Skip to main content

Bidding at eBay

It's been years since the last time I used eBay Auction. I saw one item today, and I'm very interested to bid so I rush in to log-in. I forgot, I configured my account using two-factor authentication to provide a much better security. I've spent an hour looking for my security card key that I bought from Paypal years ago. This will give me 6 digits (new every 60 seconds) as part of authenticating my log-in credentials.

I got in, now bidding time. Hopefully I'll get the item.

I checked first how many interested party would like to have this item, more than 50 bids already at $2312. So I place my bid for $2500, immediately I'm out bid by another bidder.

I know the proxy bidding works, where they bid with the maximum reserve budget. For example, Mary is the last bidder for $100, John out bid Mary after placing $110 bid (assuming $10 is the increment). You will see John (using his auction alias name). And John place his proxy bid to $1000 maximum budget.

Another bidder Bob, bid for $120. Remember John has a proxy bid, so the system proxy bid for $130 as the highest offer. Then Bob bid another for $140, the proxy bid for $150 as the highest offer again, and so on. As a bidder, I can see this transaction.

Going back to eBay Auction. When I placed the $2500 bid as User51, the other bidder User52 doesn't exist in the bidding, it only appears after I bid. Keep in mind the item in auction has a reserve amount. So I place another bid for $3000, then User52 bid for $3050. Again, this User52 doesn't participate in the auction only after I place my first bid. For the third time, I put up $4000 bid, as expected User52 outbid me.

I don't know about you, but this is not normal for me. So I stop bidding right away, it doesn't make sense to beat the "ghost bidder" in auction.

I value my hard earned money.

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp