Saturday, July 26, 2008
Ready to summit our blog~
Sunday, July 6, 2008
Corporate Blogging: A New Marketing Communication Tool for Companies
According to the wikipedia, the corporate blog is corporate web log that published and used by an organization to reach its organizational goals thought the internal blog or external blog or even the CEO blog. Readers can easily read recent posts without actually visiting the blog with the browsers such as Firefox, Opera and Internet Explorer 7 that support the RSS technology.
How the corporate blog help the organizations?
Corporate blog is useful in encourage the employee participation in the discussion and contribute their expertise, explain and clarify policies, react on public criticism on certain issues or free discussion of issues, collective intelligence from employee, direct communication between various layers of an organization, and finally increase a sense of community.
According to the website, Top 15 Corporate Blog ranked in the May 2008, the Google’s blog is the most popular blog, follow by Adobe’s blog and Flickr’s blog as the 2th and 3th.
Google Incorporatation deployed an internal blog for its employees shortly after acquiring the blogging service Blogger in early 2003, and since then Google staffers have found many useful and creative ways for the internal blog. Employees keeping track of meeting notes, sharing diagnostics information, sharing snippets of code, as well as more staff uses, like letting co-workers know what they're thinking about and what they're up to.
What are the pros and cons of corporate blogging?
Pros:
- Highly cost effective.
- Be more accessible.
- Ease way of sharing information.
- Reach more employees with a single message.
- Create a searchable archive of thoughts and ideas.
- Save time and indirectly getting large volume of customers.
- Give the writer an opportunity to answer critics in a controlled forum.
- Employees' questions and feedback will be permanently recorded on a blog.
- Organizations can communicate directly with customers, suppliers and investors, as well as employees, helping disseminate and explain strategy.
Cons:
- Loss of productivity.
- Need to master a new style of communicating.
- Too easy for defamation and invasion of privacy.
- Creates an expectation that organization will post regularly.
- Breach information security and loss of company confidentiality.
- Employees with low education level lack of the knowledge with developing technologies.
- Majority of older generation are not comfortable using the internet and related technologies.
- Risk that an ill-judged comment could be seized upon by the media or disgruntled investors.
- Difficult for executives to write freely, particularly at listed companies where they are legally required to publish significant information to all investors at the same time.
Review a local e-commerce site: Lelong.com
You may choose buy the thing you like by the way complete bid with other, or may directly contact with auctioneer and negotiate the price with him/her, buy directly. There have a lot of functions to make you use their website more convenient, like Categories Search Engine- which provides you searching by category like Beauty and health, book and comic, phone and communication, it is an easy search engine and the searching speed is quite fast, very useful.
Second is Auctioneer Profile and Ratting, this function allows you to check the auctioneer trade history and record, it help us to have more confident and reassurance trade with him/her. Normally we will find one trusted auctioneer better have high success trade percentage, therefore can reduce the opportunity of fraud auction.
Other than that if you find that this auctioneer is very trustful and you hope to have more trade with him/her, you also can visit his/her store and check other item. The design of the website take easy and comfort way, do not have too much complex background.
If you bid successful, you must make payment by follow the auctioneer instructions. For example, bank in the money to him first. If you never try bid auction online you should try, you will find that is very excited, and you can learn a lot from the whole process. But before you bid or sell your item you must register account with your real identity first. It require your IC number for avoid you making e-auction fraud.
Saturday, July 5, 2008
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.
To accelerate the objectives of Vision 2020, a path has already been defined through seven innovative Flagship Applications. These applications are engineered to start the MSC initiative and create a multimedia heaven for innovative producers and users of multimedia technology. Both local and foreign companies work with various government agencies to enhance the socio-economic development of Malaysia. The Multimedia Super Corridor offers a Malaysian initiative for the Information Age.
The Flagship Applications are:
- Electronic Government,
- Multipurpose Card,
- Smart School,
- Telehealth,
- R&D Clusters,
- E-Business and,
- Technopreneur Development.
The vision of Electronic Government is a vision for government, businesses and citizenry working together for the benefit of Malaysia and all of its citizens. The vision focuses on effectively and efficiently delivering services from the government to the people of Malaysia, enabling the government to become more responsive to the needs of its citizens.
- Project Monitoring System (SPP II),
- Human Resource Management Information System (HRMIS),
- Generic Office Environment (GOE),
- Electronic Procurement (EP),
- Electronic Services (E-Services),
- Electronic Labour Exchange (ELX) and
- E-Syariah.
So, what is the common problems that facing by Malaysian citizen?
People always will think about the security problem first. Do their information be seen by others people? Is that secure to pay online? Of course the government will concern about the security issue. The government has several ways to secure our people while they involve in the e-services. As a user of the e-services provided by the government, we also need to have the knowledge about internet security, like phising, trojan, or spyware. These are the common ways to "take" your information easily.
For a successful e-government, there are some characteristics need to achieve:
1. Convenience and Satisfaction(Services provided anytime, anyhow, anywhere)
People will have a choice of channels to government information and services that are convenient, easy to use and deliver what is wanted.
2. Integration and Efficiency(Services that are integrated, customer-centric and efficient)
Information and services will be integrated, packaged and presented to minimise cost for people, businesses and departments
3. Participation(Participation in government)
People will be better informed and better able to participate by having easier access to government information and processes
Once the government provides a very nice services, why not the people will like to use it?
Ways to encourage more citizens to use the e-government services
- Increase the popularity of e-services through TV or newspaper advertisements
- Hold campaigns to educate people how to use the services easily.
- Provide multiple language website.
Links:
http://www.govtech.com/pcio/99814http://ecommerze.blogspot.com/search/label/e-Government
http://news.bbc.co.uk/2/hi/technology/2029204.stm
http://www.mscmalaysia.my/topic/12073050330739
Technorati Tags: E-Government
Things to Take Notes to Prevent E-auctions Fraud
However, e-auction has the possibility of fraud; the fraud rate in e-auction is very high. Fraud may be conducted by sellers or buyers such as bid shielding (a buyer’s action), shilling (a seller’s action), and so on.
As a result, there are several things need to take notes in order to protect against e-auction fraud:
- Authentication service.
Product authentication is a way of determining whether an item is genuine and described appropriately.
- Grading services.
Grading is a way of determining the physical condition of an item, such as “poor quality” or “mint condition.”
- Feedback Forum.
Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.
- Insurance policy.
Some sites provide insurance on auction frauds but usually extra cost is incurred.
- Escrow services.
Both sellers and buyers in a deal are protected with an independent third party. This third party will verify the payment from the buyer and inform the seller. This third party will also hold onto the money from buyer until confirmation is received from buyer to pay seller. (An example of a provider of online escrow services is www.tradenable.com)
- Nonpayment punishment.
Implement a policy against those who do not honor their winning bids in order to help protect sellers, a first-time nonpayment results in a friendly warning. A sterner warning is issued for a second-time offense, a 30-day suspension for a third offense, and indefinite suspension for a fourth offense.
- Appraisal services.
There has a variety of methods to appraise items, including expert assessment of authenticity and condition and reviewing what comparable items have sold for in the marketplace in recent months.
- Physical inspection.
It can eliminate many problems especially for collectors’ items.
- Item verification.
One way of confirming the identity and evaluating the condition of an item is through verification. With verification, neutral third parties will evaluate and identify an item through a variety of means.
- Other security services.
Monday, June 30, 2008
Credit Card Debt: Causes and Prevention
- Get the right card for you- choose the lowest interest rate credit card (even as low as 0% interest)
- Don’t heavy rely on credit card- when you can, use cash, no credit!
- Consolidate to Lower Interest- Transfer your high-interest rate debt to a low-rate card.
- Pay on time- must always pay your bill on time, don’t give chance to them charge you interest.
- Have a system!- Always check how much you are spending and make a system to settle all the payment.
- Negotiate with credit card companies- some time if just late 1 or 2 days settle the credit card debt, you can try to negotiate with them, they maybe not charging you interest.
Technorati Tags: Credit Card debt
Sunday, June 29, 2008
Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies
There are two primary models for mobile payments:
Premium SMS based transactional payments and
Mobile web payments (WAP).
There are several mobile payment services in Malaysia such as Mobile Money and mobileExec.
Mobile Money (MM wallet) is a PIN-based Mobile Payment Solution to address the limitations and bottlenecks created by cash, cheques and credit cards. When we need to pay for goods or services, using only a mobile phone coupled with 6-digit security pin via SMS.
MM wallet has been cooperated with several bank such as Hong Leong Bank and Bumiputra-Commerce Bank. In order to pay using Mobile Money, a shopper must have either a savings, current or credit card account with participating banks. It functions like a Credit Card if a shopper applies for a "Pay by Mobile Phone" credit card account (eg Hong Leong Mobile Credit Card).
In other country in Europe or US, mobile payment is a popular system that people use for various activities available. In Malaysia, it just be launched in recent years. However, there has a big potential in this country. There are about 88% of the Malaysian population subscribing to mobile phone services. With a population of 27 million, the banking system in Malaysia has 55 million deposit accounts indicating that a high percentage of the population have deposit accounts with the banking system. The high percentage of mobile phone subscriber and the high rate of participation of the population in the banking system are important pre-conditions for the significant use of the mobile phone as an ideal platform for personal payments.
It is hoped that market participants will be able to offer new and innovative mobile payment products and services that opens up new markets for mobile service providers and payment operators, offer the convenience at reasonable costs and thus deliver the cost savings and efficiency gains that consumers and businesses seek, and thus allow for the economic benefits to be realised. For mobile payment products to succeed and achieve widespread acceptance, we need to strengthen consumer confidence in the safety, security and reliability of mobile networks as a means for consumers to access financial services. So, the market participants need to promote more and let the consumers know about the benefits and others issue such as security and reliability issue and encourage them to adopt this payment system.
More about Mobile payment: http://www.mobilepayment.com/
Technorati Tags: Mobile Payment
The Application of Pre-paid Cash Card for Consumers
Pre-paid cash card is an electronic card which has monetary value loaded into it and it is rechargeable. It is a new type of services that enable buyers to enjoy going around without bringing cash. Pre-paid cash card sometimes called as “stored-value” cards, this is because the amount of money you can spend depends on how much money you have put on it. Different with credit card or debit card, it contains a concept of “pay now, spend later”. This will make sure that you are not run into debt like over used the credit card or credit card.
In Malaysia, Touch ‘n Go card is a most popular prepaid cash card that use to pay for transportation service and toll collection. This usually is used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme park. Touch ‘n Go card now is expanding the application of the card service to other sector like parking fee, theme park, retail purchase and fast food industry. Once you have finish off the money in the card, you can reload it by top up it at specific locations. Further information, you can visit this official website (Touch ‘n Go card).
In other countries, there also have application of pre-paid cash card. In Hong Kong, that is a card called Octopus card which is a rechargeable contactless stored value smart card used to transfer electronic payments in online or offline systems. This card have been widely used payment system for virtually all public transport in Hong Kong and other service like convenience stores, supermarkets, fast-food restaurants, on-street parking meters, car parks, and other point-of-sale applications such as service stations and vending machines. For more detail can refer to the official website (Octopus).
In Singapore, there is a card name EZ-Link card which is a smart card that used for payments for transportation in Singapore. Nowadays, the usage of the EZ-Link is expand to the other industries like food & beverage, convenience store, gaming, government services, hopping, retail & leisure, private bus services, and health. The EZ-Link card can be top-up at the 7 Eleven, MDIS, PLMGS (Pacific Bookstores Pte Ltd) and Republic Polytechnic. For more detail about this card, you may visit the official website (EZ-Link).
In Washington, there is a card name SmarTrip card which is a plastic, permanent and reloadable contactless stored-value smart card used for payment within the Washington Metro system, all Metrorail stations, and on all Metrobuses. Additionally, SmarTrip is the only way to pay for parking fees at Metro-operated lots. SmarTrip can also be used on the DC Circulator. Futher information, you may request from the official website (SmarTrip) .
Thursday, June 26, 2008
Phishing: Examples and Its Prevention Methods
Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.
How the phishing works?
Usually it is thought the e-mail and instant messaging to gather personal and financial information from recipients. Perpetrators will use fake website they have created instead of legitimate one to steal the information from people, the fraudulent email address that they have sent usually redirect to the perpetrator website which is fake so that it looks similar to the original website.
The following is an example of what a phishing scam e-mail message might look like:
PayPal is one of the many examples that perpetrator has tried to impersonate. PayPal phishing attempt can be notice by the spelling mistakes in the e-mail and IP address in the link which is the visible in the tooltip under yellow box. Another clue is lack of personal greeting, even though the company personal details would not be security of legality. Other signs are misspellings of simple words and threat of consequences such as account suspension if recipient fails to fulfill the message requests.
How to prevent?
Here are some related links that will teach you how to prevent the phishing.
1. www.paypal.com/fightphishing
2. www.microsoft.com/protect/yourself/phishing/identify.mspx
Here are some tips that can help you to prevent from the phishing.
1. Detect and block the phishing Web sites in time
2. Enhance the security of the web sites
3. Block the phishing e-mails by various spam filters
4. Install online anti-phishing software in user’s computers
Wednesday, June 25, 2008
Electronic Currency
Electronic currency refers to money or scrip which is exchanged only electronically. Typically, this involves use of computer networks, the internet and digital stored value systems. Technically electronic currency is a representation, or a system of debits and credits, used to exchange value, within another system. Its development linked bank accounts that would generally be used over an internet means, for exchange with a secure micropayments system.
BitPass, the Menlo Park start-up that gave people a way to make micropayments online.Bitpass is an online payment system for digital content and services. Bitpass is an micropayment service that facilitates online content access transactions by integrating the processes involved in buying and selling content, and making it practical to charge very small amounts of money. In the Bitpass system, transaction fees are paid by the content provider. For payments under $5, the charge is 15% of the price paid by the buyer (Bitpass Professional merchant account fee). Micropayments are by definition very small sums, so the fee is usually just a few cents. For the content buyer, the BitPass system works similarly to a pre-paid telephone card: you sign up for the service and put money into your account using a credit card or PayPal, which gives you credit towards the purchase of content. When the user agrees to pay the cost of access, their account is charged automatically rather than through a link to an external Web site for payment.
BitPass was founded in December 2002 to address the growing demand among digital content providers to efficiently monetize their online offerings through a-la-carte and subscription-based payment models and partnered with major technology and financial services companies such as Microsoft, PayPal, the Royal Bank of Scotland and First Data. Kurt Huang was a co-founder of Bitpass, Doug Knopper was hired as CEO in November, 2005. Bitpass was a California corporation with headquarters in Silicon Valley.
On January 19th, 2007 Bitpass announced that they were shutting down, and operations officially closed on January 26th, 2007. No immediate reason for closure was given, however Bitpass just notified its merchant and consumer customers via email that due to circumstances beyond their control, they were discontinuing their operations and they have partnered with Digital River to provide operational support during the period prior to shut down. As of the day of January 19, 2007, all Bitpass buyers with US dollar denominated accounts are being notified that they have 7 days to spend any amounts that currently exist in their Bitpass Account.
How to Safeguard Our Personal and Financial Data?
1. Use and maintain anti-virus software and firewall
- Make sure to install a useful anti virus software that can protect your computer against viruses and trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus and firewall. You also need to keep your virus definitions up to date.
2. Regularly scan your computer for spyware
- Spyware or adware may affect the performance of your computer, it also give attackers acess to your data. Despite installing anti-virus software, you also need to scan your computer and remove it regularly.
3. Use passwords and encrypt sensitive files
- Passwords and other security features add layers of protection if used appropriately. By encrypting files, you ensure that unauthorized people can't view data if they can phsyically access it. When you use encryption, it is important to remember your passwords and passphrases.
4. Avoid accessing financial information in public.
- Do not access financial information such as e banking account in cyber cafe, coffee shop with wireless access and etc. We do not know whether there have been installed spyware or trojan horse in the computers of cyber cafe or connect to internet via wireless. Hacker can easily get your information if there is no a sturdy firewall.
5. Don't open mystery attachments
- Never open an attachment or click on a link that sent to you by an unknown party. These attachments may contain viruses and links can lead unsuspecting users to phising sites where they are asked to input financial information.
So, try to follow the ways above to help you safeguarding personal and financial data!
Tuesday, June 24, 2008
Internet Security
In these few years the number of malicious programs increased significantly this bring the threat to us (like virus, worm and Trojan which create by hacker and group of cyber criminal), therefore we need to put more attention on the internet security. But, a lot of organizations they still did not bring enough attention to secure their IT data, since lack of IT knowledge. This is very dangerous since their important data maybe easily hack by people, and sold to their competitor, this would affect their competitive advantages.
Individual also have to take more attention on this issue, since hacker’s target is not only the organization, also the individual. They may hack into individual computer to steal their identity, account password or even the privacy for ransom purpose.
Cyber crime is more complex, it makes police more difficult to identify the culprit. And it exist everywhere, we cannot 100% avoid it, but what only we can do is do something to prevent it. For example using better anti-virus, firewall, keep the personal information privately, don’t use simple password that can guess easily, like name, birthday, and hand phone number, don’t simple click, accept and install the thing or mail that stranger send to you.
Don’t think that you are lucky enough,
Friday, June 20, 2008
Threat to Online Security: How Safe Is Our Data?
There are numerous security risks on internet that can lead you to serious financial loss, information theft and the attack on your computer. Online Security Threats consist of accidental actions, malicious attacks and online fraud include viruses, denial of service attacks, distributed denial of service attacks, identity theft and data theft. These online threats make internet unsafe to the web users and even users’ data. Every unprotected online computer can be affected with the viruses, malware, adware, hackers' attacks and Trojans with only in 20 minutes. Online security threats cause the privacy and security are the most affected segments, it may cause users’ passwords and other private data being stolen. As a result, the issue of online security is becoming ever more important.
In conclusion, most people cannot really say that their data is perfectly ‘secure’ in the environment surrounding by such numerous online security threats.We need to have sufficient knowledge about the common online threats and beware and take necessary precautions in order to enhance the online security of our data. To deal with these threats we need to implement security solution on our computer, which includes antivirus, anti-spyware and firewall software or hardware device.
Other than that, we also need to implement three main concepts: confidentiality, integrity, and availability which are effective security to protect our data. Confidentiality allows only authorized parties to read protected information. Integrity ensures data remains as is from the sender to the receiver. Availability ensures you have access and are authorized to resources.
Wednesday, June 18, 2008
The Revenue Model of Google, Amazon.con, eBay
Let’s discuss the Amazon.com first, actually it is an online book shop, you may find any book, music, DVD and Videos you want here and as you need you also can make an order. The main model they making revenue which is selling books, beside sales they also earn revenue from advertisement which include Product Ads and Online Display Advertising.
Technorati Tags: Google Amazon ebay Revenue Advertisement
Monday, June 16, 2008
E-Commerce failure and its causes - Webvan.com
Webvan's abrupt closure wasn't exactly a shock. In its last annual report, the company said there was a strong chance that financial troubles would force the company to shut down.
In the first quarter of the year, Webvan had reported a net loss of $217 million and an accumulated deficit of $830 million. And things only seemed to be getting worse.
"We all knew it was going to happen," said Phil Terry, CEO of Creative Good, a consulting firm that has worked with online grocers. He blamed the company's aggressive expansion into multiple cities, combined with an overly complex website, for causing its demise.
Well, Webvan's demise seemed to have little to do with the quality of its delivery services. Although there are customers who complained of late deliveries or damaged of goods, the grocery services generally received favorable comments from customers.
In fact, Webvan's problems never really had much to do with its customers. It was the lack of customers that was the trouble.
Some people believed that Webvan "may well have 10 or 20 years ahead of its time". And, like many businesses born in the maniacal days of the dot-com boom, it tried to get too big, too fast.
Related Link: http://www.cnet.com/4520-11136_1-6278387-1.html
E-Commerce Success : eBay
In 1995, that was a man name Pierre Omidyar who starts engage online garage sale at home. After that, he form a company with Jeff Skoll .The first name eBay used was Echo Bay Technology. But, unfortunately, when the company tried to register the domain name echobay.com, they found that it was already in use. So, they shortened the name to eBay.com and then it becomes the name of the website that you have seen today.
Technorati Tags: E-commerce Success ebay
Sunday, June 15, 2008
The History and Evolution of E-commerce
Evolution of ecommerce dates back to the invention of the very old notion of “sell and buy”, electricity, cables, computers, modems, and the Internet. Ecommerce became possible in 1991 when the Internet was opened to commercial use. Since that date thousands of businesses have taken up residence at web sites.
At first, in 1960s and the late of 1970s the development of Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) allowed business companies to exchange business information, do transactions, and send commercial documentation electronically. After that, in 1992s where the Mosaic web-browser becomes the first ‘point and click’ browser and it was quickly adapted into a downloadable browser, and in 1994s Netscape which provided users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer arrived.
History of ecommerce is unthinkable without Amazon and eBay which were among the first Internet companies to allow electronic transactions. In 1995s, www.Amazon.com and www.eBay.com are launched. Moreover, in 1998s the development of DSL was allowed quicker access and a persistent connection to the Internet. The development of Red Hat Linux was also another major step in E-commerce growth.
In 2000s a great number of business companies in the United States and Western Europe represented their services in the World Wide Web. People began to define the term ecommerce as the process of purchasing of available goods and services over the Internet using secure connections and electronic payment services.
Evolution of ecommerce is a history of a new, virtual world which is evolving according to the customer advantage. It is a world which we are all building together brick by brick, laying a secure foundation for the future generations.
Technorati Tags: History Evolution E-commerce
Saturday, June 7, 2008
Hello...I am Tay
My name is Tay Pay Thai. You can call me as Vincent. That is my nick name. I am 21 years old. Now I am studying at Universiti Tunku Abdul Rahman Campus which allocated at Bandar Sungai Long, Cheras. The course that I am taking is accounting which is Bachelor in Commerce in Accounting (BAC). I am staying at Evergreen with my housemates which are also my classmates.
When I am free , I will surf net, play computer game or online game and swimming. Most of the time I will sitting in front of the pc and suft net. Usually I will visit the
This is the websites that I frequently suft the most. I downloads a lot of the comics, animations and movies from those websites. If you all have the same interest with me , then you can try out this website. You can downloads the lastest music, movies and animations from this websites.
Downloads also consider as part of my daily internet activities. Chating, playing game also wont be excluded. There are few online games that I like but I more prefer the Dot.A which is a part of the Warcraft games. This game is a strategy RPG game which need the teamwork to win the games.
If you have interest to play with me, you may add me as your friend by msn. This is my e-mail address vincenttpt@hotmail.com.
Friday, June 6, 2008
Konijiwa~~I am Qiuning
During idle times I like cooking, baking, singing, watching cartoons, drawing and the most important is sleeping. I like drawing very more and I am good in drawing also. Before I considered taking art course to study, but I choose to study accounting lastly due to reality reasons. In my point of view, the extent to career development is wider for accounting.
Sometimes I am quite clever but the more times I am quite stupid. Actually I am not stupid, I am just naïve, too ready to believe what one is told, and simple thought only. I am quite optimistic girl, and after sometimes you will find me quite funny and friendly.
My first impression give some people thought I am very proud and difficult to get close because I seemed very quiet, no smile toward them, and don’t like to talk with them. I just not familiar to talk with unfamiliar people and I thought I seemed crazy if I smile toward people that I not recognize.
The top 5 websites that I visited the most are:
1. http://comic.kukudm.com , I like to visit this website because there are many comics and I like to watch comics.
2. http://www.readnovel.com , this website includes many types of novels and I like to read novels when I am very boring.
3. http://www.gougou.com , this website supplies a lot of movies and cartoons, I like to download cartoons through it.
4. http://www.viwawa.com/en_US , this is an online game website, I like to playing game in this website because it includes the game which I like to play.
5. http://www.utar.edu.my , this is UTAR website, I visit the most because want to check timetable, subjects study and others.
Thursday, June 5, 2008
Hehe, is Me! Chinwei ^^
And beside that, my favourite was Taekwondo before, i love training, also love Sparing (fight) furthermore, i paticipated in sparing competition beforesince i want tried challenge myself. I really like that feel,very cool and very excited.
But after study in University, due to diffrent location, time problem, and exam stress, i have to give up my favourite. Hehe, That's why me become more and more fatty.
Everyday i put alot of time in online, i like to visit Friendster, malaysia forum “Cari”, cococomic, Msn, and recently,my friend has intro a web site to me, “Meetoto” now it become my new favourite website.
I like visit Friendster because i can meet more new friend here. “Cari” because i can know more news, and funny thinking, when u need Dictionary Bahasa malayu, u also can go cari find, they hav build a online dictionary(Melayu, Chinese, English).Other than that,because it is malaysian website, therefore, you can change web site language.
Cococomic also my friend intro to me, you can watch the latest comic online, but just cannot download, because the copy right problem. Msn? As every people know, msn is a mail box, so i will check my mailbox everyday. Lastly, meetoto, it is a small online game.Firstly u can create a charater, after that, you go to a place, you can hear many real people singing, all live sound, and if you confident to ur voice, you also can go up and sing for everyone.
My internet actvities sure relate to my 5 favourite webste, which are charting, visit forum, visit website, looking for new friend, download, check mail, and play game.^^
Wednesday, June 4, 2008
About Me ~ Goh Hen Yee
I have 2 younger brothers who are 18 and 13 years old. My hobbies are playing basketball and games. There is also nothing to do in Sg Long. So most of my times is in front of monitor, watching drama or NBA. My favourites teams of NBA are Lakers and Hornets. They always play an amazing game to me.
There is several website that I always visit:
NBA.com is my first visited website every morning because i want to check out the result of each match. Now, the match comes to the FINALS which are Lakers vs Celtics. Tom365 is the website to let me to download the drama. It able to let me watching the show while downloading and the speed is very fast. When I was free, I will check the email which forward by my friends. Sometimes the picture or texts are damn funny and meaningful.