Sunday, June 28, 2009

How to safeguard our personal and financial data




How to safeguard our personal and financial data


Internet is a public network of nearly 50,000 networks connecting millions of computers throughout the world. Nowadays, most people rely on the internet to store, create and manage critical information. Information transmitted over the internet is more vulnerable and has a high degree of security risk. Since they are publicity, the internet users are facing many problems that their personal and financial data has been stolen. Hence, we should take some actions to increase the internet security and prevent data from being stolen.

There are some approaches on how to safeguard our data:

1. Set up username and password

Setting up the username and password is the most common ways that people use to ensure security from being stolen by third parties. However, the password used must be longer since it provides greater security than the shorter ones. Furthermore, avoid using passwords that are easy for someone to guess, such as date of birth or hand phone number and never write it down. Not only that, we could not disclose password that related our personal data and financial data to third party and change it frequently.

2. 2. Encrypt the data before send it out

Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access. When the data is transmitted from one location to another, we should encrypt the information before sent it out since outsiders are unable to read the encrypted message. In order to protect data on the internet and networks, individual may use a variety of encryption techniques to keep security and privacy of data.

3. Installation of Firewall and Anti-Virus

The simplest way to protect personal and financial data is through use of firewall and anti-virus which enable the users to protect them from worms and Trojans. Nowadays, AVG and MC Afree and Symantec are popular software used by the computer users. Users can use firewalls to protect their computers and data from unauthorized intrusions. In addition, the firewalls can prevent the hackers from hacking our data. Moreover, we have to install the antivirus software to protect against some viruses that are very harmful. Generally, the antivirus software has the automatic update feature which provides the better protection from the new virus that popping up from the internet.

4. Biometric device

Biometric device is an access control to safeguard our personal and financial data. It grant access to programs, computers, or rooms using computer analysis of some biometric identifier such as fingerprint scanners, face recognition system, signature verification systems as well as iris recognition systems. Today, biometric devices are gaining popularity as a security precaution since they are a virtually foolproof method of identification and authentication.


Saturday, June 27, 2009

The application of Third party certification programme in Malaysia

Third-party certification is a scientific process by which a product, process or service is reviewed by a reputable and unbiased third party to verify that a set of criteria, claims or standards are being met.
Certification authority (CA) is an entity that issues digital certificates for use by other parties. It is an example of a trusted third party.



VeriSign, Inc. is one of the certification authorities. It is an American company based in Mountain View, California that operates a diverse array of network infrastructure, including two of the Internet's thirteen root name servers, the generic top-level domains for .com and .net. It is the leading Secure Sockets Layer (SSL) Certificate Authority which also enabling the security of e-commerce, communications, and interactions for Web sites, intranets, and extranets. It provides security solutions to protect an organization’s consumers, brand, Web site, and network. Besides, it also provides a variety of security and telecom services ranging from digital certificates, payments processing, and managed firewalls to mobile call roaming, toll-free call database queries and downloadable digital content for mobile devices. The company groups all of these functions under the banner of 'intelligent infrastructure' services.



MSC Trustgate.com Sdn Bhd is also a licensed Certification Authority (CA) operating within the Multimedia Super Corridor. MSC Trustgate was incorporated in 1999 to meet the growing need for secure open network communications and become the catalyst for the growth of e-commerce, both locally and across the ASEAN region. At present, MSC Trustgate has 12 million in paid up capital.
Trustgate is also licensed under the Digital Signature Act 1997 (DSA), a Malaysia law that sets a global precedent for the mandate of a CA. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development.




Examples of Phishing and Its Prevention Methods


What is Phishing??

Phishing is intentional acquiring of personal and sensitive information from the victim by masquerading as a business or individual. A scammer tries tricking someone at the website to obtain private information such as username, passwords and credit card numbers. It is usually carried out by e-mail or instant messaging and directs user to enter their personal information at a fake website. Normally, it is largely used in paypal, and others similar payment processors for instant banks, credit cards and eBay.

You might see a phishing scam
  • In e-mail messages, even if they appear to be from someone you know.
  • On your social networking website.
  • On websites that spoof your familiar sites using slightly different web addresses, hoping you won’t notice it.
  • In your instant message program.
  • On your cell phone or other mobile device.

Examples of Phishing

Example 1: Phishing scam in e-mail message

The scam artists may place a link in them that appears to go to the legitimate website (1), but actually takes you to a phony scam site (2) or possibly a pop-up window that looks exactly like the official site.

Example 2: Obfuscated URL

This example uses a technique known as URL spoofing. The origin of this technique is that a malformed URL will not be displayed properly by certain web browsers, and this allows the hacker to trick you into thinking you are on a legitimate website.

In this example, the hacker sends an email containing a graphic asking you to click the link:

Despite appearance, the link tries to take you to:

http://olb.westpac.com.au[special unprintable characters]@68.112.112.35:8888/asp/index.htm


The nature of the web browser fault is that everything after the special unprintable characters will not be shown in the address bar, so all you see is http://olb.westpac.com.au, which makes you believe that you are on the real Westpac website.

For most recent information please visit to the Antiphishing Website:

http://www.antiphishing.org/

How to prevent Phishing??

Never give sensitive personal information in a message

Be very skeptical of any emails, instant message or pop-up window that asks for your personal information. If a bank or other company really needs to get some specific information from you, they'll most likely send it in writing or via a secure email.

Make sure the website is legitimate

Do not simply enter personal information unless you're sure it is to a website you are trusted and that the site takes appropriate steps to protect your data.

Be wary of clicking a link in a message or pop-up window

If you get an e-mail, instant message, or pop-up window that asks for personal information, do not click the link. Because it may take you to a phony site where any information you give may be sent to the phisher who built it. If you’re in doubt call the company to ensure that whether any messages are sent by them.

Improve your computer's security

Phishers hope you haven't been applying the latest security fixes, and may try to take advantage of these vulnerabilities. Some phishing e-mail may contain malicious or unwanted software that can track your activities or simply slow down your computer. Therefore, you should update your computer system regularly.

Friday, June 26, 2009

The Threat Of Online Security: How Safe Is Our Data?

No doubt that Internet is not only a public system in which every transaction can be tracked, logged, monitored and stored in many locations, it is also one of the resources for computer users to search their information. Due to this apparent convenience, it provides the opportunities for them to share the knowledge without filtering the content. Thereafter, everyone can indirectly learn skills that may jeopardize online security through Internet and this directly enhance the online security risk. Thus, it is essential for computer users to clearly understand those potential online security threats that may interrupt their data.

The potential online security threats that can be discovered are listed as follows:

Cybercrime is defined as online or internet-based illegal acts. This may occur when hackers, crackers and corporate spies access computers and networks illegally with the intent of destroying data, stealing proprietary data and so on.

Besides that, Phishing is a scam in which a perpetrator sends an official looking e-mail that attempts to gain your personal information and financial information. For instance, some phishing e-mail messages ask you to reply with your information, or a pop up window that looks like a website that collects the information. The damages caused by phishing can be serious. The following case depicts the online security threat that is caused by phishing.

In 21 June 2007, a spear phishing incident at the Office of the Secretary of Defense (OSD) stole sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD. This incident has cost administrative disruptions and personal inconveniences, as well as huge financial loss in making system recovery.

On the other hand, Internet and network attack that jeopardize online security include virus, worm, and Trojan horse. Virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Virus attack can damage the operating system, causing the loss of data and other possible losses. Furthermore, worm can be expressed as a program that copies itself repeatedly. The repeatedly copied files use up the available space and slow down a computer operating speed. In addition, Trojan horse refers to a program that hides within or looks like a legitimate program. Regardless they seem to be harmless, they may however be triggered if certain condition is certified.

Last but not least, back door is a set of instructions in a program that allows users to bypass security control when accessing a program, computer, or network. Once perpetrators gain access to unsecured computers, they often install a back door or modify an existing program to include a back door, enabling them to continue to access the computers remotely without the user’s knowledge.

As a conclusion, online security threats are very real, but if you know how you become vulnerable, you will be able to better protect yourself. You should be able to get online without constantly worrying, and you can! In other words, data safeguards developed must be always up to date in order to increase the defenses against online security threats. At the same time, computer users must be educated and equipped for the information of the crucial damages and losses that caused by imposing online security threats.

References:
http://www.govexec.com/story_page.cfmarticleid=39456
http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history

Thursday, June 18, 2009

An Example Of E-Commerce Failure And Its Causes

Toys R Us Company is one of the examples of the ecommerce failure which I would like to share with everyone. This company is the leading retailer of toys, children’s apparels and baby products in the world. It provides customers with an unparalleled online selection of distinctive toy and baby products. In 1999 Toy R Us announced to create an e-commerce subsidiary – ToysRus.com. It has established as a video game, premier online toy and baby store outlet.

There are few reasons that cause Toys R Us Company towards its failure. The main reason is the formation of the company convert to the e-commerce system. Frankly, not all the company possess huge capital to invest in e-commerce system especially small company since it is large expansion for the company. Hence, if the company face the economy crisis due to the large expansion, it will influence the milestone of the company in the future.

Moreover, when Toys R Us Company changes into the e-commerce system, they neglect some common factors that will affect the operation of the company during the holidays. Shipping product takes man power during the holiday season. It will tend to slow down the process simply by the sheer volume of orders of the mail service industry receives in that short period of times.

On the other hand, the another cause of the Toy R Us Company is the inability of the customer to choose the product that are more effectively sold online than in the real world. Particularly online clothing shopping requires the customer to conjecture at what they had looked at the garments through the website. Further, the company will produce a fictitious image to catch the consumers’ attitude to purchase their products. It makes the customer hesitate for purchasing products presented on the website.

Lastly, the failure cause is delivery service provided by the company. As we know that, while delivering cannot be offered on time, the customers can request for the compensation. As a result, failure to deliver the ordered stock on time to customers created Toy R Us Company give away hundreds of $US100 vouchers to displeased customers.

Revenue Model for Google, Amazon.com and eBay

Revenue models are defined how a company creates their revenues and hence they are an integral part of business models. Revenue model also can produce a superior return on invested capital. The major types of revenue models are:

Advertising revenue model: A company provides a forum for advertisements and receives fees from the companies that advertise their products.

Affiliate revenue model: A company receives commissions for referring customers to others web sites.

Sales revenue model: A company gets the revenue by selling goods, information or services.

Subscription revenue model: A company charges a subscription fee for the users that access to the content and services offered.

Transaction fee revenue model: A company receives a commission for enabling or executing a transaction. It is based on the volume of transactions made.

Now, I’m going to compare the revenue model for Google, Amazon.com and eBay.

Google, Amazon.com, and eBay have been viewed as big e-commerce merchants and took over the lead of e-market.

Google’s Revenue Model

Google Inc is an American public corporation, earning revenue from advertising related to its Internet search, web-based e-mail, online mapping, office productivity, social networking, and video sharing as well as selling advertising-free versions of the same technologies. The principal services offered by Google include Google AdWords and Google AdSense.

Google AdWords which offers pay-per-click (PPC) advertising, site – targeted advertising for both text and banner ads. This program includes local, national, and international distribution. Google’s text advertisements are short, consisting of one title line and two content text lines.

Google AdSense is an ad serving program. Website owners can enroll in this program to enable text, image and, video advertisements on their sites. These ads can generate revenue on either a per-click or per-thousand-impressions basis.


Amazon.com’s Revenue Model

Amazon was one of the first major companies to sell goods by Internet.Amazon.com started as an on-line bookstore, but soon diversified to product lines of VHS, DVD, music CDs, MP3 format, computer software, video games, electronics, apparel, furniture, food, toys, etc. Amazon.com successfully earned distributed transaction fees which are fixed at price through creating virtual marketplace. However, Amazon is also a pioneer in affiliate partnership marketing.

Amazon Marketplace is Amazon.com’s fixed price online marketplace that allows sellers to offer their goods alongside Amazon’s offerings. Buyers can buy new and used items sold directly by a third party through Amazon.com using Amazon Marketplace. This sales strategy and program has been very profitable for Amazon.com. Amazon charges a commission rate based on the sale price, a transaction fee, and a variable closing fee which are sales revenue model and transaction fee revenue model.

eBay’s Revenue Model

eBay popularized the auction format listing. Like most auction companies, eBay does not actually sell goods that it owns itself. It merely facilitates the process of listing and displaying goods, bidding on items, and paying for them. It acts as a marketplace for individuals and businesses that use the site to auction off goods and services.

eBay offers several types of auctions such as below:

1. Auction-style listings allow the seller to offer one or more items for sale for a specified number of days. The seller can establish a reserve price.

2. Fixed Price format allows the seller to offer one or more items for sale at a Buy It Now price. Buyers who agree to pay that price win the auction immediately without submitting a bid.

3. Dutch Auctions allow the seller to offer two or more identical items in the same auction. Bidders can bid for any number from one item up to the total number offered.



An Example of E-commerce Success and Its Causes


Due to the evolution of internet, e-commerce has become more and more popular. Nowadays, many companies and individual are started to run an online business. The appropriate example of e-commerce success that I have selected to address is eBay.

eBay is the world’s largest online marketplace, where allows buyers and sellers to come together and trade anything at any time. It was founded in year 1995, by Pierre Omidyar, a computer programmer. eBay provides an online platform where millions of items are traded everyday.

eBay has become a well-known online auction website, because it has built an online person-to-person trading community, using the World Wide Web. It provides a convenient way for buying and selling online. Sellers list the item on eBay, such as antiques, cars, books and etc. They choose either bid for the item (an auction-type listing) or to select the ‘Buy It Now’ option, which allows buyers to purchase the item right away at a fixed price. Buyers can browse through the listed item in a fully automated way. Those item are arranged by topic, where each type of auction has its own category.

Another factor is that online shopping has become more and more popular and people enjoy the experience of the online shopping. A lot of people like to shop on
eBay, because they believe that it is a trustworthy shopping website, and they feel comfortable to shop there, therefore it has become a very practical place that people will buy and sell things.

Recognizing the success of e-commerce relies on the number of users. There are more than 100 million people around the world who buy and sell in
eBay marketplace. eBay makes its money from listing and collect the fees from registered users who use eBay site to trade their goods. In year 2000 eBayset up the 'eBay University', which is a learning program that help people to become successful eBay merchants. It encouraged people to deal in online business and make profit through the eBay system.

Related links:

http://www.ebay.com/

http://www.ecommercetimes.com/story/2127.html?welcome=1213184390

The History And Evolution Of E-Commerce

* Introduction *

Electronic commerce (e-commerce) can be defined as the buying or selling of goods and services over the Internet. This basically is the use of digital transactions between and among businesses and individuals. However, more commonly e-commerce nowadays is the use of the Internet to operate business.


* The History Of E-Commerce *

History of ecommerce dates back to the invention of the very old notion of “sell and buy”, electricity, cables, computers, modems, and the Internet. At the beginning, the term of e-commerce meant the process of execution of commercial transactions electronically with the help of the leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT).

However, in 2000, since there are a great number of business companies in the United States and Western Europe represented their services in the World Wide Web, the meaning of the word e-commerce was changed. People began to define the term of e-commerce as the process of purchasing of available goods and services over the Internet using secure connections and electronic payment services.

By the way, the history of e-commerce is unthinkable without Amazon which was among the first Internet companies to allow electronic transactions. Amazon.com, Inc. is one of the most famous e-commerce companies and it is located in Seattle, Washington (USA). It was founded in 1994 by Jeff Bezos and it was one of the first American e-commerce companies to sell products over the Internet.

* The Evolution Of E-Commerce *


The evolution of the e-commerce is summarized as follows:

1984
EDI, or electronic data interchange, was standardized through ASC X12. This guaranteed that companies would be able to accomplish transactions with each other reliably.

1990
A researcher named Tim Berners-Lee at the European Organization for Nuclear Research (CERN, from its French name) proposed a hypertext-based web of information that a user could navigate using a simple interface called a browser. He called it the "WorldWideWeb".

1991
The National Science Foundation lifted a ban on commercial businesses operating over the Internet, paving the way for Web-based e-commerce.

1992
Compuserve offers online retail products to its customers. This gives people the first chance to buy things by using their computer.


1993
Marc Andreesen at the National Center for Supercomputing Applications (NCSA) introduced the first widely distributed Web browser called Mosaic.


1994
Netscape arrived. Providing users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer.


1995
Two of the biggest names in e-commerce are launched: Amazon.com and eBay.com.

1998
DSL, or Digital Subscriber Line, provides fast, always-on Internet service to subscribers across California. This prompts people to spend more time, and money, online.


1999
Retail spending over the Internet reaches $20 billion, according to Business.com.

2000
The U.S government extended the moratorium on Internet taxes until at least 2005.

Today
The largest electronic commerce is Business-to-Business (B2B). Businesses involved in B2B sell their goods to other businesses. Other varieties growing today include Consumer-to-Consumer (C2C) where consumers sell to each other, for example through auction sites. Peer-to-Peer (P2P) is another form of e-commerce that allows users to share resources and files directly.


As a conclusion, the history and evolution of e-commerce is a history of a new, virtual world which is evolving according to the customer advantage. It is a world which we are all building together brick by brick, laying a secure foundation for the future generations.



All information are gained from
(i) www.ecommerce-land.com/history_ecommerce.htm
(ii) www.flysyk02.netfirms.com/Ecommerce/History.htm
(iii) www.mapsofworld.com/referrals/internet/internet-history/history-of-e-commerce.html
(iv) www.ecommercetimes.com/story/40249.html
(v) www.ecommerce-guide.com/news/trends/article.php/1016231

Thursday, June 11, 2009

~ Kimyap Chen ~

My name is Chen Kim Yap. I am an undergraduate Bachelor of Commerce Accounting student in University Tunku Abdul Rahman. I live in Kepong but I move to Sungai Long for studying. I miss my family, so I travel back to Kepong every weekend.

My hobbies are listening to music, watch movie and sing in KTV. I am the regular customer of Green Box. I love sport especially badminton, basketball and football. I like to watch football matches, even though I need to wake up late at 3am sometimes for the matches. My favorite team is Manchester United. Besides, I like to surf internet for interesting news and gain some extra knowledge form internet. Last but not least, I like to sleep definitely!

The top 5 websites I always visit are:
1)
http://www.hotmail.com/ – I will check my mail everyday in order to keep updated.
2)
http://www.facebook.com/ – I will keep in touch with my friends in secondary school and university and also my family.
3) wble.utar.edu.my – I will check new updated information that uploaded by lecturer or tutor.
4)
http://www.google.com/ – I use this search engine to find a lot of useful information. It is especially important when I am doing assignments.
5)
http://www.youtube.com/ – I always find music video in youtube and some television programme in youtube because I don’t have a television in my house in Sungai Long.

I will log in to Window Live Messenger everyday to chat with my friends and family. I have a younger sister who studies in UTAR Kampar campus. We used to keep in touch by chatting or video call. Besides, I will download music and video from internet. I will check my mail everyday and also view my friends profile in facebook. I play online games sometimes when I am so tired thinking of assignments.

~ Eva Tang Ming Cheong ~

My name is Eva Tang, currently a student in Universiti Tunku Abdul Rahman pursuing my Bachelor degree in Commerce Accounting. I decided to major in accounting course because I have a great passion in mathematics and accounting during my secondary school.

I prefer to watch movie during my leisure time. However shopping is my all time hobby. Usually I do my shopping in major shopping complexes such as Sunway Pyramid, Mid Valley, Sg wang, Berjaya Times Square and many more. My favorite store would be Forever 21, MNG, Zara, and Padini Concept. They have a wider range of selection and offer a better quality of clothing to their customers.

I will visit Facebook frequently which makes it number one in my list. Facebook keeps me connected with my friends and family no matter where their location is. Not only that, it also providers me entertainment as they have a lot of interesting games to play such as Restaurant City, Pet society, Geo challenge and many more. Second on my list would be
http://www.y8.com/, I can play free online flash games thru this website. This is my only source entertainment as I do not have a television. Not only that, I can play games to fill up my leisure time. Youtube is also only of my favorite website to visit. I can find a lot funny videos as well as movies from this website. Not only that I can also find educational videos to help to support my assignment and enhance the creativity of my presentation. JBtalk is also another frequent website I would visit. There I can find interesting and weird topic from this website. Not only that I am able to post my opinion and ideas to discuss on a matter or subject of my interest. Lastly would be blogspot.com. There I can do online shopping, search for interesting discussion, as well as reading the blog of our ex-prime minister Dr Mahathir Mohammad.

I would use the internet as an entertainment tool, mostly to play game or watch movies online. Secondly, Internet is also important for me to find my information for my assignments. It also keeps me updated with the world news. Thirdly, internet acts an important communication tool in today’s world, Program such as Window Messenger and Skype keeps people around the globe connect free of charge. Not only that, I will use the Internet to download movies or journal. Journal is important to explore what I’m studying and expand my knowledge. Lastly, Internet is useful for socializing. Socializing is important in today’s world. Getting to know more people can help in getting business connection, searching for help and many more.

That’s all about me for now. Thanks you for reading.

~ Tsueying Leaw ~

Hello, nice to meet you all. My name is Tsuey Ying. This is my first time to write my own blog. I' m 21 years old. But I look younger than my actual age. I' m a year 3 sem 1 student, and studying in the University Tunku Abdul Rahman. I was born in Johor Bahru, it is a prosperous city and I feel comfortable to live there. I love my family member, because they are always support me in whatever I do. Since year 2007, I have left my hometown and started my new life in Kuala Lumpur. I became more independent because I need to do everythings and settle all the problems by myself. I have met many friendly friends here and I' m enjoying my university life.

During my free time, I like to listen to the music, I love all pop and love songs. I also enjoy watching drama series at home. Sometime, I will go shopping and watching movie with my friends, I like to hang out with them because I feel happy to stay with them.

Top 5 website that I like to visit the most:

1) www.facebook.com - I like to make friends all over the world.
2) www.hotmail.com - I can get many interesting informations that are sent by my friends. But I hate the junk mail.
3) www.youtube.com - I like to watch various types of video through this website.
4) www.google.com - It is an useful website that I can search for the information that I am needed.
5) www.nst.com.my - It is an online newspaper. I can know the news that happened in our country.

There are many things that we can do through the internet. Usually, I will chat with my friends via MSN, I can keep in touch with them, although we stay in different places. I like to play online games. Besides that, I can download my favourite songs and movies for free and surf for the information that I am needed for my assignment. Internet also allows me to pay my bills through the online payment services, therefore I can pay my bills at any time.

Thanks for viewing our blog. Have a nice day. ^^




~ Karman Lau ~

* Introduction *
My name is Karman Lau, 20 years old. I come from Lahad Datu, Sabah. As compare with Kuala Lumpur, I prefer stay at the latter place. This is because Kualau Lumpur has more shopping malls, entertainment places, vacation islands and so forth. Now, I am undertaking a degree academic progamme at Universiti Tunku Abdul Rahman, which is Bachelor Of Commerce (Hons) Accounting. I have one more year to go to accomplish it. After that, I am deciding to sit for ACCA papers. In addition to that, my father has asked me to pursue a master academic programme. For me, it is ok because I am still young. Hopefully, every planning will be on going smoothly and successfully.
* My Family *
My family is consisted of four members, which are my grandfather, my father, my mother, and I. My father is working as a mechanic, whereas my mother is a business woman. They cannot live without my voice, as a result, even though I am studying at KL now, they still will make a call to me everyday. Hereby, I would like to tell them that I love all of you very much. Muacksssss. Furthermore, I wish my parents can add my "salary" from RM 800 to RM 1000 every month. The reason is that since the petrol oil has been increased, and this brings a huge consequence that all the daily expenses will be directly affected. Therefore, if I still receive a RM 800-salary, I think I cannot survive anymore. Hehehehe...
* My Hobbies *

Unlike other boys, my main hobby is shopping. The reasons are shopping can make me happy, can help me to release my pressure, as well as can extend my fashion knowledge. Sometimes, shopping can also help me to "search fish". If you ask: what you can buy during shopping? I think the answer is facial product. The first time when I used Shiseido's products at 18 years old, I have really fallen in love with it. Until now, I am still keeping on using it as my facial treatment product. Among this few years, I have introduced this perfect brand of facial product to my closet friends. And, my friends have strongly agreed with it's miracle and amazing effects. See, how perfect it is. Now, let me share with you regarding the Shiseido products that I am using now:


Cleanser: Brigthening Cleansing Foam (White Lucent)

Softener: Hydro-Nourishing Softener (The Skincare)

Mask: Purifying Mask (The Skincare)

Essence: Pore Minimizing Cooling Essence (Pureness)


Besides that, my second hobby is sleeping. My housemate, Catherine has also agreed with this statement. She also calls me "Day Dreammer". I love sleeping because it can help me to temporarily forget all the complicated things in this real world. In addition, sleeping can also help me to keep my face's condition perfectly. So, why not?

My third hobby is playing badminton. My mother always asks me go to play badminton because it can grow me up. But, for me, I disagree with my mother statement. The reason is that when I am Senior Three, I tend to play badminton, unfortunately I still so short today. As a conclusion, the fact tells me that playing badminton not the best choice for growing up.
* Top 5 Websites *


Like what I have mentioned above, I extremely like to buy facial product. Therefore, I tend to visit cosmetic website, especially shiseido website. Via this website, I can identify which product is suited for my skin, I can know the product price, as well as I can know the product ingredient.




I am a resident of Sabah. Consequently, if I want go back to my hometown, I need to surf this website in order to book a cheaper flight ticket. Through this website, I can learn how to book a flight ticket and check when there is a cheaper-flight-ticket-promotion.



I am the fan of chinese drama, especially Hong Kong Chinese Drama. However, in my KL house, I do not have TV. As a result, I need to log in UTUBE to watch my favour chinese drama. Utube not only provides a "room" for us to watch chinese drama, it also provides a out-of-charge service that let us to freely watch chinese drama.



Like every one, I usually go this website to check my mail box. Besides that, this website provides a way for me to send an email to others. It is very convenient when doing assginment. We always submit our assignment draft to other members through this website.




As a teenager, we always want to recognize new friends. This website provides us a "place" to recognize new friends. Over there, we can recognize different race and country friend in this world. It also provides a list of game for us to play. For instance, restaurant city, geo challenge, pet society and so on.

* Top 5 Internet Activities *

The main internet activity for me is to search my facial treatment product. Moreover, I usually log in internet to play games. Also, I will download some chinese drama from internet when I am free. During assignment season, I will surf the internet for searching some important information for my assignment references. Last but not least, I will log in the internet to check and buy flight ticket and online shopping.
********** THE END **********