a very long story.
profile

ani bazilah
science college
20/12/1996
email : ani-2012@hotmail.com
blog email : anianiani2012@gmail.com
current status

happy [:
my desires

i want to get high mark in spe & ssru . [:

links

Year 8n
class blog <3
adi hisyamuddin jasmi
aida batrisya taufiq
aisya noor azam
bahriah afiqah matali
farrah tatiana lim
fazriana mahari
hafizah irwan
haziqah taif
hanisah aminuddin
hazim
iqbal abd naba`a
mateen salam
safira jamil
shahira aboo samah

credits

designer: fiona mui
help with html codings: bleah-
brushes: faketragedy
pange
amnesia
inkblack
base image: www.abbygelfand.com

remember?

  • April 2009
  • May 2009


  • jukebox

    weird random box :D

    let it out


    Tuesday, May 5, 2009





    An embedded system is a special-purpose computer system designed to perform one or a few dedicated functions, often with real-time computing constraints. It is usually embedded as part of a complete device including hardware and mechanical parts. In contrast, a general-purpose computer, such as a personal computer, can do many different tasks depending on programming. Embedded systems control many of the common devices in use today.
    Since the embedded system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product, or increasing the reliability and performance. Some embedded systems are mass-produced, benefiting from economies of scale.
    Physically, embedded systems range from portable devices such as digital watches and MP4 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. Complexity varies from low, with a single microcontroller chip, to very high with multiple units, peripherals and networks mounted inside a large chassis or enclosure.
    In general, "embedded system" is not an exactly defined term, as many systems have some element of programmability. For example, Handheld computers share some elements with embedded systems — such as the operating systems and microprocessors which power them — but are not truly embedded systems, because they allow different applications to be loaded and peripherals to be connected.


    EMBEDDED SYSTEM IN MOBILE PHONE
    A mobile phone or mobile (also called cellphone and handphone, as well as cell phone, cellular phone, cell, wireless phone, cellular telephone, mobile telephone or cell telephone) is a long-range, electronic device used for mobile voice or data communication over a network of specialized base stations known as cell sites. In addition to the standard voice function of a mobile phone, telephone, current mobile phones may support many additional services, and accessories, such as SMS for text messaging, email, packet switching for access to the Internet, gaming, Bluetooth, infrared, camera with video recorder and MMS for sending and receiving photos and video, MP3 player, radio and GPS. Most current mobile phones connect to a cellular network of base stations (cell sites), which is in turn interconnected to the public switched telephone network (PSTN) (the exception is satellite phones).
    The International Telecommunication Union estimated that mobile cellular subscriptions worldwide would reach approximately 4.1 billion by the end of 2008 and mobile phones are starting to reach the bottom of the economic pyramid. A mobile phone proper typically has a telephone keypad, more advanced devices have a separate key for each letter. Some mobile phones have a touchscreen.

    Labels:



    xo !; 11:20 PM

    ***


    Tuesday, April 28, 2009


    E-COMMERCE
    Electronic Commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of
    products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with widespread Internet usage. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.
    A large percentage of electronic commerce is conducted entirely electronically for
    virtual items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. Online retailers are sometimes known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World Wide Web.
    Electronic commerce that is conducted between businesses is referred to as
    business-to-business or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or limited to specific, pre-qualified participants (private electronic market). Electronic commerce that is conducted between businesses and consumers, on the other hand, is referred to as business-to-consumer or B2C. This is the type of electronic commerce conducted by companies such as Amazon.com.
    Electronic commerce is generally considered to be the sales aspect of
    e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.

    Early development
    The meaning of electronic commerce has changed over the last 30 years. Originally, electronic commerce meant the facilitation of commercial transactions electronically, using technology such as
    Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. Another form of e-commerce was the airline reservation system typified by Sabre in the USA and Travicom in the UK. Online shopping was invented in the UK in 1979 by Michael Aldrich[citation needed] and during the 1980s it was used extensively particularly by auto manufacturers such as Ford, Peugeot-Talbot, General Motors and Nissan. From the 1990s onwards, electronic commerce would additionally include enterprise resource planning systems (ERP), data mining and data warehousing.
    The earliest[
    citation needed] example of many-to-many electronic commerce in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. The first[citation needed] online information marketplace, including online consulting, was likely the American Information Exchange, another pre-Internet[clarification needed] online system introduced in 1991.
    Until 1991, commercial enterprise on the
    Internet was strictly prohibited. Although the Internet became popular worldwide around 1994, it took about five years to introduce security protocols and DSL allowing continual connection to the Internet. And by the end of 2000, a lot of European and American business companies offered their services through the World Wide Web. Since then people began to associate a word "ecommerce" with the ability of purchasing various goods through the Internet using secure protocols and electronic payment services.

    Timeline
    1990:
    Tim Berners-Lee writes the first web browser, WorldWideWeb, using a NEXT computer.

    1992: J.H. Snider and Terra Ziporyn publish Future Shop: How New Technologies Will Change the Way We Shop and What We Buy. St. Martin's Press.
    ISBN 0312063598.

    1994:
    Netscape releases the Navigator browser in October under the code name Mozilla. Pizza Hut offers pizza ordering on its Web page. The first online bank opens. Attempts to offer flower delivery and magazine subscriptions online. Adult materials also becomes commercially available, as do cars and bikes. Netscape 1.0 is introduced in late 1994 SSL encryption that made transactions secure.

    1995: Jeff Bezos launches
    Amazon.com and the first commercial-free 24 hour, internet-only radio stations, Radio HK and NetRadio start broadcasting. Dell and Cisco begin to aggressively use Internet for commercial transactions. eBay is founded by computer programmer Pierre Omidyar as AuctionWeb.

    1998:
    Electronic postal stamps can be purchased and downloaded for printing from the Web.

    1999:
    Business.com sold for US $7.5 million to eCompanies, which was purchased in 1997 for US $149,000. The peer-to-peer filesharing software Napster launches.

    2000: The
    dot-com bust.

    2002:
    eBay acquires PayPal for $1.5 billion. Niche retail companies CSN Stores and NetShops are founded with the concept of selling products through several targeted domains, rather than a central portal.

    2003:
    Amazon.com posts first yearly profit.

    2007:
    Business.com acquired by R.H. Donnelley for $345 million.

    2008: US eCommerce and Online Retail sales projected to reach $204 billion, an increase of 17 percent over 2007.

    Business application
    Some common applications related to electronic commerce are the following:
    Email
    Enterprise content management
    Instant messaging
    Newsgroups
    Online shopping and order tracking
    Online banking
    Online office suites
    Domestic and international
    payment systems
    Shopping cart software
    Teleconferencing
    Electronic tickets


    Goverment regulations
    In the United States, some electronic commerce activities are regulated by the
    Federal Trade Commission (FTC). These activities include the use of commercial e-mails, online advertising and consumer privacy. The CAN-SPAM Act of 2003 establishes national standards for direct marketing over e-mail. The Federal Trade Commission Act regulates all forms of advertising, including online advertising, and states that advertising must be truthful and non-deceptive. Using its authority under Section 5 of the FTC Act, which prohibits unfair or deceptive practices, the FTC has brought a number of cases to enforce the promises in corporate privacy statements, including promises about the security of consumers’ personal information. As result, any corporate privacy policy related to e-commerce activity may be subject to enforcement by the FTC.
    The Ryan Haight Online Pharmacy Consumer Protection Act of 2008, which came into law in 2008, amends the
    Controlled Substances Act to address online pharmacies.

    Forms
    Contemporary electronic commerce involves everything from ordering "digital" content for immediate online consumption, to ordering conventional goods and services, to "meta" services to facilitate other types of electronic commerce.
    On the consumer level, electronic commerce is mostly conducted on the World Wide Web. An individual can go online to purchase anything from books or groceries, to expensive items like real estate. Another example would be online banking, i.e. online bill payments, buying stocks, transferring funds from one account to another, and initiating wire payment to another country. All of these activities can be done with a few strokes of the keyboard.
    On the institutional level, big corporations and financial institutions use the internet to exchange financial data to facilitate domestic and international business. Data integrity and security are very hot and pressing issues for electronic commerce today.

    Labels:



    xo !; 6:43 AM

    ***


    Monday, April 27, 2009


    INTRODUCTION

    The precursor for the modern home online banking services were the distance banking services over electronic media from the early '80s. The term online became popular in the late '80s and referred to the use of a terminal, keyboard and TV/monitor to access the banking system using a phone line. ‘Home banking’ can also refer to the use of a numeric keypad to send tones down a phone line with instructions to the bank. Online services started in New York in 1981 when four of the city’s major banks. Example: Citibank, Chase Manhattan, Chemical and Manufacturers Hanover, they offered home banking services using the videotex system. Because of the commercial failure of videotex these banking services never became popular except in France where the use of videotex [Minitel] was subsidised by the telecom provider and the UK, where the Prestel system was used. The UK’s first home online banking services was set up by the Nottingham Building Society (NBS) in 1983. The system used was based on the UK's Prestel system and used a computer, such as the BBC Micro, or keyboard (Tandata Td1400) connected to the telephone system and television set. The system, which was known as 'homelink', allowed on-line viewing of statements, bank transfers and bill payments. In order to make bank transfers and bill payments, a written instruction giving details of the intended recipient had to be sent to the NBS who set the details up on the Homelink system. Typical recipients were gas, electricity and telephone companies and accounts with other banks. Details of payments to be made were input into the NBS system by the account holder via Prestel. A cheque was then sent by NBS to the payee and an advice giving details of the payment was sent to the account holder. BACS was later used to transfer the payment directly. Stanford Federal Credit Union was the first financial institution to offer online internet banking services to all of its members in October, 1994.

    --------------------------------------------------------------------------------------------------------------------------------------------
    ATTACKS
    Most of the attacks on online banking used today are based on deceiving the user to steal login data and valid TANs. Two well known examples for those attacks are phishing and pharming. Cross-site scripting and keylogger/Trojan horses can also be used to steal login information.
    A method to attack signature based online banking methods is to manipulate the used software in a way, that correct transactions are shown on the screen and faked transactions are signed in the background.A recent FDIC Technology Incident Report, compiled from suspicious activity reports banks file quarterly, lists 536 cases of computer intrusion, with an average loss per incident of $30,000. That adds up to a nearly $16-million loss in the second quarter of 2007. Computer intrusions increased by 150 percent between the first quarter of 2007 and the second. In 80 percent of the cases, the source of the intrusion is unknown but it occurred during online banking, the report states.

    --------------------------------------------------------------------------------------------------------------------------------------------
    SECURITY
    Protection through single password authentication, as is the case in most secure Internet shopping sites, is not considered secure enough for personal online banking applications in some countries. Basically there exist two different security methods for online banking.
    The PIN/TAN system where the PIN represents a password, used for the login and TANs representing one-time passwords to authenticate transactions. TANs can be distributed in different ways, the most popular one is to send a list of TANs to the online banking user by postal letter. The most secure way of using TANs is to generate them by need using a security token. These token generated TANs depend on the time and a unique secret, stored in the security token (this is called two-factor authentication or 2FA). Usually online banking with PIN/TAN is done via a web browser using SSL secured connections, so that there is no additional encryption needed. Signature based online banking where all transactions are signed and encrypted digitally. The Keys for the signature generation and encryption can be stored on smartcards or any memory medium, depending on the concrete implementation.




    Labels: , ,



    xo !; 3:32 AM

    ***


    Sunday, April 26, 2009


    a very usefull article. (:

















    love, ani bazilah :D

    Labels:



    xo !; 6:24 AM

    ***