Nowadays, internet becomes really popular. Whole world for millions of users rely on internet services such as e-mail, chat programmers, searching engines etc. Beside that, internet users display more of their personal information on social networking Web sites, and office workers upload more sensitive data to online software programs, therefore it is important for us to learn about the online security threats. With identity theft on the rise, it is necessary to understand online security threats and know the ways to protect our confidential information.
The several online security threats include the following:
1) Spyware
It is software that monitors the actions of a computer user. This software falls
into a number of categories: Software that may be installed legitimately to
provide security or workplace monitoring, software with relatively benign
purposes that may be associated with marketing data collection and software
that is maliciously installed, either as a general violation of a user’s privacy
or to collect information to allow further attacks on their computer or online
transactions (e.g. “keylogging” to gain passwords).
2) Viruses
A computer virus is a rogue software program that attaches itself to other
software programs without user knowledge or permission. It may be highly
destructive such as destroying programs or data, clogging computer memory,
reformatting a computer’s hard drive, or causing programs to run improperly.
3) Identity Theft
Identity Theft is a crime in which an imposter obtains key pieces of personal
information like ID number to impersonate someone else. The information
may be used to obtain credit, merchandise, or services in the name of the
victim or to provide the thief with false credentials.
4) Hacker
A person who either breaks into systems for which they have no
authorization or intentionally overstep their bounds on systems for which
they do have legitimate access, i.e., an unauthorized individual who attempts
to penetrate information systems; to browse, steal, or modify data; deny
access or service to others; or cause damage or harm in some other way.
Monday, June 30, 2008
~How to safeguard our personal and financial data~
There is always the theft of information happen while using e-commerce services on internet as business tools. Hence, users of internet that usually perform online transaction must know the way to safeguard their personal and financial data.
Here is some hints and step provided to users to safeguard the personal and financial data. In order to avoid theft of personal and financial data, individual are advice to keep all the receipt, bank statement, credit card information billing and other document related when doing online transaction. Third party will easily trace this information if the individual does not dispose off this information and use it as threaten way to hack their account.
Individual is advice to be avoiding using computer at public places to perform their personal and financial business transaction because their local area network security might be unsecured. Moreover, all users are advise not to accept unauthorized file thru chatting devices that pop up suddenly and do not open those email that consists of unnecessary even reply it. Therefore, the personal and financial information will be easily exposed to the third party.
Not only that, it is strongly recommended that user should used strong and unique password to assess their business transaction site. Password should consist of alphabetical and numerical as less probability those intention hackers try to hacking the personal and financial information
Beside that, we secure our computer by turn it to screen saver when the computer and left to be silent for few minutes. After that, in order to active the computer usage, owner need key in the password so that other would not have chance to get excess to the personal information.
As last, remember to enhance the firewall and spy ware scanning should keep it strong enough to block unauthorized personnel who are intended to expose to our own personal and financial data that store inside the computer.
In conclusion, better preventing of computer and internet security can effectively avoid all internet users from exposing their personal and financial data to third party and suffer unnecessary loss.
Reference:
http://ecommerze.wordpress.com/2008/06/17/how-to-safeguard-personal-financial-data/
Here is some hints and step provided to users to safeguard the personal and financial data. In order to avoid theft of personal and financial data, individual are advice to keep all the receipt, bank statement, credit card information billing and other document related when doing online transaction. Third party will easily trace this information if the individual does not dispose off this information and use it as threaten way to hack their account.
Individual is advice to be avoiding using computer at public places to perform their personal and financial business transaction because their local area network security might be unsecured. Moreover, all users are advise not to accept unauthorized file thru chatting devices that pop up suddenly and do not open those email that consists of unnecessary even reply it. Therefore, the personal and financial information will be easily exposed to the third party.
Not only that, it is strongly recommended that user should used strong and unique password to assess their business transaction site. Password should consist of alphabetical and numerical as less probability those intention hackers try to hacking the personal and financial information
Beside that, we secure our computer by turn it to screen saver when the computer and left to be silent for few minutes. After that, in order to active the computer usage, owner need key in the password so that other would not have chance to get excess to the personal information.
As last, remember to enhance the firewall and spy ware scanning should keep it strong enough to block unauthorized personnel who are intended to expose to our own personal and financial data that store inside the computer.
In conclusion, better preventing of computer and internet security can effectively avoid all internet users from exposing their personal and financial data to third party and suffer unnecessary loss.
Reference:
http://ecommerze.wordpress.com/2008/06/17/how-to-safeguard-personal-financial-data/
Sunday, June 29, 2008
Review : Growing Threat from Mobile Malware
A new more dangerous time for mobile device users, filled with mobile malware, is upon us. As with desktop computers, the Lilliputian world of PDAs and smartphones is no longer immune to malicious attack.
The number of mobile malware attacks is on the rise, according to a study by the Informa Telecoms & Media that was sponsored by McAfee. Eighty-three percent of mobile operators surveyed have been hit by device infections -- five times more than the number of incidents in 2005.
This snoopware is an extreme example of the vulnerability to which our phones can expose us. The more likely target by hackers will be financial or personal data on a smartphone.
Another example of malware is FlexiSpy which is discovered in March 2006. FlexiSpy is a worm and it normally infect through internet download typically installed by someone other than phone owner. Once the phone is infected with this spyware, it will send a log of phone calls and copies of text and MMS messages to a commercial Internet server for viewing by a third party.
I totally agree that there is potential for cyber crime to occur in the mobile networks as cell phones have evolved into smart phones that enable phone users to download programs from the Internet and share software with one another through short range Bluetooth connections, worldwide multimedia messaging service (MMS) communications and memory cards, the devices’ novel capabilities have created new vulnerabilities. Scoundrels were bound to find the weaknesses and exploit them for mischief or, worse, for criminal gain.
Antivirus software now available from many companies can immunize and disinfect smartphones. Yet few customers have installed such protection. That needs to change. Phones should also incorporate firewall software that warns the user when a program on the phone seizes the initiative to open an Internet connection. This is an especially important form of protection for smartphones that can connect to Wi-Fi (also called 802.11) networks and thus directly to the public Internet. Many cellular companies aggressively filter traffic on the GPRS or UMTS data networks that their mobile devices use; open Wi-Fi networks have no such protection. And while some carriers already filter their MMS streams to remove messages bearing malicious attachments, all should do so.
The number of mobile viruses will more than double over the next year or two, and is expected to target applications such as m-commerce and mobile banking. Most users have to lose a phone before they realize how much information they have put on it. The risk to corporations is also high because data is leaking out of corporations through mobile devices because they are linked to the corporate system.
The number of mobile malware attacks is on the rise, according to a study by the Informa Telecoms & Media that was sponsored by McAfee. Eighty-three percent of mobile operators surveyed have been hit by device infections -- five times more than the number of incidents in 2005.
This snoopware is an extreme example of the vulnerability to which our phones can expose us. The more likely target by hackers will be financial or personal data on a smartphone.
Another example of malware is FlexiSpy which is discovered in March 2006. FlexiSpy is a worm and it normally infect through internet download typically installed by someone other than phone owner. Once the phone is infected with this spyware, it will send a log of phone calls and copies of text and MMS messages to a commercial Internet server for viewing by a third party.
I totally agree that there is potential for cyber crime to occur in the mobile networks as cell phones have evolved into smart phones that enable phone users to download programs from the Internet and share software with one another through short range Bluetooth connections, worldwide multimedia messaging service (MMS) communications and memory cards, the devices’ novel capabilities have created new vulnerabilities. Scoundrels were bound to find the weaknesses and exploit them for mischief or, worse, for criminal gain.
Antivirus software now available from many companies can immunize and disinfect smartphones. Yet few customers have installed such protection. That needs to change. Phones should also incorporate firewall software that warns the user when a program on the phone seizes the initiative to open an Internet connection. This is an especially important form of protection for smartphones that can connect to Wi-Fi (also called 802.11) networks and thus directly to the public Internet. Many cellular companies aggressively filter traffic on the GPRS or UMTS data networks that their mobile devices use; open Wi-Fi networks have no such protection. And while some carriers already filter their MMS streams to remove messages bearing malicious attachments, all should do so.
The number of mobile viruses will more than double over the next year or two, and is expected to target applications such as m-commerce and mobile banking. Most users have to lose a phone before they realize how much information they have put on it. The risk to corporations is also high because data is leaking out of corporations through mobile devices because they are linked to the corporate system.
Friday, June 20, 2008
~The history and evolution for E-commerce~
The first extended use of a form of electronic commerce appeared in the early 1970swhen system called Electronic Fund Transfer (EFT) was introduced. This enabled banks and financial institutions to transfer over secure networks large amounts of money either among themselves or with associated businesses. The EFT forms were used by employers to pay their employees by transferring the money directly to either their personal bank accounts or to their debit cards. To date, most payments made by the federal Government of USA are carried out via the EFT.
EDI technology has reduced costs both on the producers’ side and on the distributors’ (whether retail and wholesale). Likewise it brought about a substantial enhancement of purchase processes, by optimizing stocks and their correlation with the demand. Yet, several problematic issues — the high costs of its implementation and the difficulty of making the various versions of EDI fully compatible — caused EDI to fall short of attaining the ample market penetration one had expected.
In the late 1980s two new types of applications were widely adopted in the business world: electronic mail (e-mail) and group ware. When they were first introduced, these two systems were considered a major breakthrough. Despite this initial perception, both applications caused only insignificant growth of internal productivity.
In the year 1984, EDI, or electronic data interchange, was standardized through ASC X12. This guaranteed that companies would be able to complete transactions with one another reliably. In the year 1992, Compuserve offers online retail products to its customers. This gives people the first chance to buy things off their computer. In the year 1995, two biggest names launched in e-commerce which are Amazon.com and E-bay.com. In the year 2000,The U.S government extended the moratorium on Internet taxes until at least 2005.
Thursday, June 19, 2008
An example of E-Commerce failure and causes~
An example of E-Commerce failure is Kozmo.com. Kozmo.com was one of the leading delivery companies on the Internet in the United States. People would order a wide variety of product from a DVD rental, or just a single pack of gum and they would delivery your good within an hour and not charge for delivery. It was founded by young investment bankers Joseph Park and Yong Kang in New York City in March 1998. Kozmo.com serviced nine major urban areas, including Boston and San Francisco.
The main failure of Kozmo.com was too much competitive around the same area and challenging. At their peak, Kozmo.com was operating in 11 cities including San Francisco, Boston, New York and Seattle. At that time the competitors of Kozmo.com such as Webvan, Sameday.com and Pink Dot, all focused on a single urban area instead of trying to start operations in multiple markets simultaneously.
Besides that businesses of Kozmo.com had not been profitable. They delivered the usual grocery and drug store type items such as food and shampoo, but became too ambitious when Kozmo decided to deliver things like DVD players and other items that were not so cost effective. Kozmo was also in other various cities such as Houston and Boston. Due to offering too many different products and expanding in too many locations too quickly, the businesses collapsed.
Not only is that, Kozmo.com seem does not have a very wide client base due to the range of products that Kozmo.com would be able to provide are limited. Kozmo.com’s catalogue featured five main product categories that are entertainment, meals, grocery, drug store and gift shop. And the market of people who really need a DVD player or sweater in an hour is very small. Therefore, Kozmo.com has closed the operations.
The main failure of Kozmo.com was too much competitive around the same area and challenging. At their peak, Kozmo.com was operating in 11 cities including San Francisco, Boston, New York and Seattle. At that time the competitors of Kozmo.com such as Webvan, Sameday.com and Pink Dot, all focused on a single urban area instead of trying to start operations in multiple markets simultaneously.
Besides that businesses of Kozmo.com had not been profitable. They delivered the usual grocery and drug store type items such as food and shampoo, but became too ambitious when Kozmo decided to deliver things like DVD players and other items that were not so cost effective. Kozmo was also in other various cities such as Houston and Boston. Due to offering too many different products and expanding in too many locations too quickly, the businesses collapsed.
Not only is that, Kozmo.com seem does not have a very wide client base due to the range of products that Kozmo.com would be able to provide are limited. Kozmo.com’s catalogue featured five main product categories that are entertainment, meals, grocery, drug store and gift shop. And the market of people who really need a DVD player or sweater in an hour is very small. Therefore, Kozmo.com has closed the operations.
An example of an E-Commerce success and its causes
The example of success of E-Commence business i want to highlight here is E-Bay. Ebay is a business that used of E-Commerce to commence its business. It had successful it business by enrolled it in this field with good strategic planning.Hence, it lead to this business to a long term growth.
The key success of Ebay is cause by the Effective, Persistent Marketing and Public relationship of the owner. By implement the strategic marketing policies in promoting their products and the cheap price quoted, it attracted a lot of customer to view and purchased their product all the times and indirectly continuous increase their profit.
Another cause of their success is Ebay give great customers’ services. Ebay maintain continuous concern on their customer and understand customers’ needs. Maintenance and warranty provided for the customer that purchases their goods and found out damages.
Besides that business on Ebay provided easy and convenience tools for the users to select their items purchases, simply clicking on the product, the design of the webpage will bring customer to another sites of the products. Users’ friendly webpage allows customers to view on details and explanation on the products before making purchases.
Not only that’s, another key success of Ebay is based on the safety banking payment process. Ebay business provide safe environment for the users and customer that browsing their webpage and when they making purchase through the internet, this sites making it private and disallow hacking on customer password by other intentional hackers.
In conclusion, E-Commerce services provided by Ebay keeping on success because their reputation and marketing policies in dealing with customer. This is one of the examples of success that we can refers to.
The key success of Ebay is cause by the Effective, Persistent Marketing and Public relationship of the owner. By implement the strategic marketing policies in promoting their products and the cheap price quoted, it attracted a lot of customer to view and purchased their product all the times and indirectly continuous increase their profit.
Another cause of their success is Ebay give great customers’ services. Ebay maintain continuous concern on their customer and understand customers’ needs. Maintenance and warranty provided for the customer that purchases their goods and found out damages.
Besides that business on Ebay provided easy and convenience tools for the users to select their items purchases, simply clicking on the product, the design of the webpage will bring customer to another sites of the products. Users’ friendly webpage allows customers to view on details and explanation on the products before making purchases.
Not only that’s, another key success of Ebay is based on the safety banking payment process. Ebay business provide safe environment for the users and customer that browsing their webpage and when they making purchase through the internet, this sites making it private and disallow hacking on customer password by other intentional hackers.
In conclusion, E-Commerce services provided by Ebay keeping on success because their reputation and marketing policies in dealing with customer. This is one of the examples of success that we can refers to.
E-Commerce : Reduce cycle time, Improve employees’ empowerment and Facilitate customer support.
Reduce Cycle Time
With e-commerce, now employees have the power to make decision concerning aspects in e-business. Most company have already come out with their own intranets that give employees chances to access to the internal corporate or government network. Besides, they are always updated with the details of its company existing and new products as well as company's activities. They can directly keep in touch with the customer responding to their requests and complaints. By letting them to have power in making decisions, they will be happy and indirectly make them feel contented and competent and even being loyal to their corporation. This will enhance the quality of their working life.
Today, people can easily order materials andreview the status of their orders over the Internet. In addition, the company eliminated redundant data entry, freeing two employees to focus on other tasks.
By allowing customers to track delivery of parcels in real time, the Federal Express website keepscustomers in touch with the location of their goods and when they will arrive. Provision of this sortof information creates greater customer satisfaction and sense of control.
Cycle Time is the amount of time between a customer placing and order and receiving the goods. Reducing cycle times can increase competitive advantage, decrease carrying costs , decrease shrinkage costs and improve cash flow. The need for Government organisations to transmit business information quickly is imperative in today's business environment. With business information exchange between Government organisations, electronic data can be sent and received 24 hours a day. Because electronic data exchange allows business to continue outside the normal business day, the turnaround time for a business transaction can be reduced from days to hours and, in some instances, to minutes.
One of the main advantages of integrating the Internet within the supply chain is the reduced product development cycletime. This means that customers receive their products in a more timely fashion, due to quicker order response. This in turn leads to maintainence of customer service levels and assists in solidifying the relationship with the customer.
Improve employees' empowerment
With e-commerce, now employees have the power to make decision concerning aspects in e-business. Most company have already come out with their own intranets that give employees chances to access to the internal corporate or government network. Besides, they are always updated with the details of its company existing and new products as well as company's activities. They can directly keep in touch with the customer responding to their requests and complaints. By letting them to have power in making decisions, they will be happy and indirectly make them feel contented and competent and even being loyal to their corporation. This will enhance the quality of their working life.
Today, people can easily order materials andreview the status of their orders over the Internet. In addition, the company eliminated redundant data entry, freeing two employees to focus on other tasks.
Facilitate customer support
Building and maintaining customer relationships is the key to success in e-commerce and, unless service is maintained, customer loss may result, more than offsetting any cost efficiencies due to introducing e-commerce technology. Since the core of e-commerce is information and communications, support for managing customer relationships is available to those who know how to use it.
By allowing customers to track delivery of parcels in real time, the Federal Express website keepscustomers in touch with the location of their goods and when they will arrive. Provision of this sortof information creates greater customer satisfaction and sense of control.
Automatic TellerMachines (ATM’s) are now well used by most bank customers, who, although some still expressfeelings about the lack of personal interaction with bank staff, generally would not want to return tothe old system of standing in a queue for personal service. They feel more in control of thetransaction process and can access their information any time.
Publishing Frequently AskedQuestions (FAQ’s) on a website saves customers time and money waiting on the phone for aresponse. They also allow the business to concentrate on generating more business rather thandealing with often simple issues.
about ~HeanHean~
Well…First of all, I never write a blog before therefore it really puzzles me when I start my page on this blog. Therefore, let me start introducing myself. My name is Lee Chien Hean, most of my classmates prefer to call me Ah Hean. I came from Kuala Selangor. Well, the first impression most of you will have when I mention about Kuala Selangor is the yummy seafood and fireflies. However, frankly speaking, although I stay in Kuala Selangor but I only went to see fireflies only once. Unbelievable right? But it’s true! Haha…
I am currently having my education at University Tunku Abdul Rahman in Sungai Long taking Bachelor of Commerce (HONS) Accounting course. I’m currently in Year 3 Sem 1 in tutorial group 11 now and this is my last year to complete my studies. Really looking forward to enter the working life~~ Erm, Tutorial group 11 consist of 8 HANDSOME gentleman (include me ^.^) and 19 BEAUTIFUL ladies~~ I am very happy that I am here in this group because I am having my sweet sweet UTAR life her because of their presence in my life. Everyone in this group are very nice and very talkative…(Don’t come beat me when all buddy saw this post ya!Haha~~)
Regarding my hobby,I like sport activities such as playing basketball, football, swimming, badminton and snooker. You may think that I only involved in healthy activities right? Haha, it is because unhealthy activities cant be mentioned here…The sports I like the most is playing basketball…since I was young, I am already playing basketball…Till now, I still playing basketball at least twice a week, in order to keep my body fit. Well, no choice in order to keep myself fit.. hehe….Besides, I like to play football as well, but friends around me are not really interested in playing football…so I can only enjoy the fun of playing football through computer games - FIFA!!
Recently I am very busy watching Euro Cup 2008, which show live at midnight…I will not miss any of the match because Euro Cup is organize once every 4 years. If u ask me, which team will lift championship cup, I will definitely tell u it's SPAIN~~ because I really love this team very much.
The top 5 website I always surf are:
I’m sure everyone is very familiar with this website. It allows us to know more friends around the world. Besides that, we can post comment to wish our friends during occasions such as birthday and New Year.
I always use this website to check any latest transfer news for football club. This website not only consists of updated football news but also included other sports such as NBA, golf and tennis. So, anyone would like to check for any latest status for sports, I strongly recommend all of you to visit this website
For those who are comic admirer, this website may suitable for u as they upload any latest comic every week…This website consists of thousand of comic. I personally prefer this website very much because it saves my time and money to go to bookshop.
This is a website that allows user to play online game such as big 2 and mahjong. Anyone who are bored or stress in study can try surf this website to play online game. Besides, you may also get to know new friends from other country
bt1.btchina.net
I think this is a quite famous website, this website allow user to download any latest Hong Kong drama(especially for student like me ^.^) or music.
Naughty Lil Gal^Phylis
Hihi..First let me introduce myself..I'm a naughty girl born in Muar, Johor with the name Phylis Phan Sin Yin. I'm 20 years old this year where I find it quite sad to enter into the 20s world.haha...still don wan to admit old..But most of my friends always say that "aiyo..u physically are 20 but ur brain and thinking are only 15 only la". Well, Muar is an excellent place to stay in, although the there is no gigantic shopping centre like Sungai Wang there. Oh ya..Muar is famous with otak-otak..(if you all want to eat, tell me..come my house and we have otak-otak party!!).Muar is very near to Malacca which takes only 45 minutes of journey. We always go Malacca to shopping such as Mahkota Parade and Pahlawan and the most attractive place in Malacca is A' Famosa.
Google is indeed a good searching engine as you can find almost everything you want on a click of mouse. I usually use it to find information as a reference for my assignment
Friendster is the place where I keep myself updated of what my friends are doing and where are them now. It's also a place where I keep myself in contact with them by sending messages.
I use my yahoo mail to email to my friends and keep in touch with my
Viwawa is an interesting online game where I spend most of my times playing mahjong online. I get to know lots of friends through this game. This website also offer some strategy game to tackle our mind.
Ok, ok, enought of Malacca, back to myself. I am currently enrolling in accounting course in University Tunku Abdul Rahman which situated at Sungai Long. I'm very proud to say that i'm in Tutorial Group 11 where I find myself having a bunch of good classmates and friends. They really play an important role in accompanying me walking through this 2 years life of staying away from my sweet home. We share laugher and sadness no matter where we are and what we are doing. They will always be there for me whenever there is any stones or any blockage on the road of my life. Thanks ya buddy~~
Since I'm having my university life, I'm having lots of free time here in Sungai Long. So during my leisure time, I like to watch drama series especially Hong Kong drama because I think it is more straight forward and exciting. I don't really prefer Taiwan drama series which they like to drag the story like grandmother story and I always think that Taiwan drama series too dramatic (those who like Taiwan drama series don't come beat me ya cause above it's purely Phylis Phan's opinion).
I also like to go shopping and I guess all girls like shopping, right? But of course it's after I get my PTPTN loan la..haha..using future money to finance current condition..haha~~not a good practice actually..don't follow ya~~I like to buy Padini concepts store clothes but I also don't know why..Just like to be in that shop.
Beside, I also enjoy sleeping very much because there is a proverb in Chinese saying 'getting rest is to be prepared for a longer journey'. You guys must be thinking, "aiya..this is just an excuse to be lazy"..haha~~Indeed! I don't know why I just enjoy the feeling of lying on my bed. Once I'm on my bed, nothing can drag me out of there. Haha~~
Surfing Net is also one of my favourite activity. I guess most of the teenagers will choose it as their hobby. I have chosen 5 out of the various website I like to visit to share with all of you.
Google is indeed a good searching engine as you can find almost everything you want on a click of mouse. I usually use it to find information as a reference for my assignment
Friendster is the place where I keep myself updated of what my friends are doing and where are them now. It's also a place where I keep myself in contact with them by sending messages.
I use my yahoo mail to email to my friends and keep in touch with my
friends that are located all over the world.
Viwawa is an interesting online game where I spend most of my times playing mahjong online. I get to know lots of friends through this game. This website also offer some strategy game to tackle our mind.
Wednesday, June 11, 2008
Silence means gold _Khai Ying
Hi…! Nice to meet you all…Let me briefly introduce myself….My name is Chan Khai Ying. I am just a simple and ordinary girl… shy, quiet, sensitive….that is what my friends always think of whenever I appear before them. I was born in 18 October 1985 and that makes me a Libra. I came from Penang, which is known as ‘The Pearl of the Orien’ and having a reputation as a food paradise. Penang is a place that has many delicious foods such as Char Koay Teow, Laksa, Satay, Hokkien Mee and more. I love my hometown very much. Gurney Plaza is one of the famous shopping mall in Penang. I always go shopping with my best friends during weekend whenever I’m having my semester break.
http://www.gougou.com – I use this website to download my favorite songs and latest movies.
http://www.hotmail.com – I do check my mail everyday when I am free and contact with friends through email.
Now, I am studying at University Tunku Abdul Rahman (UTAR) located Sungai Long. I am undertaking accounting course and currently in Year 3 Semester 1. Two more semesters and I can complete my degree. Hope everything will go smoothly as it was. The same goes to everyone in Year 3 Sem 1. Since I entered UTAR, I got a nickname “Panda”, because I have dark circles under the eyes. Haha~~ But I like the name very much..
I like listening to music and singing karaoke. Music has always been a big part of my life but the only instrument I know how to play is the CD player. Since small I really have the ambition to become a musician.. But of course it’s just a small kid ambition. When I grown up, I know I don’t have the talent. Keke….. Shopping is also one of the activities I like the most to fill up my leisure time. But most of the time I just window shopping because as you know things are getting more expensive as petrol prices keep shooting up like rocket. Beside that, when I am free, I like to travel. I promised myself, if I manage to save money, the country I would like to visit the most is Paris. I think travelling is the best way to relax after working hard for some time.
Top 5 websites I visited the most are:-
http://www.friendster.com/– It allows me to keep in touch with my old friends, friends who have lost contact for long time and update myself regarding my friend’s recent situation. I also can get to know new friends from here.
http://www.google.com/ – Google is a good search engine for me to find information when I am doing my assignment and homework.
http://www.gougou.com – I use this website to download my favorite songs and latest movies.
http://www.hotmail.com – I do check my mail everyday when I am free and contact with friends through email.
K-queen ~ ciew hoiew
Hello, my name is Lim Ciew Hoiew. I am a 20 years old girl, pursuing Bachelor of Commerce in (Hons) Accounting, in University Tunku Abdul Rahman. I am now in Year 3 Semester 1 now. I am from Klang, Selangor.The most famous food there I am sure u all will know that the most famous food in Klang is “bat kut teh”. Even I myself also enjoy it. My favorite singer is Wang Lee Hom. His songs are really different from others and I like him so much. Of course, he is really very handsome and I am just addicted to him.
I have 4 siblings including me. I am the elder sister in my family. I am enjoying my lifestyle now just like anyone else teenage. Erm….I have a lot of hobbies which include swimming, net surfing, reading novel, outdoor activities watching movies. I like singing karaoke at Green box the most because I like the feeling of screaming out my emotion to release tension and stress from studies.
People who don’t know me will be hard to see deep down inside me because I’m the type of girl who always hide my feelings to myself...haha…I like surfing net a lot. It helps me to reduce my stress sometimes and finding enjoyment through it. A lot of activities can be carry out such as knowing friends, searching song and playing game.
Well, I usually visited this 5 websites :-
http://www.friendster.com/ – It allows me to know more friends around the world. I am sure now teenage all know this website because it was fun actually.
http://www.haoting.com/ –For searching music, I like this website very much and I could heard song online.
I have 4 siblings including me. I am the elder sister in my family. I am enjoying my lifestyle now just like anyone else teenage. Erm….I have a lot of hobbies which include swimming, net surfing, reading novel, outdoor activities watching movies. I like singing karaoke at Green box the most because I like the feeling of screaming out my emotion to release tension and stress from studies.
People who don’t know me will be hard to see deep down inside me because I’m the type of girl who always hide my feelings to myself...haha…I like surfing net a lot. It helps me to reduce my stress sometimes and finding enjoyment through it. A lot of activities can be carry out such as knowing friends, searching song and playing game.
Well, I usually visited this 5 websites :-
http://www.friendster.com/ – It allows me to know more friends around the world. I am sure now teenage all know this website because it was fun actually.
http://www.hotmail.com/ – I am sure everyone need an email to check their mail. This is also my routine as well. I choose hotmail because it is more convenient. Until now, it had provide 5 gb storage of mail and I believe that other mail services can't satisfy me.
http://www.yqxsj.com/ – I enjoy this site because I will always browse here to get the latest novel and read it online.
http://www.haoting.com/ –For searching music, I like this website very much and I could heard song online.
http://www.tom365.com/ – I often download movie or drama too… I can always get the latest movie here.
Subscribe to:
Posts (Atom)