GST : Register GST Online


Link URL Register for GST
 






Right Nautical Jewelry

Getting The Right Nautical Jewelry For Your Needs



The nautical fashion theme is one that is noRight Nautical Jewelryt going to fade any time soon. In fact, it is now being used not just on outfits and interior décor but also on jewelry. Nautical jewelry is becoming increasingly popular not just among fans if the nautical theme but also in the mainstream media. Getting the right jewelry of this kind however is something that needs a little bit of caution.

All things that are associated with the marine life can define the nautical theme. Some of the items of this nature that you can obtain in many jewelry stores include many a nautical bracelet, nautical striped watch, anchor earrings, and pendants among other things. You can even find jewelry pieces that have turtleheads, skulls, pirate symbols etc. It is important for you to decide on what look you are going for and shop accordingly.




When purchasing jewelry pieces that have a nautical theme, it is also important for you to decide on the type of metal or any other material you want. Your preferences on this issue may be decided by the color, quality, price, and skin reactions. A gold anchor necklace for example may be a better option than a silver one, especially if jewelry is a form of investment for you. Gold is a very valuable metal and can be used as a form of currency if you are short in cash. The metal is also versatile and can be worn with any number of looks, so you do not need to start looking for other types of necklaces to go with your outfits. Alternatively, you can settle for cheaper metals bronze, copper, and other alloys preferably you are not allergic to them. Even wooden and bone jewelry featuring the nautical theme exists. It all depends on what you prefer.

Always ensure that any jewelry that has a nautical theme is genuine and well worth your money. You can do this by purchasing it from authentic jewelers who have a good reputation. Such suppliers usually have a wide range of nautical accessories from different brands with a variety of price tags. You can therefore always find something to suit your budget no matter how limited.

How To Search for Cheap Air-tickets

How To Search for Cheap Air-tickets

As you are among travelers, who travel lot, then looking out for how to search for cheap flights tickets are must. No matter what is the reason, all needs to use air travel at some point and it is a great expense. But it is unbearable due to the high costs of flying. Coming across cheap airfares really need a lot of search & research work. For the business travelers, spending some extra cash is quite affordable. But for common people it is difficult for ever. That is the reason every one should well plan before taking air travel in order to prevent paying extra money to the Ticket.

While you start search for finding cheap flights tickets from Internet., various portals display information about various travel search engines, tourist guides, to trip planners and tourist boards. Finding out the best offers and more importantly finding out cheap cheap tickets are quite distressing and pleasurable as well. As soon as you log on into a reliable travel sites, it ensures you to get the most reliable and updated offer on air tickets. Comparison is a time consuming job but it allows a person to get special offers on air tickets.

Now a days air tickets becoming affordable to the common man and all can dream of travelling by air with less time being spent on travel and the tourists can spend that time for sightseeing or enjoying. They can reach the destination immediately and can get started with their entertainment on the same day. The advent of internet has made it easy and our lives so simple that you can get almost everything done through it. If you're satisfy with the fares and if the flight timings are convenient for you, you can make the air ticket booking at the same time & print the e-ticket too.


Once you provide the required details and make payment online, you will get your ticket. Even without having computer or internet knowledge, you don't have to worry too much about booking the ticket. It has been seen that while searching for cheap flights tickets for any destination, booking your airline tickets for weekends will cost you more in comparison to booking your flights for weekdays. If possible arrange your journey in weekdays to avoid some extra charges 

Are You Looking For Cheap Air Ticket ?


Book low fares now from AsiaAsia Dot Com Booking Air Ticket  Online
with AirAsia offers the lowest fares online to over 85 destinations across Asia with numerous frequencies a day. Fly with the Worlds No 1, Best Low-Cost Carrier today.

Search for Cheap Air Ticket : Booking online, Flights, Bangkok, Hong Kong, Taipei

Shopping Bags Online


Shopping bags are often used as a means of packaging in various stores. During the holiday season or in case of a shopping spree, people tend to become overloaded with such bags. These bags can take up a lot of space when allowed to pile up and there isn’t really much that one can do about it because so many bags aren’t required. Thus, instead of throwing them into the trash bin, it would be a good idea to turn these shopping bags around and give them a makeover so that you can use them as bags for your gifts.



There are so many different kinds of bags that you can use for this purpose, such as plastic ones, paper bags, etc. Depending on the gift you are giving away, you need to make the selection of the shopping bag to amp up. For instance, if you are gifting a clothing item then you can re-decorate a paper shopping bag but if you are gifting something heavy then a paper bag wouldn’t be a wise choice for the packaging. You’d be better off using a bag made of plastic instead.




If you want to convert a plain or ordinary looking shopping bag then you will need to purchase some supplies beforehand. It is advisable to go for decorative stationeries like crinkle paper, glitter particles, paper flowers, ribbon, water colors, crayons, markers and anything else that you think would look good on the gift bag. Also, don’t forget to purchase glue stick or a hot glue gun because you will need an adhesive for sticking these decorative items on to your shopping bag. If you don’t want to spend a lot of time on the revamped gift bag then simply use decorative pieces to cover up the logo on the bag. However, if you don’t mind sparing some time to make the gift bag look more special then you can use paint or water colors to color the entire bag or just certain portions. Whatever you choose to do, you can add the finishing touch by throwing in some glitter at random spots for that glamorous effect.

When it comes to gifts, packaging matters a lot too; in fact it is almost as important as the gift itself because it would make the receiver guess what is inside the fancy packaging. After all, who doesn’t love to feast their eyes on fancy gift bags? So, the next time when you have a huge bunch of shopping bags lying with you then you can consider allowing your creative juices to flow by converting them into fancy gift bags. This is not only a relaxing process but it is also highly enjoyable for people who love art and craft.

What Competitive Ticket Fare in Travel Industry

What Competitive Ticket Fare in Travel Industry

Due to the competition in the civil aviation industry, the airfares have dropped down to the lowest levels for ever. Crashing down of air ticket prices started when the private sector was let in to the civil aviation and the formalities related to the process were eased off. Since that every time there has been a radical change in the way people used to fly. If the small scale private sector air travel operator reduces their airfares, the leaders in the business have to follow them to gain back the customers and obviously to get their consistent profits.

The customers are being provided with the best in the industry on-board options at much cheaper airfares than ever before. That seems cheap to a person may not seem to the other person. Once you have done so, go on a ride to search for a cheap air tickets website and find the one that matches your expectation. Some of the tickets are being reserved by every airline company for every flight as "discount air tickets" to travel the world . And what could be better if you are ready to sacrifice a little of your luxury because this can get you "cheap economy class air tickets". People always may compare them by the time they take to reach a destination and the number of breaks in the journey.

Soon, the airline will allow its passengers to book an air ticket for the destinations in all over the world. They have been earning huge profits on the various routes. In fact, Most of the air lines have set many a standards for the industry which have proved to be game changing for the entire industry. If you want to see flight deals and book an air ticket, you can do so online. In fact if one has to book a ticket one, just has to spend some time (15 - 20 minutes & that is depend on internet use. Without paying any extra money, it is possible to book tickets on one's own. Off seasons are the patches in a year when the amount of boarding starts to decline in the calendar year.

How to Get Air Ticket Online at Cheap Price

Book Air Ticket Low Fares

How to Buy/Book Air Ticket Online at Cheap Price

Due to growth of the technology and the internet has changed drastically the aviation business all over the worldwide. Air ticket booking online has turned into a major business area in the aviation industry. It has become easier to by common people. The ticket booking business has changed in many ways like more Online than Offline and able to get cheap flights tickets. It is becoming common activity to book the air ticket online. Some international airlines have made it mandatory to use an e-tickets and offline ticketing is completely ruled out.

Though comfortable, we cannot deny the fact that airfares are expensive shunning people to compromise on air travel. Best deals are available on various domestic as well as international destinations through internet. The cheap flights tickets booking websites are doped with the information about the airfares, flights, schedules, and discounts on tickets. You can verify the status of your flight online and in any case there is way to cancellations too.

You can easily cancel your flight tickets and your payment will be refunded after deducting the cancellation charges, if any. The growth of internet based ticketing providers is obvious as it has many benefits over the traditional modes to air ticket booking. Online transactions are easy to carry out and completely secure. As a result, quality of the services provided by airlines has also increased. Since easy to get the detailed information on availability of airline services makes, it convenient for users to make advanced bookings too.

There are service providers, they will provide last-minute deals online. There are thousands of websites and blogs promoting air ticket booking. It has become popular due to technology & internet facility increase. They provide some of the best cheap flights tickets deals to their users. These deals are competitive with ticketing agents and people are able to get cheap cheap tickets.

Lets You Text and Call from Your Computer Using Your Own Phone Number

Introducing PPL Connect, an App That Lets You Text and Call from Your Computer Using Your Own Phone Number

Every day, you’re bombarded with notifications: an email on your laptop, a Facebook “like” on your tablet, a stream of texts on your smartphone. Jumping from device to device gets exhausting.

PPL Connect, a new SMS messaging service, wants to eliminate one of those hassles. The service brings your text messages and phone calls (previously available only on your phone) to a single website. This means you can text or make a call, from your phone number, with any computer, tablet, or connected device that can access the Internet. 

You can use the service, which is available only for Android smartphone owners for now, on any cellular network or web browser. Anyone will be able to receive your texts—not just other people who have signed up for PPL Connect.

When you send a text via the PPL Connect site, your message appears as if it came from your phone number, with a short tag at the end that reads “via pplco.mobi.” The fact that it’s linked to your phone number and that it’s based on a website means you can text from your laptop, Kindle Fire, iPad—anything with an Internet connection and a web browser.

It also means you may no longer have to waste your phone battery on a plane, or risk getting in trouble for texting during work hours.

PPL Connect also does phone calls. You can call any phone from the website using your personal number, even if your phone is dead or turned off. In other words, breaking or losing your phone just got a little less dramatic.

PPL Connect has jumped into a free messaging market inhabited by the likes of MightyText, GroupMe, WhatsApp, and many more. But so far all those services seem to excel at is streamlining texts. This service’s most unique trait is, by far, the ability to call people from a computer using your personal phone number.

Unfortunately, that particular feature is still quite limited. Though you can place calls from your computer via PPL Connect, you can’t receive them. Not to mention, each call costs 3 cents a minute and works only in the United States and Canada.

Here’s how you do it:
You’ll first need to sign up either via your email account or Google+.





Then you should give them your phone number. Remember, only Android owners can sign up right now. The company’s iOS app isn’t due out for another year.




PPL Connect will then send your phone a security code to confirm your identity. You’ll also receive an email for the same purpose.




After confirming that you are who you say you are, PPL Connect will think for a few seconds and then link your phone with its service.




From there, you can turn off your phone (if you want), and jump over to the website. Once you log in, you’ll be able to access and manage your contacts and conversations. As you can see, the main menu bar sits over on the very left of the screen, while the latest text messages that I’ve received on my phone are in the dark-purple column. My current conversation is in the third row. On the very right, I can see all my latest communications.




Though you’re alerted when you receive a message via PPL Connect, you’ll also continue receiving them on your linked phone. This can get a little annoying if you’re treating the web application like a regular chat. You’ll also have to adjust for the delay from the text messaging delivery before responding.

The app is still in its beta stages, so some of the features need some work. For instance, calling another cell phone in my office was almost impossible. It could be that we get bad service here, but that’s something to take into consideration if you’re hoping to use this app for phone calls in difficult-to-reach places.





Overall, the interface is polished and easy to follow. And—if its features are fine-tuned a bit—it could be the most comprehensive phone-linked service out there.

By Alyssa Bereznak Tech Columnist

Arcticle source
https://www.yahoo.com/tech/introducing-ppl-connect-an-app-that-lets-you-text-and-79984370126.html?src=rss

Japan: Thorco’s Fourth L-Class Cargo Ship Launched

Japan: Thorco’s Fourth L-Class Cargo Ship Launched

The vessel, named Thorco Lineage, was launched from Honda Heavy Industries’ yard in Japan. The vessel is a 16500 DWT general cargo ship, and it is going to sail under Panama flag.

Thorco Lineage is the company’s fourth L-class newbuilding. Previously launched L-class vessels for Thorco were Thorco Legend, Thorco Legacy and Thorco Liva.


Source -> http://worldmaritimenews.com/archives/107100/japan-thorco-floats-out-l-class-cargo-ship-thorco-lineage/

Mega ships are the future

Mega ships are the future, but at the price of overcapacity: top MOL man
G6 Alliance members are studying options for buying 18,000-TEU plus box ships, but no decision has yet been made, according to Mitsui OSK Lines (MOL) managing executive officer TK Konishi.

"Perhaps [we will have a] maximum two sets of 18,000 to 19,000-TEU ships by 2020, or by 2022 or 2023. It's a long-term issue," with each member contributing up to four vessels to share equal responsibility.

By comparison the rival P3 Network of Maersk, CMA CGM and MSC is due to operate at least twenty-nine 18,000 to 19,000 TEUers by 2016, provided it gains regulatory approval.

The careful approach is partly due to G6's smaller market share on Asia-Europe routes. Mr Konishi believes the largest ships within the G6 network, at 13,000 to 14,000 TEU, could be just as competitive as P3's bigger vessels, he told Lloyd's List in an interview.

"It's not really the size of ships that matters, but slot costs," Mr Konishi said. "We'll have 48 ships (of 13,000 TEU-14,000 TEU) by 2016, mostly by 2015... only five of them are ordered before the Lehman shock (at high prices)."

G6 deploys on Asia-North Europe and Asia-Mediterranean services 40 vessels larger than 13,000 TEU. "Those ships are very cost competitive."

Said Mr Konishi: "If we order 18,000 to 19,000-TEU ships now, those ships can be much cheaper... then there will be some cost benefits."

MOL is confident that G6 can widen its network to cover transpacific and transatlantic trades from the second quarter as planned.

"We have been operating in accordance with our FMC filings... from that perspective we have antitrust immunity," Mr Konishi said.

"As long as we discuss all sorts of things fully lawful as filed in agreements, I don't really see any reason we have to be in the TSA to operate in the alliance."

On liner alliances upsizing vessels in their networks over the past two years, he said, it is "kind of a vicious circle but one of the simplest, most straightforward ways to lower our slot costs".

With regards to the most viable trade routes of the future given the size of the mammoth breed of vessels, MOL's estimates, a suezmax boxship would be able to carry 200,000 TEU of containers in 24 rows, with a length of 415 metres and 16.3 metre draft. In comparison, a Triple-E class vessel has 23 rows, with a 400 metre length and 16 metre draft.

The Panama Canal's expansion would draw 8,000 TEU-9,000 TEU ships from Asia-Europe to Asia-US east coast trades, squeezing out panamax vessels or smaller.

"Those 8,000 TEU-9,000 TEU ships will have better employment... the surplus of panamax sector is more of a problem for owners, rather than for operators," Mr Konishi said.

CMA CGM Reveals Its Asia Southern Red Sea Express Service

CMA CGM Reveals Its Asia Southern Red Sea Express Service
This new service is in addition to existing Asia Northern Red Sea Express (REX2) which together will improve port coverage to meet the growing demand and customer requirements in the Red Sea market.

This new setup is developed through a Vessel Sharing Agreement with United Arab Shipping Company (UASC) and China Shipping Container lines (CSCL).

It will also benefit Red Sea exporters in minimizing their transit time through the improved port coverage.

Stéphane Courquin, Vice-President of CMA CGM Asia Med Lines states: “It was strategic to consolidate and build up our presence in the Red Sea markets with improved services from Asia. This new configuration is an additional step of our deployment in the area and confirms the will of the Group to strengthen its presence in these strategic areas”

CSAV shareholders, opposing Hapag Lloyd

CSAV shareholders, opposing Hapag Lloyd merger have one month to decide

COMPANIA Sud Americana de Vapores (CSAV) shareholders opposed to merging the Chilean company's container activities with Germany's Hapag-Lloyd have a month to decide whether to block the deal.

This comes after 84.5 per cent of CSAV's shareholders voted for the merger and creating the world's biggest container line at an extraordinary shareholders meeting held in Valparaiso on March 21.

Those opposed to the merger have until April 20 to exercise the appraisal rights, reported Lloyd's List.

The merger requires 95 per cent support from shareholders in order to progress.

In January, both companies signed a non-binding memorandum of understanding establishing that, should the merger be completed, CSAV would receive 30 per cent of the combined company.

There will be an initial capital raising of EUR370 million (US$506 million), to which CSAV must subscribe EUR259 million within 100 days of conclusion of the transaction.

A further EUR370 million will be raised within one year as part of a listing of Hapag-Lloyd, a declared aim of TUI, holder of 22 per cent of the company.

The new company would have a combined carrying capacity of one million TEU, transported volume of 7.5 million TEU per year and combined sales of $12 billion annually on cost savings of $300 million a year, according to CSAV.

First essDOCS Ocean Line Electronic Bill of Lading

First essDOCS Ocean Line Electronic Bill of Lading

The negotiable electronic ocean or master bill of lading was issued by NYK Line to a global essDOCS customer, for a shipment from Singapore to China on the M/V Vancouver Bridge.

The NYK Line eB/L was issued to Elite International Logistics Singapore (the forwarder working on behalf of the customer) on February 7th, who in turn added the necessary supporting eDocs and presented the set of electronic documents (eSet) to the American trade finance bank. After completing its review of the eSet, the American bank presented the eSet to the issuing bank, China CITIC Bank. Following that transaction, China CITIC Bank accepted the eSet under the terms of the eUCP letter of credit and in turn sent the original eDocs to Wuhan XinLianChuang Plastics. Wuhan XinLianChuang then surrendered the eB/L to NYK and received their cargo at Shanghai port.

This shipment marked many firsts for essDOCS:

    First operational use of essDOCS eB/L solution in the liner segment
    First use of eUCP involving a liner eB/L
    First containerised chemical shipment using eB/Ls
    First operational use by NYK Lines of essDOCS solution
    First operational use by Elite International Logistics
    First operational use by leading American trade finance bank (essDOCS’ first American Bank to adopt ePresentation solution)
    First operational use by China CITIC Bank (essDOCS’s first Chinese Bank to adopt its ePresentation solution)
    First operational use by Wuhan XinLianChuang

The eB/L was created from XML data pushed by NYK Line into the essDOCS eB/L solution using a standard message, resulting in an eB/L comprised purely of data based on NYK Line’s standard B/L template. This approach reuses Lines’ current IT capabilities and transitions the majority of interfacing work to essDOCS.

Most crucially, all documents involved in this transaction were managed electronically, therefore handled as eDocs only. Electronic documents used in addition to electronic bill of lading included:

    Notice of Completeness
    Insurance Certificate
    Commercial Invoice
    Packing List
    LC Negotiation Form
    Covering Letter

This significant live transaction followed several weeks of testing in Q4 2013, involving all the trial participants. essDOCS has been undertaking similar tests with a number of other container lines who have completed successful testing last year and are planning to transition to operational use in coffee and metals trades later this quarter. essDOCS is in advanced talks with a number of other lines, and expects the number of users testing its liner eB/L solution to increase steadily throughout the year.

Lincoln Leung, Global & AOC BPM of NYK Line, said: “The use of our existing XML files and data structure meant we could populate the electronic NYK Bill of Lading draft quickly, and send it with one click to Elite to verify. Once Elite confirmed the eB/L draft, our Export Documentation Team in Singapore signed and issued the eB/L upon vessel departure. Overall we were not asked to change our process much, which is a good thing.”

Yong Liu, General Manager of International Banking Department of China CITIC Bank said: “It’s a pleasure to issue and honour the first Letter of Credit requiring eDocs including eB/L presented through essDOCS in China. China CITIC Bank always focuses on innovation, and will devote to promote the use of electronic documents in trade finance.”

Alexander Goulandris, CEO of essDOCS, said: “Today marks a major milestone in essDOCS history which couldn’t have been accomplished without the vision and collaboration of our customers, who are supported 24/7 by essDOCS’s dedicated eB/L specialists. Our first liner eB/L marks essDOCS entrance into it’s last major shipping segment, and demonstrates the growing interest of eDocs, and in particular, the eUCP in the Asia Pacific market.”

Hapag-Lloyd narrows loss 32.6pc

Hapag-Lloyd narrows loss 32.6pc while increasing operating profit 156pc

GERMANY's Hapag-Lloyd, the world's sixth biggest container line, narrowed its net loss 32.6 per cent to EUR97.4 million (US$134.3 million) from the EUR128.3 million loss suffered the year before.

At the same time it also posted 156 per cent increase in year-on-year operating profit to EUR67.2 million, drawn on revenues of EUR6.57 billion, down 4.1 per cent.

Earnings before insurance, taxes, depreciation and amortisation (EBITDA) also increased 16.1 per cent year on year to EUR389.1 million.

"Hapag-Lloyd improved its result and transport volume despite persistently tough competition. Thanks to its global liner network with almost 100 services, Hapag-Lloyd was able to take full advantage of growth opportunities in a difficult market," said a company statement.

Said Hapag-Lloyd chairman Michael Behrendt: "Both factors, the improvement in results and the higher transport volume, are clear evidence of the strength of Hapag-Lloyd in the global market."

Transport volume increased 4.6 per cent to 5.5 million TEU across all trades in 2013. But freight rates continued to sag, remaining at $99 per TEU below the previous year's $1,482 per TEU. Revenue declined largely due to a weaker dollar.

"Although Hapag-Lloyd continued to perform well compared to other industry players thanks to the positive operating result, this result nevertheless falls well short of our expectations for 2013 and is ultimately disappointing," said Mr Behrendt.

Said the company statement: "It was no longer possible to push through sustainable rate increases in the market from the second quarter, despite good ship utilisation at times. The important peak season in the third quarter failed to occur again as in the previous year."

Cost-cutting measures paid off and contributed to operating profits. Slightly lower bunker prices of $613/tonne helped. Overall, transport expenses were cut by EUR409 million compared with the previous year by means of savings and energy price effects.

Weaker-than-expected economic growth, particularly in the key BRIC states, had a negative impact on global transport volumes in the past year and thus on the course of business, said the company statement.

"The outlook is much better for the liner shipping sector, especially as the addition of new shipping capacities will decline and an increasing number of older ships will disappear from the market and be scrapped," said Mr Behrendt.

Sinotrans structure offers growth potential

Shift in Sinotrans structure offers growth potential

The restructuring within the Sinotrans group will be positive for both listed companies in the group, Sinotrans Ltd and Sinotrans Shipping, say analysts.

Sinotrans Ltd will dispose of its loss-making marine transportation business to its sister company, Sinotrans Shipping, to focus on its logistics services business, Dow Jones reported.

Morgan Stanley said the disposal would help stem losses and deleverage the balance sheet. It raised its target price on the stock by seven percent.

Though Sinotrans Shipping has to absorb the unprofitable shipping business, the dry bulk chartering business injected by the parent group will offer significant growth potential, says Credit Suisse.

It says the profitability of the chartering business is expected to improve with strengthening demand for dry bulk commodities. Credit Suisse says the company still has a large cash pile, equal to over 60 percent of its market value, after the deal.

APM Terminals Wins Asia Port Operator Award

APM Terminals Wins Asia Port Operator Award
APM Terminals has been named the winner of the 2013 Lloyd’s List Asia Awards annual “Port Operator” Award in recognition of maintaining “the highest standards of operational efficiency and customer service throughout the year” among port and terminal operators in the Far East.

Excluding operations in the Indian Subcontinent (which was not part of the award’s scope) APM Terminals’ current Asian presence includes interests in 10 terminal facilities in China, two in Japan, two in Thailand, one in Vietnam, one in the Russian Pacific port of Vostochny, and the Port of Tanjung Pelepas, in Malaysia.

“We are very gratified to receive this very prestigious award in recognition of the achievements and commitment to excellence demonstrated by our global team, and our partners across Asia” stated APM Terminals Asia Pacific Regional Head, Henrik Lundgaard Pedersen. The award was collected by Rizwan Soomar, APM Terminals Chief Commercial Officer for the APAC region, who attended the awards presentation ceremony at the Raffles City Convention Center in Singapore.

APM Terminals’ 17 Far East Asian facilities handled a combined 10.7 million TEUs in 2012, (weighted by equity share), representing 30% of the company’s total annual container volume, and approximately 3% of the total Far East Asian container market. APM Terminals also maintains regional sales and business development offices in Shanghai, Hong Kong and Singapore.

In addition to the existing operating facilities, APM Terminals has signed an agreement with the Ningbo Port Group to jointly invest in and operate three new berths comprising 1km of quay in Ningbo’s Meishan Container Terminal, with a 33% ownership share. This new facility at mainland China’s 3rd-largest container port is scheduled to be operational by the end of 2014 with an annual container throughput capacity of 2.8 million TEUs. An expansion at the Qingdao New Qianwan Terminal in Qingdao, China’s 5th-busiest container port is also underway.

At the Port of Tanjung Pelepas (PTP), in Malaysia, in which APM Terminals holds a 30% share, an expansion program and crane upgrade will increase capacity by 24% to 10.5 million TEUs. The new facilities are expected to be operational next year and will be able to accommodate 18,000 TEU capacity vessels. PTP handled 7.7 million TEUS in 2012 and is the 3rd-largest container port in Southeast Asia.

APM Terminals’ industry-leading safety performance and Safety Culture have been successfully implemented across the company’s Asian operations, with the overall terminal Lost-Time Injury Frequency rate decreasing to 2.15 per million man-hours worked in 2012 from 3.59 in 2011. During this period productivity measured in crane lifts per hour increased by 8%, while CO2 emissions per TEU declined by 4%.

Last month, APM Terminals was also named “International Terminal Operator of the Year” for 2013 at the annual Containerisation International Awards in London.

Amazon.com Inc. Preparing To Release a Smartphone

Amazon.com

Amazon.com Inc. is preparing to release a smartphone in the second half of this year 2014 , according to people briefed on the company's plans, part of a broad push into hardware that would pit it against Apple Inc. and Samsung Electronics Co


The retailer has been demonstrating versions of the handset to developers in San Francisco and its hometown Seattle in recent weeks, these people said. People briefed on the company's plans have been told that Amazon aims to announce the phone by the end of June and begin shipping phones by the end of September, ahead of the holiday shopping season.

The people said Amazon hopes to distinguish its phone in a crowded market with a screen capable of displaying seemingly three-dimensional images without special glasses, these people said. They said the phone would employ retina-tracking technology embedded in four front-facing cameras, or sensors, to make some images appear to be 3-D, similar to a hologram, the people said.

An Amazon spokesman declined to comment.

The phone would thrust Amazon into a competitive market with entrenched players that has nearly felled once high-flying device makers like BlackBerry Ltd. and Motorola. With Apple and Samsung alone commanding 49% of the worldwide smartphone market, according to market researcher IDC, there is little room for upstarts.

News of the phone comes as Amazon moves more deeply into designing and making hardware. Last week, it unveiled its Fire TV set-top box and said it will soon begin distributing a wand customers can use to scan product barcodes at home to re-order groceries and other goods without logging into their computers. It introduced new versions of its Kindle Fire tablets last year.

But Amazon approaches hardware differently than many other companies. Chief Executive Jeff Bezos has said he prefers Amazon to profit from customers buying services through Amazon hardware, rather than profit from the devices themselves.


CEO Jeff Bezos has said he'd rather Amazon profit from the services it sells than from the devices it builds.
The design and pricing of the smartphone are unclear and these people cautioned that Amazon may alter its launch plans due to performance or other concerns.

The 3-D screen technology can sense the movement of a person's eyes and whether the screen is moving closer to a user's face, according to people familiar with the matter. In response, the phone will be able to automatically zoom into images as it moves closer to a user's face and could manipulate text and images as a person moves the phone.

The technology would be ideal for gaming, an area of recent focus for Amazon including on the set-top box. The phone's software is also optimized for very visual games, designed to provide a sense of depth, according to people who have handled the handsets.

It also isn't known what operating system the phone will use or which wireless carriers Amazon is working with. The Kindle Fire tablet and the Fire TV set-top box both rely on Google Inc.'s Android mobile-operating system. But Amazon created its own app store for the Kindle devices and does not offer access to Google's Play Store.

AT&T Inc. provides service for Kindle tablets and e-readers. An AT&T spokesman declined to comment.


Amazon has told one of its suppliers it is anticipating mass production of the device later this month, with an initial order of 600,000 units, according to a person briefed on the plans. The company has lined up two display makers for the smartphone, including Japan Display Inc., 6740.TO -1.67%  the maker of displays for Apple's iPhone 5C and 5S, according to another person familiar with the details.

A Japan Display representative declined to comment.

Amazon has been inviting select app and software developers to hotels to demonstrate the handset in suites protected by security guards, two people familiar with the matter said.

Because consumers carry smartphones with them everywhere, Amazon would gain access to data like users' locations and app downloads, which could help generate new sales opportunities for e-books, video downloads and items like household goods.



A smartphone may also open up new avenues for mobile payments, a nascent market dominated today by rival eBay Inc.'s PayPal. Amazon is targeting a summer launch of a program to use Kindle Fire tablets as checkout registers at smaller brick-and-mortar merchants, people familiar with the plan told The Wall Street Journal earlier this year

Article Source from

http://online.wsj.com/news/article_email/SB10001424052702303873604579495940522902678-lMyQjAxMTA0MDEwMTExNDEyWj


Do You Know PI 3D Tablet NEO3DO ? 



Check it Out  Click HERE

Beware Heartbleed Bug | Passwords You Need to Change Right Now

The Heartbleed Bug

The Passwords You Need to Change Right Now



An encryption flaw called the Heartbleed bug is already being called one of the biggest security threats the Internet has ever seen. The bug has affected many popular websites and services — ones you might use every day, like Gmail and Facebook — and could have quietly exposed your sensitive account information (such as passwords and credit card numbers) over the past two years.

But it hasn't always been clear which sites have been affected. Mashable reached out some of the most popular social, email, banking and commerce sites on the web. We've rounded up their responses below.



Some Internet companies that were vulnerable to the bug have already updated their servers with a security patch to fix the issue. This means you'll need to go in and change your passwords immediately for these sites. Even that is no guarantee that your information wasn't already compromised, but there's also no indication that hackers knew about the exploit before this week. The companies that are advising customers to change their passwords are doing so as a precautionary measure.

Although changing your password regularly is always good practice, if a site or service hasn't yet patched the problem, your information will still be vulnerable.

Also, if you reused the same password on multiple sites, and one of those sites was vulnerable, you'll need to change the password everywhere. It's not a good idea to use the same password across multiple sites, anyway.

We'll keep updating the list as new information comes in. Last update: April 12, 10:30 p.m. ET




Article from  http://mashable.com/2014/04/09/heartbleed-bug-websites-affected


How to Protect Yourself From the Heartbleed Bug

An encryption flaw called the Heartbleed bug that has exposed a collection of popular websites — from Airbnb and Yahoo to NASA and OKCupid — could be one of the biggest security threats the Internet has ever seen. If you have logged into any of the affected sites over the past two years, your account information could be compromised, allowing cybercriminals to snap up your credit card information or steal your passwords.

You're likely affected either directly or indirectly by the bug, which was found by a member of Google's security team and a software firm named Codenomicon. The bad news: There's not a lot you can do about it now. It's the responsibility of Internet companies to update their servers to deal with Heartbleed, and once they do, you can take action (see below).

The issue involves network software called OpenSSL, which is an open-source set of libraries for encrypting online services.

    Secure websites — with “https” in the URL ("s" stands for secure) — make up 56% of websites, and nearly half of those sites were vulnerable to the bug.

Secure websites — with “https” in the URL ("s" stands for secure) — make up 56% of websites, and nearly half of those sites were vulnerable to the bug. In theory, a cybercriminal could have exploited Heartbleed by making network requests that could piece together your sensitive data. The good news: There isn't any indication that a hacker caught wind of this; it seems the researchers were the first to locate the problem.

But the scary part is that attackers could have infiltrated these websites, extracted the information they wanted and left no trace of their presence. Thus, it's hard to determine whether someone ever exploited the bug, or if your account information was compromised.
What to do

First, check which sites you use are affected. If you don't want to read through the long list of websites with the security flaw, the password security firm LastPass has set up a Heartbleed Checker, which lets you enter the URL of any website to check its vulnerability to the bug and if the site has issued a patch. [Update: We've compiled a list of popular sites and whether they were affected.]

Next, change your passwords for major accounts — email, banking and social media logins — on sites that were affected by Heartbleed but patched the problem. That patch should also include reissuing any digital certificates that might be vulnerable. However, if the site or service hasn't patched the flaw yet, there's no point to changing your password. Instead, ask the company when it expects to push out a fix to deal with Heartbleed.

A big cause for concern is related to sites that have your sensitive information, such as Yahoo and OKCupid (most people aren't logging into NASA.gov with private data). Both companies have since issued a patch to fix the security hole, so users with accounts with those companies — including Yahoo Mail, Flickr and so on — should update their passwords immediately.

It's important to wait to get the "all clear" sign from a company or service before changing, especially now that this bug is out in the open. Changing a password before the bug is fully patched wont' make things any better.

    Facebook and Twitter use OpenSSL web servers, though it's still unclear whether or not they were vulnerable to the issue.

Facebook and Twitter use OpenSSL web servers, though it's still unclear whether or not they were vulnerable to the issue. Facebook reportedly issued a security patch, as did Google.

Other websites that have issued an OpenSSL software security update include WordPress, Amazon Web Services and Akamai.

Some websites not considered vulnerable include AOL, Foursquare and Evernote, among others.

"It's a big deal for Internet users, especially when it comes to protecting financial information," Joe Siegrist, CEO and cofounder of LastPass, told Mashable. "Some financial organizations are using more conservative web security choices like Microsoft, which is not vulnerable to the bug, so users should check and see if their bank has been affected."

Make sure to keep an eye on sensitive online accounts, especially banking and email, for suspicious activity for the next week or so.

Article from http://mashable.com/2014/04/09/heartbleed-what-to-do

Check site security before changing your password


It’s not clear exactly which services were impacted, or what passwords may have been compromised. But if you have an account on Yahoo, OKCupid or Github—three popular sites known to have had the vulnerability (and patched it)—you should change your password on them as soon as possible.

Other big Web companies are taking steps to fix the problem. You can check if a service has updated its security by typing in its domain name at https://www.ssllabs.com/ssltest

If everything’s green, it has probably been fixed and you are clear to change your password. If the site is not in the green, hold off. Changing your password on vulnerable sites would either have no impact, or could potentially expose your new password.

Even without Heartbleed, passwords have never been more vulnerable, and you should change them for important accounts every 90 days.

Here’s what else you need to know today:

Turn on two-factor authentication :
Beyond using fresh passwords, it’s now important to adopt an additional defense, available on a growing number of sites, called “two-factor authentication.” (It also goes by “second factor,” “login verification” or by branding such as, in Bank of America’s case, “SafePass.”)

This option, now offered by many email services, banks and social networks, sends you a one-time code (usually via text message) every time you (or anyone else) tries to log into your account. You’ll need to type in that code to access your account.

Use at least five different passwords :
The biggest mistake you could make is choosing the same password for everything. If your password gets compromised on one site, someone might try to use it elsewhere.

Instead of trying to keep track of unique passwords for every site, memorize groups of them. Start with five key categories: banking, email, social networking, shopping and, finally, sites you visit very infrequently. Within those categories, you can make each password more unique by tacking on a character or two at the end specific to a site, like AZ for Amazon.com.

If there’s a breach in, say, one of your retail sites, you should immediately change all of the passwords in that group, though this strategy may have bought you a little time.


Choose strong passwords
What counts as strong? Longer is better; you’ll want passwords at least six to eight characters long that include numbers and characters. If your password appears on lists that hackers have exposed, you’ll need to start over.



Pet and family names are also a bad place to start because criminals might have access to your personal information. They might even be looking at your Facebook posts.

Unfortunately, sites and apps all have different standards. They also have different rules about the number and kinds of characters they’ll allow—some, for example, won’t accept uppercase, while others require it. A friend recently made a project of changing passwords on all 129 accounts in his life, and was ready to pull out his hair when he discovered one site would not accept the ampersand, while another wouldn’t accept a dollar sign.

It’s especially important to have unique passwords for email accounts, because hackers with access to your email can use it to initiate a “forgot my password” recovery process for other sites.

Some people also intentionally give incorrect answers to security-challenge questions on sites—What was your first car? What was the name of your first pet?—so that criminals with information about you still can’t guess the right answer.

There’s help to remember :
Writing down your passwords on something you keep in your wallet could put them at risk. But it is better to choose stronger passwords that you keep written in a safe place than to choose easily cracked ones that you memorize.

There are good ways to remember longer passwords, however.

The most basic trick is mnemonics. For example, choose passwords based around a phrase or random assortment of words you can remember. Or, use the first letter of every word from the phrase as your password. So, “I Left My Heart In San Francisco,” could be “ILMHISF.”

Don’t just stick to phrases and words that are true in your life. You can also remember phrases that are fabrications, like the wrong name for your dog, that criminals are less likely to guess.

Finally, some people invest in password manager services and apps, such as LastPass, PasswordBox and 1Password, which keep track of passwords and suggest especially strong ones.

Some security experts, though, warn against creating a single point of potential failure with all your passwords, especially if the service stores your passwords remotely. Still, they’re safer than just using “1234” or “password.”

Article Source from http://blogs.wsj.com/personal-technology/2014/04/09/how-and-why-to-change-your-passwords-today

How To Know HeartBleed Bug ?


The HeartBleed Bug

HeartBleed Bug

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
What leaks in practice?

We have tested some of our own services from attacker's perspective. We attacked ourselves from outside, without leaving a trace. Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication.
How to stop the leak?

As long as the vulnerable version of OpenSSL is in use it can be abused. Fixed OpenSSL has been released and now it has to be deployed. Operating system vendors and distribution, appliance vendors, independent software vendors have to adopt the fix and notify their users. Service providers and users have to install the fix as it becomes available for the operating systems, networked appliances and software they use.

Q&A

What is the CVE-2014-0160?

CVE-2014-0160 is the official reference to this bug. CVE (Common Vulnerabilities and Exposures) is the Standard for Information Security Vulnerability Names maintained by MITRE. Due to co-incident discovery a duplicate CVE, CVE-2014-0346, which was assigned to us, should not be used, since others independently went public with the CVE-2014-0160 identifier.

Why it is called the Heartbleed Bug?

Bug is in the OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). When it is exploited it leads to the leak of memory contents from the server to the client and from the client to the server.

What makes the Heartbleed Bug unique?

Bugs in single software or library come and go and are fixed by new versions. However this bug has left large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitation and attacks leaving no trace this exposure should be taken seriously.

Is this a design flaw in SSL/TLS protocol specification?

No. This is implementation problem, i.e. programming mistake in popular OpenSSL library that provides cryptographic services such as SSL/TLS to the applications and services.

What is being leaked?

Encryption is used to protect secrets that may harm your privacy or security if they leak. In order to coordinate recovery from this bug we have classified the compromised secrets to four categories: 1) primary key material, 2) secondary key material and 3) protected content and 4) collateral.

What is leaked primary key material and how to recover?

These are the crown jewels, the encryption keys themselves. Leaked secret keys allows the attacker to decrypt any past and future traffic to the protected services and to impersonate the service at will. Any protection given by the encryption and the signatures in the X.509 certificates can be bypassed. Recovery from this leak requires patching the vulnerability, revocation of the compromised keys and reissuing and redistributing new keys. Even doing all this will still leave any traffic intercepted by the attacker in the past still vulnerable to decryption. All this has to be done by the owners of the services.

What is leaked secondary key material and how to recover?

These are for example the user credentials (user names and passwords) used in the vulnerable services. Recovery from this leaks requires owners of the service first to restore trust to the service according to steps described above. After this users can start changing their passwords and possible encryption keys according to the instructions from the owners of the services that have been compromised. All session keys and session cookies should be invalidated and considered compromised.

What is leaked protected content and how to recover?

This is the actual content handled by the vulnerable services. It may be personal or financial details, private communication such as emails or instant messages, documents or anything seen worth protecting by encryption. Only owners of the services will be able to estimate the likelihood what has been leaked and they should notify their users accordingly. Most important thing is to restore trust to the primary and secondary key material as described above. Only this enables safe use of the compromised services in the future.

What is leaked collateral and how to recover?

Leaked collateral are other details that have been exposed to the attacker in the leaked memory content. These may contain technical details such as memory addresses and security measures such as canaries used to protect against overflow attacks. These have only contemporary value and will lose their value to the attacker when OpenSSL has been upgraded to a fixed version.

Recovery sounds laborious, is there a short cut?

After seeing what we saw by "attacking" ourselves, with ease, we decided to take this very seriously. We have gone laboriously through patching our own critical services and are dealing with possible compromise of our primary and secondary key material. All this just in case we were not first ones to discover this and this could have been exploited in the wild already.

How revocation and reissuing of certificates works in practice?

If you are a service provider you have signed your certificates with a Certificate Authority (CA). You need to check your CA how compromised keys can be revoked and new certificate reissued for the new keys. Some CAs do this for free, some may take a fee.

Am I affected by the bug?

You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet. Your popular social site, your company's site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL. Many of online services use TLS to both to identify themselves to you and to protect your privacy and transactions. You might have networked appliances with logins secured by this buggy implementation of the TLS. Furthermore you might have client side software on your computer that could expose the data from your computer if you connect to compromised services.

How widespread is this?

Most notable software using OpenSSL are the open source web servers like Apache and nginx. The combined market share of just those two out of the active sites on the Internet was over 66% according to Netcraft's April 2014 Web Server Survey. Furthermore OpenSSL is used to protect for example email servers (SMTP, POP and IMAP protocols), chat servers (XMPP protocol), virtual private networks (SSL VPNs), network appliances and wide variety of client side software. Fortunately many large consumer sites are saved by their conservative choice of SSL/TLS termination equipment and software. Ironically smaller and more progressive services or those who have upgraded to latest and best encryption will be affected most. Furthermore OpenSSL is very popular in client software and somewhat popular in networked appliances which have most inertia in getting updates.

What versions of the OpenSSL are affected?

Status of different versions:

    OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable
    OpenSSL 1.0.1g is NOT vulnerable
    OpenSSL 1.0.0 branch is NOT vulnerable
    OpenSSL 0.9.8 branch is NOT vulnerable

Bug was introduced to OpenSSL in December 2011 and has been out in the wild since OpenSSL release 1.0.1 on 14th of March 2012. OpenSSL 1.0.1g released on 7th of April 2014 fixes the bug.

How common are the vulnerable OpenSSL versions?
The vulnerable versions have been out there for over two years now and they have been rapidly adopted by modern operating systems. A major contributing factor has been that TLS versions 1.1 and 1.2 came available with the first vulnerable OpenSSL version (1.0.1) and security community has been pushing the TLS 1.2 due to earlier attacks against TLS (such as the BEAST).

How about operating systems?

Some operating system distributions that have shipped with potentially vulnerable OpenSSL version:

    Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4
    Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11
    CentOS 6.5, OpenSSL 1.0.1e-15
    Fedora 18, OpenSSL 1.0.1e-4
    OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 2012)
    FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013
    NetBSD 5.0.2 (OpenSSL 1.0.1e)
    OpenSUSE 12.2 (OpenSSL 1.0.1c)

Operating system distribution with versions that are not vulnerable:

    Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14
    SUSE Linux Enterprise Server
    FreeBSD 8.4 - OpenSSL 0.9.8y 5 Feb 2013
    FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013
    FreeBSD 10.0p1 - OpenSSL 1.0.1g (At 8 Apr 18:27:46 2014 UTC)
    FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC)

How can OpenSSL be fixed?

Even though the actual code fix may appear trivial, OpenSSL team is the expert in fixing it properly so fixed version 1.0.1g or newer should be used. If this is not possible software developers can recompile OpenSSL with the handshake removed from the code by compile time option -DOPENSSL_NO_HEARTBEATS.

Should heartbeat be removed to aid in detection of vulnerable services?

Recovery from this bug might have benefitted if the new version of the OpenSSL would both have fixed the bug and disabled heartbeat temporarily until some future version. Majority, if not almost all, of TLS implementations that responded to the heartbeat request at the time of discovery were vulnerable versions of OpenSSL. If only vulnerable versions of OpenSSL would have continued to respond to the heartbeat for next few months then large scale coordinated response to reach owners of vulnerable services would become more feasible. However, swift response by the Internet community in developing online and standalone detection tools quickly surpassed the need for removing heartbeat altogether.

Can I detect if someone has exploited this against me?

Exploitation of this bug leaves no traces of anything abnormal happening to the logs.

Can IDS/IPS detect or block this attack?

Although the heartbeat can appear in different phases of the connection setup, intrusion detection and prevention systems (IDS/IPS) rules to detect heartbeat have been developed. Due to encryption differentiating between legitimate use and attack can not be based on the content of the request, but the attack may be detected by comparing the size of the request against the size of the reply. This implies that IDS/IPS can be programmed to detect the attack but not to block it unless heartbeat requests are blocked altogether.

Has this been abused in the wild?

We don't know. Security community should deploy TLS/DTLS honeypots that entrap attackers and to alert about exploitation attempts.

Can attacker access only 64k of the memory?

There is no total of 64 kilobytes limitation to the attack, that limit applies only to a single heartbeat. Attacker can either keep reconnecting or during an active TLS connection keep requesting arbitrary number of 64 kilobyte chunks of memory content until enough secrets are revealed.

Is this a MITM bug like Apple's goto fail bug was?

No this doesn't require a man in the middle attack (MITM). Attacker can directly contact the vulnerable service or attack any user connecting to a malicious service. However in addition to direct threat the theft of the key material allows man in the middle attackers to impersonate compromised services.

Does TLS client certificate authentication mitigate this?


No, heartbeat request can be sent and is replied to during the handshake phase of the protocol. This occurs prior to client certificate authentication.

Does OpenSSL's FIPS mode mitigate this?


No, OpenSSL Federal Information Processing Standard (FIPS) mode has no effect on the vulnerable heartbeat functionality.

Does Perfect Forward Secrecy (PFS) mitigate this?

Use of Perfect Forward Secrecy (PFS), which is unfortunately rare but powerful, should protect past communications from retrospective decryption. Please see https://twitter.com/ivanristic/status/453280081897467905 how leaked tickets may affect this.

Can heartbeat extension be disabled during the TLS handshake?

No, vulnerable heartbeat extension code is activated regardless of the results of the handshake phase negotiations. Only way to protect yourself is to upgrade to fixed version of OpenSSL or to recompile OpenSSL with the handshake removed from the code.

Who found the Heartbleed Bug?

This bug was independently discovered by a team of security engineers (Riku, Antti and Matti) at Codenomicon and Neel Mehta of Google Security, who first reported it to the OpenSSL team. Codenomicon team found heartbleed bug while improving the SafeGuard feature in Codenomicon's Defensics security testing tools and reported this bug to the NCSC-FI for vulnerability coordination and reporting to OpenSSL team.

What is the Defensics SafeGuard?

The SafeGuard feature of the Codenomicon's Defensics security testtools automatically tests the target system for weaknesses that compromise the integrity, privacy or safety. The SafeGuard is systematic solution to expose failed cryptographic certificate checks, privacy leaks or authentication bypass weaknesses that have exposed the Internet users to man in the middle attacks and eavesdropping. In addition to the Heartbleed bug the new Defensics TLS Safeguard feature can detect for instance the exploitable security flaw in widely used GnuTLS open source software implementing SSL/TLS functionality and the "goto fail;" bug in Apple's TLS/SSL implementation that was patched in February 2014.

Who coordinates response to this vulnerability?

Immediately after our discovery of the bug on 3rd of April 2014, NCSC-FI took up the task of verifying it, analyzing it further and reaching out to the authors of OpenSSL, software, operating system and appliance vendors, which were potentially affected. However, this vulnerability had been found and details released independently by others before this work was completed. Vendors should be notifying their users and service providers. Internet service providers should be notifying their end users where and when potential action is required.

Is there a bright side to all this?

For those service providers who are affected this is a good opportunity to upgrade security strength of the secret keys used. A lot of software gets updates which otherwise would have not been urgent. Although this is painful for the security community, we can rest assured that infrastructure of the cyber criminals and their secrets have been exposed as well.

What can be done to prevent this from happening in future?

The security community, we included, must learn to find these inevitable human mistakes sooner. Please support the development effort of software you trust your privacy to. Donate money to the OpenSSL project.

Where to find more information?

This Q&A was published as a follow-up to the OpenSSL advisory, since this vulnerability became public on 7th of April 2014. The OpenSSL project has made a statement at https://www.openssl.org/news/secadv_20140407.txt. NCSC-FI published an advisory at https://www.cert.fi/en/reports/2014/vulnerability788210.html. Individual vendors of operating system distributions, affected owners of Internet services, software packages and appliance vendors may issue their own advisories.


References

    CVE-2014-0160
    NCSC-FI case# 788210
    OpenSSL Security Advisory (published 7th of April 2014, ~17:30 UTC)
    CloudFlare: Staying ahead of OpenSSL vulnerabilities (published 7th of April 2014, ~18:00 UTC)
    heartbleed.com (published 7th of April 2014, ~19:00 UTC)
    Ubuntu / Security Notice USN-2165-1
    FreshPorts / openssl 1.0.1_10
    Tor Project / OpenSSL bug CVE-2014-0160
    RedHat / RHSA-2014:0376-1
    CentOS / CESA-2014:0376
    Fedora / Status on CVE-2014-0160
    CERT/CC (USA)
    NCSC-FI (Finland)
    CERT.at (Austria)
    CIRCL (Luxembourg)
    CERT-FR (France)
    JPCERT/CC (Japan)
    CERT-SE (Sweden)
    NorCERT (Norway)
    NCSC-NL (Netherlands)
    CNCERT/CC (People's Republic of China)
    Public Safety Canada
    LITNET CERT (Lithuania)
    MyCERT (Malaysia)
    UNAM-CERT (Mexico)
    SingCERT (Singapore)
    Q-CERT (Qatar)


Article from Heartbleed.com

What A Difference Saving Account and Fixed Deposits Account

There are those who prefer a savings account as it offers easier withdrawals. While others prefer fixed deposits because of higher interest rates. It's a dilemma many may face but are the two really interchangeable? In the end, it all depends on your purpose.

 

So how much of a difference does it make?

Say you’re one of the luckier people to have RM5,000 as your savings and would love to see it grow further. Which option will help you gain more money, a savings account or a fixed deposit? Whilst the answer is obvious – what isn’t so obvious is by how much.

Savings account

Before you dismiss the idea of savings accounts giving you more savings, it’s worth noting that there are savings accounts with an interest rate of 3% p.a. Although these accounts require that you have a significant amount of savings in your account to be eligible for it. Bank Rakyat offers an interest rate of 3% for those who save RM100,000 in their account. One savings account by Affin Bank has the same rate as their fixed deposit, which is 3.38%, but you will need about RM1,000,000 to be eligible for that and well, not all of us are millionaires.

If all you have is RM5,000, on average most banks give a rate of 0%-0.7% p.a., with the highest rate giving you RM35 per year with that amount. There are those like the Alliance Buddy savings account that give you up to 1% with RM5,000. The highest available you can get for your RM5,000 in a savings account is the Hong Leong Junior Savings account with an interest rate of 2.9% for the first RM50,000 although this is reserved for children below the age of 18. Not too sure if your child can have RM5,000 in their account, but if they manage to gather all their allowance savings, presents and ang pows up to RM5,000, they’d be getting an extra RM145 in their account.
So you will get something for your RM5,000 – just not much.

Let’s see what fixed deposits can do for you instead.

Fixed deposits

Fixed deposits have a higher interest rate with anywhere between 2%-3.5%, with some being more. You may find the idea of saving in a Fixed Deposit account a little tougher as you have to keep a certain amount in your account at all time, or else lose out on the higher interest rate. But if you really want to put that RM5,000 away for your future instead, it’s a good option. You can always choose 1 month – 3 month FD’s for a little more flexibility but rates for these are usually lower than those for 6 and 12 months.

The average fixed deposit rate would be about 3% p.a., especially within the first year. So if you go with this, you would get RM150 for your RM5,000 savings although you can’t use that money straight off when you get it. The Mach Fixed Deposit by Hong Leong Bank gives a high interest rate of 3.7% p.a. and the flexibility to make partial withdrawals. This means you get RM185 a year and that’s definitely a higher amount than what any savings account can give you.

Should you get an FD?

There's no doubt that with a higher interest rate, the Fixed Deposit gives you more for your money. But if you need to constantly access your money, getting it may not be a good idea. It's still important to note that fixed deposits can be opened with as little as RM1,000 and at 3%, you earn RM30 per year just by saving it. In your regular savings account at 0.7%; you earn RM7, which in the end will be used to off-set the numerous ATM fees you’re charged.
If you really want to make your savings work for you, rather than just let it lie in the bank, why don't you use a fixed deposit that gives you that little extra instead? A savings account also makes it easier to spend due to its easy access, but if you really want to save for your future; look into saving in a fixed deposit.

Article from RinggitPlus.com. RinggitPlus compares credit cards, personal loans and home loans to help Malaysians get more for their money.

Sell Jewelry Online



How To Successfully Sell Jewelry Online




If you are looking to sell jewelry online, there are some things you should consider. You have some options depending on your goals and the type of jewelry you want to sell. It is possible to have your own small business selling jewelry over the Internet.

First, determine what type of jewelry you want to sell. One of the primary decisions should be if you are making it yourself or selling pre-made pieces. This will determine your marketing strategy as well as different options for venues. Think about your target customers. Selling bracelets intended for teens will be very different than selling bracelets for adult women. It is helpful to put these ideas down on paper in order to formulate a precise and goal oriented business plan.




The next step is to figure out what kind of website you want. There are options, and they partially depend on how the jewelry is made. If you intend to make the pieces yourself, there are specialty sites that only sell handmade goods. These are great because they provide a marketplace full of potential customers looking for hand crafted items. However, most ask for some sort of fee for posting these items. If your plan is to sell pre-made items, there are also retail sites that will provide this service. Again, most of these will ask for a fee, usually a small percentage from each sale. Finally, you can also sell jewelry on your own website. Commerce sites require a little more technical skill to create and design. However, hiring someone to do this for you is always an option.

A key component to success is prompt and courteous service. Customers will often base part of their decision to buy something online off of feedback left by previous customers. Make sure everyone who purchases something from you is happy. Manage your orders and ship them out as soon as possible. Also take the time to package the item carefully. This is especially true for delicate or intricate pieces. Check your email daily and answer any questions or concerns from customers right away. You want people to leave you positive and outstanding feedback.




Market your jewelry by having business cards, pamphlets, and other promotional materials handy. Your website, email, and services should be easily read. Include related services like jewelry repair or custom designs if you are willing to do so. Do not be afraid to pass out your business cards or to hang fliers on community bulletin boards!

Starting your own small jewelry business can bring you some extra money. To sell jewelry online you need to have a clear business plan, a website, excellent customer service, and marketing skills. Start selling today!