-
what's your opinion ? :
0 comments

Nowadays, computer and internet are very common to everyone. Internet is a public network of nearly 50,000 networks connecting millions of computers throughout the world. For an example, we will rely on computer to save our personal data and using online financial services to do financial transactions such as online banking in order to safe time. Unfortunately, hackers have the ability to intercept and use that information, such as credit card numbers and expiry dates, to falsely do transactions. Therefore, it is important that users should take action to protect their data from loss, damage and misuse.
There are some suggestions on how to safeguard our personal and financial data:
1. Create passwords and PINs that would be hard for others to guess. Use a strong password or pass-phrase to protect your access data.
2. Install antivirus software and spyware protection software which can helps you to completely clean your computer of invasive threats. As a result, your computer will be clean and its performance will be better.
3. Use your own computer, instead of a work or public machine, to access financial and other sensitive personal information.
4. Do not reveal any personal information or particularly passwords to anyone and other unknown parties. Always remember to log out properly after using any of the Financial Data Center.
5. Use a variety of encryption techniques to keep data secure and private. Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.
6. Pay attention when using an ATM and keep your eyes peeled for anyone who seems a little too interested in your transactions.
7. Keep credit cards to a minimum. Store your card in a safe place and avoid giving the number to others. Only keep the ones you actually use and destroy any that you no longer use by shredding them.

http://www.ftc.gov/infosecurity/ (A guide for business in protecting personal info)
-
what's your opinion ? :
0 comments

As Internet use is developing, more and more people rely on computers to create, store and manage critical information. Consequently, it is important for users to aware that computer security plays a major role in protecting their data from loss, damage, and misuse. Similarly, online security has been online trader’s main concern in protecting their websites from potential threats, such as phishing, security hacking, information theft, virus, worms and etc.
There are few type of internet threat that appear in the internet, let us go through three of the most popular threat:
Virus is a malicious software that attaches itself to other software. For example, a patched software application in which the patch's algorithm is designed to implement the same patch on other applications, thereby replicating. It replicates within computer system, potentially attaching itself to every software application. Behavior categories of viruses are Innocuous, Humorous, Data altering and Catastrophic.
Worm is another malicious software which is a stand alone application. It's often designed to propagate through a network, rather than just a single computer. When your computer is infect of worm, computer will slow starting or slow running. It'll also face unexpected or frequent system failures.
Trojan Horse is a worm which pretends to be a useful program or a Virus which is purposely attached to a useful program prior to distribution. It's same as Virus or Worm, but also sometimes used to send information back to or make information available to perpetrator. Trojan unlike worms, which self propagate, requires user cooperation.
A back door is a set of instructions in a program that allow users to bypass security control when accessing a program, computer, or network. Once perpetrators gain access to unsecure computers, they often install a back door or modify an existing program to include a back door, enabling them to continue to access the computers remotely without the user’s knowledge.
A must read blog...
http://googleonlinesecurity.blogspot.com/
-
what's your opinion ? :
0 comments
E-commerce can be defined as a modern business methodology that addresses the needs of organizations, merchants, and consumers to cut costs while improving the quality of goods and services and the increasing speed of service delivery, by using Internet.
HISTORY OF E-COMMERCE
Development of EC applications started in the early 1970s with electronic funds transfer (EFT),
Electronic data interchange (EDI) was then developed in the late 1970s to improve the limitation of EFT. EDI enlarged the pool of participating company from manufacturers, retailers, services, and others. Such systems were called Interorganizational System (IOS).
An Interorganizational System (IOS) allows the flow of information to be automated between organizations to reach a desired supply-chain management system, which enables the development of competitive organizations.
From the 1990s onwards, electronic commerce would additionally include enterprise resource planning systems (ERP), data mining and data warehousing.
The term ‘ which refers to the computer-based systems used to perform financial transactions electronically. However, the use of these applications was limited to financial institutes, large corporations, and some daring businesses.electronic commerce’ was coined in the early 1990s when Internet became commercialized and users began flocking to participate in the World Wide Web. EC applications were then rapidly expanded.
Possibly EC is introduced from the Telephone Exchange Office. The earliest example of many-to-many EC in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. The first online information marketplace, including online consulting, was likely the American Information Exchange, another pre-Internet online system introduced in 1991.
EVOLUTION OF E-COMMERCE
Since 1995, many innovative applications, ranging from direct online sales to e-learning experiences had been developed. Almost every organization in the world has a Web site.
In 1999, the emphasis of e-commerce shifted from B2C to B2B.
In 2001, from B2B to B2E, e-government, e-learning, and m-commerce.
In 2005, social networks started to rise and so did l-commerce and wireless applications.
E-commerce will undoubtedly continue to shift and change in the future.
Year - Event
1984 - EDI, or electronic data interchange, was standardized through ASC X12. This guaranteed that companies would be able to complete transactions with one another reliably.
1992 - Compuserve offers online retail products to its customers. This gives people the first chance to buy things off their computer.
1994 - Netscape arrived. Providing users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer.
1995 - Two of the biggest names in e-commerce are launched: Amazon.com and eBay.com.
1998 - DSL, or Digital Subscriber Line, provides fast, always-on Internet service to subscribers across California. This prompts people to spend more time, and money, online.
1999 - Retail spending over the Internet reaches $20 billion, according to Business.com.
2000 - The U.S government extended the moratorium on Internet taxes until at least 2005.
More about e-commerce history, check out the website below..
http://www.ecommerce-land.com/history_ecommerce.html