Saturday, 27 June 2015

How Do You Fix Computer Errors?

Computers are awesome machines that were invented many years ago. Dramatic changes in our daily lives have taken place as a result of the computer. There are only a few things we should do to prevent or eliminate computer errors.
When To Eliminate Computer Errors
Invalid, corrupt, and infected registry entries occur in the DLL, EXE, and Driver files causing the registry to act sporadic. When the registry is unstable it will slow down the computer with poor performance. That is the time to fix computer errors.
Things We Can Do To Remove Computer Errors
• Run Disk Defragmenter
This compresses all the files together and reduces errors.
REGISTRY CLEANER

Running daily scans on your computer through the use of a registry cleaner will eliminate registry data that should be removed. Regular automatic registry maintenance tasks need to be done to help prevent infections. A good registry cleaner detects all computer problems that shouldn't be there, eliminates them and fixes the registry - bringing it back to peak performance.
Viruses Affect The Performance
Malware, adware, and spyware are guilty of many of the errors that show up in the registry. This makes it difficult for the computer's performance. Spyware steals confidential private data sending it on to third parties. This is used for many different objectives including reselling the information, trying to sell you similar products, or passing private information on for malicious use. Using a good registry cleaner to clean the registry and spyware software to remove adware, spyware and other virus from the registry will keep your computer running in top form.

WINDOWS XP Boot CD
If your system no longer will boot up, it has severely been compromised by corrupt programs and virus infections. Installing the Windows XP Boot CD can sometimes be helpful when experiencing failure of the system booting up properly. This repairs the Windows XP installation files.
If your systems memory resources are low, this can have several affects on the computer. This can lead to system crashes, system freezing, blue screen and errors popping up on the screen. It's possible you need to boost your systems RAM (memory). This will greatly boost the computers performance. If you do this, consider 5-6 Gig. of memory minimum. If you can afford 8-10 Gig., would be even better.
Most of the advice mentioned above should keep your PC running at peak performance. If, however, you still have some problems not related to the above advice - like maybe hardware issues or devises - you can check those in the system settings. It is possible your devise drivers need to be updated. The Mother Board could be worn out and needs replacing. Usually, if you follow the advice above, it will solve your computer issues. You also can check on the internet for any additional problems relating to your computer, but make sure those are trusted sites. Windows Fix and Repair is another option.
A Word to the Wise
Always have a full backup of your computer and programs!

Your Business Needs Antivirus

Have you long been wondering whether your network is safe or not? Well, the fact of the matter is that with the passage of time, hackers have also taken on sophisticated approaches. This deems it all the more necessary for you to make use of antivirus software to keep your business computers protected against external harm. With the recent viruses such as Cryptolocker and Cryptowall costing businesses millions of dollars the need for business security has never been more important and should be at the forefront of business owner's thoughts.
There are many different forms that viruses tend to take. There are those that work by infiltrating your computer so as to disrupt its operating systems. Although these viruses are more so harmless, the disruption that they cause by corrupting files has the tendency to lead to substantial down-time. This results in reduction in productivity, leading to major loss in terms of time and money.
There remains the fact that online crimes, particularly identity theft is on the rise. For this reason, hackers are prone to the utilization of spyware to acquire as much information about you as possible. This is basically an attempt to acquire your passwords, along with your financial and personal information. For a business, such a breach of security can turn out to be a major issue in the long run. This additionally has the potential to have sensitive business information leaked out. This is inclusive of trade secrets, customer listings and even pricing. This sensitive information can then be used for malicious intents, thereby bringing disrepute to your business - something that you simply cannot afford.
Which antivirus should I use?
There are countless anti-virus software currently available. However, not all of them offer the sort of security, and anti-spam features that businesses should acquire. So, which antivirus for business should you use? Well, amongst the myriads of antivirus available these days, the best is AVG for business. When you go through the latest antivirus reviews, you are bound to learn about the endless benefits that AVG has to offer for your business - adequate security, ample spam prevention, and extravagant hacking protection - AVG offers it all.
However, the one thing that you need to bear in mind is that the mere installation of antivirus software onto your business computer isn't going to deliver any benefits as such. For this reason, it is extremely important for you to make sure that the antivirus software is updated on a regular basis, and that it is used for virus detection purposes every now and then. Generally speaking, it is best for you to formulate a regular schedule for this purpose. This way, your business computers are going too protected against any and all new threats that they are susceptible to.
The impact of cloud computing for business on security
Things have changed rather significantly in the business world with the introduction of cloud computing. Now, securing physical devices is not as important as security browsing activities, virtual identities and personal data. While we are at it, there are also handheld devices, because of which, securing online interactions is a whole lot more important these days.
As a business, you entrust highly confidential data to the cloud via your chosen business cloud service, so you don't really need to be worried about direct threats to devices. You basically need to be focused on preventing your personal data or identities from being compromised upon. This is because any weakness in your business security system is going to make you vulnerable to hackers. So, while you keep your devices protected by a top quality antivirus for business, make sure that you also keep your online interactions safe. If you require more information or are looking to setup antivirus software for your business contact your local IT services company or local tech support guy.
Contact your local IT support company to learn how you can benefit from local IT services and antivirus.

Friday, 26 June 2015

Now Read Barcodes Online

Barcodes are everywhere today. They are particularly popular with retail stores, for warehouse inventory applications, and more. Essentially, barcodes are important for applications where easily sharing information via computers or mobile devices is important.
As the hunger for more online information sharing and saving grows so too does the need to process barcode information from a web application. But how can you integrate barcode reading technology with web technologies?
If you have tried integrating a barcode with a web application before, you will know how time-consuming the task can be. However, with the help of Dynamsoft's Dynamic Web TWAIN 10.2 Barcode Reader Add-on, you can make it happen in just a few minutes.
In this tutorial, I will show you step by step how to build a simple barcode reading web application.
For this tutorial, you need a basic understanding of HTML and JavaScript. There is no CSS involved in this demo page. We'll concentrate on the barcode functionality in this tutorial. You can add whatever styles you like afterward. Even if you are a novice to web programming, you will find this tutorial easy to follow. So just take it easy and have some fun.
Here is a summary of the steps:
1. Start a Web Application
2. Add Dynamic Web TWAIN to the HTML Page
3. Scan or Load Images
4. Read Barcodes
In step 1, 2, and 3, we are integrating Dynamic Web TWAIN with your web application. This is a prerequisite for barcode processing as, in this case, Barcode Reader is an add-on of Dynamic Web TWAIN.
Step 1: Start a Web Application
You can get Dynamic Web TWAIN Barcode Reader Resources files either from Dynamsoft's Dynamic Web TWAIN 9.2 free 30-day trial or the barcode sample code we used in this tutorial.
Create an empty HTML page named readbarcode.HTML. Put it on the same folder as the Resources folder.
Step 2: Add Dynamic Web TWAIN to the HTML Page
Include dynamsoft.webtwain.initiate.js, dynamsoft.webtwain.config.js, and dynamsoft.webtwain.addon.barcode.js in the HTML head. dynamsoft.webtwain.initiate.js and dynamsoft.webtwain.config.js are responsible for Dynamic Web TWAIN's initialization, while dynamsoft.webtwain.addon.barcode.js provides all barcode related API interfaces:
<script type="text/javascript" src="Resources/dynamsoft.webtwain.initiate.js"> </script>
<script type="text/javascript" src="Resources/dynamsoft.webtwain.config.js"> </script>
<script type="text/javascript" src="Resources/addon/dynamsoft.webtwain.addon.barcode.js"> </script>
Add a div container, and register the OnWebTwainReady event to get access to Dynamic Web TWAIN via DWObject:
<div id="dwtcontrolContainer"></div>
<script type="text/javascript">
Dynamsoft.WebTwainEnv.RegisterEvent('OnWebTwainReady', Dynamsoft_OnReady); // Register OnWebTwainReady event. This event fires as soon as Dynamic Web TWAIN is initialized and ready to be used
var DWObject;
function Dynamsoft_OnReady() {
DWObject = Dynamsoft.WebTwainEnv.GetWebTwain('dwtcontrolContainer'); // Get the Dynamic Web TWAIN object that is embeded in the div with id 'dwtcontrolContainer'
}
Step 3: Scan or Load Images
Add Scan and Load buttons to the page:
<input type="button" value="Scan" onclick="AcquireImage();" />
<input type="button" value="Load" onclick="LoadImage();" /><br />
And add the implementation of function AcquireImage() and LoadImage(). Notice how LoadImage() handles success and failure with callback functions OnSuccess() and OnFailure():
function AcquireImage() {
if (DWObject) {
DWObject.SelectSource();
DWObject.OpenSource();
DWObject.IfDisableSourceAfterAcquire = true; // Scanner source will be disabled/closed automatically after the scan.
DWObject.AcquireImage();
}
}
//Callback functions for async APIs
function OnSuccess() {
console.log('successful');
}
function OnFailure(errorCode, errorString) {
alert(errorString);
}
function LoadImage() {
if (DWObject) {
DWObject.IfShowFileDialog = true; // Open the system's file dialog to load image
DWObject.LoadImageEx("", EnumDWT_ImageType.IT_ALL, OnSuccess, OnFailure); // Load images in all supported formats (.bmp,.jpg,.tif,.png,.pdf). OnSuccess or OnFailure will be called after the operation
}
}
Step 4: Read Barcodes
Now you have two options to get the image loaded:
Scan images from a scanner (AcquireImage());
Or load hard disk images (LoadImage()).
It's time to add the Dynamic Web TWAIN Barcode Reader add-on to your web page.
Add a selection list for supported barcode formats:
<select id="barcodeformat"></select>
And populate it in function Dynamsoft_OnReady():
function Dynamsoft_OnReady() {
DWObject = Dynamsoft.WebTwainEnv.GetWebTwain('dwtcontrolContainer');
if (DWObject) {//Currently only code 39 and code 128 are supported
document.getElementById("barcodeformat").options.add(new Option("Code 39", 1));
document.getElementById("barcodeformat").options.add(new Option("Code 128", 0));
}
}
Dynamic Web TWAIN 10.2 Barcode Reader Add-on supports Code 39 and Code 128 barcodes. Another independent barcode product from Dynamsoft, called Dynamsoft Barcode Reader, supports more barcode types. They include Code 39, Code 93, Code 128, Codabar, ITF, EAN-13, EAN-8, UPC-A, UPC-E, etc. The next version of Dynamic Web TWAIN Barcode Reader Add-on will support all these barcode types as well.
Now it comes to the most important part of this tutorial - barcode reading logic. Please notice that how callback functions are used to deal with the success and failure scenarios for barcode reading:
function GetBarcodeInfo(sImageIndex, result) {
//Retrieve barcode details
var count = result.GetCount();
if (count == 0) {
alert("The barcode for the selected format is not found.");
return;
} else {
for (I = 0; I < count; I++) {
var text = result.GetContent(I);
var x = result.GetX1(I);
var y = result.GetY1(I);
var format = result.GetFormat(I);
var barcodeText = ("barcode[" + (I + 1) + "]: " + text + "\n");
barcodeText += ("format:" + format + "\n");
barcodeText += ("x: " + x + " y:" + y + "\n");
alert(barcodeText);
}
}
}
//This is the function called when barcode reading fails
function GetErrorInfo (errorcode, errorstring) {
alert(errorstring);
}
function ReadBarcode() {
var DWObject = Dynamsoft.WebTwainEnv.GetWebTwain('dwtcontrolContainer');
if (DWObject) {
if (DWObject.HowManyImagesInBuffer == 0) {
alert("Please scan or load an image first.");
return;
}
//Get barcode result.
switch (document.getElementById("barcodeformat").selectedIndex) {
case 0:
result = DWObject.Addon.Barcode.Read(
DWObject.CurrentImageIndexInBuffer, EnumDWT_BarcodeFormat.CODE_39, GetBarcodeInfo, GetErrorInfo);
break;
case 1:
result = DWObject.Addon.Barcode.Read(
DWObject.CurrentImageIndexInBuffer, EnumDWT_BarcodeFormat.CODE_128, GetBarcodeInfo, GetErrorInfo);
break;
default:
break;
}
}
} Barcodes are everywhere today. They are particularly popular with retail stores, for warehouse inventory applications, and more. Essentially, barcodes are important for applications where easily sharing information via computers or mobile devices is important.
As the hunger for more online information sharing and saving grows so too does the need to process barcode information from a web application. But how can you integrate barcode reading technology with web technologies?
If you have tried integrating a barcode with a web application before, you will know how time-consuming the task can be. However, with the help of Dynamsoft's Dynamic Web TWAIN 10.2 Barcode Reader Add-on, you can make it happen in just a few minutes.
In this tutorial, I will show you step by step how to build a simple barcode reading web application.
For this tutorial, you need a basic understanding of HTML and JavaScript. There is no CSS involved in this demo page. We'll concentrate on the barcode functionality in this tutorial. You can add whatever styles you like afterward. Even if you are a novice to web programming, you will find this tutorial easy to follow. So just take it easy and have some fun.
Here is a summary of the steps:
1. Start a Web Application
2. Add Dynamic Web TWAIN to the HTML Page
3. Scan or Load Images
4. Read Barcodes
In step 1, 2, and 3, we are integrating Dynamic Web TWAIN with your web application. This is a prerequisite for barcode processing as, in this case, Barcode Reader is an add-on of Dynamic Web TWAIN.
Step 1: Start a Web Application
You can get Dynamic Web TWAIN Barcode Reader Resources files either from Dynamsoft's Dynamic Web TWAIN 9.2 free 30-day trial or the barcode sample code we used in this tutorial.
Create an empty HTML page named readbarcode.HTML. Put it on the same folder as the Resources folder.
Step 2: Add Dynamic Web TWAIN to the HTML Page
Include dynamsoft.webtwain.initiate.js, dynamsoft.webtwain.config.js, and dynamsoft.webtwain.addon.barcode.js in the HTML head. dynamsoft.webtwain.initiate.js and dynamsoft.webtwain.config.js are responsible for Dynamic Web TWAIN's initialization, while dynamsoft.webtwain.addon.barcode.js provides all barcode related API interfaces:
<script type="text/javascript" src="Resources/dynamsoft.webtwain.initiate.js"> </script>
<script type="text/javascript" src="Resources/dynamsoft.webtwain.config.js"> </script>
<script type="text/javascript" src="Resources/addon/dynamsoft.webtwain.addon.barcode.js"> </script>
Add a div container, and register the OnWebTwainReady event to get access to Dynamic Web TWAIN via DWObject:
<div id="dwtcontrolContainer"></div>
<script type="text/javascript">
Dynamsoft.WebTwainEnv.RegisterEvent('OnWebTwainReady', Dynamsoft_OnReady); // Register OnWebTwainReady event. This event fires as soon as Dynamic Web TWAIN is initialized and ready to be used
var DWObject;
function Dynamsoft_OnReady() {
DWObject = Dynamsoft.WebTwainEnv.GetWebTwain('dwtcontrolContainer'); // Get the Dynamic Web TWAIN object that is embeded in the div with id 'dwtcontrolContainer'
}
Step 3: Scan or Load Images
Add Scan and Load buttons to the page:
<input type="button" value="Scan" onclick="AcquireImage();" />
<input type="button" value="Load" onclick="LoadImage();" /><br />
And add the implementation of function AcquireImage() and LoadImage(). Notice how LoadImage() handles success and failure with callback functions OnSuccess() and OnFailure():
function AcquireImage() {
if (DWObject) {
DWObject.SelectSource();
DWObject.OpenSource();
DWObject.IfDisableSourceAfterAcquire = true; // Scanner source will be disabled/closed automatically after the scan.
DWObject.AcquireImage();
}
}
//Callback functions for async APIs
function OnSuccess() {
console.log('successful');
}
function OnFailure(errorCode, errorString) {
alert(errorString);
}
function LoadImage() {
if (DWObject) {
DWObject.IfShowFileDialog = true; // Open the system's file dialog to load image
DWObject.LoadImageEx("", EnumDWT_ImageType.IT_ALL, OnSuccess, OnFailure); // Load images in all supported formats (.bmp,.jpg,.tif,.png,.pdf). OnSuccess or OnFailure will be called after the operation
}
}
Step 4: Read Barcodes
Now you have two options to get the image loaded:
Scan images from a scanner (AcquireImage());
Or load hard disk images (LoadImage()).
It's time to add the Dynamic Web TWAIN Barcode Reader add-on to your web page.
Add a selection list for supported barcode formats:
<select id="barcodeformat"></select>
And populate it in function Dynamsoft_OnReady():
function Dynamsoft_OnReady() {
DWObject = Dynamsoft.WebTwainEnv.GetWebTwain('dwtcontrolContainer');
if (DWObject) {//Currently only code 39 and code 128 are supported
document.getElementById("barcodeformat").options.add(new Option("Code 39", 1));
document.getElementById("barcodeformat").options.add(new Option("Code 128", 0));
}
}
Dynamic Web TWAIN 10.2 Barcode Reader Add-on supports Code 39 and Code 128 barcodes. Another independent barcode product from Dynamsoft, called Dynamsoft Barcode Reader, supports more barcode types. They include Code 39, Code 93, Code 128, Codabar, ITF, EAN-13, EAN-8, UPC-A, UPC-E, etc. The next version of Dynamic Web TWAIN Barcode Reader Add-on will support all these barcode types as well.
Now it comes to the most important part of this tutorial - barcode reading logic. Please notice that how callback functions are used to deal with the success and failure scenarios for barcode reading:
function GetBarcodeInfo(sImageIndex, result) {
//Retrieve barcode details
var count = result.GetCount();
if (count == 0) {
alert("The barcode for the selected format is not found.");
return;
} else {
for (I = 0; I < count; I++) {
var text = result.GetContent(I);
var x = result.GetX1(I);
var y = result.GetY1(I);
var format = result.GetFormat(I);
var barcodeText = ("barcode[" + (I + 1) + "]: " + text + "\n");
barcodeText += ("format:" + format + "\n");
barcodeText += ("x: " + x + " y:" + y + "\n");
alert(barcodeText);
}
}
}
//This is the function called when barcode reading fails
function GetErrorInfo (errorcode, errorstring) {
alert(errorstring);
}
function ReadBarcode() {
var DWObject = Dynamsoft.WebTwainEnv.GetWebTwain('dwtcontrolContainer');
if (DWObject) {
if (DWObject.HowManyImagesInBuffer == 0) {
alert("Please scan or load an image first.");
return;
}
//Get barcode result.
switch (document.getElementById("barcodeformat").selectedIndex) {
case 0:
result = DWObject.Addon.Barcode.Read(
DWObject.CurrentImageIndexInBuffer, EnumDWT_BarcodeFormat.CODE_39, GetBarcodeInfo, GetErrorInfo);
break;
case 1:
result = DWObject.Addon.Barcode.Read(
DWObject.CurrentImageIndexInBuffer, EnumDWT_BarcodeFormat.CODE_128, GetBarcodeInfo, GetErrorInfo);
break;
default:
break;
}
}
}
Now, save the file.
Okay, we are all set. You can open readbarcode.HTML in a browser and start barcode reading.
Conclusion


Article Source: http://EzineArticles.com/9068251

Now, save the file.
Okay, we are all set. You can open readbarcode.HTML in a browser and start barcode reading.

Identity Theft

Identity theft
Identity Thief (film)Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
"Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained," and identity theft is not always detectable by the individual victims, according to a report done for the FTC. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A US Government Accountability Office study determined that "most breaches have not resulted in detected incidents of identity theft". The report also warned that "the full extent is unknown". A later unpublished study by Carnegie Mellon University noted that "Most often, the causes of identity theft is not known," but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%". More recently, an association of consumer data companies noted that one of the largest data breaches ever, accounting for over four million records, resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached.
An October 2010 article entitled “Cyber Crime Made Easy" explained the level to which hackers are using malicious software. As one security specialist named Gunter Ollmann said, “Interested in credit card theft? There’s an app for that.” This statement summed up the ease with which these hackers are accessing all kinds of information online. The new program for infecting users’ computers is called Zeus; and the program is so hacker friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article stated that programs like Zeus can steal credit card information, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft or even a possible terrorist attack.
Types
Sources such as the non-profit Identity Theft Resource Center sub-divide identity theft into five categories:
·         Criminal identity theft (posing as another person when apprehended for a crime)
·         Financial identity theft (using another's identity to obtain credit, goods and services)
·         Identity cloning (using another's information to assume his or her identity in daily life)
·         Medical identity theft (using another's identity to obtain medical care or drugs)
·         Child identity theft.
Identity theft may be used to facilitate or fund other crimes including illegal immigrationterrorismphishing and espionage. There are cases of identity cloning to attack payment systems, including online credit card processing and medical insurance.
Identity cloning and concealment
In this situation, the identity thief impersonates someone else in order to conceal their own true identity. Examples might be illegal immigrants, people hiding from creditors or other individuals, or those who simply want to become "anonymous" for personal reasons. Another example are posers, a label given to people who use somebody else’s photos and information through social networking sites. Mostly, posers create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief is able to obtain false credentials in order to pass various authentication tests in everyday life.
Criminal identity theft
When a criminal fraudulently identifies himself to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented fake ID. Provided the subterfuge works, charges may be placed under the victim's name, letting the criminal off the hook. Victims might only learn of such incidents by chance, for example by receiving court summons, discovering their drivers licenses are suspended when stopped for minor traffic violations, or through background checks performed for employment purposes.
It can be difficult for the victim of a criminal identity theft to clear their record. The steps required to clear the victim's incorrect criminal record depend in which jurisdiction the crime occurred and whether the true identity of the criminal can be determined. The victim might need to locate the original arresting officers and prove their own identity by some reliable means such as fingerprinting or DNA testing, and may need to go to a court hearing to be cleared of the charges. Obtaining an expungement of court records may also be required. Authorities might permanently maintain the victim's name as an alias for the criminal's true identity in their criminal records databases. One problem that victims of criminal identity theft may encounter is that various data aggregators might still have the incorrect criminal records in their databases even after court and police records are corrected. Thus it is possible that a future background check will return the incorrect criminal records. This is just one example of the kinds of impact that may continue to affect the victims of identity theft for some months or even years after the crime, aside from the psychological trauma that being 'cloned' typically engenders.
Synthetic identity theft
A variation of identity theft which has recently become more common is synthetic identity theft, in which identities are completely or partially fabricated. The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number. Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly, but may appear as an entirely new file in the credit bureau or as a subfile on one of the victim's credit reports. Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters credit. Individual victims can be affected if their names become confused with the synthetic identities, or if negative information in their subfiles impacts their credit ratings.
Medical identity theft
Privacy researcher Pam Dixon, founder of the World Privacy Forum, coined the term medical identity theft and released the first major report about this issue in 2006. In the report, she defined the crime for the first time and made the plight of victims public. The report's definition of the crime is that medical identity theft occurs when someone seeks medical care under the identity of another person. In addition to risks of financial harm common to all forms of identity theft, the thief's medical history may be added to the victim's medical records. Inaccurate information in the victim's records is difficult to correct and may affect future insurability or cause doctors relying on the misinformation to deliver inappropriate medical care. After the publication of the report, which contained a recommendation that consumers receive notifications of medical data breach incidents, California passed a law requiring this, and then finally HIPAA was expanded to also require medical breach notification when breaches affect 500 or more people. 
Child identity theft
Child identity theft occurs when a minor’s identity is used by another person for the impostor’s personal gain. The impostor can be a family member, a friend, or even a stranger who targets children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver’s licenses, or even buying a house using a child’s identity. This fraud can go undetected for years, as most children do not discover the problem until years later. Child identity theft is fairly common, and studies have shown that the problem is growing. The largest study on child identity theft, as reported by Richard Power of the Carnegie Mellon Cylab with data supplied by AllClear ID, found that of 40,000 children 10.2% were victims of identity theft.
Financial identity theft
The most common type is financial identity theft, where someone wants to gain economic benefits in someone else's name. This includes getting credits, loans, goods and services, claiming to be someone else.
Techniques for obtaining and exploiting personal information for identity theft
Identity thieves typically obtain and exploit personally identifiable information about individuals, or various credentials they use to authenticate themselves, in order to impersonate them. Examples include:
·         Rummaging through rubbish for personal information (dumpster diving)
·         Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized
·         Using public records about individual citizens, published in official registers such as electoral rolls
·         Stealing bank or credit cards, identification cards, passports, authentication tokens ... typically by pickpocketinghousebreaking or mail theft
·         Common-knowledge questioning schemes that offer account verification and compromise: "What's your mother's maiden name?", "what was your first car model?", or "What was your first pet's name?", etc.
·         Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards
·         Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled passports
·         Observing users typing their login credentials, credit/calling card numbers etc. into IT equipment located in public places (shoulder surfing)
·         Stealing personal information from computers using breaches in browser security or malware such as Trojan horse keystroke logging programs or other forms of spyware
·         Hacking computer networks, systems and databases to obtain personal data, often in large quantities
·         Exploiting breaches that result in the publication or more limited disclosure of personal information such as names, addresses, Social Security number or credit card numbers
·         Advertising bogus job offers in order to accumulate resumes and applications typically disclosing applicants' names, home and email addresses, telephone numbers and sometimes their banking details
·         Exploiting insider access and abusing the rights of privileged IT users to access personal data on their employers' systems
·         Infiltrating organizations that store and process large amounts or particularly valuable personal information
·         Impersonating trusted organizations in emails, SMS text messages, phone calls or other forms of communication in order to dupe victims into disclosing their personal information or login credentials, typically on a fake corporate website or data collection form (phishing)
·         Brute-force attacking weak passwords and using inspired guesswork to compromise weak password reset questions
·         Obtaining castings of fingers for falsifying fingerprint identification.
·         Browsing social networking websites for personal details published by users, often using this information to appear more credible in subsequent social engineering activities
·         Diverting victims' email or post in order to obtain personal information and credentials such as credit cards, billing and bank/credit card statements, or to delay the discovery of new accounts and credit agreements opened by the identity thieves in the victims' names
·         Using false pretenses to trick individuals, customer service representatives and help desk workers into disclosing personal information and login details or changing user passwords/access rights (pretexting)
·         Stealing cheques (checks) to acquire banking information, including account numbers and bank routing numbers
·         Guessing Social Security numbers by using information found on Internet social networks such as Facebook and MySpace
·         Low security/privacy protection on photos that are easily clickable and downloaded on social networking sites.
·         Befriending strangers on social networks and taking advantage of their trust until private information is given.
Individual identity protection
The acquisition of personal identifiers is made possible through serious breaches of privacy. For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves as a result of being duped but identity-related documents such as credit cards, bank statements, utility bills, checkbooks etc. may also be physically stolen from vehicles, homes and offices, or directly from victims by pickpockets and bag snatchers. Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the US Federal Trade CommissionCanadian Phone Busters and most sites that address identity theft. Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands.
Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. Requiring, storing and processing personal identifiers (such as Social Security numbernational identification number, driver's license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times.

To protect yourself against federal tax-identity theft, you are advised the following:
·         do not give out personal information (and the SSN in the case of the US) on the phone, fax or on social media platforms
·         use a shredder to destroy tax related documents after tax time is over and keep the necessary ones in a safe (thieves can look through the trash)
·         for taxpayers planning to e-file their tax returns, it is recommended to use a strong password. Afterwards, save the file to a CD or flash drive and keep it in a secure location. Then delete the personal return information from the computer hard drive
·         US citizens should show employers their Social Security card at the start of a job, but otherwise do not routinely carry the card or other documents that display their SSN. Additionally, it is recommended not to fill the Social Security number on medical forms and such documents (in case your wallet or purse gets stolen)
·         only use secure websites while making online financial transactions (thieves access information you provide to an unsecured Internet site)
·         if working with an accountant, query him or her on what measures they take to protect your information.
Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones and other sources to exploit delays between the death and the closure of the person's accounts, the inattentiveness of grieving families and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased's families or the authorities notice and react to anomalies.[
In recent years, commercial identity theft protection/insurance services have become available in many countries. These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium. The services typically work either by setting fraud alerts on the individual's credit files with the three major credit bureaus or by setting up credit report monitoring with the credit bureaux. While identity theft protection/insurance services have been heavily marketed, their value has been called into question.
Identity protection by organizations
In their May 1998 testimony before the United States Senate, the Federal Trade Commission (FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-raters and data miners. The FTC agreed to the industry's self-regulating principles restricting access to information on credit reports. According to the industry, the restrictions vary according to the category of customer. Credit reporting agencies gather and disclose personal and credit information to a wide business client base.
Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has documented over 900 individual data breaches by US companies and government agencies since January 2005, which together have involved over 200 million total records containing sensitive personal information, many containing social security numbers. Poor corporate diligence standards which can result in data breaches include:
·         failure to shred confidential information before throwing it into dumpsters
·         failure to ensure adequate network security
·         credit card numbers stolen by call center agents and people with access to call recordings
·         the theft of laptop computers or portable media being carried off-site containing vast amounts of personal information. The use of strong encryption on these devices can reduce the chance of data being misused should a criminal obtain them.
·         the brokerage of personal information to other businesses without ensuring that the purchaser maintains adequate security controls
·         Failure of governments, when registering sole proprietorships, partnerships, and corporations, to determine if the officers listed in the Articles of Incorporation are who they say they are. This potentially allows criminals access to personal information through credit rating and data mining services.
The failure of corporate or government organizations to protect consumer privacyclient confidentiality and political privacy has been criticized for facilitating the acquisition of personal identifiers by criminals.
Legal responses
International
In March 2014, after it was learned two passengers with stolen passports were on board Malaysia Airlines Flight 370 which went missing on March 8, 2014, it came to light that Interpol maintains a database of 40 million lost and stolen travel documents from 157 countries which it makes available to governments and the public, including airlines and hotels. The Stolen and Lost Travel Documents (SLTD) database however is little used. Big News Network which is based in the UAE, observed that Interpol Secretary General Ronald told a forum in Abu Dhabi the previous month this was the case. "The bad news is that, despite being incredibly cost effective and deployable to virtually anywhere in the world, only a handful of countries are systematically using SLTD to screen travelers. The result is a major gap in our global security apparatus that is left vulnerable to exploitation by criminals and terrorists," Noble is quoted as saying.
India
Under the Information Technology Act 2000 Chapter IX Sec 66C
SECTION 66C
PUNISHMENT FOR IDENTITY THEFT Whoever, fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.
Notification
Most states followed California's lead and enacted mandatory data breach notification laws. As a result, companies that report a data breach typically report it to all their customers.
Spread and impact
Surveys in the USA from 2003 to 2006 showed a decrease in the total number of victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to $15.6 billion in 2006. The average fraud per person decreased from $4,789 in 2003 to $1,882 in 2006. A Microsoft report shows that this drop is due to statistical problems with the methodology, that such survey-based estimates are "hopelessly flawed" and exaggerate the true losses by orders of magnitude.
The 2003 survey from the Identity Theft Resource Center found that:
·         Only 15% of victims find out about the theft through proactive action taken by a business
·         The average time spent by victims resolving the problem is about 330 hours
·         73% of respondents indicated the crime involved the thief acquiring a credit card