One of Malaysia’s E-commerce sites that I found is http://www.bpfair.com/. This is a site which I fascinated on it. Some reviews been done for your reading.

E-catalogue – A list panel of various categories of items will found in left side. They are arranged according to different categories.

Search Engine – You know exactly what you item but lazy find through e-catalogue? Search engine can ease you burden. Just type in the item name, and result will come out in few seconds. Result can too be shown either in tiles, thumbnail, or list, according to your preference.

Top Sales – In the right side, there is a column for displaying the rank for top sales items. If you wish to be one of the fashions, you may refer to the top sales rank there.

Description – After clicking the item you like, you will able to see the details, description, and price of that particular item. You can also read the comment given by user or seller before buying it.

Bonus – Every item will have its own reward point. The more you purchase, the more points you collect. Points can be used to enjoy a discount up to 10%. (Click here)


Shopping Cart – For the items you like, you may just add them to the shopping cart. After done, all you need is just a click, and then all the transactions will complete at once.

Payment – User can do the payment through CIMB Bank, Maybank2u, Public Bank, or RHB Bank. These banks are the popular bank that most Malaysian familiar with.


Forum – This is a place where user or customer can leave down their message or question, and they will get reply as soon as possible.



Customer Service – Two floating windows will appear in left side when you scrolling down. For online service, you may access to it during working hours, through calling, MSN, or Skype. After working hours, you may access offline service by leaving message or call for it.


P.S: Logo and pictures being protected. For more details, please make yourself available at http://www.bpfair.com/

After discuss few topics with all of you, today I will like to share with all of you, what is corporate blogging. Corporate blogging is published and used by an organization to reach its organizational goals. It is used by a company to produce and support a blog to achieve business objectives and to be known with their services. Although there is few types of corporate blogging, but typically it is can be categorized as either external or internal blogs.


http://en.wikipedia.org/wiki/Corporate_blog
http://www.idynn.com/archives/05/corporate-blogging-secrets-revealed/
(paragraph 5)

1) Internal Blogs
~ Is a blog that can be view by every employee and is generally accessed through corporate intranet.
~ It encourage
- employees participation
- free discussion of issue
- collective intelligence
- direct communication between various layers of organization

- a sense of community

Further explanation:
http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html (Internal Communication)
http://en.wikipedia.org/wiki/Corporate_blog
(Internal blogs)

2) External Blogs
- Is blog that is publicly available for company employees, teams, or spokespersons share their views.
- Also can be treated as public communication blog which it is used to communicate to prospects, clients, employees and the media. Press releases and project updates can be posted, as well as job opportunities or information that the company wants to distribute outside of the normal news channels.

To read more detail about external blogs, you can click the link below:
http://en.wikipedia.org/wiki/Corporate_blog
(External blogs)
http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html
(Public Communication)

Typically there is some famous type of corporate blogs, which is:
1) Company Blog
2) CEO Blog

3) Industry Blog

4) Department or Product Blog

5) Customer Service Blog


For further explanation and also example for above those famous types of corporate blog, you can access to this link for some further reading:

http://mariosundar.wordpress.com/2008/05/19/the-5-types-of-corporate-blogs-with-examples/
(The 5 Types Of Corporate Blog – with example)

Why we have corporate blogging?????
1. Become the Expert
2. Customer Relationships
3. Media Relations

4. Internal Collaboration
5. Knowledge Management
6. Recruitment
7. Test Ideas or Products

8. Rank High in Search Engines


Explanation of about can be access through this link
http://www.corporateblogging.info/basics/why/
(Why blog for business)

There is some practices need to be account to make the corporate blog is being useful and benefits, which is:
- Fine print
- Know what you are doing
- Create blogging policies
- Avoid the marketing blog

- Keep it fresh

- Reinforce the company core value
- Encourage employees to use it


Explanation of the practices above can be found in:
http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html
(Secrets of Corporate Blogging)

Top 15 sites of corporate blogging (Sept 2008)
1. Google
2. Adobe

3. Yahoo! Search
4. Facebook

5. Dell

6. Yahoo!

7. Linkedln

8. Southwest Airlines

9. General Motors (wound up)
10. Flickr
11. Mint

12. Marriott

13. Lenovo
14. Kodak

15. Delta









Link:
http://mariosundar.wordpress.com/2008/09/09/top-15-corporate-blogs-technorati-rankings-sep-08/


Hi everyone, today I will share with you all the information about the implementation of E-Government (E-Government) in Malaysia. E-Government refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, business and other arms of government. It initiative was launched to lead the country into the Information Age.



The 7 pilot projects of the Electronic Government Flagship Application are as follows:
1. Project Monitoring System (SPP II)
2. Human Resource Management Information System (HRMIS)
3. Generic Office Environment (GOE)
4. Electronic Procurement (EP)
5. Electronic Services (E-Services)
6. Electronic Labour Exchange (ELX)
7. E-Syariah


The primary delivery models of E-Government can be divided into:
~Government-to-Citizen (G2C)
~Government-to-Business (G2B)
~Government-to-Government(G2G)

Government-to-Citizen
Electronic Services (E-Services)
With E-Services, citizens can conduct transactions with government agencies, such as Road Transport Department (RTD) and private utility companies such as Tenaga Nasional Berhad (TNB) and Telekom Malaysia Berhad (TMB) through various convenient channels (eg: eServices kiosks and Internet) .

Electronic Labour Exchange (ELX)
ELX is one stop-centre for labor market information that supervises by the Ministry of Human Resource (MOHR) to enable employers and job seekers to communicate on the same platform.

E-Syariah
E-Syariah is a case management system that integrated processes related to management of the cases to the Syariah Courts. It eventually improve the quality of service in Syariah Courts as the Syariah judges are able to get access to past cases and obtain the information they need for particular case quicker that before.


Government-to-Business
Electronic Procurement (EP)
EP system enables suppliers to sell goods and services to Government through the Internet. It would cover central contracts, tender and direct purchase.

Government-to-Government
Human Resource Management Information System (HRMIS)
HRMIS provides single interface for government employees to perform human resource functions effectively and efficiently. It helps to standardize all human resource processes for federal, state, statutory body and local authority services.

Generic Office Environment (GOE)
GOE is a powerful document and office management solution that enables users to effectively and efficiently manage their office environment. It facilitates efficient communication, allows collaboration across all workers and ensuring right information reach to right people in a timely manner.

Project Monitoring System (SPP II)
SPP II is an online system that designs to monitors the entire lifecycle of national programs. It also provides a platform for exchanging ideas and demonstrating best practices models in information management and communication services.

You can click to http://www.mait.com/admin/enews_images/MAIT%20Country%20Intelligence%20eNews96_37.pdf and http://www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf for detail information about these 7 pilot projects.

Citizen’s Adoption Strategies
In order to attract and encourage citizens to using the E-Government System, few strategies can be carrying out by Government:

o Enhance the security of those E-Government systems to built citizens’ confidence
o Enactment of relevant rules, regulations and policies to govern the implementation of E-Government systems to safeguard, secure and protect the privacy of users
o Organize activities such as advertisement and campaign to educate public about E-Government systems and the benefits that can gain from it
o Simplify the procedures that need to follow by the users in using E-Government systems to increase users’ satisfaction
o Provides E-Government websites with multiple language
o Provides Internet access points and officers to assist the illiterates to benefits from E-Government services
o Fulfill the needs of citizens by understand what are the other services and benefits that they want gain from E-Government system





E-learning is a type of learning that used technology(software, application, computer) to support the learning process. The delivery mode of e-learning will be lack of face to face interaction due to the use of computer in conducting the learning. It usually will use by universities as a tool to offer their courses to student or it also used by an organization to provide training to their staff.





Nowadays, Universities in Malaysia become more attentive to this type of learning. In the old days, television, transperancy and projector is used as a teaching material. However, with the introduction of the excellent software and hardware, e-learning has been gradually accepted by the public and become a convenient tool in pursuing their studies.



Many universities in Malaysia start to offer this type of learning method as they not only can take in more student either locally or internationally but also have income to maintain their position in this competitve world. This usually will happen in the private universities as they do not need a huge campus to allocate their students. Due to the competition, more and more universities nowadays are providing e-learning in conducting their course.



Ther are several advantage of e-learning which are:


a) Foster the interaction among students and lecturers, normally a lecturer cannot pay attention to everyone of the student in a lecture class as it was too big and due to time constraint. Besides, some students may also shame to post question when they do not understand the lecture.Thus, by using e-learning, lecturer can deal with that student individually and students will also be more comfortable in asking question.


b)Self-paced learning, This mean that students actually can learn at the rate they prefer. In the case where a students is a slow learner, they can absorb the knowledge slowly whereas if this happen in traditional teaching method, the teaching pace would not be change just because you are a slow learner.

c)Reduce costs and time, Students can learn from anywhere without travelling to the universities as they can conducting the lesson from their home. This can save the travelling costs and time especially for the student who do not has enough budjet to further their studies in overseas.





d)Gain diversify knowledge, By using e-learning, we are able to learn different knowledge from different country. Thus, this can inspire the students to came out with creative or innovative ideas which it may be useful when they work for their organizations.




On the other hand, e-learning also has it disadvantage which are:

a) Reduce social and cultural interaction, The impersonality of e-learning will let the students feel they are being isolated because lack of face to face communication. Instruction will not always help the students to solve the problem they face during the studies, but somestimes they also needs realistic assistance from the lecturer which they can feel they are being attach by the lecturer.



b)Low motivation, Student must be highly motivated and responsible in doing their work since this is a self-paced learning. In such case, those student with low motivation will not be able to catch up the lesson and fall behind.

c)Access, since e-learning need an internet access, students sometime will feel frustated when the internet connection is slow or having a problem in accessing to a particular websites. Besides, they may facing a problem to deal with the complex learning application and difficulty in manage the computer files.



d) Practicability, Because the lesson is learn through internet, so it is impossible to conduct practical work such as experiments through internet. Sometimes, students may feel boring and do not have a better understanding of the subject they learn.



Again...everything in this world has two aspect!!Although the conduct of e-learning in universities seem like constituting benefit to the students but in my opinion, it also act as a tool to increase their income in this competitive world where many universities are starting using e-learning in conducting the courses. If any of them fall behind, they may not be able to sustain but being kick off from this realistic world. So, is it e-learning brings more benefit to the students or the universities? Let you be the one who determining it.




Reference:




Mobile payment (m-payment) systems have been developed in recent years to facilitate purchases of products, services and content in mobile and electronic commerce and also at physical points of sale. It is a point-of-sale payment made through a mobile device, such as cellular telephone, smartphone or personal digital assistant (PDA). Instead of paying cash, cheque or credit cards, a consumer can use m-payment to pay for a wide range of services and digital or hard goods.

Examples of M-payment systems that available in Malaysia and its potentials are:

Mobile Money
Hong Leong Bank has teamed up with a Malaysian company, Mobile Money International Sdn Bhd to bring its customers this innovative payment system. It unlocks the power of the mobile phone to make payments and allows card members to pay for goods and services using a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS. This unique method of payment is called as “Mobile Money”. It is secure as the mobile phone is linked to the Hong Leong Mobile Credit Card account and the security PIN is set by the customer which used for approval of each payment. Its convenient will encourage more consumers to shop online which will definitely be a great boon to the e-commerce industry in Malaysia. For details, please refer to http://www.hlb.com.my/news/2005/corn148.jsp?flag=102005 and http://www.neowave.com.my/mobilemoney_overview.asp


TeleMoney
TeleMoney is Malaysia’s first mobile payment service via multi-channel access for Internet and wireless transactions that launched in November 2001. Through TeleMoney, Malaysians can enjoy a secure and convenient method to conduct mobile commerce using a GSM cellular phone. It is a service free of banks and telco dependence. A consumer with a credit card or debit card with a cellular phone can register for this service. To register, a consumer only need to have a GSM phone and a TeleMoney personal identification number that connecting it to a credit card, debit card, stored valued card, bank account or even the phone account.

Maxis FastTap
Malaysian mobile operator Maxis launched the world’s first contacless mobile payment system based on NFC (Near Field Communications) technology on April 2009. This m-payment system is called as Maxis FastTap. It is an integrated mobile payment service established under a partnership with Nokia, Visa, Maybank and Touch ‘n Go and available only on the Nokia 6212 classic device. NFC is a short-range wireless technology that allows communications between devices at close range. It offers high levels of interoperability between devices and readers and global standard for contactless mobile payments with a wide range of features that allows credit card, debit card, ticketing and transportation payments to be integrated into a mobile phone. For details, please refer to
http://www.telecoms.com/10397/maxis-brings-nfc-payments-to-malaysia and http://mis-asia.com/news/articles/worlds-first-contactless-mobile-payment-system-launches-in-malaysia

Mobile Wallet
Mobile wallet is mobile phone that has functionality to replace a traditional wallet and more. It stores personal and sensitive information like passport, credit card information, PIN codes, online shopping accounts, booking details and insurance policies that can be encrypted or password-protected. This technology aims to reduce the number of items that people need to carry around. With mobile wallet, consumer can use their mobile phone to pay transactions at merchants that accept mobile payments. The user just needs to upload digital cash from a credit card to their mobile phone and swipe their mobile phone at payment counters. For details, please refer to http://www.mobileworld.com.my/v1/content/view/219/62/

The developments of m-payment systems have simplified our busy life and making consumers’ everyday lives more convenient. It is predicted to have a bright future as m-commerce becomes more popular. Even it is still new and in developing process in Malaysia, but it is believed that the use of m-payment system will becomes a part of Malaysian daily routine. However, the acceptance of mobile payment systems depends on many factors including usability, costs, security and convenience issues.

In order to attract and encourage consumers to using the m-payment systems, few strategies can be carrying out:

o Organize activities such as advertisement and campaign to educate public about mobile payment systems and how the systems work
o Enhance the security of those m-payment systems to built users confidence
o Simplify the procedures that need to follow by the users in using m-payment systems to increase users’ satisfaction.
o Collaborate with more banks to facilitate and widen the use of m-payment around the world
o Lower down the costs that will be charge for each transactions that made through m-payment systems

Other References:
http://www.prlog.org/10138966-commerce-on-the-go-mobile-payment-systems-and-solutions.html
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci772807,00.html
http://www.zdnetasia.com/news/communications/0,39044192,39001884,00.htm

Hello, it has been one week time I never update my blog, last two week I have share with all of you about revenue model of some e-commerce website and discuss with all of you whether there are some threat of internet or how safe of our data is. I think it make all of you understand even more how online transactions work and how we can be safe by using it. Today, I will like to share further with all of you again, which it is about how actually those payments being make for those transactions online? If all of you still confuse how online transactions make the payments and receive the payment, here got some useful information for all of you. Actually those payment make or transfer is calls Electronic Currency.


Electronic Currency (also known as electronic money, digital currency, digital money, electronic cash, digital cash, and digital money) is the money or scrip which is exchange electronically, which is through use of computer network, internet and also digital stored value systems. In more detail, e-currency means the money that can use for shopping, do investment via internet by through credit card payment or some other payment methods. There are few popular example of electronic currency which is:


~Webmoney
~1MDC

~ e-gold














~e-bullion
~ Pecunix

~ Liberty Reserve



Typically it has two major types of electronic currency, which major different is the backed base, the types is describe below:

1) Backed by Precious Metal – such as e-gold which it is backed by gold
2) Backed by Hard Currency – example like Paypal



This is the link that got further explanation of the type of electronic currency:


http://www.giexc.com/

There are some major characteristic of electronic currency which is:

• The transfer of electronic currency is instant and ‘real time’ and cannot be reversed. It is just same like when you have purchase a cup of drink from a restaurant and you had pay for it, after that if u suddenly feel regret and would want to refund back for the payment, it is impossible because the transactions are final and not reversible in this kind of situation, so same situation apply by using electronic currency.

• Secondly, the transfer of electronic currency is private and anonymous for the sender and receiver, it means that normally it would not show the real identification of the sender and receiver and generally the account titles shown during transaction are numbers, nick names or email addresses. Additionally, just like actual cash, the source of the funds is never disclosed to the receiver.

Further explaination:
http://www.nowpublic.com/what_is_digital_currency_digital_money_real_cash

Requirement of Electronic Currency
1) Security
2) Anonymity
3) Scalability
4) Acceptability
5) Off-line Operation
6) Transferability
7) Hardware Independent


For the explanation and example of above requirements of electronic currency, you can refer to this link file:

http://clifford.neuman.name/papers/pdf/9311_netcash-medvinsky-neuman-cccs93.pdf

After share with all of you about the types, characteristics and requirements of the electronic currency, now I would like to share about benefits and limitation or disadvantages using electronic currency.

Benefits
1) Convenient
- provides users a quick, simple and safe way for shopping instead of showing their credit card information to merchant who they do not know
- offer a variety of services without having to handle physical cash or checks. Customers do not have to wait in lines; this provides a lower-hassle environment.
- Debit cards and online bill payments allow immediate transfer of funds from an individual's personal account to a business's account without any actual paper transfer of money. It saves up the time of process and doing paper work.

2) Low Transactions Cost
- Unlike other businesses that eat up your profit with exorbitant fees, electronic currency trading allows you to do business with minimal fees giving you more profit and more money for you.

3) Anonymity and Detection of Double Spender
- Highly confidential for users ID and also information and real-time checking of all transactions make the possibility of multiple expenditures negligible.

4) Globalization
- allows access to a global market where not restricted and controlled by local currencies.







Disadvantages or limitation:


1) Fraud or Criminal Activities
- hacking into bank accounts and illegal retrieval of banking records has led to a widespread invasion of privacy and has promoted identity theft.

2) Failure of Technology
- such as network breakdown, defected by virus or worm, power failure that cause loss of data and record may be one of the issue of electronic currency.





3) Privacy

- it is still an issue of how safe the confidential information of a credit card or debit card holders to be protected and personal information will not be misuse.


4) Costly to Implemented and Massive Databases
- Additional required of hardware is quite costly for installation and the bank have to maintain a detailed and confidential database which required them to have massive databases.

Below are some link that describe further about the Advantages and Disadvantages of electronic commerce, anyone interest can surf for it and understand it further.

http://www.romow.com/business-blog/benefits-of-e-currency-trading/
http://www.iit.edu/~peacjen/cs485/ecash2.htm
http://www.buzzle.com/articles/advantages-and-disadvantages-of-electronic-cash.html
http://www.businesspme.com/uk/articles/trade/90/Electronic-money---advantages-and-disadvantages.html
http://www.learncurrencytradingonline.com/electronic-currency-trading.html





Nowadays, credit card becomes a common instruments where many peoples now use it to pay for their bill in their daily use. Actually, the procedures and terms for applying credit card in nowadays is much simplier if compare to the past time. This may due to the competition between financial institutions where they try to attract more customers by lower down their interest rates and conditions. It is not surprising if you can found out that a person can hold 5 credit cards at the same time. However, everything in this world is double sided which are the application of credit card become easier now but it is not easy for the card holders to settle their debts. So, this week let me hare with you all the causes and preventions of credit cards debts.


CAUSES:
Income vs Expenses
A person must spend their income according to their expenses. Peoples alway think that they are able to pay for the bills when they want to buy something that is more expensive which the things is not really a "NEED" but a "WANTS". Many such cases happen in Taiwan where STUDENTS are too follow blindly nowadays fashion causing them to be in the red. They bought a lot of branded goods to satisfy their vanity. Some even owe RM100K to the bank.
Little saving
Many people nowadays do not save money for their future needs. They think that they can obtain short term loan from the bank easily if they need any financial assistance. Due to this thinking, they will always spend first without considering they are able to pay for the debts in the future. Besides, because of the little savings, they will not have enough money to deal with emergency. Again, credit card become the fatest way to loan money.

Unemployment
Unemployed person normally will depend on their credit cards to pay for their spending as this is the only way for them to survive. If they still spend extravagantly for a long time then they will have accumulated too much debt which they do not have ability to pay for it. Lastly, they will end up by declared bankruptcy.



Pay only the minimum

Some credit card holders will choose to pay part of their debts. This normally will step up their debts because of the interest that imposed on the late payment. Thus, that money paid by them actually is paying for the interest but not for the principal. If thing keep going for long time, then the debt will increase more and more.

PREVENTIONS:

Have a good money management

A person will need to have a good spending plan to keep track of their bills. This will help them to identify where is their money is going. Actually, it is good to form this habit because it can control their expenses where they only buy thing that they need.
Save money

Always save money...This is because cash is the most liquidity asset which it can be used when there is an emergency and future needs. Having enough saving for a rainy day is always a worthwhile investment.You will be more thankful if you have enough money on hand in case of emergency.



Pay on time
Never made late payment to any debt whether is your credit card debts or your car and housing loan. This is because the interest is calculated based on the daily balances. Pay on time will help you to save money on interest. Do not look down on the interest because it may be the main killer in settling your debts.
Self-control
Do not be a shopaholic!!! Buy whenever you needs but not useless things. Limit the "plastic" in your wallet or purse. This will restrain you from being overspend. Spend according to your income but not the fashion.
Choose the right card
Customers must read the terms and conditions carefully especially the fine print before they apply for the credit cards. This is because some financial institutions will imposed extra charges which you would not realized of it. You must understand everything from your interest rates and fees to how to earn rewards from your credit card. This can let you prevent from being charge more for your credit cards.More on this topic: http://www.cardratings.com/howtochoosetherightcreditcard.html

Reference:


Third parties refer to Certificate Authority (CA) who issue digital certificates to verify that a particular website is representing its company. One of the famous application of 3rd party certification programme in Malaysia is provided by the MSC Trustgate.com Sdn Bhd. MSC Trustgate.com Sdn Bhd was incorporated in 1999 as a licensed Certification Authority (CA) in Malaysia under Digital Signature Act 1997. It aims at catalyzing the growth of e-commerce by creating a trusted e-environment that helps businesses to expand in the new economy. It provides security solutions and trusted services to help companies build a secure network application infrastructure for their electronic transactions and communications over the network. The services that provides by Trustgate are SSL Certificate, Managed PKI, Digital ID, MyTRUST, MyKAD PKI, SSL VPN, Managed Security Services, VeriSign Certified Training.




SSL Certificate
Trusgate provides two SSL Certificates due to the increase of phishing attacks on the Internet. It helps the customers to ensure that they are dealing with trusted parties and their information traveled over the Internet was reaches at intended recipients. The two certificates are Global Server ID and Secure Server ID. Global Server ID adopts today's strongest encryption commercially available for secure communications via Server Gated Cryptography (SGC) technology while Secure Server ID protect the transfer of sensitive data on network using a minimum of 40-bit and up to 256-bit encryption. It includes VeriSign that provides security solutions to protect the network and consumers of the organization.

Managed Public Key Infrastructure (MPKI)
MPKI service is a fully integrated enterprise platform designed to secure intranet, extranet, and Internet applications by combining maximum flexibility, performance, and scalability with high availability and security. The service allow enterprise to quickly and cost-effectively establish a robust PKI and Certification Authority (CA) system with complete control over security policies, PKI hierarchies, authentication models, and certificate lifecycle management.

Digital ID
The use of Digital ID to sign and encrypt the transactions can ensure that the confidential information is secured. Digital ID is an electronic credentials that uses private key and public key to facilitate the following operations:

Authentication – you are who you claim you are
Privacy – your confidential data remains private
Authorization – control user access rights to important data
Integrity – be sure data is not altered behind your back
Non-repudiation – have the evidence in the event of a dispute

MyTRUST
SIM card can turns into a Mobile Digital Identity for secure mobile banking and other financial services with MyTRUST. Mobile digital signature provides non-repudiation on transactions under the Digital Signature Act, 1997. It runs on Wireless PKI platform and Mobile Operator infrastructure. PKI-enabled SIM cards are preloaded with MyTrust application and a digital certificate from a licensed Certification Authority. Therefore, users are able to digitally sign any transaction easily and conveniently via their mobile phone.

MyKad PKI (MyKey)
MyKey is the MSC Trustgate.com Sdn. Bhd.’s Digital Certificate which is loaded into MyKad. It is governed by Malaysia’s Digital Signature Act 1997 and is accepted by the Malaysian government. Mykey allows its users signed document digitally. The document is treated as a legal binding document as it is with a handwritten signature.


SSL Virtual Private Network (SSL VPN)
SSL VPN provides secure remote access based on the web security standard SSL (Secure Socket Layer). SSL VPN can be configured to access multiple intranet sites with single sign-on. Users can get access to intranet, e-mail and business system from wherever they are and whatever device they choose. Besides, it provides an advanced policy management component to authenticate users and type of device they are using.


Managed Security Services
Valuable business resources that are accessible over the network need to be protected against misuse to ensure the business runs smoothly. Trustgate provides full set of security solutions to help companies build a secure and reliable environment for their organization. Trustgate’s consultants have extensive experience in implementing IT security and conform to SAS 70 standard. They are committed to deliver effective security infrastructure to protect organization’s network from attacks.


Verisign Certified Training
Trustgate has been appointed as Asia's first VeriSign Authorised Training Centre. Under the partnership, Trustgate and APIIT (Asia Pacific Institute of Information Technology) jointly facilitate the delivery of VeriSign’s high-end Security and E-Commerce programmes.

The projects that have been implemented by Trustgate in Malaysia included:
~E-banking Security Deployment
~E-procurement Integration
~User Authentication and Customer Clearance Approval System
~PKI for Online Transaction Payment System
~PKI Development & Integration for Malaysia’s National Identification Card “MyKad”
~PKI Infrastructure for E-government and E-business Transactions
~Secure Document Storage System
~Project Management and Application System Development
~Security Consultancy & Outsourcing Services

Reference:
http://www.mykey.com.my/Website/home.php
http://www.trademal.com/global/index.php/id/17463/key/trustgate/MSC_Trustgate_com_Sdn_Bhd/index.html http://www.msctrustgate.com/

It’s cool of storing a lot of music, movie, photo, working paper, and some secret inside our computer. However, we will feel shock when we suddenly notice our personal things being uploaded in some website, or lost of data inside the computer. How it actually happened???

How data lost?
When a normal people like us having our first computer, first of all, we will think of applying for internet connection. This makes the opening, and our human’s action continues the tragedy. When opening internet browser, we will go search for something that we want. However, if you ever typed in “word unscrambler, lyrics, myspace, free music downloads, phelps, game cheats, printable fill-in puzzles, free ringtones and solitaire”, any of these term will probably carried the chance for your computer to get hit by “malware”, that might steal away your computer data.

Impact of data lost
Lost of data might cause losses either in physical or reputation. If our financial data being stolen, it is possible that our money will be just used by anonymous for their own transaction. For businessman, every customer data that had lost might cause an uncountable loss in business.

If personal data get stolen, it is just like the incident happened in November 2006. A Hong Kong male artist, Edison Koon-Hei Chen was involved in sex photo scandal of his with 6 others females. Although this incident brings him the hottest search result in Google search engine for year 2008, however, his reputation had already become a bad one.

Common methods to safeguard personal and financial data
The most common ways to safeguard our data are through encryption, password or PIN. With a password, we can protect from letting others access our computer and account. A further protection is installing antivirus to prohibit viruses attacking. To protect home network from offensive website and hacker, it is recommended that enable the Window Firewall.

The latest technology to protect data is through biometric, which will recognize owner’s fingerprint, optical, facial structure, voice, signature, or keystroke. Everyone in this world had his own unique physiological and behavioral characteristic, therefore, using biometric for identify and verify purpose can be a higher secure than password and PIN.

Other methods to safeguard personal and financial data
We always said that, there’s better prevent than cure. For me, I more prefer take precaution rather than take action. For a normal user for you and me, here, I’m willing to share the way I safeguard my data.

First time when sign in to MSN messenger, it warns that “Never give out your password or credit card number in an instant message conversation”. We should follow this instruction, because it was trying to protect us from financial aspect. If you using a shared computer, it is recommend that do not save your message as MSN history, so that other won’t know what you had chatted about.

In a MSN conversation, sometimes, your friend might send some file for you. For your benefit, it is recommend that you should ask your friend what is that file. A small tip for you, if you able to close the chat window when there’s a file in pending status, that file usually not a file from your friend, but a virus link. Sometimes, when your friend sends you a link (e.g.: http://SweetStufff.com :D, click here www.mebeholdgo.in), NEVER CLICK THAT! Unless you’d get the confirmation from your friend to do so.
P.S: DO NOT CLICK on that 2 links, any damages or losses is not liable.

It’s enjoying when you can access Wi-Fi in hotspot. However, when connected to these shared connection, you should bear in mind that you might get the chance to let other access to your network and personal information. So, it’s better for you not to online in the hotspot.
(Refer to http://www.cnn.com/2009/TRAVEL/business.travel/05/28/computer.security/)

When surfing website, we should aware of any pop-up advertisement. Any careless action will just cause the tragedy, think before you do. For credit card user, you are advised that make a routine review on the transaction made, so that can discover any unusual transaction at once.

Remember to set a schedule for your antivirus to update its database to the latest version. Although there is some free antivirus in open-source, it is recommended that spend some money to purchase original version antivirus. You will shock of the scan result after scanning it.

Too much I can write for it, however, too little I can think out right now. So, if there is any problem, you are most welcome to leave your comment here. I’ll reply whenever I read it…

Extra Informations:
1) US is started to concern on this issue, further information can refer to:
http://edition.cnn.com/2009/POLITICS/05/29/cyber.czar.obama/index.html#cnnSTCText
Video
http://edition.cnn.com/2009/POLITICS/05/29/cyber.czar.obama/index.html#cnnSTCVideo


2) How to Safeguard Your Personal Data – Before, During and After a Breach
http://www.eweek.com/c/a/Security/How-to-Safeguard-Your-Personal-Data-Before-During-and-After-a-Breach/

3) Digital Shredder Premium (Easily, Securely & Permanently Erase Confidential Data)
http://www.dtransfer.com/products/data-deletion/digital-shredder-premium/

4) Safeguarding Your Data
http://www.msisac.org/awareness/news/2007-03.cfm

Hi…everyone! Welcome to our blog AGAIN... This week, I am going to tell you all about the threat and attack that the e-commerce will face in this modern day. Even though, E-commerce has let our life more convenience nowadays, however, it also bring some problem to us where many deceivers actually make use of it on their self benefits. Thus, many users nowadays complaint that they have been cheated when they made any transaction through the internet.

One of the most popular threats nowadays is called PHISHING. The pronunciation of Phising is same as fishing. It is an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to deceive the user into disclosing their private information that will be used for theft purposes. The e-mail usually will contain a link that direct the user to visit a website where they are asked to update their personal information, such as passwords, credit card numbers, and bank account numbers.

Phishing not only happen by sending email messages, but it actually exists in many ways. The other examples are:

a) On a social networking website.
b) On a fake website that accept donations for charity.
c) On a website that imitate your familiar website that you would not be realized of it.
d) In your instant message program
e) On your cell phone or mobile device.

Now, even has a new type of phishing which is spear phising. It focuses on a single user or a department within an organization. The e-mail message appears to be legitimately addressed from someone within the organization normally in a position of trust such as head of human resources or IT. From there, the employees are being requested for their login IDs and passwords. Once data is gained, the hackers can entry into secured networks and steal the data. Another type of spear phishing attack will ask users to click on a link, which deploys spyware that can steal their data as well.

So, to prevent this attack happen on ourselves, we need to learn how to spot a phishing scam. Normally, phishing scam will contain several elements:

a) The "From Field" shows the e-mail is send by the legitimate companies which normally appear as your bank or financial institution or a company you regularly to deal with such as e-bay, Paypal or Microsoft. User need to be very careful in looking out the senders as those deceivers can make use of the company name easily.


b) The e-mail will usually contain logos or images that have been taken directly from the legitimate Web site of the company. So, the existence of logo does not necessarily means that the e-mail is send by legitimate company. However, there will be some logos that are not an exact match to the company's logo or contain spelling errors. In such case, user should be alert that this a fake e-mail.


c) The e-mail will contain a clickable link which suggests you to use the inserted link to validate your information. When you rest your mouse on the link, it will show the real website address to which you will go. Note that the hyperlink usually does NOT point to the URL of the legitimate company. Somehow, the link will contain percentage signs followed by numbers or “@” signs, or random names. Besides, the deceivers will use web addresses that resemble the name of the legitimate company but slightly altered by adding or omitting letters. For example, the address "www.microsoft.com" could appear as, www.micosoft.com , www.mircosoft.com



d) It contains several phrases such as:
I) verify your account
II) You have won the lottery
III) If you don't respond within XX hours, your account will be closed

So, you all know what phishing mail look like. Now, it is the time to learn the prevention method.

a) We should always be alert to any email with urgent requests for personal financial information. Normally, a bank or other organization would not request your personal information through e-mail. However, there is digitally signed e-mail [more on: http://www.antiphishing.org/smim-dig-sig.html] which send by bank. These e-mails normally are more reliable and certified by third party which shown in the picture. However, it is more safety if you can contact the bank or related authority and confirm with them.


b) Don't click on the links in an email or instant message to get to any web page if you suspect the message might not be authentic or you don't know who the sender is.

c) Avoid filling out forms in email messages that ask for personal financial information instead you should only communicate information such as credit card numbers or account information via a secure website or the telephone.

d) Make it a habit to enter the address of any banking, shopping, auction, or financial transaction website yourself and not depend on displayed links. This is because phisers can mimic the legitimate URL which can lead you to the forge website.

e) Installing a Web browser which contains phising filter to protect you from phishing websites. You can get a free browser toolbar from: http://www.earthlink.net/earthlinktoolbar

f) Log into your online accounts and change the password regularly.

g) Check your bank, credit and debit card statements to ensure that all transactions are legitimate regularly.

h) Report to the legitimate company if you received a phising e-mail. Otherwise, you can report to reportphishing@antiphishing.org. which is an anti-phishing organization.

Nowadays, the crime rate in the internet has increased gradually. So, we need to alert to the happening around us regularly to prevent us from being cheated and of course being a brilliant customer in nowadays is important as well. I hope this information can provide a useful guide to you all.


Reference:





Introduction of youthgeneration blog

Welcom to our blog!!! This is first time we blogging here and hope all of you will come to have a look and drop a comment to us and we will provide all of you some useful information and share with all of you. Let keep in touch all the buddy!!

THANK!!!

We have receive a lot comment from the visitors and we hope that we will provide more useful information to all of you in the coming days. Thank for the support, we will do better next time! :) I also would like to thank all of you for the praise of the design of our blog, anything want to share or discuss with us about the design we are welcome you leave a comment to us. :) have a nice day to all of you. Hope all of you will come revisit our blog again!

*My Favour Song*