Monday, March 3, 2008

internet shoping

Online Shopping and Security

The Internet is changing the way people shop. Online, consumers are purchasing a variety of goods and services, including books, software, clothing, and travel, with increasing frequency. Most online consumers are attracted to the convenience that online shopping provides: 24-hour availability, no waiting on lines, and no salespeople. Retailers are excited about the expansion of their customer base that accompanies online selling, and also about improved customer relations. Both consumers and retailers, however, are concerned about the security of online transactions. Demand for e-commerce solutions will eventually require all ISPs to install encryption or other security software onto their servers. This article explores one such e-commerce solution.

Many consumers are wary of sending their credit card and other personal information across the Internet. Very often, online purchases are completed via fax or telephone because of this concern about security. Additionally, many online consumers are hesitant to purchase from a retailer with whom they are not familiar, for fear that they will have no recourse should there be a problem with the product, or, should no product be delivered at all. Retailers, too are concerned about security. They are aware of consumer wariness about the security of online transactions, and retailers are also concerned about the security and integrity of their internal networks.

In response to this, there have been a number of innovations that attempt to address the issue of security of online transactions. One such innovation is what has come to be known as SET (secure electronic transaction) protocol. The SET protocol was originally developed by Visa and MasterCard, along with several technology companies. It purports to provide more secure protection of credit card numbers and other confidential information that is sent across the Internet. In addition, it uses digital certificates and encryption technology that enables consumers and retailers to verify the authenticity of the parties involved in online credit card transactions.

Briefly, digital certificates serve to ensure that the parties to an online transaction can trust each other. This is done by encrypting the messages that are being sent by the parties, and then decrypting the messages when they are received. Encrypting means essentially to code a message in such a way as to make it undecipherable to those who are unable to decode the message. The coding is done by using what is known as a key, a series of electronic signals, and only those who have this key can decipher the message. Keys can be stored on the hard drive of a computer, on a disk, or on a special smart card.

Public key encryption is one form of code making in which not one but two unique keys are used: the public key, which is made available to the public, and the private key, which remains a secret. Public key encryption facilitates the use of digital certificates and digital signatures. The process of using a digital certificate in an online transaction can be explained as follows: The consumer generates a public and private key using a key generation system (special software, or some combination of software and hardware). The consumer then provides a certification authority, a third party, with identifying information, along with the consumer's public key. The certificate authority then provides the consumer with a certificate. The consumer then contacts the retailer in order to transact whatever business that the consumer wishes to transact with that retailer, e.g., placing an order for certain goods, complete with payment information. This communication with the retailer will be digitally signed by the consumer using the consumer's private key, along with the consumer's certificate, signed by the CA's public key. Upon receipt, the retailer verifies the certificate, and confirms that the certificate has not been revoked. The consumer and the retailer then complete their transaction. Should the consumer so desire, s/he, too, can confirm that the retailer is who s/he purports to be by requesting that the retailer provide a digital certificate. The functions of encrypting and decrypting are done by computer instantly.

This illustrates one way in which digital certificates can be used to decrease consumer and retailer concerns of the security online transactions. It should be noted that digital certificates serve other important functions in this regard. Authenticating the identity of a party to an online transaction increases the difficulty of and reduces the likelihood that a party to an online transaction can successfully repudiate the transaction, by claiming, for example, that it was not they who sent the message. Additionally, digital certificates can be used to verify that the message sent or received has not been altered or changed in any way during transmission.

SET protocol is only one of the innovations that is being created to address the concerns that consumers and retailers have about the security of online transactions. As new technologies develop, and the rate at which consumers make online purchases increases, the concerns of retailers and consumers about security will diminish. Increased use will bring confidence in the technology, in addition to a better understanding of the actual risks involved in transacting online. In time, online transactions will be regarded as being no more risky than any other kind credit card transaction. To help you take advantage of these commercial developments, Elan Consulting Ltd. can provide your business (ISPs in particular) with a range of various e-commerce security solutions for your clients and customers. To learn more, click here

Wednesday, February 27, 2008

funny

1) Ishq kar deta hai bekrar, bhar deta hai pathar k dil mein pyaar, har 1
ko nahi milti zindagi ki ye bahar, kyunki ishq ka dusra naam hai
intezar.........

2) Mosam shabab ka,
Nasha sharab ka,
Parda janab ka or rang gulab ka,
in sabme haseen , in sabme Lajawab dekho SMS padne wala "Chehara Janab ka."

3) Baithe-Baithe jindgi barbad na kijiye. Jindgi milti hai kuchh kar
dikhane k liye. Roke agar aasman hamare raste ko. To taiyar ho jao aasman
jhukane k liye.

4) Aapki yad na aaye to hum bewafa, Aap bulao aur na aaye to hum bewafa,
Hume maarne k liye khanjar ki zarurat nahi,1bar nazar fer lo, na mar jaye
to hum bewafa.

5) Shaam bhi udas hogi raat bhi udas hogi,Kafan me lipti meri laash hogi...
Ae dafna ke janewalon unse keh do,Qabar me bhi unki tasvir mere saath
hogi....

6) Zindagi se sabhi ko mohabbat hai,par zindagi kisiki mehboob nahi
banti,tamanna leker jeete hain sab log,magar har tamanna TAQDIR nahi
banti... Good morning

7) Rangat teri zulfo ki ghatao ne churai
Khusboo tere anchal se hawao ne udai
Paimane ka dil na tut jaye to kahu main
Hai cheez gazab ki jo nigaho ne pilai

8) Na rahi aaj wo apni kahani, Na wo hasin din na wo raatein suhani, Phir
bhi hume aziz hai unki har nishaani, Chahe dil ka wo dard ho ya aankho ka
paani...

9) Kisike dil me basna bura to nahi,kisiko dil me basana khata to
nahi,gunah hai ye zamane ki nazar me to kya hua,zamaane wale bhi insaan
hain khuda to nahi.

10) Patti, patti Gulab ban jati
Har kali mehare khwab ban jati
aapne dali na kuch aisi mehkdana najre
warna
subhaki os bhi sharabh ban jati

gurdas mann






Tuesday, February 26, 2008

modeling

This summary is not available. Please click here to view the post.

ways to make money

the best way to earn money is to make website or even google blog can be handy agter just add ur site to google or any other webmaster and sing up for google adsence after two or three days u will get notification or u can join link referrals like this one
which provides both webmaster and money
join agloco get money for surfing

Monday, February 25, 2008

Saturday, February 16, 2008

punjabi new modals










Thursday, February 14, 2008

Tuesday, February 12, 2008