-OP, you should turn off your cards immediately you find out that you are a victim of credit card fraud.

Report to the credit bureaus

The next thing you should do is to make a report to the credit bureaus about the fraud. It is enough to contact one of the three credit bureaus which include Equifax, Experian and TransUnion because once you inform one credit card company the rest will be notified. When you make the report to any of these bureaux, request that they put your credit card on a 90-day fraud alert. You can also ask for credit freeze which stops identity thieves from creating new account with your personal information. It also limit access to your credit report. If you apply for loan from a financial institution and access to your credit report is required by the financial institution before your application will be processed, the freeze will be temporary lifted.

File a police report

The next thing you should do is to file a police report. This is also very important because it will serve as a legal evidence that you are a victim of fraud. With the police report, it will also be possible for you to obtain credit freeze service free of charge. The report can be filed over the phone or in the police department or to a police agent that will be sent to your home. It all depends on what is obtainable in your locality. Provide the police with detailed information about fraud. So, before contacting the police, you should know the date the fraud occurred, the circumstances that resulted in the fraud, the amount stolen and other important information about the fraud.

Remote Desktop Protocol

The remote desktop protocol can be defined as a proprietary protocol designed by Microsoft to provide users with a graphical interface, to enable them to connect with other computers through a network connection.


  • Encryption: To encrypt small amounts of data, the RDP utilizes stream cipher known as RSA Security RC4 cipher. The cipher ensures communication over networks is secure.
  • Roaming disconnect: The feature enables users to disconnect manually from the remote desktop session without necessarily logging off. Therefore, users get reconnected automatically to disconnected sessions.
  • Bandwidth reduction: The feature reduces the amount of data transferred over any network connection, suing various mechanisms. Some of the mechanisms include; caching fragments and glyphs in RAM, compression of data and continued caching of bitmaps.¬† Continued ¬†bitmaps caching leads to performance improvements, when the bandwidth connection is weak.
  • Clipboard mapping: the feature enables users to copy, paste and delete graphics and texts between running applications on the local computer and those running in the remote desktop session.

Other features of RDP include; remote control, where the user can see and control a session in remote desktop, among other activities. Besides, it features network printer redirection, port, drive, and sound. Additionally, RDP supports 24-bit color and can authenticate smart card via remote desktop services.

Importance of SMTP in Email Communication

Information and communication technology and computer technology are two technologies of the modern time that have revolutionized not just the doing of businesses but also other economic activities. They two technologies are widely accepted and utilized by almost all the businesses, institutions, organizations and individuals in their day to day operations. As the computer and information and communication technologies are developing and evolving, various modes of communications have emerged over the years. One of such modes of communications is the email communication especially when it comes to the use of email in marketing. Email today is regarded as one of the most effective means of communication and marketing tools used by many businesses, organizations, institutions and individuals. The reason why email communication mode has become widely accepted means of communication is because of its ability to transfer messages from one server to another within a twinkle of an eye. Messages are sent instantly via emails.

SMTP which is an acronym for simple mail transfer protocol is an essential part of email technology. Email technology will not work without SMTP. You will appreciate the importance of SMTP if you understand the function of SMTP in the sending of emails. SMTP performs two unique functions in the sending of emails. The first function of SMTP is to verify the sender’s computer configuration and provides permission for the process. The second function of SMTP is to transfer or relay message from the sender to the server of the recipient. It also oversees the delivery of the email. When it is not possible for the email to be delivered, the email will be returned to the sender as failed delivery. The improvements witnessed in the internet technology have made it possible for images and files to be sent the same time. An improved version of SMTP has been developed. It is called extended simple mail transfer protocol abbreviated as ESMTP. Note that SMTP does not pull emails from servers. The protocol that does that is POP.

Many businesses today engage in email marketing. Email marketing cannot be possible without SMTP. Normally, there is a limit to the number of emails that you are allowed to send in a day if you are using an ordinary email services such as Yahoomail, Gmail, Hotmail and others. Once the limit is reached in a particular day, every other email sent on that day will be taken as spammers. This means that businesses using email marketing cannot get to a lot of people on the same day. This will defeat the aim of email marketing. Besides, if they keep exceeding the number of emails that are allowed on daily basis, they will be blacklisted as their IP address will become notorious or earn a bad reputation. But a business can avoid all these problems by installing SMTP server. With such a server, thousands of emails can be sent at a time. There is no restriction to the number of emails that can be sent. Users are given multiple IP addresses which they can use to send thousands of emails on daily basis. With SMTP, businesses will not experience any limitations in their email marketing.

Today, SMTPs can be installed on laptops, smart phones and desktop computers.