Tuesday, July 8, 2008
Friday, July 4, 2008
Review:Another spammer gets jailed
Spammers are bad as they used spam to spread computer viruses, trojan horses or other malicious software for identity theft, advance fee fraud or worse. Thus, spammers who get caught will be fine in huge amount and put into the jail for several years. For instance, Todd Moeller Todd Moeller were sentenced to 27 months jail and fined more than US$180,000 by a New York judge. And, spam king, Robert Alan Soloway might be given a penalty of USD$250,000 fine and maximum of 65 years jail as mentioned in Mr Hen’s blog: http://ecommerze.blogspot.com/search/label/Legal.
In Soloway’s case, he used computers infected with malicious code to send out millions of junk e-mails since 2003. The computers are called “zombies” because owners typically have no idea their machines have been infected.
He continued his activities even after payment of $7 million to Microsoft and $10 million to the operator of a small Internet service provider in Oklahoma.
Thus, I doubt how much he actually earn from spam business and whether the fine imposed to him adequate to stop him to practice spamming again.
Perhaps, the government need to impose a significant penalty to spammer to refrain from spamming.
- One of world's top 10 spammers held in Seattle
http://www.msnbc.msn.com/id/18955115/ - How Spam Works — and Drives You Crazy! http://media.wiley.com/product_data/excerpt/56/07645596/0764559656.pdf
- Spamhaus Statistics : The Top 10
http://www.spamhaus.org/statistics/spammers.lasso
Tuesday, July 1, 2008
E-Government in Malaysia: Its implementation so far and citizen's adoption strategies.
E-Government or Electronic Government is defined as the use of information technology in public sector as a medium of delivering information and services. It is to provide citizens and organizations with more convenient access to government information and public services to citizens. It is an efficient and effective way of conducting government business transaction with citizens and business and within governments themselves. Through the adoption of e-government, government objectives can be achieved by integrating the processing and communication technology. Furthermore, government processes can also be improved through the adoption of e-government delivery of services to Malaysia people. It seeks to improve the convenience, accessibility and quality of interactions with citizens and businesses as well as, improving the speed and quality of policy development, coordination and enforcement by improving the flow of information and processes within government in connecting citizens and building interactions with and within the society.
The E-Government was launched in Malaysia to lead the country into the Information Age. It will improve the government internal operations and the Malaysia so far has implemented systems such as Electronic Services System (E-services), Human Resource Management Information System (HRIMS), E-Syariah and myGovernment Portal, which serve the purpose of providing government information and services to the citizens. For example, the myGovernment (My-Gov) portal acts as a one-stop source of Malaysian government information and services to the citizens. Recently, it has won Global ICT Awards at the World Congress on Information Technology (WCIT) 2008, held at Kuala Lumpur Convention Centre (KLCC). Some of successful applications of e-government are:
- Electronic Labor Exchange (ELX) (http://www.elx.gov.my/) which is a one stop-centre for labor market information, as supervised by the Ministry of Human Resource (MOHR) has matched 75,000 potential employees with employers since 2005. It enables employers and potential employees to communicate. The purpose is to create an effective job matching process and to ensure man power's utilization is optimized. Over the years, many Malaysians have started to use ELX to search for jobs.
- Online renewal of driving licenses
- E-Filing or Electronic filing of income tax forms.
- Voter’s information
- Details for government tenders
The adoption of e-government has brought a lot more convenient to Malaysia citizens. This is because most of the transactions can be done at a single click, at any time infact people no longer need to queue up to perform certain government transaction such as filing the income tax form. Eventhough, e-government is still unpopular among the citizens but sooner people will realize its importance.
Learn more about e-government: http://en.wikipedia.org/wiki/E-Government
Credit:
http://www.american.edu/initeb/ym6974a/egovernment.html
Review :Q Jelly Bakery Shop
Q JELLY BAKERY SHOP, previously known as Homemade Jelly Cake. The 1st booth located in Sunway Pyramid in year 2000 and now they goes online. Promoting a healthy lifestyle with jelly cakes that are low in cholesterol, contain nearly 87% water and are rich in vitamins as well as other important nutrients and most of all the food colour dyes are approved by The Food and Drug Administration (FDA) in the United States.
Having to surf around their site is a fun loving moment whereby you can see more than 1,000 designs of colourful jellies cake that are available for you to choose from.If you are interested,just click on and fill in your particulars.TADA~ delivery is on the way!
I know..there are too many to choose but little money to pay,and you wish to get a perfect design that suit your taste, no hassle ,the site provides you a shopping cart, ,that allows you to choose first and decide later.
Besides that ,if you are curious on whatever they are selling in the site,dont worry, FAQ serves you right. All information on food safety,whether or not it is Halal,how to keep the jelly cakes in an upmost quality before you serve is all there to answer you.
Well i can say it is a user friendly site where the outlay of the website speaks it all.Easy and Simple.
Being a regulars to the site, I've noticed some changes going on...yes..they added new features allowing customers to subscribe to their Newsletter.Well isn't it cool that you can receive latest cake's design in your mailbox.
If there is a birthday..anniversary..special occasion, try get a jelly cake online this year. Happy surfing (and eating too).
Credit:
- http://www.qjelly.com/
- http://thestar.com.my/metro/story.asp?file=/2008/4/13/sundaymetro/20874410&sec=SundayMetro
Saturday, June 28, 2008
Electronic Currency
Over the years, money as we know it has been undergoing transformation. The shape and form of money has changed from precious metals to metal coins and paper money with no intrinsic value and today it presents us with a formless form in the name of digital or e-money. Electronic currency is also known as e-money, electronic cash, electronic money, digital money, digital cash or digital currency.
Electronic currency allows consumers to pay for goods and services by transmitting a number from one computer to another. These numbers function much like the serial numbers on "real money." They are unique, and represent a specific amount of actual cash. Unlike credit-card transactions, electronic-cash transactions are anonymous. E-cash works just like paper cash. Once it is withdrawn from an account it does not leave a trail of digital crumbs. E-cash by its nature is portable and therefore more convenient for mobile commerce (Internet-capable cell phones and personal digital assistants).
1) Convenience-With the introduction of online banking, debit cards, online bill payments and internet business, Debit cards and online bill payments allow immediate transfer of funds from an individual’s personal account to a business’s account without any actual paper transfer of money. This offers a great convenience to many people and businesses alike.
2) Ease of transter-Banks now offer many services whereby a customer can transfer funds, purchase stocks, contribute to their retirement plans and offer a variety of other services without having to handle physical cash or cheques.Customers do not have to wait in lines, and this provides a lower-hassle environment.
The Cons
1) Fraud-over digital cash has been a pressing issue in recent years. Hacking into bank accounts and illegal retrieval of banking records has led to a widespread invasion of privacy and has promoted identity theft.
2) Failure of technology- There is also a pressing issue regarding the technology involved in digital cash. Power failures, loss of records and undependable software often cause a major setback in promoting the technology.
3) Possible tracking of individuals and loss of human interaction- There is a fear that the use of debit cards will lead to the creation by the banking industry of a global tracking system. Some people are working on anonymous ecash to try to address this issue. The issue of providing anonymity to users itself introduces more problems, where there is a possibility that a fully anonymous digital cash system could induce people to commit the “perfect crime” to occur, where a criminal uses someone else’s electronic cash to make a payment, but cannot be traced.
Electronic Cash Payment Systems
Examples of providers:
Pay Pal- an e-commerce business allowing payments and money transfers to be made through the Internet.
eCash- a computer generated system which allows items to be purchased by credit card, check or by money order, providing secure on-line transactions and processing.
First-E – an Internet-only bank.
Credit:
- en.wikipedia.org/wiki/Electronic_money
- www.projects.ex.ac.uk/RDavies/arian/emoney.html
- -http://http//www.murdoch.edu.au/elaw/issues/v6n3/ishman63.html
THE APPLICATION OF PRE-PAID CASH CARD FOR CONSUMERS
An example of pre-paid card widely used in Malaysia is Touch 'n Go which was used to pay the highway toll payment. It is very convenient for highway user as they don’t have to go through the long queue congestion at toll plazas. Users just need to tab the card on the sensor and the amount will be automatically deducted. User can reload the card at many places such as toll plazas, train stations, Automated Teller Machines, and Cash Deposit Machines.
Another foreign example of pre-paid cash card is the Octopus cash card used in Hong Kong. Basically, the application of this card is similar to Touch’n Go card. The people in Hong Kong use this card to pay public transportation fees whereby it only take a couple of seconds and even easier as they no need to carry coins(Yes!it is the card that you always see in HK drama). Octopus card can also be used in some retail shops that accept this card, such as convenience stores, supermarkets or even restaurants. The user only need to wave the card over the Octopus Reader (even if it's in your wallet or handbag), payments will be deducted instantly (provided there is enough money in the card). The reader will also show the new balance of the Octopus Card. It is very convenient to use Octopus cash card as it can be purchased from any public transportation company's customer service centre, such as MTR's or KCR's and infact, can top-up the card easily.
Some other, country’s pre-paid cash card are Coinstar prepaid debit card in Canada, Advance Visa prepaid card in America, Just Cash Maestro prepaid card in West Yorkshire and ACE Cash Express prepaid card at United States. In conclusion pre-paid cash card is gaining its popularity among other countries and there is no risk for the user to get themselves into debt as it has no credit or overdraft facility.
CREDIT:
Credit card debts: Causes and Prevention
Credit card debt is a burgeoning problem throughout the world undoubtedly. As a credit card holder you must be one that with budget and good in self-control. Otherwise, you might unable to pay off accumulated debts and then lead to bankruptcy.
what causes credit card debts? Here it goes:
1. Poor money management~ you may encounter problem like over spending, non-payment of the debts without money spending plan. With that, you will know that how much money you can spend on. Thus it is vital to have it.
2. Multiple credit cards ~ there are some people like to show off their social status by having multiple cards which in turn creating sky high credit card debts.
3. Financial illiteracy ~ many people do not realise how money works and grows and how to save and invest money for future needs. Financial mistakes are increasingly expensive and complicated to resolve. Thus, it is essential to learn from expert and get in control.
when comes to debts it is to say prevention is better than cure.
Below are methods to prevent credit card debts:
1. You can pay off smaller balances first. It is common for a person to try to focus on their cards with larger balances first. Pay off the smaller ones. It will take less time and you will feel a sense of satisfaction when you have actually completed your goal. This will boost your confidence and make it easier to tackle the higher balances.
2. You can pay double the minimum payment if affordable. The minimum payment usually pays just enough to cover the interest and a little more that pays down the balance. Paying extra will pay your balance more quickly.
3. You can keep your credit cards to a limited number. It is not necessary to have more than one credit card. If you want to have a card that you can use everywhere, try just having a Visa, MasterCard, or American express card which are all used everywhere
4. You can create a letter to your credit card company stating that you are thinking of switching to their competition because other companies are offering a far more reasonable interest rate. Most probably Credit card companies will match or even offer a lower rate than the competitor as they do not want to lose your business.
5. You can also avoid making any purchases with your credit during peak buying season. As credit card companies charge you more interest during these peak seasons because they know that everyone is buying more items with their credit
6. You can have a direct debit set up. So that you have to pay back full amount each month.
credit:
- WORLD'S FIRST CREDIT CARD
- Diner's Club, Inc. (Early Credit Card Company) - New York1963
- The first credit card was issued in 1951
- Credit Card Debt Prevention
You may also want to have a look at this sites:
- Top 10: Best Credit Cards http://www.askmen.com/money/investing_200/225b_investing.html
Wednesday, June 25, 2008
Review:OpenTable.com - Online restaurant reservations
Read more ...
Have you ever made a reservation trough the net?? Well such e-commerce business model is not something new in the overseas but certainly an innovative idea to be implemented in Malaysia itself.
Imagine, you making a reservation in a single click within seconds? It just spells convenience isn’t it?, what else better than being F.O.C (Free of Charge). All you need to do is to click upon the restaurant ,fill in your particulars, number of seats ,time and date..Voila~..here’s you reservation sir/miss.
I've tried myself by just searching randomly with a keyword "Steaks", pops, here it goes, information on the restaurant just pop out within seconds.Easy,Fast and Useful.OpenTable.com is certainly a recommending site.Our neighbour, Singapore is now starting to implement such concept. If you have any chance to be in Singapore,try to make a reservation online.
Though in Malaysia we don’t own site with such services, we shouldn’t be ashamed of as we had site with similar characteristic, Foodvenue.com which provides food delivery trough the net, reviews on food from hawkers to high end restaurants in Malaysia and listing almost 3000 restaurant in their list. What the site is lacking of is online reservation like OpenTable. Haha, should I make a suggestion to Foodvenue, telling them to include such features? instead of just plainly listing the restaurant's name.
credit:
Friday, June 20, 2008
REVIEW:INTERNET SECURITY
I even realized how dangerous computer viruses can be and the problems encounter by computer users such as data lost, important information being deleted, computer system breakdown, and others. The most common attack for me would be virus which is defined as a computer program that can copy itself, change computer settings and slow computer down without the knowledge of the user. The most common way these viruses come into contact is through online whereby, the user who may surfing the internet for some information may be unaware of the risk contacting with virus. Virus can also be transferred through device such as thumbdrive or could be due to some incomplete coding. Over the years, many types of viruses have been discovered such as e-mail worm, file infecting virus, or macro virus.
In order to prevent virus attack, a user should install a reliable antivirus software that helps to eliminate, identify, or neutralize wide range of threats, including worms, phishing attacks, trojan horses and other malware. Installing a good antivirus is not sufficient, the virus definition should be updated regularly and it is advised to scan the computer at least 2 to 3 times per week before switching off the computer off. Furthermore, always remember to scan those portable drives before opening it eventhough you assume it is clean from those viruses.
Tuesday, June 17, 2008
Ways to Safeguard your personal and financial data
The followings are some ways to help internet user to protect their essential data.
1. Use and maintain anti-virus software, a firewall, and anti-spyware software regularly
It is strongly recommended to use anti-virus software and a firewall in your computer as it helps to protect you against viruses and Trojan horses that may steal the data on your computer and leave you vulnerable. Besides, whenever possible make sure you keep the virus definitions up to date. Use a legitimate anti-spyware program to scan your computer and remove any sypware or adware hidden in software programs as it may also gives attackers access to your data.Review 2008 top ten internet security software.
3. Evaluate your software's settings
The default settings of the majority software enable all available functionality. However, attackers may be able to take advantage of this functionality to access your computer. It is particularly crucial to check the settings for software that connects to the Internet such as browsers, email clients and so forth. Apply the highest level of security available that still gives you the functionality you need.
4. Develop a strong password
Through a strong password may add layers of protection from attackers. Avoid using readily available information, such as your mother's maiden name, your birthday.
5. Be cautious of emails requesting information
Never open an attachment or click on a link by an unknown party. Attachments can contain viruses and links can lead unsuspecting users to dummy sites where they are asked to input financial information or requesting you to confirm purchase or account information. Legitimate businesses will not request this type of information through email.
6. Dealing with reputable vendors
It is encouraged to interact with a reputable, established vendor before providing any personal or financial information as many attackers are trying to trick via creating malicious web sites that appear to be legitimate. Hence you should verify the legitimacy before supplying any information
7. Make certain that your information is being encrypted
Many sites use secure sockets layer (SSL) to encrypt information. Indications that your information will be encrypted include a URL that begins with "https:" instead of "http:" and a lock icon in the bottom right corner of the window.
- http://finance.yahoo.com/banking-budgeting/article/103893/Six-Ways-to-Safeguard-Your-Online-Assets
- http://www.marketwatch.com/news/story/six-ways-limit-your-risk/story.aspx?guid=%7BDD417708%2D0E40%2D465D%2D9720%2D4FB486EA87BD%7D&siteid=e2eyahoo
- http://en.wikipedia.org/wiki/Adware
- http://en.wikipedia.org/wiki/Spyware
The Threat of Online Security
How Safe
is Our Data??
Most of us know full well the degree to which our lives can be affected as a result of others getting their hands on our data. Financial fraud and identity theft have become commonplace these days, with fraudsters using increasingly sophisticated methods to try and get a hold of our details. In fact, fraudsters can use all sorts of documents or items that belong to us in order to commit a crime or steal an identity and information.
However, worryingly many of us fail to take precautions to minimize the chances of our data falling into the wrong hands. Although numerous measures have been taken to prevent data theft and misuse, our data online is still insecure, and we are still susceptible to viruses, worms, and Trojan Horses.
Our data still faces threats from:
Virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way computer works without the user’s knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software.
Worm is a program that copies itself repeatedly, for example in memory or on network, using up resources and possibly shutting down the computer or network. It exploits vulnerabilities in operating systems (
Trojan horses(named after a Greek myth) is a program that hides within or appear to be legitimate, but in fact contain malware such as keyloggers
and spyware
The countermeasures developed for detecting viruses can often detect other forms of malware as well.A nother effective, but easily overlooked, countermeasure is security awareness training. It is common knowledge now that you should not open an email attachment sent from someone you do not know. Less well known are tips such as avoiding sites that may harbor malware, such as peer-to-peer file sharing sites, and not downloading browser plug-ins that may be Trojan horses. Keeping users aware of the changing tricks and techniques used by malware developers and cyber-attackers is an effective complement to the technical countermeasures that are essential to preserving information assets.
Just for laughs.......
Credit:
- Information Security-en.wikipedia.org/wiki/Information_security
- Defining Malware-www.microsoft.com/technet/
security/alerts/info/malware.mspx - Malware: what it is and how to prevent it-arstechnica.com/articles/paedia/malware.ars
Monday, June 16, 2008
Phishing:Examples and its prevention methods
The average home computer user like us is always bamboozled by technology jargon which is used to warn people about the most serious security threats online. This is what we called 'Geek speak' confuses net users..Hehe.
So what is phishing all about?Well according to Wikipedia.org , "Phishing" in computing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. PayPal, eBay and online banks are common targets.In layman's terms,Phishing is basically describe as faked e-mail scams.
Wants to know more?There's couple of example of banks in Malaysia becoming the victims of Phishing.
RHB BANK
In the year of 2006, nonetheless,RHB Bank was once a target of phishing scam. Fake e-mails are widely sent to mislead customers.Example of email sent by unauthorized party.
Example :
Remark:Click to enlarge
CITIBANK
On 2 September 2004,a Citibank phishing email began making the rounds via email in Malaysia, warning Citibank customers of possible fraud affecting their accounts and urging them to login to check the status.
Example:
Remark :Click to enlarge
We always say prevention is better than cure, there's step for computer users like us to avoid being phished.
- Dont ever trust emails urgently requesting personal financial information.Phishers want you to react immediately and therefore include upsetting or exciting statements which trigger fear or happiness.They may falsely claim suspicious withdrawals from your banking account or present you as the winner of a lottery(so don't be silly,there's no free lunch in the world).
- Do not fill any forms in email messages that ask for personal financial information
Typicall phishing scams or hoaxes ask for information such as usernames, passwords, credit card numbers, social security numbers through an online form. - Be suspicious of email links.The link from the email is the key to successful phishing scamming which will send you to the phishers own internet site with an online registration of account information. If the link in question shows www.hacker.com it is likely to scare of most of its target audience. One way the scammers have to go about this is to buy a new domain with an apparent link similarity to the bank or e-commerce it’s trying to be portrayed. For example,www.citibnkupdates.com.
Just a couple a game i would like to share with you guys.
Lets see how you good are you in differentiating legitimate site or just another phishing scams
Remark:Click on the image to play
A video on Phishing
credit:
Saturday, June 14, 2008
The revenue model for Google, Amazon.com and eBay.
Commission that is received from the product's sale is known as transaction fees. Ebay adopt transaction revenue model as their primary income whereby the auctioneer is given a space to auction their items or products and will be charged an insertion fees. In other words, transaction fees will be received from those who are interested to post their product using the name of eBay. If the product is successfully sold, yet another commission will be received.
A subscription fee is a monthly or yearly fixed amount paid to get some services. It is designed to obtain up-front payments from customers that access to specific content or services. This subscription model attracts customers with services that enable them to maintain continuous contact with the company.
Advertising fees is derived from companies paying a fee to advertise their products on a portal
An affiliate fee is a commission earned for referring new customers to the buyer. 1% of Google’s revenue comes from affiliate fees which provide a link on their website that highlights web address or images of an another website. Google earns a referral fee if a customer clicks on the link and purchases goods at the transaction site, registers for the site, or some other services for which a commission is paid. Besides Google, Amazon.com also uses this revenue model with other websites to generate side income. Basically, Amazon.com will receive a certain amount of fee when a visitor of advertiser site purchases an item through a link on their website. Similarly, Ebay also generate its income through affiliate revenue model mainly from three sources of business which are auctions, payments (PayPal) and communications (Skype).
In conclusion, the revenue model adopted by Google, Amazon.com and eBay varies according to the nature of the business.
Sources:
http://www.organicspam.com/google_revenue_model.asp
http://www.ebstrategy.com/mobile/articles/port_rev_mod.htm
http://en.wikipedia.org/wiki/Ebay
http://en.wikipedia.org/wiki/Amazon.com
Friday, June 13, 2008
E-commerce success and its causes
In conclusion,VerticalResponse is success due to following reasons:
- Feature Set
Vertical response can ensures your emails are properly delivered whereby you can run a SPAM check and send a test email to yourself before you send it out to your customers. This program will also automatically add an unsubscribe link to the bottom of the email.
Ease of Use
Vertical Response has a user-friendly main control center where you can see all the options that are available to create your email campaign. There is a tab to manage your emails, reports, postcards and mailing lists. In addition, this program has a tour that will show you exactly how to use the program before you even start
Email Campaign Creation
Through Vertical Response you can create a plain text email message, use a pre-existing template or a freeform where you can upload your HTML page.
When you start creating your email campaign, the service directs
you to a page where the creation process is broken up into different steps. These steps make it easier to create your message and navigate the entire process.
Campaign Reporting
The reporting section is located on the homepage dashboard. The page includes all the campaigns you have sent. It will show you summary of how many emails were sent, opened, bounced, unsubscribed and display the number of times each link was clicked.
There is also a report based on the email domain. This shows how many of the emails have been sent, opened, clicked, bounced and unsubscribed by a specific domain name like Yahoo.com, MSN.com and others.
Help and Support
Vertical Response includes a searchable knowledgebase that frequently answered people questions. They also include email, phone and live chat support. The community and blog were interesting and good for some minor tips and tricks.
To know more on Verticalresponse and the advantages of verticalresponse you can click on the following links-
- http://www.franchiseadvantage.com/info/verticalresponse.ihtml
- http://www.verticalresponse.com/landing/email/wybg2/?FranchiseAdvantage_VR
Credit