Credit Card Debts  

Posted in

Are you one of the millions Americans who carry a balance on your credit cards? If so, your debt can cost you much than you bargained for. Americans have consumed indebtedness that exceeds $2 trillion dollars. About 40 % of all credit card users pay their bills in full every, which means that they need to pay along with interest every months. In this kind of situation, if you are one of the “revolvers”, that is, you carry a balance from month to month.

So that, what is the actual reason that let you receives this kind of credit debt in the end of each month? These are several reasons:
1. Reduced income or expenses: Too often we delay bringing expenses in order to a reduction in income for a mass of good reasons and let debt fill the gap. The sooner you adjust to your new reality, whether it be temporary or permanent, the better off you'll be.
2. Poor money management: A money spending plan is essential. Without planning you may spend hundreds of dollars unnecessarily each month and end of the month you may have to pay extra changes and expenses on your credit card services.
3. Underemployment: Some of the unemployed citizen may misuse the credit cards. They may treat the credit debts as their future income. Down the road if you increase your income due to more hours, a second job, or a better job, then is the time to start adding in some of the previous spending before you become underemployed.
4. Gambling: call it America's new entertainment or the Indian's revenge. Either way this is a guarantees exchange of money from you to “the house”. It can be addictive, hard to stop and loans are freely available. Gambling establishment may be the only place you can mortgage your house while intoxicates and have it be legal.
5. Saving too little or not at all: The simplest way to avoid unwanted debt is to prepare for unexpected expenditures by saving three to six months of living expensive.
6. Banking on a windfall: Spending tomorrow's money today is very tempting. A planned job bonus may not be a sure thing. The inheritance that you believe will come your way may not. The lesson is don't spend the money until the check clears.
7. Financial illiteracy: Many people don't understand how money works and grows how to save and invest. You are responsible for your life and your money anyway. Financial mistake are increasingly expensive and complicated to resolve. Get educated and get in control.


There are a number of things you can do to prevent getting taken to the cleaners.


1. Restrict your use of credit. Cut up your credit cards. Stop using them whenever possible.
2. If you keep a card or two, pay them off full every month. Never carry a balance.
3. Set up a savings account for the unexpected.
4. Set up another account for semi-major repairs and expensive. Use that account to replace the washer, reroof the house and so on.
5. Set a budget and work on your self-discipline. Budgets need to be realistic to work, but they don't necessarily have to be hideously painful.
6. Pay cash for transient events like dining, entertainment, and travel. Charge that vacation and you'll be paying for it for a long, long time.

Electronic Currency  

Posted in

Electronic currency is also known as e-money, electronic cash, digital money, digital cash or digital currency. It refers to money or script transferred electronically through computer networks, the internet or digitally stored value systems. Electronic currency will possible like public-key cryptography and digital signatures make e-money possible. A private key known only to the owner, and a public key, made available to everyone. Whatever the private key encrypts, the public key can decrypt, and vice verse. Examples of how electronic currency are used are such as Hong Kong's Octopus Card system which started as a way to pay for transit payments but has now progressed to an electronic cash system, Singapore's FeliCa card and Netherlands Chipknip which has the same use as Hong Kongs Octupus Card, and Malaysia's Touch 'n Go card.There are two difference types of electronic currency: identified e-money and anonymous e-money (also known as digital cash).

Identified e-money contains information revealing the identity of the person who originally withdrew the money from the bank. Also, in much the same manner as credit cards, identified e-money enables the bank to track the money as it moves through the economy. Anonymous e-money works just like real paper cash.

Once anonymous e-money is withdrawn from an account, it can be spent or given away without leaving a transaction trail. You create anonymous e-money by using blind signatures rather than non-blind signatures. Online means you need to interact with a bank (via modem or network) to conduct a transaction with a third party. Offline means you can conduct a transaction without having to directly involve a bank. Offline anonymous e-money (true digital cash) is the most complex form of e-money because of the double-spending problem.

One of the primary benefits that electronic currency trading is that it allows doing business and earning with only a few dollars of investment. In fact, some electronic currency trading experts even suggest that beginners should start with only a few dollars so that they can first learn the ropes about electronic currency. Electronic currency trading does not demand much and it is really up to you if you want to increase your investment or not. With electronic currency trading you are given many opportunities to profit without spending too much on investment.

Moblie Payment system in M'sia: Its potentials and consumers' adoption strategies  

Posted in

Mobile phones are being used for phone calling, internet surfing, instant messaging, music playing, appointment scheduling, game playing, emailing, time telling and math calculating all over the world. Mobile payment, also called mobile web payment or WAP billing, is the collection of money from a consumer through mobile device such as mobile phone, Personal Digital Assistant or other device. To use this mobile payment function the user entails electing to make a mobile payment, being connected to a server via the mobile device to perform authentication and authorization, and subsequently being presented with confirmation of the completed transaction. Mobile Money is designed to overcome the limitations created by cash, cheques and credit cards. This Mobile Money encourages more consumers to shop online.


Potential

ü Safety of the consumers as transmits payment without credit card and cash.

ü Eliminates the hassle to queue up for bills payment.

ü Can be use when need for payments urgently or lack of other payment instruments.

ü Enhanced payment instrument availability.

ü Low signup fees and low transaction fee.

ü No minimum monthly transaction like credit cards and no merchant account required.

ü Support refund and reversal functions.

Strategies for mobile payment system adoption


B Attract consumers if the transaction cost of mobile payment included in the price of the purchased items become lower.

B Strengthen consumer confidence in safety, security and reliability of its networks as a means for consumers to access financial services.

B Increase consumer convenience in make payment at anytime, anywhere using mobile phone coupled with a 6-digit security PIN via SMS.

B Organize seminar and campaign of mobile payment about its advantages, benefit and awareness.

B Automatic activate customers’ telephones by logging into websites after register their mobile telephone numbers.

The Application of Pre-paid Cash Card for Consumers  

Posted in




For the first time in decades, a new payment form, the prepaid card, is making significant inroads into the UK payments infrastructure. Prepaid cards present our partners with a fresh new opportunity to serve existing customers, reach out to new market segments, and expand their brand recognition. Prepaid cards further the evolution of the card payment business from the pay later of credit and the pay now of debit, to the pay before of prepaid.Prepaid cards are easy for consumers to understand and use. The consumer determines the card spending limit by adding money directly to the account, and our cards can be re-loaded with additional money as needed via online, Post Office or PayPoint channels. Funds from a prepaid card can be accessed via ATM, PIN POS, and signature POS delivery channels. Prepaid offers tremendous flexibility, convenience, and spending control.

The most common prepaid cash card in Malaysia is Touch ‘n Go. Touch ‘n Go card is an electronic purse that can be used at all highways in Malaysia. Touch ‘n Go uses contact less smartcard technology. The card looks similar to a credit card. User can continue using the card as long as it is pre-loaded with electronic cash. User can reload the card at toll plazas, train stations, Automated Teller Machines, Cash Deposit Machines, Petrol kiosks and at authorized third party outlets.

Application of Prepaid Cash CardsThe prepaid cash card can be used in such several ways:-
1. Pay bill
2. Shopping
3. Get cash at ATMs
4. Transfer money
5. Pay for toll

How to Safeguard Our Personal Data?  

Posted in

In this world, there has thousands of security solutions that are available, but why is protecting sensitive data so difficult? A dizzying variety of technical solutions are available, like network firewalls, personal firewalls, operating system patching solution, anti-virus, anti-spyware, intrusion-detection , and security management systems. Shouldn’t we able to keep our most sensitive data safe? The answer to this question will be yes!


The following is a list of things that I believe every computer user should know :
1. Identity and remove those unnecessary files which contain Social Security numbers, credit card numbers, or other such information if no longer required.
2. Set passwords on all accounts.
3. Keep software and operating system up-to-date.
4. Approach e-mail attachments with care. Before opening any attachment, the recipient should consider whether the sender is known and if the attachment is expected, if no, then recipient should not open such attachment.
5. Run anti-virus software. Since so much business is performed using e-mail, this is a compulsory application to help identify viruses.
6. Limit access to the computer. Turn file-sharing off unless absolutely
Necessary, if file- sharing is necessary, configure it with a strong password.
7. Run a personal firewall. Both Microsoft Windows and Apple Mac OS have buit-inpersonal firewalls that should not be turned off. Consider other commercially available firewalls as an additional step.
8. Turn off the computer when it is not in use. Unless the computer must be kept running for services. It is impossible to compromise or infect a computer that is not running.

9. Regularly check for spyware. Spyware is often is installed in computers when other applications are installed or when Wes sites are visited.

The Application of 3rd Party Certification Programme in Malaysia  

Posted in


(New Program Enables Vendors to Certify Storage Virtualization Devices for VMware Environments, Providing Greater Choice for Customers)

VMware, Inc., announced a new hardware certification program for storage virtualization devices. Combined with the virtualization-enabling technologies in VMware ESX Server, this program is designed to enable customers to have more choice in deploying virtualized storage solutions with VMware Infrastructure.
“VMware is committed to working with our storage partners to offer customers the greatest choice of storage vendors when deploying virtualization across their organization’s infrastructure,” said Parag Patel, vice president, alliances at VMware. “As enterprises increasingly standardize their IT environments using virtual infrastructure, it is important to have a breadth of storage hardware options available to them.”
By enabling hardware vendors to certify storage virtualization devices for VMware Infrastructure, VMware and hardware vendors together are poised to bring to market the complementary technologies of server virtualization and storage virtualization. As a result of this program, customers will be able to leverage the flexibility of management, cost efficiency and high availability of VMware Infrastructure as well as storage virtualization to create an end-to-end solution.
Patel continued: “VMware Infrastructure leverages and drives significant new adoption of iSCSI and fibre channel SANs with its native capabilities for distributed volume management, VMware VMotion and rapid application recovery. Many customers are looking to implement network-based storage virtualization as their VMware environments continue to grow in order to optimize the storage resources that support these new capabilities. This new certification program is designed to fully support this capability by leveraging the native capabilities of VMware Infrastructure.”
VMware has worked closely with its storage ecosystem partners to extend partners’ storage virtualization services to virtualized environments, including collaboration to integrate products such as VMware Site Recovery Manager with third-party LUN-based replication. This new program to certify storage virtualization devices, with their complete feature sets, is another step forward in VMware’s ongoing efforts to work with the storage industry to bring server and storage virtualization together to improve customers’ flexibility, efficiency and total cost of ownership.
VMware launched its hardware certification program in 2000 to enable VMware and its hardware partners to fully test and optimize their products for VMware Infrastructure. Nearly 2,000 different server and storage hardware models are currently certified, representing products from 46 vendors. VMware is working directly with its Global- and Premier-level Technology Alliance Partner (TAP) program members to certify their storage virtualization devices. VMware is also working to expand the certification program to the broader storage ecosystem, including to Select-level TAP members, later this year with testing done by VMware’s authorized testing centers or by AppLabs or Cognizant Technologies. These global IT services companies specialize in testing and are authorized by VMware to test eligible hardware for all standard VMware hardware certification categories.
VMware continues to work with the world’s largest networked storage system vendors including EMC, Hitachi Data Systems, HP, IBM and Network Appliance to attain certification of their storage offerings later this year. This 3rd party certification programs the delivering a true end-to-end virtualization solution, from server to storage, and enabling customers to reap the benefits of sophisticated virtualization services across their entire storage environment.

Phishing  

Posted in

Phishing is the act of using fraud method and criminally and fraudulently steal people information such as username, password, credit card number, bank account number to invade other people privacy. Phishing is not just limited to personal information; phishers can also send emails with virus attachments. Phishers know that most people that use computers, more specifically, the Internet, have little to no knowledge about security.

The best practices to protect from online fraud are:

P Never reply to e-mail messages that request your personal information. It will be very suspicious of any e-mail message from a business or person that asks for your personal information or one that sends you personal information and asks you to update or confirm it.

P Don't click links in suspicious e-mail because the link might not be reliable. If you receive an email with a bad link in it, add the link to your 'Restricted Sites'.

P Use strong passwords and change them often. Strong passwords means combine uppercase and lowercase letters, numbers, and symbols, which make them difficult for other people to guess. User need to change the passwords frequently and use a different password for each of accounts.

P Install a good Anti-Virus and firewall help protect your PC. It is important to keep your computer updated, and use antivirus software, especially if you connect to the Internet through a cable modem or a digital subscriber line (DSL) modem.- Monitor your transactions. Review order confirmations, credit card and bank statements to make sure that you're being charged only for transactions you made.


example of phishing message

The Threat of online security: How safe is our data?  

Posted in

As we all know, online is a common activity nowadays. It is useful, but do all of us know how safe actually we are using this facility? Nowadays, managing online security is becoming a big challenge due with the numerous use of Internet. We as user should aware that we are disclose from online threats that may attack your computer system, personal data and privacy without your consent.

Phishing attacks
There is a most popular threat called phishing which steal consumers' personal identity data and financial account credentials through fake websites. Customers should caution with some scams sent out e-mails and they will ask to log in the fake websites. This action may disclose information about their financial accounts and their private information such as username and password. Usually, phishing messages may attack their victims from eBay, PayPal, or other online-shopping websites.


Spyware attacks
Spyware is programming that secretly gather information about a user without authorization and dispatch it to other interested parties to earn profit from that. If you simply download software that never heard before without scan all files, that is easy for u to attack by such spyware. This threat is quite similar with phishing that both of them can steal user’s personal information, such as documents, passwords, credit card numbers and bank accounts. The different is only the different way they use.

Malicious attacks
The most common form of malicious code is computer virus. Virus is a computer program that can replicate itself and change our computer settings and slow our computer down without knowledge of the computer user. This virus can spread easily by sending over a network via internet or by carrying on a removable medium such as floppy disk, CD, USB drive. The most famous example is the ”I Love You” virus which is a simple and small piece of code attached to e-mail which cause e-mail servers to overload and business to shut down email.

Hacker attacks
Hacker is a computer program that tries to break into others’ computer systems and specialized in the discovery of exploits in systems or prevented unauthorized access to systems. Using public shared computers to carry out bank transactions can be easily become a victim of hacker. Past few years, hackers have worked together with organized crime to harvest the valuable data exposed on the Internet.

Actually there are many other online threats but above is the most well-known threats. It is the time to keep yourselves safe from these threats!!!

Discuss how E-commerce can reduce cycle time, improve employees' empowerment and facilitate customer support  

Posted in

E-commerce use to conduct business transactions among buyers, sellers, and trading partners without human intervention by electronic Information Technology. Confessedly, E-commerce brings a lot of advantages in trading segment. Generally, an efficiency business’s objectives are to earning high profit with low cost. E-commerce can reduce cycle time, improve employees’ empowerment and facilitate customer supports that help company to reduce cost, increase productivity and obtain competitive advantages.

  • Reduce cycle time

Cycle time is defined as the time it takes to provide a service from beginning through completion. Traditionally, time is wasted through queue, processing paper-based purchase order, transferring goods from contributor to seller and many other activities. Using E-commerce can eliminated such non-profitable activities and reduces cycle time. Moreover, E-commerce can use to eliminate intermediaries between sellers and buyers which are also known as disintermediation who not only increase cost of goods but also raise the time where the customers have to go through intermediate person. Overall, reduction of cycle time can decrease carrying costs and shrinkage costs, improve in cash flow and increase competitive advantage.

  • Improve employees’ empowerment

Employees’ empowerment means giving employees responsibility and authority to make decisions for the company behave regarding all aspects of business transactions. Employees are company’s important assets. E-commerce can lead to employee empowerment by offering online training without taking leave and travel around, providing employees access to information through intranet and keeping good communication between company and employees. With this, company can enhance employees’ satisfaction by knowing they needs and thus increase their productivity. Training cost and cost use to solve employees’ problems can be reduced.

  • Facilitate Customer Support

To be successful in business, customers are an important factor.E-commerce can provide excellent customer support system for company in order to attract more customers and retain current customers. The common tool in a company website is FAQ that help to answer customer question about company product or services. Other than that, some companies provide a special function to increase customer satisfaction such as allow their customer to design their own products to increase their customer satisfaction. Besides, shopping cart allows customers to track back the products that they selected and produce the order once. Today’s customers not only can frequently view the updated products through online, the order also can be placed faster in a few of minutes and the product required can be delivered faster on the hand of customer.

Why eBay Success??  

Posted in


eBay is an Internet-based, person-to-person trading site. eBay offers sellers the ability to list items for sale and prospective buyers the ability to search those listings and bid on items. The seller can set the terms and conditions of the auction. The item is sold to the highest bidder. The transaction is consummated directly between the buyer and seller without eBay's involvement. A potential purchaser looking for a particular item can access the eBay site and perform a key word search for relevant auctions and bidding status. eBay has also created category listings which identify items in over 2500 categories, such as antiques, computers, and dolls.

One of the eBay user said that, "40% to 50% of our sales are international. It's very easy to ship overseas and it doubles our business automatically." This clearly stated, with eBay, there are many advantages granted to eBay user. What was make eBay success? The factors will be discussed in the following.

In most of the eBay user’s opinion, eBay trust and safety team is devoted to making eBay a secure and trustworthy place to trade. eBay works behind the scenes to develop the technology and skills to fight fraud and empower the community to understand and conduct safe trading practices. eBay also attempts for a level playing field and information transparency, enabling economic opportunity for the community and encouraging open, honest and accountable transactions. Feedbacks obtained proved that products on sales are of good quality and in very reasonable price.

The lure of a bargain, combined with the excitement of a Las Vegas gamble, is what brings in millions of Internet customers. The loyalty and enthusiasm of devoted eBay users all over the country is what has helped build eBay into the powerhouse it is today.

In additions, factor of success also include cost control. eBay’s founder, Pierre Omidyar and his team were the operators. They deal with the enterprise with their own skills in order to keep their overheads low. Meanwhile, profits are generated from commission on sales.


Additionally, eBay is also a success legend because it can reach globally to hundred thousands of people enabling them to make a business of their own. eBay who gains access to a global market place can reach to more potential buyers than locally and with profits keep pouring in.


Thousands of successful sellers from all over the world showed up at eBay’s first national convention in Anaheim last summer. The company had a reward for its big sellers -- access to low-cost premium health
insurance, a fitting reward for the mom-and-pop sellers who form the backbone of eBay.

Example of E-commerce failure and its causes  

Posted in


Recently, Kenneth H. Slade, Hale and Dorr LLP presented a talk which is discussed about the current state of e-commerce in the United States. In his talk he started to discuss the unduly large number of online users in the United States and Canada. From his talk, we had known that the e-commerce success stories were reviewed that include amazon.com, which is an online book, CD and video retailer, e-bay, which operates an online person-to-person exchange in an auction format, permitting trading of personal items, E-trade, which provides on-line investing service and Cisco System, which sells Internet routers, network switches and software which provides base-online order tracking and routing functionality.

There have, of course, been failures. IBM’s World Avenue Mall was probably launched too early, before online usage become sufficiently popular to justify IBM’s investment in that project. Merchants participating in the World Avenue Mall also complained that IBM did not adequately promote the project. IBM claims it learned another valuable lesson from the project—that IBM’s name alone is not sufficient to bring enough customers traffic to the site to make it success. MCI’s 1800 Music Now, which permitted both telephone and online ordering of CD’s, shut down in December 1996, only year after it was launched. That failure was attributed in the force down to a variety of factors, including:

1. Weakness in the music industry that year, leading to deep discounting by retailer.

2. The site was not easy to use and that time consumer look like more prefer the traditional way for ordering product which is the way touch and see the product.

3. Compared once again to traditional stores, its prices were relatively high.

The history and evolution of e-commerce  

Posted in

The Market for E-commerce According to International Data Corp. (IDC), the first records of a company letting people buy things off the computer is present as early as 1992 in the form of CompuServe, which may not have offered a great boost to international trade, import/export or global sourcing but it did provide a humble basis for future development in the arena. The year of 1995 cannot be forgotten as it marked the beginning of two giants of Amazon and Ebay which do not need any introduction these days have certainly contributed in their own ways to international trade, import/export and global sourcing. The worldwide market for Internet-related services is expected to explode - from $4.5 billion in 1997 to $43.6 billion by 2002. The main impetus for this trend is the rush to implement e-commerce Web sites. Often, the term electronic data interchange (EDI) is used inappropriately as a synonym for e-commerce. In fact, EDI is only one aspect of e-commerce; e-commerce comprises other elements, including electronic faxes, e-mail, and e-forms. E-commerce has become a critical business component for many businesses. The earliest available records or e-commerce are available as early as 1984 when then the electronic data interchange was invented, which helped companies to carry out their dealings in a much more reliable manner than before in terms of international trade, import/export and global sourcing. B2C (Business to Consumer) models have been tried and tested during the first generation of E-commerce boom, but the newer trends are toward B2B (Business to Business) and Click-and-Mortar models. B2B provides advantages of close integration and communication with partners and suppliers, Click-and-Mortar provide takes advantage of offline and online channels being established in physical store locations but at the same time offering online commerce convenience. Companies have quickly realized that E-commerce sites are more than digital storefronts that display products and allow customers to place an order. Business processes should extend to the back-end with systems in place to optimize the company’s supply chain and distribution system. A holistic approach will offer the company insights on creating maximum efficiencies to support all business processes. E-commerce business models are more than technology solutions. Success in the e-marketplace will depend on companies being able to respond to needs of the ever-changing marketplace and forming partnerships, alliances, and collaborations with others to deliver value that may not have been possible with individual efforts. The ability to innovate, change, recover from setbacks will be hallmarks of success in this competitive arena. Generic models of B2C commerce are outdated and newer efforts are needed to leverage the untapped potential offered in the digital medium. There is a discerning shortage of personnel with the right mix of technology and managerial competencies. With continuing education and real-world experience that reflects trends in current marketplace, today’s IT professionals should grab hold of opportunities that are available in the dynamic E-commerce field and position themselves to be leaders of the next generation E-commerce that is constantly creating rapid transformation in Internet time.

Ryan Chew Cher Long.....who??!!.....(=.=)"  

Posted in


I’m Chew Cher Long, 21 years old. My date of birth is 11 Feb 1987. I come from Negeri Johor. When I was at secondary school, my friend said my looking like a Malay boy. Beside, when I was worked as part timer, many Chinese customers spoke to me in Malay. Actually I’m quite upset at that time. After that I decide to try to change my style to more Chinese style, hohoho. I have many hobbies, such as reading some books especially Harry Potter (either Chinese version or English version), watching movies, chatting with my friends and etc. In addition, I love to travel with my friends and the destination I wish to travel is Pulau Redang. Although I’ve been there a few years ago, but I still to get there again. I’m crazy about mobile stuff especially mobile phones, I had changed about 16 mobile phones, those mobile phones include Nokia, Sony Ericsson, Panasonic and LG.My strength is eating as I can eat as many as possible. Remember once, I had ate two plates of chicken rice and three plates of noodles. However, I still looked slim and tall, yeah ^^. The top 5 websites that I visited the most are www.google.com.my and www.gamarena.com to search data and information, this website all about mobile phones ;www.utar.edu.my to access UTAR intranet for latest announcement; explore for something new and interested in www.jbtalk.com.my; and sometimes I will log in to www.friendster.com to contact my secondary schoolmates as we have never seen each other after graduate and make some new friends. Usually, I like to search information from google and wikipedia as there are sufficient sources for me to do my assignments from this two search engines. My 5 top internet activities are such as searching information for study purpose, listening to broadcasting station via the internet, reading news from newspaper published websites, chatting with my friends through MSN and watching steaming video online. I also like to play online game, I can sit there about 12 hours just for playing online games…..

Mei Thing  

Posted in

My name is Mei Thing, a student study at University Tunku Abdul Rahman. And course on bachelors of commerce accounting from tutorial group7. My hobbies are exploring internet, chatting with friend, shopping and watching movies. E-commerce is one of the subject include my syllabus in this semester. I am very interest to this subject because before of this I have been experience buying something through online system. Beside that, I am also enjoying on online pay bill or transfer money because it is easy and times saving. Usually the most common websites I visit are Google, Yahoo, Friendster, WBLE, and UTAR website. The Google and Yahoo websites are very good search engine for me to searching any accurate information within very shorter time. Thus, it can help to improve my performance to be more efficiency and less times consuming. Friendster is a much popular website to many people. Because from this website can obtain our friends recent information and photos. We also can send the blessing messages to them. This is an easy and convenient way to maintain our friend relationship. Finally WBLE and UTAR websites both are concern about my university websites. From this two websites are very useful for me get the school announcement, timetable , examination result, subject unit plan, tutorial questions and any relevant information important for us the lecturer will post on the WBLE.

Ying Hui  

Posted in

I’m Ying Hui, 20 years old. My date of birth is 20 Dec 1987. I come from Negeri Sembilan. When I was at secondary school, my friend called my nickname as penguin because they said my walking style similar with that animal. That nickname follow me until I finish my secondary school and actually I like that name because penguin quite cute!!! I have many hobbies, such as reading novels, watching movies, chatting with my friends and etc. If I have extra money I think I prefer to go shopping rather than activities mentioned above. I like to try things that new to me such as foods, drinks and any other things. The top 5 websites that I visited the most are http://www.google.com.my/ and http://www.wikipedia.org/ to search data and information; http://www.utar.edu.my/ to access UTAR intranet for latest announcement; explore for something new and interested in http://www.chinese.cari.my/; and sometimes I will log in to http://www.friendster.com/ to contact my secondary schoolmates as we have never seen each other after graduate last 3 years. Usually, I like to search information from google and wikipedia as there are sufficient sources from this two search engines. Besides, I can spot any interested things and events that exist within the world via the Cari forum. The ebuddy website, http://www.ebuddy.com/ consist many functions such as blogging, chatting and searching, so it is my favorite website too. My 5 top internet activities are such as searching information for study purpose, listening to broadcasting station via the internet, reading news from newspaper published websites, chatting with my friends and uploading information for sharing purpose. I like to sit in front of my computer for hours just clicking here and there...

Sin Nee  

Posted in

My name is Tai Sin Nee and my friends called me Sin Nee. I’m 21 years old since my birthday is on 19 Feb 1987. My hometown is Kluang and I’m staying in Sungai Long now to further my studies. I like to listening music no matter how busy I am. When I am free I prefer sleeping, sometimes I will watching movies too. I like to go to cinema for movie too; it is really enjoyable for me when I can concentrate for the whole movie with air-conditioned and a big pop-corn. I like to search information through http://www.google.com/ and http://www.yahoo.com/ as this two search engines is useful and contain many information. I always explore http://www.utar.edu.my/ to get into UTAR intranet to obtain any new announcement related to my studies. Other than that, I like to watch movie in http://www.xunlei.com/ and even download from this websites. I will never forget to check my mail in my mailbox through http://www.hotmail.com/. Sometimes, I will send message to my friends in the friendster to keep in touch with them. Most of the youth own friendster and I am not excepted. My common internet activities are such as searching information, listening to music, watching movies, chatting with friends and downloading shared data from internet.