Saturday, June 27, 2009

Review on a post on internet security

First of all, I would like to share news in China:
“22 year-old hacker from Hunan steals over 7million RMB from banks”
There is a 22 year-old unemployed man with only a junior high-school education being a hacker and steal money from banks. He purchased a hacking software which used to infiltrate the main computers and websites of Chinese banks to insert “Trojan horse”, and steal the identification numbers, bank account numbers, bank codes, mobile phone numbers and other personal information of banking customers. Thus, he successfully steal over 7 million RMB from the over 300 accounts!

From this news, it means that, nowadays, it is easy to be a hacker, and even easier being hacked! In this e-century, hackers are everywhere. They can hack into your MSN, yahoo, hotmail or others personal websites. That is why we have to learn how to avoid from being hacked! I always receive message from my friends’ msn messenger, sent me some website address link while the sender is appear offline! I feel weird and just ignore it. But, this is actually the hackers who try to send out virus after hacked the user’s msn account. However, after my friend change the password, these things did not happen again.

After reading the password security post in E-Commerce blog, I finally understand why a lot of people being hacked by hacker. They did not care about the security of password. Some people use their name, date of birth as the password that could be easily found out by everyone. Although it may be easier to remember the password, we should change the password every month to avoid hacker. Besides, avoid using the same password for every applications or account login.

I would like to share some ways to create a secure password and STOP being hacked to protect your private personal information. 1. Avoid using personal information: never use your name, spouse name, or date of birth as your password.
2. Do not use real words: try to create your own words that could not find in dictionary.
3. Mix different character types: create a password which include different type of character such as ‘#’ or ‘&’.
4. Use a pass phrase: think a sentence or line from song, and create a password using the first letter from each word.
For example: “I like to wear Nike shoes” we can change it to:‘il2wns’
5. Use password management tools: password management tools can remember password securely and easier for user.

The post I review:
1.
http://ecommerze.blogspot.com/search/label/Internet%20Security
2.
http://chinanewswrap.com/2009/06/24/22-year-old-hacker-from-hunan-steals-over-7-million-rmb-from-banks/

How to safeguard our personal& financial data?

How safe is our data? Do you know how to protect your data? For me, I only know the basic way to protect my data. Nowadays, my way to protect data is outdated, because there is a lot of software that can easily hack into my data or computer. Hacker is the “most professional people” that steal the data; they can easily steal data without your knowledge. As this is very dangerous for the innocence people, that is you and me, because we don’t know have strong knowledge in protecting our data. In order to adapt to current situation, we need to start to protect our data now.

There are some ways to safeguard our data:
1) Set up password
Setting up password is the most basic way to protect data, but the others can still steal your data if your password can be guessed. We avoid using password such as birthday, name and identity card number, this type of password is can be easily guessed by other people. Besides that, we should not use repeating word in a password e.g. Betty. The length of the password is also very important, we need to set password that is at least 7 words long. Nowadays, when setting up the password there will be an identification of the strengtheners of your password. Remember to set the password that is strong enough to avoid stealing of data. 2) Firewall
A firewall is a part of a computer system or network that is designed to block unauthorized access. Firewalls are usually used to prevent unauthorized users from accessing private networks, especially
intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that are unauthorized. Firewall is suitable for individual or organization use. There is a lot of firewall software that are available in the internet; you can download it for free. 3) Antivirus Software
A computer virus is a
computer program that can copy itself and infect a computer without the permission of the owner. Virus can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. In order to avoid virus hacking our computer, we need to install antivirus software. The software must be very strong enough to “kill” the virus. Besides that, we need to update antivirus software everyday, so there will be strong protection for our data. 4) Log in, log out
When you log in to some website, the website may keep your username and password. This may be dangerous when you using public device to log on to that website. Others may steal your data without your knowledge. So, when you log in to one website, you need to make sure that you have clear the data. This will ensure that your data will not be hack by others. Besides that, when you sign in to one account, you need to ensure that you have sign out from that account, because some people will directly close the window and they think that the account will be automatically sign out. Some website will automatically sign out your account but not all. You need to make sure that you have signed out to the account and make a double check by log in another time to that website.

Friday, June 26, 2009

The threat of Online Security:How safe is our data?

Computer plays a major role in our daily life. Without computer, a lot of tasks couldn’t be done. For example, we need a computer to do assignments, communicate, do online shopping, news feed, and to find information. However, the doubt on how safe is the data disclosed still remains an issue to all Internet users. Crimes don’t only exist in real world but also in Internet. Worries on whether private information such as credit card number will be misused, stolen, loss, or damage still remains. Threat such as phishing, information theft, hackers, viruses and worm are concerns of traders as well. Therefore, traders are still trying their very best to prevent their customers’ information from being stolen, loss, misuse, as well as damage.

1. Phishing

Phishing is an act of obtaining access to passwords, identity details, and credit card information by posing as a trustworthy website such as Maybank2u, Amazon, eBay, and Public Bank through emails or Instant Messaging. Phishing concept is similar to ‘fishing’ whereby the theft leads to bait used to gain personal and financial information. Not only steals information, sometimes phishers also infect the computer with viruses or worm.

2. Information Theft

Similar to phishing, information theft is also a crime of stealing private information thru the Internet. Most popular information theft is the credit card number theft. The use of credit card has widened as people do their purchases online. It is the easiest area to use fraudulent as it has no extra identification number to use. Website without proper security such as free hosting websites is main target. Therefore, purchasing from a trusted entity is much safer.

3. Hackers

Black hat hackers are individual that breaks into others computer system to access forbidden information and cause some damages. However white hat hackers are those that work for big corporation to test out their latest website in order to offer a safe website and program to the public. For example, Maybank hires hackers to try out their website, http://www.maybank2u.com/ to make sure their security are safe enough and there are no loop holes for hackers to break into their system and steal and damages their information.

4. Computer Virus

Computer virus corrupts files and programs in a computer, causing the files and program damages. It infects a computer without the permission or knowledge of the computer owner. Types of viruses include Trojan horse, worms, most rootkits, spyware, crimeware and many more. Computer may be infected by virus thru clicking on website pop up, email links, corrupted files, pendrive, downloads, as well as programs. Installation of anti virus software can minimize the risk of virus attack on ones computer.


Therefore, users are advice to be careful when they are doing any online transaction. Get confirmation from the bank before disclosing any important data such as password and user ID. Moreover, important data in the computer may be abused if one lost their laptops or computer files are corrupted. Therefore, users are advise not to keep personal data such as ATM password, e banking password, or even credit card number in the computer system, but rather write it down on a notebook.

Phishing

Phishing is a fraudulent technique to steal the identity of a company to acquire the sensitive and confidential information of its customers. For examples, the customers’ personal information such as username or password.

Spy-phishing is a phishing technique with spyware programs which target on online banking and other websites. The phisher normally uses SPAM, malicious websites, email and instant messaging to trick users and login into their personal account so that they are able to steal their information. This information is then sending to the fraudster who then uses it, mostly for bank and credit card fraud. This is the most common phishing tactic nowadays.

Phishing has become more and more serious fraud nowadays. As users of the online application, we must protect and prevent ourselves from getting into those tricks.

Firstly, users must verify the authenticity and security of the websites. A user must login to their account by using the company’s official website rather than login through any hyperlink or email. Most of the banking websites are now warning their users not to login through any email or hyperlink and ignore email that require the users to update their personal information. Also, never reply to any email or pop up messages from company that ask for personal information.

Users must secure their computers with the antivirus software and firewall software. They have to ensure all of the software is updated frequently before they conduct any online activities. However, the users are highly recommended to install online anti-phishing software. There are two type of anti-phishing software: blacklist/ white list based and rule- based. The blacklist/ white list based will warn the users whenever they visit those phishing sites while the rule- based will check the security of the visited web site according to the rules established.
On the other hand, education can be provided and users are acknowledged regarding the danger of phishing. The users are taught to understand what phishing is and how phishing can attack and endanger them. The users must also be alert to identify and detect the phishing email. They may block the sites to prevent the phishing attack.

Last but not the least; users can block the phishing email by using anti spam software or spam filter. This filter could scan the contents as well as the information of the email to determine whether the email is sent by the identified sender and thus decreasing the phishing attack.

Example of phishing email of Citibank:

Thursday, June 18, 2009

Boo.com – E-commerce failure and its causes


Boo.com was launched 3rd November 1999, with approximately $125million of funding from Europe largest luxury goods group. It was actually a high profile e-tailer website, but due to several serious problems in managing the site, Boo.com had failed in this competing industry.

Boo.com spent a lot for consultancy fees after the launched had been delay for 6 months. The online virtual shopping assistant “Miss Boo” did not successfully helping visitors with purchasing experience. The site was reported slow browsing, poor navigation and irritating technology which caused bad reputation for Boo.com. Moreover, Boo.com can’t fulfill the “three click rules” in web design, which means customer should be able to access to their product information not more than three clicks. Boo.com makes the process over complicated. Besides, computer text appeared instead of graphics causes customers unable to view and purchase the products. Customers’ complaint on the poor online shopping experience that advised customer to limit their transaction discourages customers to drop on the site again. This is because there is no site-testing before it is launched, and they ignore the users of their site.

Boo.com has a nice graphic and 3-D view on the products, but they ignore the price of those products. The bad marketing completely shows where Boo did not fulfill 3 important criteria which are “ease/convenience”, “better prices” and “speed of process”. Furthermore, there is bad planning in expanding their business plan. The management tries to dominate in the market immediately instead of expanding step by step.

Boo.com had lack of sound financial management, due to huge cost spend on technological and employee benefits. Besides, Boo.com did not have a manager to oversee its spending. Instead of cut down the cost, Boo.com employs excessive employees which show a bad human resource management in the company.

The last and the main reason Boo.com fail is where investors refuse to continually inject money into business after it has spent $380 million. This force Boo.com into liquidation and finally it was bought by a US fashion portal, Fashionmall.com.

Revenue model for Google, Amazon.com & e-Bay

E-commerce consists of buying and selling products through computer process and it is quite popular nowadays. Some company focusing on using e-commerce to conduct their business. Some people may be confused that without physical transfer of money, how are these companies going to survive? How are they going to earn money? The answer is through revenue model.

A Revenue Model lays-out the process by which a company actually makes money by specifying how it is going to charge for the services provided. What is the revenue model for Google, Amazon.com and eBay?

Google is a useful and popular search engine; it has many revenue models such as Google AdWords and Google AdSense. Google Adwords is a pay per click advertising program designed to allow the advertiser to present their advertisement to the user. Pay-Per-Click (PPC) is an online advertising payment model in which payment is based on qualifying click-through. An advertiser has to pay every time his advertisement receives a click. When a user search for something, there are some related advertisement will be shown on the right side of the screen. You can see a clear picture as below:

If you are interested to advertise in Google you can log on to www.adwords.google.com for more information.

Google AdSense is an advertisement serving program. Website owners can enroll in this program to enable text, image and, video advertisements on their sites. Revenue is generated on a per-click or per-thousand-ads-displayed basis and the advertisement are administered by Google. AdSense program includes AdSense for search and AdSense for content. Advertisers are required to pay Google a fee each time a user clicks on one of their ads displayed on Google Network members’ web sites. Here is the picture for Google AdSense:



Amazon.com is an American-based multinational e-commerce company. It sell product online such as electronic device, books and games. Amazon is the most successful online-shopping website.

Amazon Marketplace is an online marketplace that allows sellers to sell their product. Buyers can buy new or used items which are sold directly by a third party through Amazon Marketplace; this has created profit for Amazon. Besides that, Amazon will charge a commission rate based on the sale price of an item. When each transaction is being done, Amazon will also charge transaction fee to the seller. In addition, Amazon also allows some user to advertise their advertisement on their website.

eBay is an online auction
and shopping website in which people and businesses buy and sell goods and services worldwide. It also establishes localize website in many countries including Malaysia. EBay generates revenue from a number of fees such as insertion fees, promotional fees, and final value fees.

Insertion fees: When an item is listed on eBay, a non-refundable fee is charged.
Final value fees: Fees that charged to the seller at the end of each auction.

Here is an example of the auction:


Every e-commerce business is continuously creating new revenue model in order to bring more profit to the organization. We hope to see a lot of revenue model in the future.

History and evolution of e-commerce


E-commerce has tremendously developed over the past few years. It can be defined as the transaction of selling, buying, transferring or exchanging goods, information and services using the Internet. In the past, people need to go to a physical shop to shop for clothing, groceries, food and many more. However, since e-commerce wan introduced, shopping and travelling time can be cut down. Today, the most successful firm with e-commerce based would be Airasia. Most firm nowadays use E-commerce as a way to cut cost (permit cost, material cost) while trying to improve e their services and goods to be able to compete with other organization in offering their customer a better quality of goods and wider range of products.

History of e-commerce is dated back to when the term “buying and selling”, internet, computer and electricity was invented and introduced. It all started in 1991 when Internet was opened for commercial use. With the help of Electronic Funds Transfer and Electronic Data Interchange which appeared in late 1970s, users are able to exchange business information and carry out electronic transaction. Organizations and companies are able to send commercial documentation electronically to its supplier, customers, as well as creditors.

In 1984, the Electronic Data Interchange was standardized through ASCX12, enabling the transfer of large amount of transaction become more reliable and stable. Next development occurred in 1992 when Mosaic web-browser was made available and adapted into Nescape. It enables easier and convenient access to electronic commerce. This is when online retail products are offered and purchases are made online by the customer The Digital Subscriber Line (DSL) was introduced which allows faster access and more stable connection to the internet.

The development and success of E-commerce can be seen in 1995 with two biggest E-commerce based companies which are Amazzon.com and eBay.com. In 1999, retail spending over the Internet reaches $20 billion according to business.com and is still expending again day after day.

E-commerce success and its causes- eBay

In today business world, e-commerce is become more and more important for business activity which conducted over the internet. As we can see, there is more business engaged and sell the products and services online.

eBay, is one of the most successful example of e-commerce business. It is the world’s largest online marketplace, where anyone can trade online anytime and anywhere. There are million items available for fixed-price and also auction-style trading which is conducted online in their day to day e- commerce business.

Questions arose as how eBay did and the reason of the success and sustainability to be the leading in the online trading platform?
The key successful factor is the trust and safety. eBay has developed a Trust and safety team which is responsible to maintain a safe trading marketplace for people from all around the world to trade with each other. For example, there is a set of rules and regulation to guide the clients whenever they trade in eBay. The rules and regulation is strictly enforceable to prevent any fraud and unethical transactions occurred.

Moreover, eBay’s transaction processing to make online payment is supported by the PayPal, which is the leader in the online payment solution. It enables an individual and business to securely and easily make or receives their payment by online. On the other hand, PayPal fraud prevention would keep buyers’ financial information private and highly confidential from the sellers and other to others unauthorised access. Other than using PayPal to make the payment, buyers also can make their payment by credit card, debit card, Paymate, Propay and other payment methods.

The next success contributor to eBay is a convenient platform to search and bargain for the item. A buyer can find the items that they wish to purchase by either searching or browsing through the catalogue. For the buyer who is looking for a specific item, they can just enter the descriptive or key word of the item into the search column. There are also some specific options which allow the buyer to narrow their search.

Also, eBay provides a feedback option which enables the buyers or sellers to leave their feedback and comments on particulars products, services, and even comment on the members. This option played a significance role because it is a useful option which ensures the buyers with the reputation of members before they trade with each others. This can increase the trustworthy of a buyer to other members who they wish to trade with.

To be sustainable and continue to be the leading in e-commerce, eBay is striving for continuous improvement in all aspect.

Wednesday, June 10, 2009

Teris



Hello, my name is Wong Shin Wen, you can call me Teris. I am 21 years old. Currently, I am studying in Universiti Tunku Abdul Rahman for undergraduate program- major in accounting. I was born in Johor Bahru- the city that located in the south of Malaysia. When I first started my life in KL, it is quite though. I need to stay far away from my family, taking care myself and doing all the house-hold by myself. Throughout these 2 years experience, I already adapted to this kind of environment. But I still miss my family very much.

When I am free, I will definitely stick myself with computer, watching drama & playing computer games. Computer is my main entertainment in KL. Besides that, I like to travel around in KL, eating local dishes and shopping. In my opinion, KL is a shopping paradise as compare to my hometown.

I visit Facebook almost everyday. There got a lot of games to play and is quite interesting. Besides that, all my friends are using facebook, so I can get the latest news from there, and I won’t lose contact with my friend. I have set up a personal blog in the internet (
http://wretch.cc/blog/prteris). I have written all things that happen around me and me recent status. My friends have given me a lot of comment about my blog, thanks. Usually I will check my e-mail everyday. I can get may interest news through e-mail from my friend. In addition, I will log in to UTAR intranet everyday. If there are any changes about my subject, then I can get connected with it and I won’t be the last one who knows about the changes. I like to go to Google website. I can get many things from there. It is a very useful searching engine for everyone and I would recommend it to my friend.

Surfing through internet will help increase my knowledge. I can get something that is not available in the classroom. Usually, I will chat with my friend through internet, by using Skype or MSN. It is very convenient to contact with my friend. Besides that, I will buy thing through internet, such as movie ticket, clothes and bag. Watching video through Youtube is usally my activities in internet, the video they posted is very funny and interesting and I like it very much. Besides that, I will watch some article news, so I can get the latest news that happen around the world.

Winnie



Bong Siat Nyuk, Winnie, Mirian,born and grown up in Miri, Sarawak. I’m currently pursuing my degree in Utar, a year 3 semester 1 student, undergraduate of Bachelor in Commerce of Accounting.

Outgoing, love travelling, foods, surf net, love holidays, and capturing some special moments. Last but not least, I love shopping the most. I spend most of my weekend doing shopping at my favourite mall- Pavilion, Mid Valley, Sunway Pyramid, etc.
The websites that I visited the most is www.facebook.com, www.friendster.com. Both of this website keep us connected to our friends and explored us to people all around the world. I uploaded my pictures as well as my personal information in this website to share with all my friends and family. www.utar.edu.my, Utar’s official website. I log in daily to update myself with any news or latest information about my university. www.mydressroom.com.my, is a local online boutique which is located at Bangsar. Customers can just browse through the catalogue in this website and purchase their garments online. They offer great variety of garments, from casual to office wear, which is the ideal dressing room for every girl, every occasion. www.miricommunity.net , a forum where people post all the forum and information about Miri. I visited this website frequently to update myself with the news about my hometown.
I did sign up for msn messenger account which I log in daily. I chat and communicate with my friends there. Sometime, I also use the video call to communicate with my friends over Msn Messenger. It was a fun and convenient way to keep in touch with my friends and family. Also, I check and send email daily through my hotmail account. Besides, I download music and video from internet. I did E commerce by using internet too. For instance, I purchase the airline ticket online. By doing this online, I can get my ticket at a cheaper price and it is fast and convenient.