473,396 Members | 1,967 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Securing credit card information, GnuPG?

Hi everyone,

I'm a pretty novice PHP programmer as all I've done so far is to do simple registration forms for events. The data that's going from the from to the database (mySQL) didn't need much securing, but now I need to figure out a way to securely capture credit card information. This is one-time registration for only 120 people. I figured I wouldn't risk storing that, but now I'm trying to figure out how to encrypt that credit card information from the form to the email box of event coordinator. It seemed like installing and using GnuPG to encrypt and decrypt the data is a good idea but... I can't seem to figure out how I could install GnuPG on a shared host. I am not sure how to go about installing that...

Another idea I was tossing with was to have the php script write to a file to a secured directory... Any feedback? Thank you in advance.
Jul 3 '08 #1
1 1600
pbmods
5,821 Expert 4TB
Heya, Pantone.

Do you need to store their entire credit card information? Or can you suffice with, say, the last 4 digits?

Unless you're charging subscriptions or you've been authorized to store the customers' information for the purpose of making future transactions, you don't need to (and in fact are not allowed to) store credit card information.

If you do need to store the full credit information, you can use GnuPG. I don't have a whole lot of experience using it programmatically, but you might find this article useful (http://www.alt-php-faq.org/local/65/).
Jul 4 '08 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

6
by: Simon Wigzell | last post by:
My client wants to have credit card information fields on his forms for his website visitors to be able to buy his wervices by credit card. The credit card info - Brand, number and expiry date will...
10
by: dries | last post by:
A friend of mine has a problem with his credit card validation routine and it is probably a simple thing to solve but I cannot find it. It has to do with the expiry dates. What happens is that as...
9
by: nm | last post by:
Hi, I am a developer quite familiar with the C# language and .NET framework. I develop mainly data driven websites. All of our past clients have shopping cart systems developed by me in ASP.NET...
6
by: Arne | last post by:
What would be a good component for processing credit cards? (I am not using commerce server.) Would I need to encrypt the credit card column in the database?
3
by: mikekissman | last post by:
I've built an online reservation website in ASP .NET with a SQL Server backend. It allows customers to search for available resources, than charges their credit card a fee to hold the reservation....
4
by: David Lozzi | last post by:
Howdy, I'm planning on storing credit card numbers in my SQL database for online ecommerce. Whats the best scenario to secure the data in SQL? Can I encrypt the field so if browsing table data...
11
by: Paul Furman | last post by:
I'm setting up credit card payment through authorize.net and they have the option to send a POST string back to my site once complete. I'm not sure how to proceed. They don't have much to read...
1
by: securedcardss | last post by:
http://card.2youtop.info secured credit card card credit instant secured card cash credit secured card
10
by: Les Desser | last post by:
In article <fcebdacd-2bd8-4d07-93a8-8b69d3452f3e@s50g2000hsb.googlegroups.com>, The Frog <Mr.Frog.to.you@googlemail.comMon, 14 Apr 2008 00:45:10 writes Not sure if I quite follow that. 1....
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.