Quote:
Originally Posted by angiefox10
This is an informational post.
|
I realize that, and thank you for that piece of the security puzzle, Angie. I was just pointing out, since your post title was using your cc without it being compromised, that there are other ways to compromise a cc.