CORPORATE BLOGGING


CORPORATE BLOGGING
So, the things that consumer take note to prevent e-auction fraud would be as follow:
Pre-paid cash card
The prepaid card is far from a new idea. The concept is basically the same as a prepaid gift card or a mobile phone SIM card. A prepaid cash card looks like a credit or debit card, and gives users the ability to purchase products and services with a card but with a crucial difference which means a person can only spend the balance that has been preloaded onto the card. This means there is no risk of running into debt as it has no credit or overdraft facility.
One can simply start using prepaid cash card when money has been loaded on to a prepaid card by cash at a bank, Post Office, at Payzone or PayPoint terminals, bank transfer, through your employer or even by credit card.
When using for purchasing at a high street store, they work in exactly the same way as a credit or debit card. When purchasing just simply hand over the card and then you will be asked to enter your PIN number (supplied with the card) on an electronic keypad or to sign a payment slip so your signature can be matched with that on the back of the card (if there is no Chip on the card). The total amount will be taken from your card immediately and the transaction is complete.
To shop online, you'll find the item you want to buy and click on to the website's "checkout" page before filling in your details and those of your prepaid card. As long as you have enough cash loaded on your card, the purchase is completed and your item will be shipped to you.
Application of pre-paid cash card for consumers
Off-lineOff-line means that a transaction can be conducted without having to involve a bank directly. Off-line electronic money systems prevent fraud in basically two different ways. There is a hardware and a software approach. The hardware approach relies on some kind of a tamper-proof chip in a smart card that keeps a mini database. The software approach is to structure the electronic money and cryptographic protocols to reveal the identity of the double spender by the time the piece of e-money makes it back to the bank. If users of the off-line electronic money know they will get caught, the incidence of double spending will be minimized, at least in the theory.
Credit card debt is an example of unsecured consumer debt, accessed through ISO 7810 plastic credit cards. Debt results when a client of a credit card company purchases an item or service through the card system. Debt accumulates and increases via interest and penalties when the consumer does not pay the company for the money he or she has spent. The results of not paying this debt on time are that the company will charge a late payment penalty (generally in the US from $10 to $40) and report the late payment to credit rating agencies. Being late on a payment is sometimes referred to as being in "default". The late payment penalty itself increases the amount of debt the consumer has. When a consumer has been late on a payment, it is possible that other creditors, even creditors the consumer was not late in paying, may increase the interest rates the consumer is paying. This practice is called universal default. Nowadays, credit card debt is a burgeoning problem on campuses. Although most students handle credit well, a significant minority get into debt.
Causes
One of the following causes of credit card debt might mirror our financial situation:
The Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web(WWW).
As conclusion, internet has the advantages and disvantages. If we prepare well before we online, surely we'll be secure and safe from internet threat.
Nowadays, it can be said there are more and more threats over the Internet. Malware is a general name for all programs that are harmful; viruses, trojan, worms and all other similar programs.
A computer virus is a program, a block of executable code, which attach itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of a PC user. There are a couple of different types of computer viruses for example boot sector viruses, parasitic viruses, multi-partite viruses, companion viruses, link viruses and macro viruses. These classifications take into account the different ways in which the virus can infect different parts of a system. The manner in which each of these types operates has one thing in common: any virus has to be executed in order to operate. Most viruses are pretty harmless. The user might not even notice the virus for years. Sometimes viruses might cause random damage to data files and over a long period they might destroy files and disks. Even benign viruses cause damage by occupying disk space and main memory, by using up CPU processing time. There is also the time and expense wasted in detecting and removing viruses.
Viruses don not just appear, there is always somebody that has made it and they have own reason to so. Viruses are written everywhere in the world. Now when the information flow in the net and Internet grows, it does not matter where the virus is made. Most of the writers are young men. There are also few university students, professors, computer store managers, writers and even a doctor has written a virus. One thing is common to these writers, all of them are men, women do not waste their time writing viruses. Women are either smarter or they are just so good that never get caught.
Why do people write and spread viruses?
It is difficult to know why people write them. Everyone has their own reasons. Some general reasons are to experiment how to write viruses or to test their programming talent. Some people just like to see how the virus spreads and gets famous around the World. The following is a list from news group postings alt.comp.virus and tries to explain why people write and spread viruses...
How viruses spread out
Viruses mission is to hop from program to other and this should happen as quickly as possible. Usually viruses join to the host program in some way. They even write over part of the host program. A computer is infected with a boot sector virus if it is booted from an infected floppy disk. Boot sector infections cannot normally spread across a network. These viruses spread normally via floppy disks which may come from virtually any source:
A file virus infects other files, when the program to which it is attached is run, and so a file virus can spread across a network and often very quickly. They may be spread from the same sources as boot sector viruses, but also from sources such as Internet FTP sites and newsgroups. Trojan horses spread just like file viruses. A multipartite virus infects boot sectors and files. Often, an infected file is used to infect the boot sector: thus, this is one case where a boot sector infection could spread across a network.
What to do when you find viruses
First thing what you should do when you find virus is count to ten and stay cool. You should keep notes on what you do and write down what your virus programs and you computer tells you. If you are not sure what to do, you should call the administrator for future action. In some cases it is not good to start you computer from hard disk, because the virus may active and then do some harm.
Second,make sure that you should get sure that it is virus and what virus it is. It is important to know what kind of virus we are dealing with. Companies that make anti-virus programs knows what different viruses does and you can ether call them and ask about that viruses or you can go to their web pages and read about the virus you have.
When you start you computer you should do it from a clean (non-infected) floppy diskette and after that run the virus program. The boot diskette should be write protected so that virus can not infect the boot diskette too. It is good to take a backup of the file that was infected. Virus program could do some damage to the file and that is why it is good to have a backup. It is good to let you administrator to know about the virus, so viruses would not spread around so much. In TKK PC classes are protected by anti-virus program and that virus program reports to a person, responsible for virus protection.
This is an example of a phishing scam targeting Washington Mutual Bank customers. This phish claims that Washington Mutual Bank is adopting new security measures which require confirming ATM card details. As with other phishing scams, the victim is directed to visit a fraudulent site and any information entered on that site is sent to the attacker.
Install up-to-date antivirus and antispyware software. Some phishing e-mail contains malicious or unwanted software that can track your activities or simply slow your computer. Try new antivirus and comprehensive computer health services like Windows Live One Care To help prevent spyware or other unwanted software, use Windows Defender. Windows Defender comes with Windows Vista and is available at no charge for Windows XP SP2
Rather than merely clicking on the link provided in the email, type the URL into your web browser yourself (or use a bookmark you previously created). Even though a URL in an email may look like the real deal, fraudsters can mask the true destination.
Don't enter sensitive or financial information into pop-up windows - A common phishing technique is to launch a bogus pop-up window when someone clicks on a link in a phishing e-mail message. This window may even be positioned directly over a window you trust. Even if the pop-up window looks official or claims to be secure, you should avoid entering sensitive information because there is no way to check the security certificate. Close pop-up windows by clicking on the X in the top-right corner. Clicking cancel may send you to another link or download malicious code.
Secure the hosts file – A hacker can compromise the hosts file on desktop system and send a user to a fraudulent site. Configuring the host file to read-only may alleviate the problem, but complete protection will depend on having a good desktop firewall such as Zone Alarm that protect against tampering by outside attackers and keep browsing safe.
HiStOry...
Ecommerce is any business related transactions partially or totally carried out by electronic medium especially on internet using Open networks or Closed network.The most important feature accountable for the success of internet is electronic commerce that allows people to buy or sell anything they want at anytime of the day or night.The process of advancement in Information Technology to evolve into a business transaction is the ecommerce history.
During prehistoric period before invention of electricity, transactions of all the business were done face to face or via letters. Later on this was substituted by telegraph, telephones and in mid 1980’s by fax machines. As large companies invested vastly in researching in order to develop more reliable electronic means of transaction, old technology was replaced by new technologies that were more consistent and spread much faster than the previous technology.
To interchange data and to carry out business deals electronically in 1960’s Electronic Data Interchange (EDI) was formulated. Initially ecommerce was facilitating business transactions electronically mostly using technology such as EDI (electronic data interchange) and EFT (electronic funds transfer) to send business documents such as purchase orders or invoices. Previously in 1970’s and 1980’s it also involved data analysis.
Lets have a look into how gradual technical development attributed to the growth of ecommerce:
EvOluTion...
The evolution and acceptance of Credit cards, Automated Teller Machines (ATM) and Telephone banking and later in 1990’s ERP (enterprise resource planning), data mining and warehousing are different types of e-commerce. Activities such as purchasing products over the world wide web which had secured links(HTTP) with e-shopping, carts, electronic payments such as Credit Cards authorization. Today it includes of a very extensive range of activities and methods, from e-banking to Offshore manufacturing to e-logistics. The increasing dependency of ecommerce gave momentum to the advancement and growth of supporting systems, backend systems, applications and middleware. Few examples are Broad-band, Fibre –optic networks, supply-chain management, client management software, client relationship management software and inventory control systems.
The swift growth of ecommerce is due to business ventures implementing the effective policies of ecommerce that embraces the following four crucial principles:
As a conlusion,the first business deal carried out on telephone or via a fax is mainly considered as first ecommerce transaction.Ecommerce spread to a significant group globally within a span of 4 years from 1996 to 2000. E-commerce technology continues to progress to change personal communication and global trading at an astonishing speed. This not only assures to bring a significant section of global population online but this also brings about major challenges to policymaker and business alike. By 2009 it is estimated that some 47 percent of Business to Business (B2B) commerce will be carried out online.
REDUCING CYCLE TIME