Saturday, July 5, 2008
A Review on a post on Legal from My E-Commerce blog
Once again, is the review of the post from My E-commerce blog.
The topic to be review is related to Legal issue for E-commerce.
Reviewed topic: How to lose your ID easily to fraudster at home?
According to the author, we lost most of our important personal details such as passwords, identity, login IDs, and accounts number when we throw our documents into rubbish bin. It is the main reason why fraudsters can obtain our personal informations and used it as a source to cheat/fraud others.
Refer to the article, these are what researcher found from the rubbish bin:
1) discarded banks details
2) national insurance numbers
3) mortgage documents
4) copies of passport
5) credit card numbers with expiry dates and signatures
6) blank cheques
7) unopened letter
Although these documents look like invaluable for the owner, but it is as valuable as money for fraudsters. They can open bank accounts, buy goods, apply credit card illegally by using the stolen personal information. A birth date, mother’s maiden name, password, signature, confidential letter can be the sources for fraudsters to pose our identity. These fraudulence cases can harm us. For example: criminal case (due to unpaid debts, cheating cases), damage our reputation in the market, and in many other aspects.
In order to reduce the chances for fraudsters to obtain our information, we need to have better control over our documents. One of the best ways is knaps the document by using paper crusher before we throw it. Furthermore, cover the important information by using the correction pen before we throw our documents.
There are many ways can helps to reduce the chances for fraudsters to steal our personal details. The main concerned of the issue is, how can we avoid becoming one of the victims?
The conclusion that quoted from the article:
Next time before you throw away any document, make sure all the information were properly destroyed or just avoid throwing away documents that contain the personal details.
Reference:
- http://ecommerze.blogspot.com/search/label/legal
Prepared by: Teo Muh Chow
Review A Local E-Commerce Site

This company provides services such as Floral Fresh Cut Flowers For All Occasions, Specialises in Roses, Tulips, Gerberas, Lilies & Heliconias, Flowers & Fruits, Fruit Baskets, Hampers, Gifts, Cakes and Candies. Its product can divide into some categories, there are Hand Bouquets, Flowers & Gifts, Basket, Congratulation and Seasonals.
The site design is attractive which can catch interest of the user, and the design and layout is user friendly because this site has category their products in systematic manner which the user can shop by the product or shop by occasions (include congratulation, happy birthday, new baby, wedding flowers and others.)

The product search engine is available for the user who logan this website to search products. It bring many convenience for the users. They no need search it through product category. The shopping chart is also available in this site. It help users find what product is interested and they can add it to the shopping chart. After shopping, they can choose the most favourable product they like and yet can make payment of transaction in a single or multiple receipt. The shopping card has display the quantity and unit price of the product. It enables let the consumer to know better about the item, price and quantity that have been chosen when shopping. With the use of the shopping chart provide, the consumer will be feel more easy.
The website also allow various type of payment method which could be one of the advantage compared to the competitors. The payment methods that are provided are :
1) Online Credit Card Payment
* VISA or MasterCard
* AMEX, Diners Club, JCB
2) Online Banking:
* Maybank2u.com
* RHB e-Banking
* Hong Leong e-Payment
* FPX(HLB, BCB, Bank Islam, PB)
* PosPay
3) Mobile Payment - Mobile-Money.com
4) Pay using Kawanku ATM
5) Open Bill Payment
* Maybank2u.com
* RHB e-Banking
* Hong Leong e-Payment
* Public Bank
6) Cash Payment-Pay cash at Blooming's Outlets
Reference:
- http://www.blooming.com.my/blooming/
Prepared By: Lee Boon Keat
Saturday, June 21, 2008
A Review on Internet Security from My E-Commerce blog
Today, I am going to do a review on a post on Internet Security from E-Commerce blog.
In Facts, there are a lot of harmful threats on internet.
Some of the example of the threats:
-Hacker
-Malicious Code
-Spam
-Denial-of-service attack (DoS)
-Distributed Denial-of-service attack (DDoS)
-Virus
-Worms
-Trojan horse
What is Internet Security?
Internet security is the prevention of unauthorized access to our computer via internet. The security is consisting of encryption and password. There are many of the security applications/software has been developed to protect our computer from the threats. I discovered an interesting post from the E-commerze.blogspot which teaches us how to prevent our blogger blog for being hacked and how to recover our hacked blog.
Refer to the post: John Cow.com was hacked! And unhacked !
Tips to prevent out computer from being hacked:
There are few tips is provided for us to prevent our blogger from being hacked, we need to keep our personal information private and avoid to use a same password for different registration. We should put a password which is much more complicated (Alpha-numeric password) because it has a higher security level compare to homogeneous password.
We shouldn’t use our identity card numbers, home address, nickname, year of birth and whatever number which can be found by others easily. Try to avoid using a public computer to access any important websites because the security system of a public computer is not good enough to protect our private information. The most important tips is that we need to install anti-virus software to protect our computer from being hacked. Antivirus systems can help us to block and detect potential threat.
What is Antivirus system?
Antivirus software is computer programs that attempt to detect, identify, eliminate or neutralize malicious software. Nowadays, antivirus serve as functions such as to combat a wide range of threats including virus, worms, Trojan horse, phishing attack, malware and etc. There are few steps is executed by antivirus software, it is scanning, identifying, eliminating, quarantine, and Delete potential threats.
There are few popular antivirus software in the market, such as:
-Norton Anti Virus
-Panda software
-AGV antivirus
-Nod32 antivirus
-Spyware Doctor (anti Spyware)
Next, we will focus on how to recover a hacked blogger or website.
How to recover a hacked blogger or website?
There are 7 steps in the recovery process:
1)Regain control to your website.
2)Restore the data from backup file in diskette, CD, hard disk and etc.
3)Restore missing information.
4)Scan for the vulnerability.
5)Delete, block, or eliminate the vulnerability.
6)Remove/delete all suspicious file and send a copy to the antivirus software provider.
7)Periodically monitor your website activity after the recovery.
In facts, the steps above only can help us to recover our website from minor attacks. For those websites which is hacked seriously by professional hackers, there are lesser chance for us to recover it because we do not have sufficient software and techniques to resolve the problems. Hence, we need to seek for help from computer/software/IT experts to help us to regain access to a hacked website.
Internet security is very important for us because we conduct a lot of activity via internet. A lot of private information is transmitting across internet and a high level security system is a necessity to protect the users.
References:
- http://en.wikipedia.org/wiki/Antivirus_software
- http://en.wikipedia.org/wiki/Internet_security
- http://ecommerze.blogspot.com/search/label/Internet%20Security
- Turban, E., King, D., McKay, J., Marshall, P., lee, J., & Viehland, D.(2008). Electronic Commerce: A Managerial Perspective 2008 (International Edition). Upper Saddle River: Pearson-Education International.
Prepared by: Teo Muh Chow