Develop software that blocks repeat abusers from using a credit card. The software must identify the user by type of credit card use, name, userid, mailing address,credit card number and email.
In most cases each of the credit authorization providers, such as CyperCash and the like provide a capability to review each transaction and release them manually.
using this capability you can retrieve the list, scan it and delete any transactions that are originated by repeat or "suspicious" purchasers. In this manner you can stop shipment, as well as fraud.
In the case of CyberCash, fraudulent purchasers are screened prior to authorization and a return code provided that will alert your program not to process the transaction.
If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.
Credit Card Fraud