Are the viruses found in the mobile as threatening as thecomputer’s one?
What would happen if your mobile phone is infected by malware?
I am a user of Nokia E71, a Symbian based operating system smart phone which its
performance can easily surpass my 20 years old computer. This phone operates like our normal
computer, I used it to surf nets, msn chit chatting, storing files from the internet and many
more. So do I install antivirus software in this phone?
Nokia E71-My cute little phone
The answer is yes but it was 4 months ago. I used Karpersky
Mobile Security. But I deleted it
for several reasons.
Kapersky Mobile Security's display on Nokia 5800
It makes my phone performs like a snail…Slowwwww..
It did not detect any virus after I used the phone from day 1. So I presumably there is no virus
are interested enough to attack my phone or the antivirus did not do its job.
I did not use my phone to access the internet to pay
anything. So, if my phone is hacked by hackers, they most
probably would know which porno sites I visit the most. HEHE
So I would answer the question I asked just now. Yes, there is a need to worry about mobile
malware if you always use your phone to deal with financial stuff like doing e-banking which
requires user id and password. If not, keep using your phone without any antivirus software
as you can enjoy a more responsive smart phone.
Up to date, the threat of the
mobile malware is not that severe compared to the computer malwares. A survey
carried out by SMobile said there is only 1.5% of Symbian based phone is infected by
malware. So, may be in the future mobile malware will be getting more serious as the
phone capable to replace computer and this could invoke more hackers to create
malware to attack the phones.
Lastly, if your mobile phone is infected by malware, u could either hard reset the phone or thing get worse; you can send it to the phone service centre. If your latest high tech phone constantly attacked by virus, I suggest u to change to a less savvy tech phone like this:
You bought a new computer, installed the operating system and other applications including an anti virus software. But after few months or half a year, u feel that your computer is running slower than ever and more and more unknown stuff popping up to disturb you.
Using a "turtle" computer
Then you will start to think whether you are infected by any "shits" ( at least this is what i call them - virus, malware, Trojan and many more) and slowed down your computer.
You also don't want to be this poor guy screaming at his laptop after seeing his bank account is being hacked and the money is gone.
When the time people are using the internet, we seldom care or even know about the threat of using it. We simply key in our personal information to register many stuff like an email account, log in pass, facebook account and etc. This information may be easily exploited by those black hat hackers if the company which holds our data did not secure it properly. So, how safe is our data with the current protection from online security?
The most common online security threats is identity theft. This means the private information of victims are being used for other purposes. For example, the credit card number is being stolen when it is transferred over the network due to the vulnerability of online security. Then the credit card will be used without the consent from the victims and the victims have to pay for those stuff they did not buy. Another category of online fraud takes place in the form of data theft which encompasses the theft, perusal and manipulation of private data.
I think the hacker has hacked the Singapore ID department if not this felor's father hate him right after he is born
Next, we shall discuss some of the underlying threats to online security. First, Malware, is a software designed to penetrate and damage a computer system without the owner’s informed consent. Generally, Malware includes computer viruses, worms, trojan horses, rootkits, spyware and so forth. Specifically, computer viruses are small software programs which intent to interfere with computer operations and they may corrupt and damage your data or even erase everything on your hard disk!
On the other hand, worms are self-replicating programs which do not required to be attached to other programs as it spread by exploiting security loopholes of operating system. For instance, Windows ExploreZip worm, is a destructive software with malicious purposes of crippling the file system by writing invalid data and destroying files on hard disk.
Not this kind of cute worms INFECTING your coms
Preventions which are desperately needed if you don't want to lose your precious data over the internet or reformat your computer every 2 months.
First-Activate your firewall or install one.
Hope i have this kind of firewall to cook those viruses in my Vista
Second-Install a reputable anti virus and update it frequently.
Which is the better?or can i install all of them to get maximum protection??HAHA
Thirdly-Do backup of your computer to prevent loss of data when the computer is under attacked by the virus.
Lastly, be smart when you are assessing anything from the net including your email, attachments, any suspecious mail and many more. Most importantly is all down to the user, experienced internet users to tend to suffer less online threats.
Do you have a proper safeguard on your personal and financial data? Most of the people like to rely on the computer to save their data information while some of us like to make an online transaction in buying and selling through the Internet. But do u really careful in protecting your personal data from stolen, losing or misuse by the intruders? Lets me gives you some useful tips that may help to prevent your data from damaging.
Install and maintain anti-virus and a firewall – Viruses and Trojan horses that may lose or modify our data on the computer can be protecting by the anti-virus software. However, a firewall is a software program that designed to remove the bad people and allow the good people. Besides that, if we have an older computer or using a dial up, we may need to separately buy a firewall and install ourselves instead of a modem that have an added layer of protection which using in nowadays.
Using encryption key to store confidential data – In order to prevent or avoid unintended disclosure, we can use the encryption key to stored data. It means that we coded the information into unreadable form of characters, so that nobody can open our data. In addition, we can protect our data by encrypting the whole storage drive or select whichever folder as we want. If we want to ensure our data is more secure, then we should create a unique and a longer encryption key. The longer the code, the more secure the data.
Never open a mystery attachment – Do not open any link or an attachment that sending by unknown parties. It is because those of the attachments may contain viruses that will harm our data or else directly to the computer. Another reason is that if we open a link that contains viruses, it maybe will affect our personal or financial information without our notice.
Secure the network – Now everyone has Internet to make an online access to search for the information. But some of us may use a wireless network to online. So we have to make sure that we secure it, because an unsecured network would cause a hacker to gain access to anything we do. In order to be safe, we should lock our router and encrypt our information by keeping away the intruders.
Do not put private information on public computer –Nowadays, most of the people like to go to the cyber café or any other wireless zone to access for the information that they want. But they do not realize that the public computer is the most unsafely to use. Why I say so? It is because if you access your private account at the cyber café, then you have to make sure you log out completely from your accounts, otherwise another users would try to access into your personal information. Try to avoid save login information like username and password into public computer.
Phishing is a threat to every internet user as it gains personal financial information through sending fraudulent email. Besides, phishing also can the personal information when the users doing personal financial information through online banking or e-commerce transactions.
The example of a phishing e-mail is an official e-mail from a fictional bank. The phishing e-mail sent to the internet user on behalf of the bank which requests the user to send personal financial information such as credit card, social security, bank account number, passwords and others. Lately, I got a phishing scam email pretending to be Maybank2u. It required me to enter my details including my LOGIN PASSWORD. Of course I am not stupid enough to give them that and moreover the terrible grammar has worked as a warning alarm to me. However I gave it a try and luckily Mozilla prompted me the web as a phishing web. (good reason to use Firefox right?) There are some ways that the internet users must know in order to avoid from becoming a victim of phishing.
Obviously, the users must be suspicious with any email with urgent requests for personal financial information unless the email is digitally signed. For instance, an e-mail sent by fictional bank which contain misspelling word usually is phishing e-mail. The users should never supply their personal information via e-mail. The users must always turn on both desktop and network firewalls. Firewalls can help the users prevent from the suspicious malicious code entering the users’ computer and browser.
Another easy way to prevent a phishing attack is keep the anti-virus software up-to-date. There are many products on the market usually are included in anti-virus software. This software program usually using filter which searches the content in the message that may be carries phishing software. Besides these, the users must not enter any sensitive or financial information into pop-up windows even it looks like official. This is because this pop-up window usually has no way to check its security certificate. Many of them are usually contain phishing scams which will gain the information and damage the computer.
The internet user must remember Think Before You Click. This can help the user from phishing threat.
Have you guys ever wondered what to do with the internet when you are introduced to it for the very first time? I had that experience before and I remember I was stoned in front of the computer with the very old Netscape internet browser but got no idea what to do with it. Fortunately at that time msn have search engine and it was the only search engine I knew about its existence. Then I started to use msn search engine to search all those stuff which I was interested in but. But here came a problem, all those search results were not matched to what I had expected from. This had pissed me off a lot and when I have almost lost my faith in msn search engines, I found a mighty powerful search engine-The Google Search Engine.
When people mention about Google, we would automatically think of search engine. This is how dominance of Google in the search engine industry. The Google Search Engine somehow gives me more accurate and pin point search results compared the other search engine. It hardly ever fails me and I dare to say 8 out of 10 searches, it strikes the bull eyes. From then on, I depend heavily on Google whenever I need information for my assignment, self interest, random searching and many more. Google has changed the source where I find information which is usually the library. Library had become the place for my friend and me to chit chat or loaf around.
I also found Google Search engine has a lot of interesting features in it and this makes the users can search specifically and accordingly. Google allows the users search images, news, groups, books, scholar and many more. The features I like the most is the images search. There is a saying “a picture speaks a thousand words”. This saying is so true as I am a very lazy person and I hate to read. I randomly type anything under the image search and it will come out with lots of images. Eventually these images capture my attention and from there I slowly read the contents of the article and gain information from there.
The second service from Google I use the most is the Google mail Gmail. It works as my secondary email as I favor msn mail more. However, the venture of Gmail into the free email industry has made the free email services make a big leap. This is because Gmail offer larger mail capacity compared to the other email provider. It has a incredibly 1 gigabytes of space per account offer to the user. This is significantly big space compared to the initial msn or yahoo mail which has about 10 megabytes only. This has benefited the users to store more mails. Due to this, I reluctant to delete my older mails or junk mails and this had changed the ways I manage email.
Another service from Google I like is the Google Maps. How cool is it to punch few words to the Google Maps search and u could see where u stay at. Besides, this images you see is either in satellite form or map form. It also provides direction to any places on the planet. This features is super cool to me and most of all, it is free of charge. Lately, Google has also introduced its very own internet browser, Google Chrome. It has a very clean interface and user friendly. But it needs some minor tweaking before it could steal my loyalty towards Mozilla Firefox. It is because I find Firefox is somehow safer and faster compare to Chrome.
Google has changed everything and it is still changing. The emergence of Google has made my surfing internet experience richer and richer. Internet has improved significantly in terms of its contents, usage, security, speed and many more. Partly of it is due to the role of Google and it is undeniable. However I hope the internet users would not abuse the services provided by Google such as stalking their own friends…HAHA
Revenue model outlines how the organization or e-commerce companies will earn revenue, produce profits and produce a superior return on invested capital. 5 major revenue models nowadays are sales, transaction fees, subscription fees, advertising fees, affiliate fees and other revenue sources.
Google has multiple revenue models. The main source of Google’s revenue is from advertising such as AdWords, a pay per click (PPC) advertising program which allow advertisers show relevant or related advertisement from what users searching for. Google also have another revenue model which also an advertising form calls Adsense. Website owners can enroll in the program to enable text and video advertisement which the advertisers are required to pat Google a fee for each time a user click on the advertisement.
eBay, the world’s largest online auction site and shopping web in which people perform businesses such as buying and selling goods and services worldwide. eBay generates revenue by way of various fees and commissions, such as insertion fees, promotional fees, and final value fees. Thus, the major revenue of eBay is through Transaction Revenue Model from sellers and Buyers. eBay targets different types of consumer behavior in its affiliate program to earn affiliate fees of Affiliate Revenue model but rather than pay a commission on sale of goods.
Amazon started as an online bookstore, but soon diversified to vary product lines. Amazon generates revenue primarily by selling books, videos, electronics, and kitchen equipment on domestic and international websites, such as Amazon Marketplace. Amazon Marketplace is something like eBay. It is a fixed- price online marketplace that allows seller to offer their goods alongside Amazon’s offerings and it is using sales revenue model to earn its income. Moreover, users are allowed to comment on reviews. Amazon provides an optional budging option for reviewers to indicate that the reviewer is one of the top reviewers.
In the conclusion, the revenue models adopted by Google, Amazon and eBay are slightly different in terms of their natures of business. However, there is a common ground among themselves which they are mostly relying on the advertising to generate income.
Back to the earliest century where E-commerce has taken place, it was just a simple transaction of buying and selling, nothing else. Yet the history of this vast improving system on how information technology has transformed into today’s business process.
E-commerce was first developed in the early 1970. It is a process of the execution of commercial transactions electronically with the help of technologies such as Electronic Data Interchanged (EDI) and Electronic Funds Transfer (EFT) which gave opportunity for users to exchange information and do electronic transactions. By the year 1984, the EDI was standardized through ASCX12, which give guaranteed to the companies to complete transactions with one another reliably. By year 1992, the compuserve offers online retail products to its consumers. These provide the first chance for people to buy things through computer. While in 1994, Netscape has arrived which provide users a simple browser to surf the net and a safe online transaction technology called Secure Sockets Layer.
In the year 1995, Amazon.com and eBay.com have launched. In year 1999, the retail spending over the internet was reached approximately $20 billion (according to Business.com). By the year 2000, the US government extended the moratorium on Internet taxes until at least year 2005.Fortune magazine,2007 stated that dell as the 34th largest company in the Fortune 500 list and 8th on its annual top 20 list of the most successful companies in USA.
The emergence of E-commerce has provided us with lots of advantages and conveniences. It has never ended and I believe that it will continue improving for the better.
Internet has become a powerful and ubiquitous communication mechanism to facilitate, execute, and process business transactions. It also used in communicating relevant information to decision-makers including the customers. There are many companies are making large investments in e-commerce. One of the succeed companies is eBay.
eBay has started its business in 1995 as an online community marketplace for the sale of goods and services for individual. It is founded by a computer programmer, Pierre Omidyar’s who wrote the code for an auction website. Omidyar also is the chairman of eBay. The headquarter is located at San Jose, California, United States.
Now, eBay is the world’s top online community of buyers and sellers. eBay offers boundless opportunity to the registered users worldwide to come together and trade various of items such as cars, accessories, electronics and others. Some items are rare and valuable also can be found in eBay. This result the users worldwide prefer to search for the items they want at eBay.
eBay enable the registered sellers sell their items in any form to the people interested from anywhere, anytime. Such as Ms. A (Malaysia) want to sell her homemade designed T-shirt but she couldn’t find anyone who wanted, so she put it on eBay and people interested can bid for it. eBay has the astonishing power that it may be sold to a person at United States.
One of the reasons eBay success is that it has a fully automated system as when the sellers list out the items for sale, all the users can browse it in the same time. The items are arranged systematically by topics, where each type of auction has its own category. It’s easy to be found and convenient for the users.
Marketing strategies also helps eBay business expanded rapidly and build its memberships. eBay has done a regular basis for promoting it through newspaper, radio and some banner ads on other websites. However, eBay has done very little promotion in terms of expansion of memberships if compare with the normal business.
The users are satisfied with the transactions done, as they can buy and sell with reasonable confidence that they will get what they were promised. The people are really enjoyed looking around for merchandise, and competing in bidding process. This of course resulted by eBay has a user friendly designed webpages. This help ebay as successful as it has been.
Hi, I am Tan Sin Sean. Michelle is the name which usually my friends call me. I am from Pantai Remis, Perak which is a small fishing village. You are welcome to my hometown to have seafood dinner anytime. Don’t worry, they are not expensive at all.
I am a student majoring in accounting at Universiti Tunku Abdul Rahman (UTAR). My hobbies are watching television shows, traveling, outdoor recreation and listening to music. Internet searching is also one of my favorite’s activities.
The top 5 websites I visit are facebook, MSN, youtube,com, filehippo.com and Google.Facebook and MSN are the websites I visit to send or read email. Besides, I can find my old friends from there as well. I also like to watch videos on video-sharing site especially Youtube.com. There are thousands of videos shared by the users. To download free softwares, it usually can be found from filehippo.com. This website provides downloading services. Various types of programs whether is old-version or updated version are available for free downloads. Lastly, since I am still a student, of course I need a search engine to find information apart from books. Then I will get them from Google. Google is a very convenient search engine in obtaining information. Besides from the above internet activities, I also like to play online games.
CHUA SHIAU TING
I am Chua Shiau Ting, majoring in accounting studies in Universiti Tunku Abdul Rahman. I am from Kuala Terenggannu, a wonderful place that has lots of island such as RedangBeach, Perhentian, and Lang Tengah. Tourists used to go there to enjoy their holiday. It is extremely relax, full of excitement and enjoyable. Also, there are varieties of traditional ‘kuih’ such as keropok, kuih bahulu, nasi lemak., nasi dagang and many more.
I always go shopping during my leisure time, and enjoying drinking coffee in the coffee shop. Besides that, I also enjoy playing badminton and swimming with my friends. I also like to surf internet to explore information. I used to download songs, movies and online chatting.
The most frequently visited website is Microsoft Internet Explorer to look for information. It is the most stable and developer supported internet browser. Besides that I also visit Airasia website to look for air-ticket going back to my hometown, Kuala Terenggannu I also made online booking through the web site. In addition, I also visit Window Live Messenger website to check for mail and online chatting. On top of that I used to visit Yahoo to explore further information and data. Lastly I also visit Utar website and wble to check out the updated information and data.
CECILIA
This semester I have an e-commerce subject force me to give out my first time in writing a blog as assignment throughout the semester. Now I have to squeeze my mind to vomit out a blog that contain over 200 words. As usual, the first time in writing must be start with the lame of self-introduction which I am very hate about it. I’m Cecilia from Kangar, Perlis. It is a very small town in a very small state. That is where I came from. I do have a lot of hobbies but the most I like is sleeping and sleeping. Nothing else, haha.
Besides that, I do like to surf the internet for my leisure time. As part of the generation Y, Facebook, Friendster, TGV, GSC and mail can be count as a must when I do my surfing. For your information, SUNGAI LONG really is a very bored and dull town without any entertainments. The thing gets worst if you do not have a transport because it is located far away from the outside world with all the fun. So, internet is my sole. At least I can use the internet to download some favorite songs, watching movie, playing online games and any other activities that can bring some fun for my boring life. I think I will stop here for my first blog..
HONG WEI HONG
I always want to have a blog and coincidentally one of my uni subject E-COMMERCE required me to do so. To keep the blog running with updates, we need the determination and a lot of will power to do so. I said so because i have gone through all that for the passed 6 weeks as i only typed this self introduction LAST.
I come from Puchong and i have stayed here since i was 4 years old. So like other typical KLnite, we like to hang around in Midvalley, Sunway and One U but not IOImall which is situated jut opposite my house. I am an easy going person provided you don't mess around with me. So you are welcome to add me as friend in friendster or facebook and most probably you are added unless you are a jerk or rubbish to me.
I got my first computer when i was just around 5 to 6 years old. This memories still very clear to me because i had to put in a floppy disk and type some commands to run the computer. Don't ask me what were the commands because nowdays operating systems run automatically when u press the start button. Then, i got my first internet connection when i was in standard 2. Why i remembered so clearly again? Because my uncle taught me how to surf PORN with internet with 56k modem connection. How innocent i was at that time because i kept thinking why that handsome kept banging that beauty and lots of yelling or screaming happened for nothing.
The ancient com i mentioned looks exactly like this
I have to visit those websites whenever i turn on my computer and they are:
www.paultan.org-This sites is writen by a local and it talks about local automotive news. I like to visit it because the news are relevant to what malaysian drives and could dreamt about. Not like those foreign auto websites, they kept showing us ferrari or lambo which is mean for kaya tauke in malaysia.
www.kennysia.com-This is a very famous local blogger's blog. It inspired me to have my own blog as well at a time. But due to my lazyness, i did not start. HAHA. It mainly talks about anything but in a funny and happening way. It had accompanied me for few years and without it, i won't want to surf net....haha, joking only.
www.gutteruncensored.com-This site is recommended for adults only. Cos it is quite NSFW ( not safe for work). Open it when you are alone at home only. It talks a lot about scandals especially sex scandals. Edison Chen, Malaysian politician like errr--I don't dare to mention.
In a nutshell, those websites that i have mentioned above is highly recommended to visit. Like other students, i goggle, check mail with either hotmail or gmail, do msn chatting and downloads massive bytes of movie, songs, games via torrent whenever i got an internet connection.