Sunday, June 29, 2008

A review on a post on e-tailing from My E-Commerce blog


Most of the people sell products via Internet, how about services?
Offering services thru Internet might not be popular in Malaysia, but getting online services is a trend in overseas. For instance, online restaurant reservation services have been launched since 2007 in New York and San Francisco.
There are approximately 7,000 high-end restaurants around the world are using
OpenTable.com, a Web site which allows customers to go for online restaurant reservation. In OpenTable.com, it takes 10 seconds by only few "clicking", which is far better than making reservation thru telephone. Having this service helps to improve the efficiency and profitability of the restaurants, save time and even reduce the error risk.
Based on the current trend, I believe there will be more online services popping up in the Internet, perhaps in the future people can even do a hair cut without physically present to the saloon. (Haha…this is merely my imagination!)
Wish to know more about OpenTable? Here is a news reporting about OpenTable.com.

Wednesday, June 25, 2008

The Treat of Online Security: How safe is our data?

Technology is wonderful as it keeps bringing more convenience to our lives. Traditionally people rely on computers to work for simple electronic tasks. With the advancement of technology, we can perform more than that by using the Internet, such as e-transactions. However data security is always an issue and it grows largely as more and more malicious attacks are developed.

Malicious Threats
Malicious threats can be categorized into technical and non-technical attack. Technical attack is an attack perpetrated using software and systems knowledge or expertise. The most common example is Malware. Malware is a compound from malicious and software. It is used to describe all types of malicious software, including worm, virus, Trojan horse, Spyware, Adware, Rookit etc.
A perpetrator is likely to use Trojan program to capture one’s personal and sensitive data. Trojan is a program which appears to perform a certain useful action but in fact performs hidden action such as transmitting a computer virus. For example, Girlfriend Trojan is a server program that arrives in the form of file that looks like an interesting game. When the unsuspected runs the program, the Trojan installed. The server will execute commands, sent by the client, on the victim’s computer such as to send back the information captured (user Ids and passwords) to the client. The Trojan program also enables the perpetrator to erase or overwrite data on a computer, corrupt files in a subtle way, upload and download files, show fake downloads of software movies, games, porn videos and porn websites that victim did not download, and so on.

Similar to Trojan, a Spyware existed to collect personal information without the user's knowledge or informed consent and send it to third parties. It is being installed surreptitiously on a personal computer. The spyware program can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party. Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs.

Besides this, our data is also exposed to non-technical attack, which is an attack that uses trickery to trick people into revealing sensitive information. Phishing is an example of this attack. It becomes a popular method to collect information by masquerading or creating fake Web sites that look identical to real Web sites. Commonly an email will be sent to customers requesting them to provide or update their information on the fake Web sites.

There are still other threats of data security. By taking necessary steps to safeguard our personal information, it could reduce information leaks.

How to safeguard our personal and financial data?

Traditionally, by locking up all the important documents and files is considered safe. Due to the advance in technology, it however does not work that way anymore.

You might wonder, how secure is considered as secure in network system?
Have you ever purchased any item from the Internet? Or have you experienced making any transaction through e-banking? Performing Internet activities which involve personal data could be risky, because the chances of leaking or theft these information is higher.
Therefore I’m here to share with you some tips regarding how to safeguard your personal and financial data.

1. Setting the passwords
character as long as possible. The log in passwords of financial transaction should be more than 6 characters, and the characters should exclude the IC number or date of birthday to prevent anyone to trace your personal and financial confidential data. Bear in mind; do not divulge your account access passwords to other.

2. You should be able to verify the security web site, especially the web site which is financial-based. A secure financial web site should
have the certificate of ‘Veri Sign Secure Site and also certified by ‘Web Trust’. The purpose of getting ‘Veri Sign Secure Site’ certificate is to ensure data confidentiality and integrity, and all information transmitted over the Internet is encrypted using the 128-bit Secure Sockets Layer (SSL) protocol from Verisign Certificate Authority. SSL is a secure way of transferring information between two computers on the Internet using encryption. Whereas ‘Web Trust’ is to certify that the web site complies with the international web security standard. For example Maybank2u.com is reliable because it has been certified by both of these.

3. Antivirus. Top 5 Online Scanners which recommended by
Mary Landesman are Trend Micro's Housecall, Kaspersky Online Scanner, Kaspersky File Scanner, Virustotal Jotti Online, and Malware Scan. By scanning the computer with any of these antivirus softwares before performing any financial transaction, it helps you to ensure there is no spyware in your computer.

The last but not the least, you should avoid accessing financial information in public, such as the outdoor wi-fi access. The financial transaction data seem to be open to the public and anyone who is IT expertise can easily trace the information.

Wish to know more?
http://www.verisign.com/
http://antivirus.about.com/od/freeantivirussoftware/tp/aaonline.htm

A review on a post on Internet Security from My E-Commerce blog

After reading a post about new spamming tactics on Internet Security from My E-Commerce blog, I learn more about spam and would like to share some information here.

What is spam?
Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages and it is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, while the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media:
instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, mobile phone messaging spam , Internet forum spam and junk fax transmissions.

Spam can be used to spread computer viruses
, trojan horses or other malicious software. The objective may be identity theft, or worse (e.g., Advance fee fraud ). Some spam attempts to capitalize on human greed whilst other attempts to use the victims' inexperience with computer technology to trick them (e.g., Phishing ).


Anti-spam software can prevent all unwanted spam and junk email and filters for preventing spam. This is evidenced in the Web-based e-mails services providers such as Yahoo, Google and Hotmail, where spam mails are easily filter out and diverted to the spam folders.

Email and Internet content security provider, Marshal warned of the emergence of three new forms of spam.

· The first is a new run of greeting card spam targeting major holidays;
· The second is disguised as an Adobe Picture Document Format (PDF) attachment.
· Lastly, is a new form of spam labelled as Piggyback Spam.

These three forms of new spam are discussed in the new spamming tactics on Internet Security. To learn more on these please click here


Besides the solutions that are discussed in the post, here are some tactics you can use to greatly reduce the amount of spam you receive. Combining these tactics can help you read your e-mail in peace, without being accosted by continual spam.

1. Remove email links from your Web site.
Spam "robots" are continually scouring the Internet in search of new e-mail addresses. To reduce your current amount of spam, u can remove actual links to your e-mail and replacing them with a spelled-out e-mail address or create graphics that display your e-mail address because Spam robots can't read the text in graphic form.

2. Do not give out your business e-mail address.
If you must provide an e-mail address for a purchase, subscription, or registration, use a non-company account with a free webmail provider, such as Hotmail or Gmail.

3. Do not ask to be removed.
Many people make the mistake of replying to spam e-mail messages and asking to be removed from the list. However, attempting to remove yourself may result in even more junk e-mail.

4. Never buy and never reply.
Don't respond to spam solicitations. Buying products that are advertised in spam messages encourages spammers to continue. If you truly need what's being offered, find it from a reputable business.

5. Block spam at the server level.
Many hosting companies allow you to employ a spam blocker, such as Spam Assassin, at the server level. This means that your spam will be shuttled to a particular junk folder before you ever see it. However, these e-mail messages will remain on your server until you delete them.

6. Purchase a spam filter.
You can purchase a spam filter. There are many products out there, including SpamCop, which can filter out even cloaked spam messages. SpamCop also provides a free service to report spammers who are targeting your e-mail address.

Thursday, June 19, 2008

Phishing:Examples and Its Prevention Methods

Let me share with you what phishing is all about. Phishing is basically a method of collecting(stealing) information through fake Web sites which seem as real Web sites. In United States, approximately 1.2 million computer users suffered losses of $ 929 million USD which caused by phishing.

One of the examples of phishing is Adwords. It is a Google’s flagship advertising product. Google offers pay-per-click advertising which seems attractive to marketing salesperson to deal with their business. In fact, “phishers” have taken up this opportunity to steal information by creating a fake Web site.

Here is the example of a faking URL:


Other indicators of phishing such as:
1. The email address of a user in a generic fashion which may lead to a high probability of phishing. Eg: Dear valued eBay member….
2. As mentioned above, the fake URL like http://www.google.com@members.thinkbank.com/ may trick the user to log in by clicking a link provided in the site, such as
http://www.google.com/. In fact, the link actually directs the browser to phishers on members.thinkbank.com.
3. The other common trick used by phishers is requesting the user to “verify” their account or “update” their information.
Increase in the public awareness of phishing by identifying the real URL of a Web site helps to solve the problem. Here is a video that I downloaded from youtube. I would like to share with you on how to identify a fake URL and a real URL.






Users also can use software programs to identify phishing contents on Web sites and emails. There are some anti-phishing software available in the market such as Phishing-Sweeper-Enterprise, Phishing Detector, Phishing Zapper, etc.
Click here to look for more anti-phishing software.

Besides, the use of spam filter also helps in protecting a computer users from phishers. Kindly visit to
Cloudmark to look for various types of anti-phishing spam filters.

For organizations, Cloudmark introduced some unique verification tools such as challenging questions and secret images which serve the purpose of verifying a passwords. Or, users could look for the digital certificate to ensure the particular site is being certified and reliable before proceeding with any transaction. A good example would be Maybank2u.com


Tuesday, June 17, 2008

An example of an E-commerce failure and its causes

The internet creates new connectivity with customers and offers the opportunity to expend markets. However, it also has the potential to expose a retailer to more source of risk. There are some extremely successful virtual Ecommerce companies such as eBay, Google, Yahoo! and etc. But, there are also a large number of Ecommerce companies began to fail. Pets.com is one among many other online retailers that failed as a business-to-consumer (B2C) e-commerce entity.

Pets.com was a San Francisco-based online business that offered pet products, information, and resources to consumers over World Wide Web. The site was launched in November, 1998 founded by web company developer Greg McLemore. Julie Wainwright, previously CEO of Reel.com, was appointed CEO of Pets.com. The company
received over $50 million in funding from backers including Hummer Winbald, Bowman Capital, Discovery Communications, Walt Disney, and Amazon.com.

In the beginning of 1999, Pets.com appeared to be on a road to success. The company succeeded wildly in making its mascot, the Pets.com sock puppet. The Pets.com site design was extremely well received, garnering several advertising awards. Pets.com offered consumers a broad product selection, large-scale inventory, competitive prices, and expert advice from a staff of pet-industry experts and veterinarians. It also offered an efficiently designed website that attracted many customers.

Although Pets.com had a first-mover advantage being the first of these virtual pet stores to enter the market but Pets.com was in a crowded field. It operated in a very competitive market, Pets.com, Petopia, PetsMart.com, and Petstore.com all launched within months of each other in 1999. This market competition forced Pets.com to advertise extensively and to sell goods below cost. Noting the high costs of delivering items such as dog food and the thin profit margins involved. Pets.com decided to close down in November, 2000 just two years after its launch.
One problem with Pets.com’s business model was that it was not unique and did not offer consumers anything different from the other online pet supplies retailers. Another problem that Pets.com faced was that it entered a market of selling low-margin food and supplies that are extremely costly to ship to consumers.

The reasons for the closing of Pets.com relate back to an unsustainable business model and unachievable expectations. It acquired large amounts of funding from venture capitalists without considering the consequences. Without any experience, the firm went public only a few months after its initial launch. Pets.com assumed that the market and its revenues would grow quickly enough to allow for a profit before funding money was exhausted. Too strong of a focus on market share instead of on gaining profits led to the downfall of Pets.com. Also, another contributing factor is that this e-tailer may have overestimated the number of online customers it could gain in the pet market.
After collapsing, its assets were sold to Petsmart.com, a click-and-mortar pet supplies retailer. Refer to http://www.petsmart.com/home/index.jsp. There are many reasons why some firms may not want to enter the online selling market, and the experience of Pets.com is just one example of many.

E-Commerce Success - Amazon.com

What is Amazon.com?

Amazon.com was launched by Jeff Bezos in 1994. It was initially a small online bookseller that provided customers with access to an extensive selection of books without physical stores and warehouses (Hamilton, 2004). Amazon.com has rapidly grown within years and become a giant superstore company. The success of Amazon.com has opened up the potentials and business opportunities of e-commerce.


What are the key factors contribute to the success of Amazon.com?


Jeff Bezos and Amazon.com did not witness the success immediately. In fact it has incurred significant losses and exposed to greater competition and challenges. However Jeff Bezos distinguished Amazon.com from its competitors by unique business strategies and providing customers with outstanding value and a superior shopping experience.

1. Business Strategies
Amazon.com stands head and shoulders above others because it pursues 3 business strategies, including cost-leadership, customer differentiation and focus strategies (Saunders, 2001). Cutting costs and achieving greater profitability is the greatest challenges of Amazon.com. Amazon.com always makes sure that it provides quality products to customers at a lower cost for a more reasonable and affordable price than its competitors.
Amazon.com pursues customer differentiation strategy by providing customers with different design, quality or convenience so that customers could easily recognize and differentiate its products from competitors. Lastly, Amazon.com focuses on outstanding customer service and experience to ensure customer satisfaction by fulfilling customers’ demands and requirements.

2. Amazon.com's Value Proposition
Values play an important role in Amazon.com's succeeding. A value is similar to a goal and often determines the difference between success and failure of the enterprise (Saunders, 2001). Amazon.com is practicing 2 key values in its business – customer satisfaction and operational frugality. Customer satisfaction is what Amazon.com most concerns about; whereas operational frugality helps the company to have more capital to spend on branding and business expansion.

3. Customer Service
Amazon.com always focuses on its customers and it provides admirable customer service. A study by Saunders (2001), shows that more than half of Amazon.com's customers are repeat customers. Impressive customer service of Amazon.com has aided in its success because it strengthens its customer satisfaction, and in turn, results in customer retention and loyalty. Amazon.com serves its customers by performing as promised, such as punctual delivery. Amazon.com also focuses on additional elements that customers want, such as concentration of quality, reliability, security and availability of product. Amazon.com never stops seeking customer service improvements as it believes customers are the support of the business.

Amazon.com as pioneer of e-commerce
Now, customers can buy many items from Amazon.com as Jeff Bezos wants Amazon.com to be the place for consumers to find almost anything they want. In Amazon.com, we can clear see the development and growth of a business in the internet environment. As a pioneer of e-commerce, Amazon.com has established a successful model for future online retailers to follow.

The History and Evolution of E-commerce

HISTORY
In the traditional way, commerce can be defined as the trading of goods, buying and selling physically. It is a major drive of human survival since the beginning of recorded history and beyond. Now, the trading of goods, buying and selling through computer interaction over the Internet is known as e-commerce.
E-Commerce were first developed in the early 1970s with innovations such as electronic data interchange (EDI) (used to electronically transfer routine documents), and expanded electronic transfers from financial transactions to other types of transaction processing. In 1984, electronic data interchange (EDI) was standardized through ASC X12. This guaranteed that companies would be able to complete transactions with one another reliably.


EVOLUTION

In 1992 it was the first introducing purchase of goods through computer by CompuServe with an online retail product system. Followed by 1994, one of the companies in US, Netscape provided users a simple browser to surf the Internet and a safe online transaction technology – Secure Sockets Layer.
In 1998, the use of Digital Subscriber Line (DSL) helped the network to work faster. The design of DSL provided fast, always-on Internet service to its subscribers and subsequently prompted people to spend more time and money to online. As a result, retail spending over the Internet reached up to $20 billion in 1999.
Come to the 21st century, online shopping and e-banking transaction become common in use and some of the retailers also started their business through internet. The top 5 most famous retailers are Amazon, Dell, Staples, Office Depot and Hewlett Packard in worldwide internet. Besides, the “brick and mortar” on retailer web side allows the consumers easily search through the large database of products to get the actual price of products and enables them to compare the price before deciding to purchase such goods.

E-commerce has lead companies to be globalization. It is a potential business marketplace. Based on the past surveys conducted, e-commerce sales achieved 3.4 percent of total sales and it will be growing continuously in years.

Sunday, June 15, 2008

DISCUSS HOW E-COMMERCE CAN REDUCE CYCLE TIME, IMPROVE EMPLOYEE EMPOWERMENT AND FACILITATE CUSTOMER SUPPORT


Today, most of the services are offered in electronic form. This is very popular among the travelling agencies and real estate companies in United State. The services are now available anytime and anywhere whenever they are needed.

How does e-commerce reduce cycle time?
It reduces cycle time by providing customers direct access to the services thru extranet with strong securities to protect customers’ confidential information. In this technology era, consumers’ acceptance towards e-commerce is increasing. More consumers now prefer to do online shopping instead of physically appearing to the stores. Besides, by creating an extranet, it enhances customer satisfaction which in turn attributes to a maximizing of company’s profit.

Does it help in improving employees’ empowerment? How does it work?
Understanding your employees is important! Getting involvement of employees is even better for a company’s operation. Thus, most of the companies are moving towards to this target. In an e-commerce world, top managers empower their subordinates by authorizing the lower level management to access to certain applications which enable the top management to monitor the business performance and evaluate the work accomplishment in a more effective way.

Can it facilitate customer support?
Obviously, it can! It establishes a better communication between parties. Customers can easily obtain necessary information by just doing “clicking” on the mouse whereas companies are just required to establish a system to support it! Currently, there are various types of packages offered by NETSUITE to facilitate the companies that are dealing with e-commerce as a way of improving their customer support services. The following are the examples:

Case Assignment, Management & Escalation
- Companies can log and analyze e-mail communications with the clients.
- Companies are able to prioritize the customers’ cases according to the period of waiting, terms in service contracts or any other conditions that set by companies.

Online Customer Center (Self-Service)
- Empower customers by providing security passwords that allow them to access to the information as they needed.
- Customers need only to send an e-mail regarding to the required information to Customer Service address.
To look for more examples, kindly visit to :
http://www.netsuite.com/portal/industries/ecommerce/support/knowledge.shtml

Sunday, June 8, 2008

Self Introduction

Welcome to aaa_long and visit our first blog~
Traditionally the very first blog of course is self introduction! Here goes the self introduction of each of us..

Profile 1
Name_ Neo Pei Yee a.k.a Abby
Age_
21
Gender_
Female
D.O.B_ 30.06.1987
Star Sign_
Cancer
MSN_
lovelytiramisu@hotmail.com

Well, writing a self introduction seems far easier than doing an assignment. In fact, this is the hardest task for me. I’m a student who’s currently pursuing my degree in accountancy in UTAR. But my dream is not being an accountant. Being a psychiatrist is what I’m dreaming of. You may wonder why I’m here now, just simply because of my family. Dream and reality are always different; but I think I’m having the characteristic of an accountant, that is “kiam siap” ! (Haha..)
My greatest hobby is watching Astro, because watching tv helps me to reduce stress and gets my minds relax when I’m tension. I always imagine how good if I could lie on the sofa and watching for a whole day without any pressure and worries. Lol…
I love to shop whenever I’m free to do so. I love the feelings of shopping, because I like to explore the latest goods in the market to get myself updated of the current trend. Normally I will just do window shopping because I’m a poor student. I’ll only buy during Mega Sales! It makes me crazyyy!! XD
Besides all these, listening to songs is what I’m doing everyday. I like all types of songs, as long as it is pleasant to listen to. Mandarin songs are preferable, because of the lyrics and melody. I could spend whole day for just listening to a song repeatedly if I find it meaningful.
Hmm.. I like surfing net and chatting online too. Normally I surf net to check e-mails, search for interesting web sites, free themes for my phone, free online games and songs and etc.
The top 5 websites that I visited the most are:
http://www.yahoo.com/ – To check e-mails, share interesting e-mails with friends, and keep in touch with friends in Yahoo! Group.
http://www.google.com/ – A powerful search engine where I use it to search for information, mostly for assignments.
http://www.gallery9.com/ – The website where I download free mobile phone themes and wallpapers.
http://chinese.cari.com.my/ – A Chinese forum where people share their stories and experiences, and seek for suggestions. I like to read people’s stories and experiences.
http://www.chinapress.com/ – To read electronic news to know what’s happening and save money for buying newspaper.

Profile 2
NAME : Low Shu Yee a.k.a Ashleey
AGE :
21
GENDER :
Female
MY FAVORITES :
As below…

i. Gardening
Because my mom loves it, so during weekend I would spend some times with my mom on gardening. Am I a good girl?! Speechless…

ii. Reading
I read most of the time just because I want to score in my mid- term tests and examination. What is the motivation for me to study? Of course is MONEY!!! I can apply for scholarship with good results and ensure my career (income) in the future.

iii. Sports… I love Yoga!
I’ve been practicing Yoga for two years, although it doesn’t show a good effect on my body shape! (Laughing…) However, it did help to manage my stress during my university’s life and maintain a healthy lifestyle.

iv. Outdoor activities
I like snorkeling; my first experience was in Redang Island. Whenever there is chance for snorkeling, I’ll never miss it! Of course, if I would like to try on surfing. It’s a challenging activity for me! I hope I can try once in my life…

v. Music
I must listen to songs or music every day, without music my life is MEANINGLESS!!!
Top 5 Favorite Websites:
i.
http://www.hotmail.com/ – One of the communication tools that creates a space for everyone to have communication by sending e-mail and online chatting.
ii.
http://www.thestar.com.my/ – This website enable people to update themselves to the current issues without buying newspapers!
iii.
http://www.google.com/ – A powerful tool for searching relevant information that helps in accomplishing any tasks required.
iv.
http://www.flyfm.com.my/ –Through this website, people can listen to the recent songs and news from a local radio station.


Profile 3
N@m3 : lOk kHy3 lOOn a.k.a Alan
G3nD3r : M
D.O.B :
1985.05.26
heigHt :
168 cm
w3IgHt :
57.8 kg
BlOOd type :
O+
Horoscope :
g3mInI

Sometime I would ask myself what I’ve learned and what I’ve done in my study life.
I’m an ordinary and average year3 semester1 student who’s studying accounting course in UTAR. During my study life, I never gain any outstanding result, but I gain a gang of best friends. They are mostly funny, friendly, and crazy, but always be ready for me whenever I face problems. I would like to take this opportunity to thank all of them for giving me such meaningful and unforgettable memories. I appreciate them for accommodating me as a vegetarian and making me a great day.
Recently I’m engaged in thesis preparation; the websites I visited the most are emerald and science direct for the purpose to search for relevant journal articles. Other than these 2 websites, I visit to hotmail and download.com too. I use MSN as my communication tools to communicate with friends; and Hotmail to receive e-mails. Whereas download.com is helpful when I need to download some free softwares.
My hobbies are making new friends and making money. If you find my personal details are not sufficient and wish to know more about me, please feel free to visit my friendster account by searching
lk_loon@hotmail.com. Friendster.com is also one of the websites which I access frequently.

Profile 4
Name: Long Mei Mei a.k.a Long
Age: 21
Gender:
Female

I’m Mei Mei. My hobbies are listening to music, reading, dancing, watching movie, shopping and sleeping. I love to read love stories and comics. During my holiday, I can spend whole day for reading comics and novels but when reading text books, I could easily fall asleep within 30 minutes. I like to listen to music too; whenever I turn on my computer, I will listen to music.
When I was 7 year-old, my mummy sent me for ballet classes. From that time, I started to love dancing. I was a gymnast and representing my secondary school to win a lot of prizes. Because of my passion towards dancing, I dreamt to become a dancer. But now, I end up with being an accounting student waiting to graduate. Besides dancing, I also like to practice yoga, everyday I will spend some time to practice yoga.

The top 5 website that I visit the most are as follow:
http://www.hotmail.com/ – it allows me to communicate and share information with friends and family.
http://www.google.com/ – it is a useful search engine, I always search information in this website.
wble.utar.edu.my – I always download lecture notes and tutorials in this website. It also allows us to share information and communicate with lecturer and schoolmate.
http://www.thestar.com.my/ – I read news from this website and I can save me a lot of money from buying news paper.
http://www.tgv.com.my/ – I visit to this website to know what movie is currently showing and which are coming soon. It also allows me to book ticket online.
We guess that’s all for our self introduction. Please leave us any comment on our first blog~ Thanks for viewing!
Profile 5
Name: Lim Peng Kuan a.k.a Ben
Age: 24
Gender: Male
D.O.B: 18.01.1984
Horoscope: Capricorn
Hello I'm Ben. I'm actually a repeat student in this subject. So sorry that i'm joining this group lately but I'm happy to join this group. =) I used to be called as "Ping Guan" as my chinese name, the name of a chinese singer Victor. My friends call me this way is because my name Peng Kuan. In fact my chinese is not to be pronounce that way, but i still take it as my chinese name because i love being a superstar =p
I'm currently working in a foreign bank and i like my job very much. My working life is challenging and i learn a lot from my job.
My greatest hobbies are watching movie and reading comics. I like to surf the Internet too to learn new things and keep in touch with my friends.
The top 5 websites that I visited the most are:
www.google.com >> It is a powerful search engine where to find out what i wanted.
www.hotmail.com >> I visit it to check my emails and share information with my friends and clients.
www.chinese.cari.com.my>> The most popular Chinese forum in Malaysia, I like to share my experience and chat with new fiends.
www.ggyy8.com >> It is an online comics website
www.sinchewdaily.com.my >> I used to read e-news everyday.