CLICK HERE FOR THOUSANDS OF FREE BLOGGER TEMPLATES »

2008-06-29

Prevention of e-auction fraud

Nowadays, the increasing popularity of the Internet that is used for the purpose of commerce has caused an increase in Internet fraud. This has raised new and challenging legal issues about online auctions. The Internet has the capacity to reach a global audience, so the users may find it difficult to distinguish genuine source of information from fraudulent sources and result in e-auction fraud. This is often happen when the sellers conduct the auctions of goods through the online auction sites by using Internet and the buyers do not have the opportunity to examine the offered goods. Sometimes, the online auction seller may even list out the things that do not exist for sale. Thus, consumers must take note to prevent e-auction fraud when participating in an e-auction.

Firstly, the consumers can rely on the escrow agent to prevent the e-auction fraud. The escrow agents will hold their funds until the purchased item arrives, in the promised condition and eventually pay the funds to the sellers.

Secondly, the consumers should evaluate the existence and quality of the merchandise offered for sale as a condition on the auction site. The consumers should get the appraisal from a licensed expert to ascertain the validity when purchasing some items that are very valuable.

Thirdly, the consumers must be aware of the authentication of the identities of all sellers. They can request the identity validation to be done through any reputable credit agency.

Lastly, they can purchase the insurance that is provided by the online auction sites in a reasonable price to cover the full amount of their transactions. Hence, even if there is an e-auction fraud, the consumers can still being compensated by the online auction sites because the online auction sites are still quite reliable. The reason is that the online auction sites control the procedures that take place in their sites, so the online auction sites are in a good position to prevent fraud. In addition, the online auction sites have been superimposed to follow specific steps by a comprehensive regulatory scheme to prevent fraud. Thus, if the online auction sites fail to adequately comply with the regulations, they will face the financial liability.

A review on a post on e-tailing from my e-commerce blog




E-tailing is a term used in modern world, means that the selling of retail goods on the Internet. It is the short form of "electronic retailing," and is used in Internet discussions as early as 1995, the term seems an almost inevitable addition to e-mail, e-business, and e-commerce. E-tailing is synonymous with business-to-consumer (B2C) transaction.
E-tailing began to work for some major corporations and smaller entrepreneurs as early as 1997 when Dell Computer reported multimillion dollar orders taken at its Web site. The success of Amazon.com hastened the arrival of Barnes and Noble's e-tail site.
Nowadays, many industries have started their business online, which included service industry. Hotel and restaurant are the best example of the service industry which provides the e-tailing. The online booking had easier the customer to make reservation.
The introduction of e-tailing has improved the daily transaction of many business especially the banking industry. The transaction volume of the bank which provided online transactions have increased in double.
The frequent use of e-tailing has resulted in the development of e-tailware -- software tools for creating online catalogs and managing the business connected with doing e-tailing. A new trend is the price comparison site that can quickly compare prices from a number of different e-tailers and link you to them. To know more about the recent e-tailing issue, you can proceed to http://ecommerze.blogspot.com/search/label/e-Tailing

2008-06-27

The application of pre-paid cash card for consumers

Do you know, what are prepaid cards? I am sure that you all know about prepaid phone card and have heard it before. Pre-paid cash card for consumer is just a little bit similar to it. Prepaid card means that we need to pay money first and before using the card to buy the product or service. It includes:
1) Touch’n Go Card-Touch ‘n Go card is an electronic purse that can be used at all highways in Malaysia. The card looks similarly to a credit card. Users can continue to use the card as long as it is pre-loaded with electronic cash. Users can reload the card at toll plazas, train stations, Automated Teller Machines, Cash Deposit Machines, Petrol kiosks and at authorised third party outlets. Beside that,they also can pay it at these participating outlet such as 7-eleven,Burger King,Caltex,Dunkin Donuts and A&W……


2) Octopus-Octopus is an electronic payment system that uses a contactless smartcard. Octopus is a trademark of Octopus Cards Limited.In the beginning, they aimed to develop a simple way to pay fares on public transport in Hong Kong.Then they extended their reach into simple micropayments for purchases in retail outlets and a simple way for cardholders to gain access to buildings and schools and to identify themselves.


Nowadays,pre-paid credit card, which is a pre-paid reloadable card that can be used everywhere. Visa or MasterCard is accepted at stores, gas stations, restaurants, theaters, in the mall and even online. It can also be used to get cash from ATMs. The card is so great and useful for everyday purchases, special occasions, and emergency back up. Below that is its benefit for us:


Spending independence - You can use prepaid credit cards just like regular credit cards. Just find what you need, hand your card to the clerk, sign your name on the receipt, get a copy of the receipt and your card back, and you're done.


Convenience - Prepaid credit cards can be used everywhere. Visa or MasterCard is accepted-at stores, gas stations, restaurants, theaters, in the mall and online.


Budgeting - You figure out in advance how you'll spend it: spending can be controlled by how much money is loaded. In addition, prepaid credit cards provide a simpler way to keep track of money vs. carrying cash.


Safer than cash - Unlike losing that twenty-dollar bill, with prepaid credit cards you're protected from unauthorized transactions if the card is lost or stolen. Cards can be replaced if lost or stolen.


Teaching tool - Prepaid credit cards help you or your teens to learn financial responsibility and good money management skills. Prepaid credit cards are a hands-on tool that teach teens about finances in a controlled environment. You can monitor the balance and where the card is used either by going to your password-protected website and reviewing the transaction history and online statement in detail or by telephone.


Security: If you are still uncomfortable giving the numbers of the card on the internet, the prepaid card is the answer. Since the card can be charged only up to the value of the pre-loaded fund, the thieves can not make an excessive charge using your card.


Gift giving - Parent-approved gift givers can also fund the card for generalpurpose spending or with virtual gift certificates for merchant-specific spending.
You also can visit
http://www.fcac-acfc.gc.ca/eng/publications/Prepaid/PDFs/Prepaid-e.pdf to get more detail information.

2008-06-26

Electronic Currency


Pay pal is an e-commerce business allowing payments and money transfers to be made through the internet. It is also an European bank based in Luxembourg. It is also known as a form of electronic currency.Pay pal performs payment processing for online vendors, auction sites, and other corporate users for which it charges a fee. Pay pal is a wholly subsidiary of ebay. Ebay watched the rise in volume of online payments and realized its fit with online auctions.

Currently, pay pal operates in 190 markets, an manages over 164 million accounts. Pay pal allows customers to send, receive, and hold funds in 19 currencies worldwide. The domain of paypal.com attracted at least 260 million visitors anually. Pay pal or other methods of electronic currency works by selecting paypal when checking out at online stores worldwide. Paypal will pay directly from the account balance or linked bank account or even charge it to your credit card. This ensures security, recipient gets the money without seeing sensitive financial details
like your credit card or bank account numbers. Users may also keep track of every transactions on pay pal.

Pay pal is accepted at most of the world's top online stores. One can now check now any websites with confidence without exposing financial details. Pay pal has even protection against unauthorized payments. With this post i also include a link of a video on how to use pay pal which may prove to be helpful for those who plans to do any online shopping

2008-06-22

credit card debts: causes and prevention


Do all of you know what is credit card? Now, let me share somethings about credit card to all of you. Credit card is very useful when the users need to settle some payment in emergencies or travel abroad. However, if the users use up their credit limits and max out their credit cards, they have to face the credit card debts. As s result, the users may have to find several ways to settle the debts and end up with tension, frustration and unhappy life.

Causes
Credit card debts can be caused by the users’ poor money management. Without a monthly spending plan, the users may spend most of their money on unnecessarily things. Finally, the users may also have doubt on where their money has gone. Besides, credit card debts also resulted when there is no money communication skill in the family. When the family members do not honest about what each other spend, the credit card holder may finally get shock with thousands of dollars in credit card debts. In addition, when the users hold too many credit cards at a same time, they will cause the credit card debts. The users may loss their self control and discipline to keep these cards in their wallet and not to over spend on them. Moreover, the more the credit cards, the higher the risk that the credit cards will be stolen. Thus, the users’ credit card may be stolen without their notice. Finally, this will result in large amount of credit card debts when they received the bank statement as their money has been spent by the thieves.

Prevention
Inability to control the credit card debts can destroy the users’ credit rating and even lead to bankruptcy. Hence, the users must practice direct debit so that they are able to pay back the debts each month as prevention is better than cure. The users must also check their credit card debt information regularly to make sure the records are correct and request for the sudden increase in their credit card interest rates. Furthermore, the users with many credit cards on hand should cut up their cards so that they are not tempted to use them and just save one cards for emergency purpose. The users are also advised to pay double the minimum payment if they can afford it. The minimum payment is usually just enough to cover the interest and some of the credit card debts. So, paying double can help the users to settle their balance of the credit card debts more quickly.

2008-06-21

Internet Security

Recently I have experienced something from the review on a post on Internet Security from My E-Commerce blog, http://ecommerze.blogspot.com/search/label/Internet%20Security . In this blog entry, I am going to share with you guys on what I have experienced.

In the rapid growth of internet service today, the internets have become an indispensable tool for major humanity over the world. Highly demand and highly dependent on the internet service lead the world to walk into a cyber virtual world. Interaction among people no longer takes time from travelling 1 place to another but all happen instantaneously by online tools like skype, MSN messenger, e-mail, or video conferencing.

The convenient of the internet also lead to unexpected risk exposure, such as: virus, malware, adware, spamming, cracking and many else. While a person is likely to depend on internet in his life, many of his information will expose to internet like personal id and bank account. If the internet is being hacked or threat by malware, all the information of the person will lose and the most important is the information of he or she may be abused by the hacker or cracker.

For the internet, it is never have a well secured of protecting code. The code is created by humanity intelligence and programming skill, the other person who has the same programming skill and the intelligence may crack the codes too. Thus, for every of the internet users today, please be aware of the internet security, do not simply put any privacy information into the internet, it is not always safe. This are the advice from me, always make a backup of your information whichever in digital form into hard copy.

How to safeguard our personal and financial data ?


Every item that we purchased, every password that we typed, every online bill and even every website we have ever visited are permanently stored on hidden files in our computer which can easily be recovered by hackers and ID thieves with easy to get software found on the internet. Identity thieves are smart, they will steal your personal information and your identity and it is easier than stealing our wallet. Although some hackers get their thrills from breaking into and vadalising our property but most hackers are thieves.


In order to safeguard our information we should:
1. block hackers from gaining access to our computer
2. make our computer invisible to everyone on the internet
3. automatically stop pop-up ads
4. protect data by using backups
5. protect from identity theft and online profiling
6. eliminate spam and prevent spyware sending personal information across the internet.


For those who will be lost without computers or even access to the internet, we should really take this into consideration. Quite simply, the internet has become a way of life for many of us. We use it daily for e-mail, shopping, banking, working, chatting or even surfing. Over the past years, the itnernet has become a virtual breeding ground for hackers, viruses, SPAM, spyware, pop-ups and identity thieves. One of the solution is to have a good password on your email. Any activities done through the internet there is always a risk invovled. Here are some of the risk that is extremely dangerous:

1. the safety of your family
2. safety of your investments.
3. the cash in your bank accounts
4. sensitive health information.
5 credit card numbers
6. ATM pins
7. personal information.


There are always ways to battle this hackers from getting our information. There are several methods that may be used:

1. ANTI VIRUS PROTECTION
arm ourself with most powerful tool-knowledge and build a barrier to protect ourself from viruses that can destroy our personal information and keep ourself safe from passing those viruses on to others.

2. ANTI-SPYWARE PROTECTION
Keep hackers from using their technical spyware to locate our personal information. DOn't let them follow us around to our favourite websites. This makes sure that no one is detecting your every key stroke.

3.CHILD PROTECTION
If there is a child that uses our computer, this function will protect htem from accidentally clicking pop-ups and accepting e-mails that may potentially be an identity theft nightmare.

4. HACKER-PROOFING
lock down our virtual internet files, passwords and bank information from hackers. This function or software makes our information virtually invisible on the itnernet.

5.FILE PROTECTION.
We must set our important folders safeguarded with passwords such as passwords, credit car information, purchased items on store websites.




















2008-06-19

Threat of online security: How safe is our data?

Nowadays, computer is the basis equipment at home and office in this world. People use the computer online to do their business or communicate with their customer. Unfortunately, the threat of online security always happen to us. Computer virus is a common threat on computer.

Do u know what is computer virus? Let me explain to you, a computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occur in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Meanwhile viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without the need to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to a computer system's hosted data, functional performance, or networking throughput, when executed. In general, a worm does not actually harm either the system's hardware or software, while at least in theory; a Trojan's payload may be capable of almost any type of harm if executed. Some can't be seen when the program is not running, but as soon as the infected code is run, the Trojan horse kicks in. That is why it is so hard for people to find viruses and other malware themselves.

It is very important for you to protect your data, what can you do? Well, you can do the following:
1) Protect your personal information. It is valuable.
2) Know who you are dealing with online.
3) Use anti-virus software, a fire-wall, and anti-spy ware software to help keep your data.
4) Be sure to set up your operating system and web browser software property and update them regularly.
5) Use strong passwords or strong authentication technology to help you to protect your personal information.
6) Back up important files.
7) Lean what to do if something goes wrong.
8) Protect your children online.
Please remember these; they can help you to protect your computer data.

Phshing: Examples and its prevention methods

Phishing
Phishing is a form of identity theft that uses the Internet to fraudulently acquire sensitive information such as usernames, passwords, credit card details and bank account numbers from business and individuals. It is the act of sending the user an email and directing the user to enter personal details at a very real looking website. The purpose is to steal the user’s information.

Examples.

Example 1

"Update Your Account"a simple eBay phishing attempt:


As the website is made similar to a legitimate organizations site, the people are easily being tricked into thinking that they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information.

Example 2



The technique of URL spoofing was used in this example. The users will be tricked into thinking that they are on a legitimate website as a malformed URL will not be displayed properly be certain web browsers.



Prevention methods
Using TippingPoint’s Phising Protection can prevent Phishing. It is able detect and prevent phishing attempts by analyzing the content of both the web site and e-mail and look for defining phishing characteristics, certain vulnerabilities and behaviors. It is done by a combination of vulnerability filters, signatures and behavior-based protection techniques. With phishing protection, the TippingPoint IPS identifies phishing e-mail scams to protect the individuals and businesses from financial losses and unauthorized phishing operations within their web servers.


Phishing can also be prevented with the installation of Cyberoam. It can help to prevent phishing by blocking site access and spam entry. The filtering and firewall of Cyberoam prevent inbound and outbound traffic to sites and others that are spyware carriers, which can be a forerunner to phishing attacks. Besides, most of the phishing mail by spam filtering will be stopped before it reaches the users with the help of Cyberoam’s pre-integrated Anti-Spam as it will analyze the mail content and delete phishing mails.


Besides, Firefox can be installed to protect the user’s websites from being phishing. Firefox will check the sites that the users browse against a list of known phishing sites for more up-to-date protection as phishing attacks occur very quickly. The Firefox’s security settings can configure the phishing protections settings and enhance the capability.


In addition, enterprise must also educate their employees of phishing threats to prevent them from creating a backdoor entry for the phishing into the network as spyware and phishing attacks can be entered though other means rather than the Internet.

2008-06-12

History and evolution of e-commerce

E-commerce
E-commerce is all about buying and selling goods and services online by businesses and consumers, but it is also used to transfer and share information within organizations through Intranets to improve decision-making and abolish duplication of effort. It included three categories:
B2B - Business to Business (Intel)
B2C – Business to Consumer ( Priceline )
C2C – Consumer to Consumer ( E-bay )

History of E-commerce
E-commerce was founded late in the 1970’s. It existed when all the data transfer related to commerce done electronically. E-commerce represents a revolution for the online industry. E-commerce has revolutionized further and has been converted into eBusiness with the optimum usage of resources such as the Internet. E-business is now defined as the fastest growing industry in this modern era of computers and finance.

Evolution of E-commerce

  • The Electronic Data Interchange (EDI) was developed in 1960’s for the companies to exchange business information and do electronic transactions. In 1984, EDI was standardized through ASC X12 to guarantee that the companies to carry out their dealings related to international trade, import or export and global sourcing in a much more reliable manner.
  • Mosaic web-browser, which was the first ‘point and click’ browser, was made available in 1992. The browser was adapted into a downloadable browser, Netscape to enable easier assess to electronic commerce. The Netscape also provides the users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer. So, the first record of a company letting people to buy things from the computer is presented in 1992.
  • In 1995, the two biggest names in e-commerce are launched, Amazon.com and eBay.com. These two companies have certainly contributed in their own ways to international trade, import or export and global sourcing.
  • In 1998, the people can access the Internet with a persistent connection due to the development of DSL. This prompts people to spend more time, and money, online.
  • The merger between AOL and Time Warner was a major push for electronic commerce to bring together a major online company with a traditional company. The development of electronic commerce is required for further security improvement as some major players of e-commerce were being hacked.
  • Today the largest electronic commerce is Business-to-Business (B2B) which means businesses sell their goods to other businesses. In 2001, this form of e-commerce had around $700 billion in transaction.

How e-commerce can reduce cycle time, improve employees' empowerment and facilitate customer support

Is me again, thanks for viewing my blog. In this blog entry, I am going to share with you guys some information about e-commerce. As public knowledge, e-commerce has a lot of advantages to business and employment nowadays. Any organization which can master their e-commerce and fully utilize the function of it will automatically create a competitive advantage over its competitor.

Many people know that e-commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support. However, did you guys know that how is it function in order to achieve those advantages?

By using e-commerce, an organization may reduce its cycle time to a very short period. How does it work? In traditional transaction, an organization may need to take time in travelling from a place to others in order to purchase or make an order. Besides travelling time, purchasing process also takes a lot of time to be completed. The user of e-commerce is more convenient than traditional trading; they can make an order in any time and any way. The ordering and purchasing process will automatically generated by the system in a few seconds. Thus, this will reduce the cycle time of an organization.

When an organization adopts e-commerce, their employees will become more empowered. To handle a rapid growth transaction from time to time and worldwide, traditional way to conduct such transaction is a bit difficult to do it well. The employees in such organization which adopt the e-commerce, will be given some power to manage those transactions without the supervised of high level manager. In other word, the empowerment of employees has been improved by this way.

A customer support is a very important function of an organization. With e-commerce, customer support may be facilitated through online. Customer can access to an organization to check what is the variable solution or alternative in making order or when facing any problem. By using the FAQ provided by the customer support, organization personnel will not receive the same problem facing by customer frequently. Customer will solve their problem through the alternative provided. So, it will result in facilitating customer support.

Lastly, I need to clarify that the above essay is just my personal opinion. I did not refer to any website or book. Anything which is incorrect, please give me some comment. Thanks!

An example of an E-Commerce failure and its causes


Webvan was an online grocery business that went bankrupt in 2001. It delivered products to customer's homes within a 30-minute window of their choosing. At its peak it offered service in ten diffirent cities in the U.S. Experts hailed that Webvan was one of the greatest dotcom disasters in history.

While Webvan was popular, the money spent on infrastructure far exceeded sales growth, and the company eventually ran out of money. As part of its shutdown process, all non perishable food was donated to local food banks. Webvan's legacy consist thousands of coloured platic shipping bins for groceries that are still siting in customer's basements and closets.

The online grocery market sector has seen many other failures, including Publix Direct. However there have been a few successes. Analysts blamed the failure of Webvan is caused by a serious error of judgment on the fact that none of Webvan's senior executives had any management experience in supermarket industry. Another factor that contributes the disaster is the Webvan policy of trying to embrace a total customer satisfaction model involving 30 minute window delivery without considering that many working customers would like their groceries delivered at home at night.

Example of e- commerce success




E-commerce is a type of business model or segment of a larger business model, that enables a firm or individual to conduct business over an electronic network, typically the internet We know that eBay is one of the example successful in e-commerce area. eBay is the world online marketplace, a website where anyone can be a buyer or a seller with just a few clicks away. eBay started by Pierre Omidyar in 1995, it include items like antiques,art,book,cars,coin or paper money,CDs,clothing,and so on. What the reason make the eBay success? eBay is offering their users an opportunity to come together in one Internet site and be able to buy and trade a wide range of items, including fine collectibles. It allows people to pursue their interests and their passions in the areas of their hobbies and their collectibles. Besides that ,it also become a very practical place to buy and sell collectibles or commodities. Another factor is that people really enjoy the experience of the shopping bazaar. They enjoy the hunt. They enjoy looking around for merchandise. The other component, they really enjoy the competition of the bidding process. Everybody likes to get a bargain, and everybody in some way, shape, or form, likes to haggle a little bit over the price. The last point, eBay can reach globally to hundred thousand of people enabling them to make a business of their own. eBay who gains access to a global market place can reach to more potential buyers then locally and with profits keep pouring in, eBay’s continuous success will definitely not cease yet.All factors let the eBay continuously grow and achieve successful.

2008-06-07

About me

My name is Foo Hee Yoong. I am from Klang. During my free times I normally hang out with my friends or take up any sport activities such as futsal, swimming and basketball. Going online is also one of my hobbies. By surfing the internet, we can know many of the worlds current issue’s and increases our general knowledge.

Among the websites I visit the most is http://www.soccernet.com/. This websites posts all the latest news in the football arena as the latest scores, latest news and even pictures of all the football teams available. Next is http://www.thestar.com.my/. By visiting this website I will be able to know the latest issue that is happening in our country or even outside Malaysia. This will be more cost effective for a student than purchasing the newspaper everyday. 3rd is http://www.facebook.com/. This is a social networking websites; I use this website to keep in touch with friends that are far away especially overseas, where there are many activities that could be done or even share pictures or events. http://www.youtube.com/ is an interactive websites with lots of videos shared by users from all over the world. During my free time I would go into the websites and randomly watch videos posted by anyone. Lastly one of the website that I visited the most is http://www.lowyat.net/ this is where I keep myself updated with the latest gadget and information of the latest in trends of the IT world.

There are a lot of activities that could be done through the internet. The most used activities should be the instant messaging programs. I used it to communicate with friends and even family’s this helps to save costs as the cost to make and oversea call is expensive. Next is through the internet I am being able to watch the latest series or anime from oversea. Another activity that is very frequent is gaming. Through the internet, I can play games with my friends anywhere in the world. This keeps us in touch and is a form of leisure too. The last internet activity that is useful is emails. This is a cheaper and convenient form of communicating formally or even spreading latest news such as forwarding mails.

2008-06-05

About Goh Li Chen


Hello, everybody!! Welcome to watch my blog…nice to meet all of you.

Let me introduce myself, my name is Goh Li Chen, I am 21 years old. I own a short hair like the boy although I am a girl. In my family I have one younger brother and one younger sister, I am the eldest sister, so I should help them when they face problems. My parent dote me very much,so I love my family. Thank god to make me live in this world.

I'm a person who likes to smile. It is because I like to make the people around me happy. When I smile to them, they also smile to me, too. Thus, smiling is a free tool to make me happy the whole day.

My hobby is cooking. I like to cook for my family and friends. I feel very happy and satisfied when they say that my food is very delicious and tasty. Recently, I was thinking of baking cakes. However, there is no time for it now. Well, I will try my best to use the time wisely so that I can spare some time to learn to bake cakes.

These are the 5 websites that I always visit. I can make a lot of friends from other countries such as Thailand, Singapore through http://www.friendster.com/. The website of www.hotmail.com gives me the opportunity to check my mail and and share some articles which I like to my friend. Besides that, I always visit http://www.sinchew.com/
to increase my knowledge and I can know what is happening in this world through this website. When I want to search for some of the informations, I will visit www.google.com. It is very useful as I can get the information I want easily and quickly. Lastly, I can go to http://www.xunlei.com/ to watch movies for entertainment.

About me~Jaclyn


Hello~ Welcome to my blog!
I’m jaclyn from Melaka. Have you guys gone to Melaka before? It’s actually a nice place as there are many delicious food to eat (satay celup,chicken rice ball,cendol and etc) and many famous historical sites to visit. Haha, is it attracting? Welcome to my hometown!
Well,I'm the eldest in my family. I only have one cute sister. My parents love us very much. Since we are small, my parents will always pay more attention to our needs. They sent us to piano, drawing and swimming class. I'm an active girl when i was small, so my mother always get me involved in many activities like singing, dancing, drawing competition and etc. In every competition i take part, i used to get prizes. Because of my mother encouragement that makes me a very independent person, so i love my mother very much.

My hobbies are listening to music especially Japanese song from Ayumi, Utada and YUI, reading magazines and novels, watching horror movies and swimming. I also like travelling as i like to explore new things and I have been to Bangkok, Singapore and Phuket. Besides, I also surf the internet very often. There are 5 tops websites that I visited the most. Firstly, I usually visit http://www.yahoo.com/. to check mails from friends that have gone oversea for studies. With this website, I can stay contact with them as well as maintain our friendship. Secondly, I also often visit http://www.sinchew.com.my/ to read newspaper online as I feel that it is more convenient. With this websites, I can know everything that is happened in the world without travelling to every place. Thirdly, I often read novels online in http://www.free-online-novels.com/ as my hobbies are reading. There are many famous novels can be found in this websites. Fourthly, I also visit http://www.baidu.com/ to download some music as I like to listen to music very much. I can easily find the music that I want in the website. Lastly, http://www.spaces.msn.com/ is one of the websites that I visited the most. Through this website, I can view the blogs of my friends and comment about them. I can know how their living life is and I also can share my happiness with them. That’s all about me.

In the upcoming entries, we would like to share some new information or knowledge about e-commerce with you guys. Hope all of you will learn something in our blog and enjoy viewing it.

2008-06-04

jl@n on the spot


Hi everyone, welcome to my blog. I am the person who is not wonted in write blog especially write on internet. This is the 1st times I create a blog entry on an officially website and 1st times on English version.

Firstly, I make a simple introduction about myself. My name is Tey Wei Jian, 21 years old, from Muar. Is it a very simple introduction? Haha! That is me, simple and ordinary. My hobbies are listen music, watch movie, play computer games, and visit website. That is all about me, quite boring.

In this first blog entry, I have something to share with you guys. It is about the website which I always visited. I think that the websites are quite nice and hopefully they will help you up in many ways. The 1st website which I want to introduce is http://www.ukoo.net/ . As a music passion person, this website may help you in recognize some latest music. The website provides the criticism about the album and you can download the album of some singer through this website.
The following website which I want to share with you all is http://www.google.com/ . I am very sure that all of you know about this website. It is the global largest search engine, very useful, convenient, and user friendly website. You can simply search anything that you want through this website. The third website which I want to bring to you guys is http://www.youtube.com/ . I think most of you are already familiar with this website. It is a website which is the subsidiary of the http://www.google.com/ . The function of the website is just like the Google, but it is used to search video. Now, there are some of the universities using this website to provide education to the public.

The next website which I always visit is http://www.xunlei.com/ . This website provides a lot of current issue and news from worldwide. This website help me to search some song or video and download from it. This website is better than http://www.baidu.com/ because it can find more things that cannot be found by http://www.baidu.com/ . I highly recommend this website to you all if you want to download some things which are not so famous. Lastly, I want to share a website which is providing online comic for the public, www.fzdm.com/manhua . For the comic fans, you will surely love this website, because there is a lot of famous comic post on here and it is completely free to view.

I think i should stop here, the words of this blog already fulfill the the minimum words per post. Give some comment about what you think about my blog. I will appreciate your opinion.