Review a local e-commerce site

Posted in Uncategorized with tags on Sunday, June 29, 2008 by jashen

Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of product and service over electronic systems such as the Internet and other computer networks. The local E-commerce site that we have chosen is Mahaweb, which is located at 38-A, Tingkat 1, Jalan 6/3, Taman Komersial Pandan Indah, 55100, Ampang, Malaysia.

MahaWeb Sdn Bhd was incorporate in 2003. With the young, energetic and dedicated team of players in this company, they are committed to the highest level of quality to serve their clients better. Moreover, Mahaweb is not just any regular web design company, but it’s also a web solution provider to prepare the other company to compete in this fast growing IT edge.

Mahaweb is a unique in this niche market because of the strong hold to their company philosophy in highest satisfaction, creativity and quality. Besides, they are dedicated to understand their every single client better and diverse needs of individuals, thus we are attuned to your specific requirements. Mahaweb also consist of highly skilled technology consultants, internet marketing consultants, creative artists and software engineering specialists dedicated to leveraging the latest web and online advertising technologies to build website solutions that meet your business needs today and the future

MahaWeb is the industry leader in Search Engine Optimization (SEO), Ranking and Positioning. Because of their SEO Analysts, they ensure that businesses’ and associations’ websites are at the very top of search results every day. MahaWeb and its search engine optimization service truly thrive on competition and on achieving the highest search engine rankings. Therefore, MahaWeb’s services are completely flexible because their optimization packages based on the particular needs of each client.

Finally, MahaWeb also has offers ad-free web hosting, domain names, website hosting and email hosting services. They are the clients’ web host for everything from web design, internet marketing tools, domain names, email addresses and powerful web hosting services.

The MahaWeb latest project is help Securical Glass Protection System design a website for promoting ACE security glass laminate. Additionally, MahaWeb also help the Dynasty Auto Sdn Bhd design the website for an introduction and products line up, such as body kits and ICE for automobile.

http://en.wikipedia.org/wiki/E-commerce

http://www.mahaweb.com.my/profile.html

A new marketing communication tool for companies

Posted in Uncategorized with tags on Sunday, June 29, 2008 by jashen

Corporate blog is published and used by an organization to reach its organizational goals. Intended for an organization, corporate blogging is as simple as an employee or an outsourced blogger journaling about the company he or she works. Additionally, it is defined as a website where entries are written in chronological order and commonly shown in reverse chronological order. Blog can also be used as a verb, meaning to maintain or add content to a blog. Further, Blogs serve as a place for users to make comments and to invite readers to pass on their comments too.

A new marketing communication tool for companies, blog has divided into internal and external types. An internal blog, generally accessed through the corporation’s Intranet, is a weblog that any employee can view. Therefore, many blogs are also communal and allowing anyone to post to them. The informal nature of blogs may encourage the employee participation. Corporate blogging can become a collective intelligence and a free discussion within the organization.

It is a direct communication between various layers of an organization. Internal blogs may be used in lieu of meetings and e-mail discussions, and can be especially useful when the people involved are in different locations, or have conflicting schedules. Finally, blogs may also allow individuals who otherwise would not have been aware of or invited to participate in a discussion to contribute their expertise.

An external blog is a publicly available weblog where company employees, teams, or spokespersons share their views. It is often used to announce new products and services or the end of old product, which to explain and clarify policies or to react on public criticism on certain issues. It also allows a window to the company culture and is often treated more informally than traditional press releases, though a corporate blog often tries to accomplish similar goals as press releases do. In some corporate blogs, all posts go through a review before they’re posted. External corporate blogs, by their very nature, are biased, though they can also offer a more honest and direct view than traditional communication channels. Nevertheless, they remain public relations tools.

Currently, corporate blogging become a new marketing communication tool for companies. Blogs are the order of the day. They have become a way of promoting just about anything whether it may be public relations, marketing a new product, improving brand image and for research.

Moreover, blog achieves the goal of growing a business because the company expands as it caters to online customers who may come across it. This is cyberspace in addition to any offices and factories that it may have. Blogs are a great tool of promoting a business in that it can help in interacting with users and display their feedback. Thereby when other people view any testimonials made by customers like themselves, they will be satisfied that the company is serving its clients well and listening to their needs.

Besides, this is a form of advertising for company and it is excellent because it will be sought by customers when they seek to visit it again and again. From other perspective, an amount of people within the company end up talking to and doing business with just simply in appreciation to a blog is amazing. For instance, everyone is alerted and almost anyone seems to identify with this new development. People who in another time without this network would never been able to correspond.

There is a variety of information available in the blog. Hence, a successful marketing through blogs creates or enters an area of interest where readers are caught up in the use and means of a product or service. In addition, blog writers who believe they can sell musings by payment have been let down, and companies that have used blogs to sell overtly and generated interest.

Corporate blogging as communication tools when involved people in developing their own blogs to talk up and as a result add value to their own products and services and also by using other people’s blogs to promote or discuss them. However, not all companies have actually worked out how to use blogs effectively yet.

Finally, the corporate blogging as communication tool success because they may do public speaking, to build trustworthiness for themselves and boost up their company’s credentials. Blogging has become a new less time consuming and less expensive way to reach potential and current customers.

http://en.wikipedia.org/wiki/Corporate_blog

http://www.webupon.com/Blogging/Blogs-as-a-Marketing-Tool.50561

Internet users could be banned over illegal downloads

Posted in Uncategorized with tags on Thursday, June 26, 2008 by jashen

Illegal download of music, movie, game and software have classify as a crime and will possess to be taken action under law. Big company is suffering millions of losses from people who illegally download films and music. People who illegally download films and music will be cut off from the internet under new legislative. Internet service providers (ISPs) will be legally required to take action against users who access pirated material.

Users suspected of wrongly downloading films or music will receive a warning e-mail for the first offence, a suspension for the second infringement and the termination of their internet contract if caught a third time, under the most likely option to emerge from discussions about the new law.

Broadband companies who fail to enforce the “three-strikeregime would be prosecuted and suspected customers’ details could be made available to the courts. The Government has yet to decide if information on offenders should be shared between ISPs.

Six million broadband users are estimated to download files illegally every year in this country in a practice that music and film companies’ claim is costing them billions of pounds in lost revenue annually.

Major sticking points include who will arbitrate disputed allegations, for example when customers claim to have been the victim of “Wi-Fi piggybacking”, in which users link up to a paid-for wireless network that is not their own. Another outstanding disagreement is how many enforcements the internet companies will be expected to initiate and how quickly warning e-mails would be sent.

International action in the US and France, which is implementing its own “three-strikes” regime, has increased the pressure on British internet companies and stiffened the Government’s resolve.

Ministers will make an explicit commitment to legislate with the launch next week of a Green Paper on the creative industries. A draft copy, obtained by The Times, states: “We will move to legislate to require internet service providers to take action on illegal file-sharing.” A consultation paper setting out the options is promised within months.

A spokesman for the Internet Service Providers Association said it remained hopeful that agreement over a voluntary agreement could be reached: “Every right-thinking body knows that self-regulation is much the better option in these areas.”

Roz Groome, vice-president of antipiracy for NBC Universal, welcomed the prospect of new laws. “We welcome the signal from Government that it values the health of the creative industries and takes seriously the damage caused by widespread online copyright infringement. We call upon ISPs to take action now. They must play their part in the fight against online piracy and work with rights owners to ensure that ISPs’ customers do not use their services for illegal activity. Piracy stifles innovation and threatens the long term health of our industry.”

Ed Vaizey, the Shadow Arts Minister, said: “David Cameron called on the internet providers to address this issue last summer. The credibility of the Government’s latest threat is undermined by the fact that ministers have spent so many years dithering on whether to legislate.”

The commitment forms part of a Green Paper on the creative industries entitled The World’s Creative Hub to be launched by Andy Burnham, the Culture Secretary, and Gordon Brown next week.

Other high-profile elements include a pledge that children will be entitled to five hours of culture a week overseen by a new youth culture trust. The pledge will give children the right to learn a musical instrument, visit art galleries and museums and even make films.

Other pledges include setting up a new international conference modeled on Davos, entitled the World Creative Economy Forum, and supporting a new £200 million film centre at the South Bank in London. A spokeswoman for the Department for Culture, Media and Sport said: “Early drafts of our creative economy programme document were circulated to stakeholders for comment. The content and proposals for the strategy have been significantly developed since then and a comprehensive plan to bolster the UK’s creative industries will be published shortly. We will not comment on the content of the leaked document.”

http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article3353387.ece

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction.

Posted in Uncategorized with tags on Thursday, June 26, 2008 by jashen

Auction is market mechanism by which buyers make bids and sellers place offers. It is characterized by the competitive and dynamic nature by which the final price is reached. Auctions can rapidly disposal of items that needs liquidation or a quick sale, they offer trading opportunities for both buyers and sellers that are not available in conventional channels and they ensure cautious execution of contracts.

Types of auctions are traditional auctions, electronic auctions, dynamic pricing, English auctions, Yankee auctions, Dutch auctions, free-fall auctions, sealed-bid first-price auction and sealed-bid second-price auction. The most popular type of auctions is an electronic auction (e-auctions) which means auctions conducted online.

The largest Internet auctioneer is eBay which has introduced several measures in an effort to reduce fraud. Following are action to prevent e-auction fraud:

1. User identity verification such in IC number, driver’s license number or date of birth. For example, verified eBay user, the voluntary program, encourages users to supply eBay with information for online verification.

2. Authentication service. It is to determine whether an item is genuine and described appropriately. It difficult to perform because their training and experience, experts can detect counterfeits based on subtle detail.

3. Grading services which is a way to determine the physical condition of an item, such as ‘poor quality’ or ‘mint condition’. Different item have different grading systems. For example, trading cards are graded from A1 to F1, while coins are graded from poor to perfect uncirculated.

4. Feedback forum. It allows buyers and sellers to build up their online trading reputations. It provides user with ability to comment on their experiences with other.

5.        Insurance policy. For example, eBay offers insurance underwritten, users are covered up to $200, will with a $25 deductible. The program is provided at no cost to eBay user.

6. Escrow services. Both buyers and sellers in a deal are protected with an independent third party. Buyer mails the payment to escrow services which verifies the payment and alerts the seller when everything checks out. An example of a provider of online escrow services s i-Escrow.

7. Non-payment punishment. To protect sellers, a friendly warning for first-time nonpayment. A sterner warning is for second-time offense, with a 30 day suspension for a third offense and an indefinite suspension for a fourth offense.

8. Appraisal services which use a variety of methods to appraise items. It includes expert assessment of authenticity and condition, and reviewing what comparable items have sold for in the marketplace in recent months.

9. Item verification which is a way of confirm he identity and evaluate the condition of an item. Third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purpose. It provides a way of tracking an item if it charges ownership in future.

10. Physical inspection. It can eliminate many problems especially for collectors’ item.

The application of prepaid cash card to consumer

Posted in Uncategorized with tags on Thursday, June 26, 2008 by jashen

Prepaid cash card can help you control your spending. It also a reload able debit card allows you to only spend up to the amount you have pre-deposited into the account. Moreover, if you tend to overspend or would like to control you’re spending then a pre-paid cash card could be a good card for you.

Prepaid cash card uses not only can a prepaid card enable customers who find it hard to get credit, but this type of card can help you take control of your finances, if you have found normal credit card interest rates too high and the balance offered too tempting. You can be confident that you will stick to your budget with a pre-paid card, as you are the one who sets it by deciding how much to top-up your card with. Moreover, most prepaid credit cards can enable you to need not longer to carry cash when shopping because you may use an ATM to withdraw money. Besides, it also can be at home and abroad transfer funds to send money to other cardholders shop on the internet with security.

Consumer will need to pre-load their card before use and this can be done in different ways, such as, by direct transfer from a bank account, or by paying in cash at a nominated outlet. Therefore, the prepaid cash card is accepted in most of the ways that a normal card be. Nowadays, there are a lot of bank offering the prepaid card, such as, Eon Bank, Public Bank, Am Bank and others. It also divided into Visa prepaid and MasterCard prepaid.

For the MasterCard prepaid cash card, it is a great alternative to carrying cash for consumer. It is a popular payment option in the United States. Besides, MasterCard Prepaid cards also have debuted in Canada and MasterCard is the leader in offering this new product.

This prepaid cash card offering the consumers all the benefits of a regular MasterCard card. For instance, the MasterCard Prepaid card gives consumers the added flexibility of loading an amount of money with up to a preset limit into an account associated with the card. The cardholder then uses their MasterCard Prepaid card to make purchases or cash withdrawals at an ATM. Those purchases and cash withdrawals are deducted from the account balance. As the balance is spent, the cardholder can reload additional funds on to their card.

For the Visa’s prepaid cash card, it’s offer a secure, cost-effective, and convenient alternative to paying by checks or cash. These products enable many consumers to access their pre-funded pool of funds to make everyday purchases, pay bills, and even receive direct deposits with a Visa prepaid cash card.

There are several benefits that the cardholder can obtain, which is include convenience. The cardholders can use Visa prepaid cash cards to securely pay for groceries, fuel, and even utility or household bills. Prepaid cash cards can also be used for making payments on the phone or line, and, in some cases, withdrawing cash at ATMs. Moreover, it’s also a safety for the cardholder. Cardholders can make purchases or get cash whey they need it, rather than carrying large sums of cash. Finally, it’s also has provided a protection to the cardholder, while the cardholder can replaced if lost or stolen and carries the same liability against unauthorized purchases as other Visa cards.

http://www.corporate.visa.com/md/fs/consumer/prepaid.jsp

http://www.coinstar.com/us/WebDocs/A1-0-3

Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies

Posted in Uncategorized with tags on Thursday, June 26, 2008 by jashen

Mobile payment (m-payment) systems not very well established yet but with growth in Wi-Fi and 3G cellular phone systems. This is beginning to change. In US, development of Wi-Fi and Bluetooth expected to drive growth.

Mobile payment service included mobile money. Mobile Money is money in mobile. People can sms this money to anyone, at anytime, from anywhere. Just with a sms can make payment to anyone to their mobile phone numbers, to get sms instructions to buy product, to check balances and last transactions.

In Malaysia, mobile payment is recently services developing fast. This service is effective providing customers with admission or money off vouchers which can be unique coded or designed to allow viral spread. The mobile channel can be effectively used as a self-funding and revenue generating medium. This service covers all mobile operators on Malaysia; it’s for prepaid and postpaid service billings.

The mobile payment package include Project Planning and Management Services, Product Catalogue Submission (to all mobile operators), Premium Billing System Configuration, Systems and Load Testing, User Acceptance Testing (UAT) will all mobile networks, Service Launch, Monthly Service Monitoring and Progress Report and Settlement Reports, collections from mobile operators

Celcom set up a whole mobile Banking and Wireless electronc payment solution. It will allow customers to access financial and account information at any bank and at a minimal investment by participating banks via mobile phone. Malaysia’s premier of Celcom Berhad will be launching a simple and standardized platform mobile Banking & mobile Payment solution for the Malaysian market.

Only a few banks provide m-banking systems using a Java client on their phone. Many banking customers either do not have a Java capable phone or not familiar how access the service, the overall customer benefit remains limited. Celcom will expand the system to extended remittance, bill payment and merchant payment services.

Besides that, Nokia and Visa start mobile payment project in Malaysia. Visa and Nokia have cooperated to release the world’s first credit card payment system that allows consumers to shop and pay using mobile phones. Furthermore, it also lets people transfer money through cell phones. Nokia phones will use Visa Wave smart card technology that uses radio frequencies to eliminate the need to swipe credit card.

The wireless electronic payment systems is transform mobile phones into secure, self-contained purchasing tools capable of instantly authorizing payments over the cellular network for goods and services. In future, micropayment technology should be expanded to Malaysia such as making payments to parking garages, restaurants, grocery stores, and public utilities. The success of micropayments depends on the costs of transactions.

Electronic currency

Posted in Uncategorized on Thursday, June 26, 2008 by jashen

Electronic Currencies are money which is exchanged only electronically on the internet through digital stored value systems. Moreover, electronic currency also known as E-money, electronic cash, digital money, digital cash or digital currency that refers to money or scrip which is exchanged only electronically. Besides, it is a collective term for financial and technologies enabling it. Usually, this involves use of computer network, internet and digital stored value system. Electronic currency is a representation, or a system of debits and credits, which used to exchange value within another system, or itself as a standalone system through online or offline.

In addition, the electronic currencies will benefit the Internet commerce in three ways. Firstly, the currencies can serve as universal media of exchange. Once a user acquires a global electronic currency, she can enter into transactions around the world without having to pay exchange fees. Secondly, the currencies will provide global units of account, enabling buyers and sellers all over the world to understand what goods and services are worth without calculation. Thirdly, and perhaps most importantly, global electronic currencies will serve as stable stores of value. The competition will drive unstable products out of the market and the unlike national monies, private currencies will not be subject to the inflationary monetary policies of national governments and the special interests they represent.

Nowadays, there are many systems will sell their electronic currency directly to the end user, such as PayPal and Web Money However, other systems, such as e-gold, it sells only through third party digital currency exchange For instance, The Electronic Currency Trading System (ECTS). ECTS is an investment platform that offers its customers a safe, efficient way to trade foreign currencies against the strength and weakness of the US dollar. Also, utilizing its database of historical price patterns and technical indicators, the complex algorithms interwoven into the system allow for the recognition of entry positions with maximum profit potential. In order to maintain prudent money management, 24-hour stops are put in place to lock in gains as well as prevent heavy losses. There has never been a better time to invest in currency trading than right now.

Finally, in order for global electronic commerce to achieve its full potential in the new millennium, the Internet needs more than credit cards. It needs cash equivalents, including global electronic currencies capable of transcending national politics and monetary policies. Additionally, to encourage innovation along these lines, government must not only resist the temptation to unleash new laws and regulations, but also work to repeal the legislative sins of its past.

http://en.wikipedia.org/wiki/E-currency

http://electroniccurrencytradingsystem.com/

http://www.law.berkeley.edu/journals/btlj/articles/vol14/Macintosh/html/text.html

credit card debts: causes and prevention

Posted in Uncategorized with tags on Thursday, June 26, 2008 by jashen

Credit card debts result from when a client of a credit card company purchased an item or services through the card they use. Debts accumulate increase with interest and penalties for late payment had made the total amount due become larger.

Credit card debt is said to be increasing in the industries areas. Sometime the late fees, over the limit fees, high annual percentage rates, and universal default overcome customer who frequently do not pay off their debts, and the customer declares bankruptcy.

The real culprit behind the scenario is the desire to spend money. Many other culprits seem to be the causes of credit card debts such as lack of concern that their unable to meet the credit card payment obligation. There is no creditor hounding us for the payment and lack of self-discipline in dealing with credit management. We never know how to spend wisely and every single cent spend go toward keeping up with the minimum payment. Unfortunately this distressing situation is the common norm of many people.

Beware of this situation, do not fall in too deeply and dire till unable to solve the debts. An importance aspect that is not always addressed is why you go too deeply into debts. Why you keep charging the item you couldn’t afford? Why you have urge to use the plastic card for thing that wasn’t necessary, even when you struggle to make the payments? What causes your compulsive shopping?

Another negative consequence of using credit card is that you will never feel like you are spending the real money. The pleasant feeling you experiences when you purchase the items are disconnected from the unpleasant feeling of making the credit card payment when received the statement. To get control of your credit card spending you need to examine what money really means to you. Studies show that people with low self-esteem tend to purchase more the thing they don’t need.

How to prevent credit card debts had been seriously studies. There are three step plans and walk away to debts-free-living. Through an intensive understand the financial and take control of it and making it better than other. The three steps are as following:

1.0 Understand your spending

1.1 Find out are you in debt danger? Through the questionnaire below:

  1. Do you seem to worry about money most of the time?
    • No
    • Sometimes
    • Yes
  1. Has living paycheck to paycheck become a normal routine for you?
    • Yes
    • No
    • Sometimes
  1. Are you near or at the credit limits on your credit cards?
    • No
    • Sometimes
    • Yes
  1. Are you concerned you’ll receive calls from creditors?
    • Yes
    • No
    • Sometimes
  1. Do you find you sometimes have to borrow money from friends or family to pay the bills?
    • Sometimes
    • Yes
    • No
  1. Have you ever thought about bankruptcy?
    • No
    • Sometimes
    • Yes
  1. Do you charge more each month than you make in payments?
    • Yes
    • No
    • Sometimes
  1. Are you worried that your spending habits are jeopardizing your future?
    • Sometimes
    • Yes
    • No
  1. Does it feel as if you’re always late paying your bills?
    • Sometimes
    • Yes
    • No
  1. Do you feel you need to earn more money to keep up?
    • No
    • Sometimes
    • Yes

1.2 Learn the real scoop of on the ten biggest debt and the myth

Myth 1: I’m a loser and a failure because I’m in financial trouble.
Reality: You have to accept responsibility for your actions and remember that you did accept the credit with the promise of paying it back. But most families and our schools do a poor job of teaching financial responsibility. How many classes did you take while growing up that taught you how much credit you should accept? Maybe the truth is that you made a mistake and got in over your head because you didn’t know better. If you can learn from this mistake, you are neither a loser nor a failure. Accept your setback, learn from it, and move on.

Myth 2: My financial condition is so bad that my situation is hopeless.
Reality: Although your problem may not be solved in a way that you would envision, a resolution can always be found. Open your mind and be realistic about your options. Ultimately, you have to choose a solution you are most comfortable with.

Myth 3: The credit card companies wouldn’t send me applications in the mail if I couldn’t afford it.
Reality: Wrong. The credit card companies are simply making you an offer based on mailing lists or research they have performed. It is your responsibility to determine whether you can afford to accept their offer.

Myth 4: Everything is okay because I pay the minimum payment due each month.
Reality: By just paying the minimum payment on a debt, you extend your payments for many years. If possible, send more than the minimum payment. If that isn’t possible, you are probably living close to the financial edge. What would happen if you were injured or sick or could not work? Simply being able to live from paycheck to paycheck is not a sign of financial well-being.

Myth 5: If my debts get to be too much, I’ll just file for bankruptcy. Reality: Bankruptcy is a very serious matter and should be a last resort, not an easy out. It is a legal case filed with the bankruptcy court that is a matter of public record, and it can be reported for the rest of your life if you apply for certain loans, life insurance or jobs. Many people who have filed bankruptcy wish they had tried other alternatives before filing.

Myth 6: It’s okay if I take a cash advance to keep me from falling behind on my payments.
Reality: Some people take cash advances on their credit cards to pay their other creditors ”on time.” It is better to accept a late payment than to borrow your way deeper into debt, just to pay for bills you can’t afford. What often happens is you put yourself so deep in debt that it is nearly impossible to improve your situation without significant negative marks being made on your credit report.

Myth 7: I can wrap up all of my credit card debt into a home equity loan and my interest will be tax deductible.
Reality: You have just placed your home at risk and could lose it if you fail to make your payments. Nobody ever plans not to be able to make her payments. The reason the lender uses your home as collateral is so she can take it from you if you default on the loan. As for the tax deduction, who knows whether the interest will be deductible for the life of the loan? Credit card interest used to be deductible but no longer is. Are you confident that home equity interest will always be deductible?

Myth 8: Credit is bad.
Reality: Wrong. Credit can be used for many good and worthwhile purposes, such as buying a home. Credit cards are very convenient when making purchases as long as you have the money to pay off the credit card bill. Credit is like many other things in life: When used incorrectly, it can hurt you.

Myth 9: If I don’t use credit, I’ll never be able to buy anything.
Reality: If you don’t use credit, you won’t have debt. Remember when people used to pay for purchases in cash? If you want something bad enough, save for it. It is significantly more rewarding to purchase something and own it outright than to create another liability.

Myth 10: If I cosign a loan, the lender will never come after me.
Reality: You cosigned for the loan, which means you promised to repay the debt if the borrower couldn’t. When the borrower is unable to pay back the loan, you are on the hook. Unless you are prepared to repay the loan when the borrower defaults, you should never cosign any loan.

2.0 Repay sensibly to payoff what you owe. Small step can be a huge different.

Learn how to make a realistic repayment plan and follow the five ways to reduce your debts. Here’s just one reason to start managing your credit debt now: If you should ever not pay a credit card balance, that blotch stays on your record and can prevent you from getting a car loan, a mortgage or a plain old department store credit card. (If you should ever declare bankruptcy, forget it — it will be on your credit record and affect your credit rating for seven to 10 years.)

Here are some things you should know about getting off the revolving credit merry-go-round:

1. Pay more than the minimum payment each month, if you ever hope to pay off your credit card debt. You must also pay on time or a finance charge will be added onto the total, creating a larger minimum payment for the next month — and a larger finance charge added to the total again if you don’t pay it.

2. Get a system for credit card debt reduction. You need your own deadline each month for paying bills. There are great software programs for keeping track of your financial records (and even writing checks). Quicken, by Intuit, is a popular money-management program. So is Microsoft’s Managing Your Money.

3. Negotiate with credit card companies. The amount of credit card debt in this country has made creditors realize that if they don’t want people backing down from their obligations completely (in other words, if they want to get any money back), they have to make deals, like these:

4. If you have a limited budget for debt reduction, write letters to each of your creditors acknowledging the situation, and tell each one when you can begin repayment. They’ll appreciate your openness and likely be a lot nicer to you. You’ll get yourself some breathing space (something we all need when we’re dug in deep), and dealing rather than hiding will help boost your bruised self-esteem.

5. If you have a limited budget for debt repayment, write down what you can pay each creditor each month.

Here’s a sample budget:

Say you owe a total of $1,000: $200 to the dentist, $400 to the doctor, and $400 to the accountant who got you out of trouble with the IRS last year. That means 40 percent of your debt is to the doctor, 40 percent is to the accountant, and 20 percent is to the dentist. If you have $50 a month for repaying debt, that means the doctor gets 40 percent of $50, which is $20, as does the accountant. The dentist gets $10, or 20 percent of $50.

A final note on dealing with creditors: Keep your cool. It will make you feel better. And remember, some creditors have been taught to be mean and nasty. Don’t be intimidated. You have figured out a plan and are truly attempting to deal with your situation.

3.0 Get financial healthy

It seems the better consumers get at paying off their credit card balances each month, the nastier the companies get. Why? Pure dollars and cents. The better you are at paying off your balance every month, the less profit for the company. Companies are responding by becoming more creative in finding ways to make money off of you. Although some of the shadier practices are being challenged in court, most are legal. It is more important than ever to master the rules of the game.

Although I would prefer a world without credit cards, there are some reasons you should have one — and I mean just one. (Unfortunately, for most people, “just one” becomes “just two,” or …) Holding one card and paying off the balance on time helps establish your credit history. And you may need a card for travel expenses or emergencies. Aside from those cases, however, you should keep your credit card spending to the absolute minimum.

Rule 1: Don’t be a revolver
The first rule of credit cards is avoiding the nefarious “balance.” Carrying a balance means paying far more than you should for everything your charge to your card. And it is one of the fastest ways to fall deep in debt.

Are you what the credit card companies call a revolver — someone who carries a balance — or are you a freeloader, someone who pays off her balance every month? With any luck, you are a freeloader. If you pay off everything you charge within the grace period, the time between when the purchase is paid and when your bill comes due, you will not get stuck in the trap of paying interest.

It is another story entirely for the revolvers who carry a balance from month to month. Revolvers get no grace period. They just get stuck paying more and more interest — paying far more than the amount the item originally cost.

Rule 2: Read Everything
Read every form for any potential credit card account with a magnifying glass. You may, for example, be asked to print your initials somewhere on the application. But read the small print and you find you have signed up for insurance — credit card insurance, life insurance or disability insurance and anything else that arrives in the envelope. Issuers are free to change the terms of your card agreement with as little as 15 days’ notice. Typically, the notice gets slipped in with your monthly statement. Typically, it goes unread.

Rule 3: Avoid Late Fees
Stay free of the triple whammy known in the business as “tiering.” One late payment and you are immediately socked with a late fee — generally $29 (up from $12.50 just five years ago). Then you have a larger balance (after the $29’s been added in) and your minimum monthly payment has gone up too. What is more, one late fee and your card issuer may hike up your interest rate.

Rule 4: Fight Back
If your credit card issuer is squeezing you, complain. Competition among credit card companies is fierce. Use that leverage to get what you want. Often you can get a late fee waived or your interest rate lowered just by asking. Most companies will make adjustments at least once.

Rule 5: Shop around
There is a lot of fish in the sea. There is no reason to hold a card that has a high interest rate or a short grace period. Go “rate surfing.” Get the interest rate you want. Get a card with no annual fee. Compare the rates and terms of several cards. Start your search at CardWeb.com, bankrate.com, ABC guides and Credit Choice.

Rule 6: Check Your Credit Report
An especially dirty trick played by the companies is not reporting a good customer’s on-time payment history to a credit bureau, lest competitors steal their customers. So if you are planning on getting a mortgage or other loan, it is a good idea to ask whether the company is reporting your good payment record to the credit-rating bureaus when you check your credit report. But check a few months before applying for a mortgage, which gives you time to correct any mistakes.

Rule 7: Stop spending
Ultimately, this rule will make the most difference in your financial life. Make it hard to use your card. Don’t leave home with it. Financially healthy people do not use credit cards for borrowing money and paying it back over long periods of time at high interest rates. They do not buy things they can’t afford. Many people mistakenly believe they’re on top of things as long as they make their minimum payments religiously and on time. But they’re not. Keep a card on hand for emergencies. The rest of the time, keep it frozen in the middle of a carton of milk.

How to prevent your blog from being hacked

Posted in Uncategorized with tags on Tuesday, June 24, 2008 by jashen

hacker

Internet security is term refers to the various steps a firm or individual can do to protect their network that connected to the internet. Internet security is required because the internet environment is not secured. Initially internet was a place openly and loosely for public usage to exchange their idea and information. Data send toward the e-mail and e-shopping order give a broad opportunity for hacker to intercept and change the information.

The rapid increase in internet usage has focus the increment dimension of security awareness where many transaction of ideas and information done through internet. Therefore a study of how to prevent from being hacked is crucial and significant importance.

Hackers have two different ways to causing problem for computer system. They either enter the system and change or steal the information from inside or the attempt to overwhelm the system with information from outside so that it’s shut down. Passwords are widely applied within the public to secure their personal data. However, hawkers are able to recapture their password through guessing some common password used or run program that capture and locate the passwords information.

Today topic is more toward the how to prevent your blog from being hacked. Nowadays most common prevention is equipped with virus protection. Antivirus software is available for computer network and internet. Internet service provider put updated online to cover new emerging virus. In addition back up the data is another way to prevent data loss when hacking. Firewall is another way to block unauthorized outside access or internet webpage that cause virus.

On the other hands, every user should keep their personal information private. Do not expose the personal identity to other person. Create unique password for every account created. Always write the data in alphabet-numeric form to secure the data and personal information. Do not create password that can be found in blog and do not use public computer to access the page. Remember to register every account according to your domain name.

There are some others ways to secure the blog in word press as following:

· Backup the database and file often

· Keep word press updated

· Make sure the directories are protected

· Don’t link to word press

· Don’t advertise the word press version

· Change your password often

· Use strong password

· Rename the default admin login

· Protect your login page

· Keep importance page out of search engine

The Threat of Online Security. How safe is our data

Posted in Uncategorized with tags on Monday, June 23, 2008 by esther86

There are two types of threat and attack of online security, which are technical attacks and non-technical attacks.

Technical attacks are an attack perpetrated using software and systems knowledge or expertise. There are several types of types of technical attacks. Firstly, there is the Common Vulnerabilities and Exposure (CVEs). It is publicly known computer security risks, which are collected, listed, and shared by a board of security-related organizations. Secondly is Denial-of-Service (Dos), which is an attack on a web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources. The third is Virus. It is a piece of software code that inserts itself into a host, including the operating systems, to propagate. It requires the host program be run to activate it. Moreover, virus will simply infect and spread over the operating system and consequently cause the collapse in the server system.

Next, Worm is a software program that runs independently and consuming the resources of its hosts in orders to maintain itself and capable of propagating a complete working version of itself onto another machine. Therefore, the macro virus or macro worm is a virus or worm that is executed when the application object that contains the macro is opened or a particular procedure is executed. Finally, Trojan horse is a program that appear to have useful function but that contains a hidden function that presents a security risk.

Non-technical attack is an attack that uses trickery to trick people into revealing sensitive information or performing action that compromise the security of a network. There are two types of non-technical attack, which is social engineering and phishing. Social engineering is uses social pressures to trick computer user into compromising computer networks to which those individuals have access. Besides that, phishing is a popular method to collect information through fake website.

Currently, we have to make sure our data is safe when we have any transaction via internet. However, to protect our data is safe we can have an antivirus program to scan the entire computer for viruses. Even though most antivirus programs have an auto-protect feature that should, theoretically, prevent the insertion of a virus onto our computer, because it’s still a good idea to scan our computer periodically in the event the automatic protection feature missed something. Moreover, we can scan our computer once per week.

Furthermore, we also may apply some software to protect our data, such as Sarbanes-Oxley Act. The Safe Data is specializing in providing cost-effective, subscription-based data protection services to small and mid-size businesses. In addition, if we believe our bank account or using any account, we have been used without authorization and need to report it to the bank immediately. Besides we have to make sure that don’t use the same password for all accounts. We also have to create our passwords from a mix of letters and numbers, which makes them far less easy to hack.

Nowadays, there are many free and paid, stand-alone or part of a package with anti-virus software. We can choose to use the spam filters in our e-mail client. While, when if receive obvious spam, we don’t open it, and never open attachments that we’re not expecting, even from people we know and trust because their computers might have been hijacked. That’s why we need spam filters enabled to help keep our computer safe and help reduce or eliminate the possibilities of viruses arriving in e-mails. The only certainty is that the battle to keep our data safe will be never ending. The crooks and scammers continue to become and more inventive, so the solutions have to be more high-tech.

Yet, at the heart of it all, we can do a lot simply by using our common sense, such as distrust everything until we know otherwise. Furthermore, we may use a lot of caution whenever we’re online. It’s an open environment, but as much as that’s a joy, it also means it can be dangerous. Keep all that in mind, take all the precautions, and we should be as safe as anyone can be.