473,480 Members | 2,303 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Off Topic Opinions or Answer

Hi All,

I run my business from my home office. After my users subscribe to my
application (Access 97 Runtime) they must make payment by check, cash
or credit card. I run the credit card numbers through my Link Point
modem manually since all I have is their number and expiration date.

I request that my credit card users either call or fax their credit
card numbers instead of emailing the numbers. Very often I still have
people who email their number instead of faxing or calling.

I have always assumed email was not a secure enviroment.

Could a email be read by outside hackers (excluding my own office)
before I receive it?

Thanks,

Kevin
Nov 12 '05 #1
2 1098
on****@aol.com (Kevin Thomas) wrote:
Could a email be read by outside hackers (excluding my own office)
before I receive it?


Absolutely. By the folks who run your or the clients email hosting service or by
folks who sniff for traffic along the route.

But I'd be much more concerned about your email hosting service.

That said someone could have a tap on your fax phone line and be getting a copy of
your faxes. Minute chance of course but still possible.

Tony
--
Tony Toews, Microsoft Access MVP
Please respond only in the newsgroups so that others can
read the entire thread of messages.
Microsoft Access Links, Hints, Tips & Accounting Systems at
http://www.granite.ab.ca/accsmstr.htm
Nov 12 '05 #2
TC
As the other respondent said, email IS NOT secure in any way. Of course,
your users could encrypt the CC number - and there are email packages that
try to do encryption automatically - but most users will not know how to do
this, and/or will not bother.

Also be aware that email is very easily forged. Getting an email from
Fr*******@blah.com is absolutely no guarantee, whatever, that the email
actualy came from that person. You may need to consider that, in your
process.

HTH,
TC
"Kevin Thomas" <on****@aol.com> wrote in message
news:47**************************@posting.google.c om...
Hi All,

I run my business from my home office. After my users subscribe to my
application (Access 97 Runtime) they must make payment by check, cash
or credit card. I run the credit card numbers through my Link Point
modem manually since all I have is their number and expiration date.

I request that my credit card users either call or fax their credit
card numbers instead of emailing the numbers. Very often I still have
people who email their number instead of faxing or calling.

I have always assumed email was not a secure enviroment.

Could a email be read by outside hackers (excluding my own office)
before I receive it?

Thanks,

Kevin

Nov 12 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

34
2642
by: nobody | last post by:
This article is posted at the request of C.W. Yang who asked me to detail my opinion of Lisp, and for the benefit of people like him, who may find themselves intrigued by this language. The...
109
4067
by: MSG | last post by:
Michel Bardiaux <michel.bardiaux@peaktime.be> wrote in message news:<G4idnfgZ0ZfCWbrdRVn2jQ@giganews.com>... > Mark Shelor wrote: > > > > > OK, Sidney, I am considering it. I can certainly...
33
2469
by: Chris Croughton | last post by:
I notice the real reason for not posting "off-topic" here is that the result will be a long thread on whether the matter is off-topic or not -- caused by the very people who claim that they don't...
5
3390
by: Piotrek Stachowicz | last post by:
Hi, Sorry, it's gonna be a bit off-topic but I'm looking for experienced ..NET (c#) developers and I guess there're quite many here. I'm looking for a topic for my final year project (B.sc). It...
52
1565
by: FAQ server | last post by:
----------------------------------------------------------------------- FAQ Topic - How do I convert a Number into a String with exactly 2 decimal places?...
20
417
by: FAQ server | last post by:
----------------------------------------------------------------------- FAQ Topic - How do I get a perl/asp/php variable into client-side js?...
1
1450
by: The Cool Giraffe | last post by:
I wonder if FoxToolkit is regarded as a part of C++, hence being on-topic here? Or should i ask my questions elsewhere and such case - where? Any suggestion would be welcome. -- Vänligen...
10
383
by: FAQ server | last post by:
----------------------------------------------------------------------- FAQ Topic - Which newsgroups deal with javascript? ----------------------------------------------------------------------- ...
7
1418
by: FAQ server | last post by:
----------------------------------------------------------------------- FAQ Topic - What is JScript? ----------------------------------------------------------------------- JScript is...
21
2628
by: Steve Swift | last post by:
On page 90 of my O'Reilly "Javascript The definitive guide" 3rd edition there is an example of an If/Else construct: (some text removed) If (username != null) alert("Hello " + username); else {...
0
7051
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
1
6750
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
6993
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
5353
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
1
4794
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
4493
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
3003
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
1
567
muto222
php
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
193
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.