Ezeọgụ Publication     
…… building enviable legacies



Ezeogu Main News




Internet Scams - Be Aware

Most of us like to think we're too clever to be caught out by internet fraudsters. In fact any of us can be caught out by these scroungers . Their tricks have gone far beyond the infamous fax from a "Nigerian prince" , "the 419" or variants of these - asking you for money. 

Now frauds are increasingly sophisticated and you are much more likely to be contacted (email,sms or telephone) by someone you trust (seemingly). Fraudsters dupe their victims using a type of psychological manipulation known as "social engineering". It is essentially a confidence trick that influences a person to take action that may not be in their best interest. With many technical security defences in place to prevent large and medium size enterprises from being hacked directly, it is us humans that present the best medium and to a certain extent, the sweet spot for criminals to target. To explain how "social engineering" works here is an analogy - Children are little people we all loved. And they get us to do things which under normal circumstances we'd never thought of doing ever. The same psychological principles is what the scammers are applying . They build rapport, get us to like them, trust them, and often inject a sense of urgency into the scenario. This all releases certain chemicals in our brain that allow us to take actions we perhaps shouldn't take.Why is it growing? Social engineering fraud has been identified by the international police agency Interpol as one of the world's emerging fraud trends. In the last two years there has been a spike in this type of fraud, with reported losses in 2015 doubling to nearly $1bn (£675m) 

It's a lucrative crime. You don't need a skilled programmer to do social engineering - just someone who's willing to talk to people or write emails. On top of this, the growth of the internet has played right into the criminal's hands. A key part of social engineering is having information on your target. Criminals can get this from buying hacked company data and studying their victim's social media profile online. 

Vishing: 


In June last year Emma Watson, a British businesswoman who was setting up a children's nursery, got a phone call from her bank's fraud team. They told her that they had stopped some unusual transactions on her account, but because it had been compromised she had to transfer her money into some other accounts they had set up in her name. "They were completely professional, it was a clear line, they knew my name, they called me on my landline, they used all the language," she says. "They were very reassuring, saying 'I know this is a distressing time for you and I'm going to help you'." In fact it wasn't her bank calling at all, but criminals fraudulently posing as her bank's fraud team. Emma ended up transferring £100,000 into the fraudsters' accounts online. Only a fraction of it has so far been traced and returned. This type of fraud is called "Vishing" where criminals persuade victims to hand over personal details or transfer money, over the telephone. They have a number of techniques at their disposal. 
  •  Information: the criminals already have your name, address, phone number, bank details - essentially the kind of information you would expect a genuine caller to have  
  •  Urgency: You are made to believe your money is in danger and have to act quickly - fear often leads people into acting without thinking  
  •  Phone spoofing: The phone number appears as if it's coming from somewhere else, so when you pick up the phone you already believe the caller because the number is convincing  
  • Holding the line: In some cases, the criminals can hold your telephone line, so if you hang up to call back the bank, you can get put straight back to the fraudsters. 
  •  Atmosphere: You hear a lot of background noise so it sounds like a call centre rather than a guy in a basement - they either do have a call centre, or are playing a sound effects CD. 


Here is the advice: Don't ever give personal information like banking or credit cards over the phone to someone who has called you. If you get a call, hang up, and ring the number on the back of your credit card using a different phone from the one they called you on.

Phishing 


Phishing emails have risen in number and have got a lot more sophisticated. How they work? They play on your trust and they use a front, whether it's a bank, a friend's name, or someone you expect communications from, and they put urgency on you to respond immediately. Most of the phishing emails will looked very convincing - for example like one from Amazon if you recently made a purchase from them or from your bank. In case of the former, clicking a link would open up what look like a real Amazon log-in page. A closer look at the address bar in your browser might indicate a site in Russia, Ukraine, Romania etc. etc - it certainly wasn't Amazon.com. If the scammers hit the right emotional triggers at the right time, anyone can be a victim of phishing." Phishing emails can look very convincing - copying branding and 'spoofing' email addresses to make them look genuine. Here is a simple advice once you have opened the mail - "hover the mouse over the link and the URL details will come up and will show if it's valid, or taking you somewhere unrecognizable" If in doubt, never click on the link. If an email looks genuine then contact the sender through their official website. Never use telephone numbers or links provided in the email if you never requested or anticipated them. 


Smishing 


Smishing is SMS phishing where text messages are sent trying to encourage people to pay money out or click on suspicious links. Sometimes attackers try to get victims on the phone by sending a text message asking them to call a number, in order to persuade them further. Unsolicited text messages from unknown numbers should raise alarm bells, but often banks do text their customers for a variety of reasons. In that case, you should call the bank using a number from a bank statement or a verified source, not a text message.



 The Internet  2016  -  don't be a victim surf wisely




read more



Phishing,Vishing and Smishing - Be Aware Of Social Engineering Fraud

Most of us like to think we're too clever to be caught out by internet fraudsters. In fact any of us can be caught out by these scroungers . Their tricks have gone far beyond the infamous fax from a "Nigerian prince" , "the 419" or variants of these - asking you for money.

Now frauds are increasingly sophisticated and you are much more likely to be contacted (email,sms or telephone) by someone you trust (seemingly). Fraudsters dupe their victims using a type of psychological manipulation known as "social engineering". It is essentially a confidence trick that influences a person to take action that may not be in their best interest. With many technical security defences in place to prevent large and medium size enterprises from being hacked directly, it is us humans that present the best medium and to a certain extent, the sweet spot for criminals to target. To explain how "social engineering" works here is an analogy - Children are little people we all loved. And they get us to do things which under normal circumstances we'd never thought of doing ever. The same psychological principles is what the scammers are applying . They build rapport, get us to like them, trust them, and often inject a sense of urgency into the scenario. This all releases certain chemicals in our brain that allow us to take actions we perhaps shouldn't take.Why is it growing? Social engineering fraud has been identified by the international police agency Interpol as one of the world's emerging fraud trends. In the last two years there has been a spike in this type of fraud, with reported losses in 2015 doubling to nearly $1bn (£675m)

It's a lucrative crime. You don't need a skilled programmer to do social engineering - just someone who's willing to talk to people or write emails. On top of this, the growth of the internet has played right into the criminal's hands. A key part of social engineering is having information on your target. Criminals can get this from buying hacked company data and studying their victim's social media profile online.

Vishing: 


In June last year Emma Watson, a British businesswoman who was setting up a children's nursery, got a phone call from her bank's fraud team. They told her that they had stopped some unusual transactions on her account, but because it had been compromised she had to transfer her money into some other accounts they had set up in her name. "They were completely professional, it was a clear line, they knew my name, they called me on my landline, they used all the language," she says. "They were very reassuring, saying 'I know this is a distressing time for you and I'm going to help you'." In fact it wasn't her bank calling at all, but criminals fraudulently posing as her bank's fraud team. Emma ended up transferring £100,000 into the fraudsters' accounts online. Only a fraction of it has so far been traced and returned. This type of fraud is called "Vishing" where criminals persuade victims to hand over personal details or transfer money, over the telephone. They have a number of techniques at their disposal.
  •  Information: the criminals already have your name, address, phone number, bank details - essentially the kind of information you would expect a genuine caller to have  
  •  Urgency: You are made to believe your money is in danger and have to act quickly - fear often leads people into acting without thinking  
  •  Phone spoofing: The phone number appears as if it's coming from somewhere else, so when you pick up the phone you already believe the caller because the number is convincing  
  • Holding the line: In some cases, the criminals can hold your telephone line, so if you hang up to call back the bank, you can get put straight back to the fraudsters. 
  •  Atmosphere: You hear a lot of background noise so it sounds like a call centre rather than a guy in a basement - they either do have a call centre, or are playing a sound effects CD. 


Here is the advice: Don't ever give personal information like banking or credit cards over the phone to someone who has called you. If you get a call, hang up, and ring the number on the back of your credit card using a different phone from the one they called you on.

Phishing 


Phishing emails have risen in number and have got a lot more sophisticated. How they work? They play on your trust and they use a front, whether it's a bank, a friend's name, or someone you expect communications from, and they put urgency on you to respond immediately. Most of the phishing emails will looked very convincing - for example like one from Amazon if you recently made a purchase from them or from your bank. In case of the former, clicking a link would open up what look like a real Amazon log-in page. A closer look at the address bar in your browser might indicate a site in Russia, Ukraine, Romania etc. etc - it certainly wasn't Amazon.com. If the scammers hit the right emotional triggers at the right time, anyone can be a victim of phishing." Phishing emails can look very convincing - copying branding and 'spoofing' email addresses to make them look genuine. Here is a simple advice once you have opened the mail - "hover the mouse over the link and the URL details will come up and will show if it's valid, or taking you somewhere unrecognizable" If in doubt, never click on the link. If an email looks genuine then contact the sender through their official website. Never use telephone numbers or links provided in the email if you never requested or anticipated them. 


Smishing 


Smishing is SMS phishing where text messages are sent trying to encourage people to pay money out or click on suspicious links. Sometimes attackers try to get victims on the phone by sending a text message asking them to call a number, in order to persuade them further. Unsolicited text messages from unknown numbers should raise alarm bells, but often banks do text their customers for a variety of reasons. In that case, you should call the bank using a number from a bank statement or a verified source, not a text message.



 The Internet  2016  -  don't be a victim surf wisely




read more



Boko Haram - Political Or A Terrorist Organisation

This was originally written in Dec 2014

In 2014, after the kidnapping of 200 school children in the North East of Nigeria, many people became aware and sympathetic to the nightmare that was slowly and surreptitiously creeping in to Nigeria in the form of extreme religious fundamentalism called "Boko Haram". It is imperative to explicitly make this point absolutely succinct - there are religious fundamentalist in all the major religious denominations or groupings _ Christianity, Judaism, Buddhism, Hinduism et al. But none has shown or exhibited the same callous, depraved and inhumane instinct as demonstrated by the aforementioned group. It beggars the question - Is there an intrinsic attribute within the fundamental set up of Islam that necessitates this outcome? The main two branches or divisions in Islam i.e. Shia and Sunni and their fundamental differences being allied to the successor of the Prophet Mohamed are clearly understood. Thus, one can categorically states that the above mentioned branches(Shia, Sunni) both adhere to the same fundamental principles and beliefs that emphasize that Allah is all knowing, merciful of all, all present and powerful and is the sustainer of life.

Now, going back to the original question and considering all that has been said herein, one can only infer that the basic structure of the religion creates the seed for this type of depraved organ to emerge or easily come in to being. Consider this thought for a moment. Apart from Islam, all the other major religious denominations have a top down layer structure. In these sort of set-up, religious edict pronounced from the top is actively move down the structured layers to the masses who follow to the letter. For example, a subhead, leader, pastor, rabbi, priest, etc; within the organisation falling foul of one of its tenet is easily brought to book as detailed in its procedures. 


From what we know, have read and seen in practical terms within Islam, a so called Head Preacher or Mullah ( whose distinction and qualification is not verifiable or authenticated because there is no such system in place to do this within Islam) can preach in a mosque, on television, internet ( social media - facebook, twitter, You tube etc.) to his heart's content with no social or moral compulsion. There is no one to check, revoke or stop him from preaching (if for instance what he is saying is contradictory to the teachings of Islam) because no such mechanism exists. You will hardly see another Muslim cleric or ordinary Muslim for that matter challenging or disclaiming his pronunciations. It is almost as if doing so is against their religious ethics. However, when public reaction and backlash come to the fore through the media only then will you start seeing a kind of token reaction from so called moderate Muslims - which by and large, is very fickle and merely to safe face. 

Going back to the Head Preacher or Mullah - the fact that he can preach and elucidate on verses in the holy book (Koran) with impunity notwithstanding, if he happens to be a good orator as well, he can have extra ordinary influence on both young social misfit already marginalised within the social fabric through drugs and alcohol and others you would consider literate and educated respectively. In the latter category, the Nigerian Pant Bomber who was studying Mechanical Engineering at London University(University College London) and very recently the medical student of Pakistani descent in Wales currently orchestrating killings in Syria as a Jihadist (apparently disowned now by his own parents) come to mind. The two men of Nigerian descent involved in the depraved killing of soldier Lee Rigby is a case in point for the former category. Both were known to the authorities for dealing and consuming drugs and other misdemeanour. Thus, these so called Hate Preachers will definitely find an audience willing to perform and participate in whatever instructions they deemed necessary for their own self gratification

If further evidence is needed, look at all that has been written and said about those going to Syria to fight the so called Jihad how they got involved. Look at the current leader of Boko Haram Abubakar Shekau does he fit this bill? Look at all the various Islamic sects popping up around various regions in the world claiming to represent the real Islam with conflicting ideologies. The structure of Islam seems to encourage and breed homogeneous sect totally independent and in total disregard of the social structure and fabric that it happens to reside in. There is a word for this type of behaviour or organism in Biochemistry and it is called - Cancer . It destroys from within the very substance keeping it alive. A famous Nigerian author once wrote "Things fall apart if the centre cannot hold" Well may be it has not got to that stage yet but it is certainly bursting out from the seams. The conclusion here is that it cannot be a political organisation because it is destroying the very fabric that holds it intact . - not sustainable Sharia Law Or Not. 


People wake up and smell the coffee (poison) it is definitely neither Arabica nor Robusta . To do nothing is not an option. The government alone cannot solve the carnage that is going on now in Northern Nigeria.  Today the 11 of December 2014 another bomb  has gone off in the city of Kano supposedly carried out by a teenage female suicide bomber - bringing the total wanton killing of innocent people  by a small group of depraved Muslim Fundamentalist to over 2000 this year alone. 

This needs to be stressed - the government is not some entity from outer space representing you. You are the government - you, I and everyone else has a part to play directly or indirectly - the government is you, a family member, an extended family member, a village compatriot, a member from your tribe, a neighbour ,a friend way back from school days,college, university , a colleague from work etc. etc. Thus, the government is made of people like you.  Compare and contrast in advance the election of 1964 that led to the crises that eventually resulted in the civil war and numerous coup d'etat subsequently with the up coming 2015 election - will Nigerians conduct election with (in) blood. Can there be fair  election in the North under the  current   status quo

"We have to act in concert to remove this social malignant cancer eating us up from inside".

Imagined one of the abducted school girls (their whereabouts still in the dark) in northern Nigeria is your junior sister or your daughter, the British Soldier murdered in London was your brother, the British taxi driver delivering aid to Syrian refugees with a bunch of Muslim friends whose throat was slitted and left to bleed to death was your father - how would you be feeling? People Doing Nothing Is Not An Option Any More - Because It  Is  Far  Closer  to Home Than You Think  - Mobilise Mobilise Mobilise.




read more



Responsive Website Design (RWD)

Responsive Web Design

How It Came About

A very clever chap called Ethan Marcotte wrote an article about responsive design on A List Apart. The article proposed addressing the ever-changing landscape of devices, browsers, screen sizes and orientations by creating flexible, fluid and adaptive Web sites. Instead of responding to today's needs for a desktop Web version adapted to the most common screen resolution, along with a particular mobile version (often specific to a single mobile device), the idea was to approach the issue the other way around - a very briliant piece of lateral thinking. The genius was to say, why not use flexible and fluid layouts that adapt to almost any screen. And that article written in May 2010 started a revolution that has changed literally everything about how you consume information on the web.

To emphasise this point, Google has just recently announced it will be relegating site on it result page that are not optimised for the mobile platform - link here.Thus if you are a stake holder in an enterprise still procastinating about overhauling your old website think again. It is rather getting harder and harder to justify putting it off because now you will be punished (ranking,traffic etc.etc.) for not doing so. This is a diminishing return strategy that will invariably put you at a disadvantage. You better act now.



Core Concepts

Three key technical features are at the heart of responsive Web design:
  1. Media queries and media query listeners
  2. A flexible grid-based layout that uses relative sizing
  3. Flexible images and media, through dynamic resizing or CSS

Truly responsive Web Design requires all three features to be implemented.

The key point is adapting to the user's needs and device capabilities. Suppose a mobile user will be viewing your site on a small screen. Taking the user's needs into account doesn't just mean adapting your content to the screen size. It also means thinking about what that mobile user will require first when visiting your site and then laying out the content accordingly. Maybe you'll present the information in a different order. Don't assume the user won't need access to all the site information because he or she is on a mobile device. You might need to change the fonts or interaction areas to respond better to a touch environment. All these factors influence responsive Web design.

While mobile devices are changing the display landscape, with the appearance of more and more small screens, don't forget what's happening at the other end of the spectrum. Displays are also getting larger and larger. Having to serve both segments shouldn't stop designers from being innovative on either.

1-Media Queries

Starting with CSS 2.1, media types were used to apply CSS for both screen and print. You might remember these media types:

<link rel="stylesheet" type="text/css" href="style.css" media="screen" ></link>
<link rel="stylesheet" type="text/css" href="printfriendly.css" media="print" ></link>



That was it end of story. Today though, this has been significantly improved on by the W3C media queries in CSS3, taking them a gigantic step forward.

Today, you can use media queries to scope styles to specific capabilities, applying different styles based on the capabilities that match your query. You can even combine queries that test for several features by using semantic operators such as AND and NOT. Features include width, height, max-width, max-height, device-height, orientation, aspect-ratio, resolution and more.

There are three ways to implement media queries:

  1. Use the @import rule to import style rules from other style sheets:
  2. Put media queries directly in the style sheet:
  3. Include a query in a linked style sheet's media attribute:


Because of the (cascading) nature of CSS, default styles are defined at the top with the media query matching rules and styles below. Styles defined at the top will be cascaded to the matching styles in the rule, or even completely overwritten. If a document has more than one css style sheet applied to it, precedence will be given in their order of execution. The cascade (in css )defines an ordered sequence of style sheets where rules in later sheets have greater precedence than earlier ones.

The images shown below present an example of a responsive web design approach that uses media queries. Fig1 and Fig2 both show a desktop using the chrome broswer in two different resolutions. Fig3 shows the same responsive site on an android Smart Phone, also with the Chrome Browser.The same outcome is attained with other broswers(Internet Explorer,Firefox , Safari and Opera)Smartphones using other operating sytems (windows and apple OSX) also rendered the content correctly.

Fig1



Fig2


Fig3

Media Query Listeners

Taking media queries a step further, the CSS Object Model (CSSOM) working group at the W3C also created media query listeners, which provide an API for responding to media query changes. Instead of having to poll for changes or load several versions of a resource, you can use the API, for example, to download images only of a particular size when a media query match is triggered.

A Word about the Viewport

When testing media queries on mobile browsers, you might notice that the correct media queries are not actually being applied. When this happens, the mobile browser is doing some work on your behalf to render the page optimally on the smaller screen. So do you think there isn't a way of getting the real resolution? Actually there is, in the viewport meta tag. The viewport meta tag controls the logical dimensions and scaling of the mobile browser's (chrome-less) window. Setting the width equal to the device-width works around the problem: Other viewport settings include maximum-zoom and initial-scale.

Flexible Grids

A flexible grid-based layout is one of the cornerstones of responsive design. The term "grid" is used rather freely and doesn't imply a requirement to implement any of the available grid frameworks. What it means here is using CSS for positioning and for laying out margins and spacing, and for implementing various Web layout types in a new way. Layouts and text sizes are typically expressed in pixels. Designers love pixels. Photoshop loves pixels. But a pixel can be one dot on one device and eight dots on another. So how do you approach responsive Web design if everything is pixel-based? You might not like the answer: You stop using pixel-based layouts and start using percentages or the em for sizing.

By basing text sizes, widths and margins on percentages or on the em, a unit of measurement based on a font's point size, you can turn a fixed size into a relative size. This means you'll need to do a little math to achieve a flexible grid and text size system. But the formula for calculating the em is very simple:

target ÷ context = result
Let's say the normal context for the body font size is 16 pixels. If the designer specifies that the H1 should be 24 pixels, you can calculate the following:

24 ÷ 16 = 1.5
This results in the following CSS style:

h1{
font-size: 1.5em;
}

Always take the context into account. Continuing with the previous example, if you have an element inside the H1 that needs to be 12 pixels, you use the current H1 as the context. The context is now 24 pixels, so the context calculation for "H1 a" is:

12 ÷24 = 0.5
And the CSS style is: h1 a{ font-size: 0.5em; }

You can also use percentages. The calculation algorithm is the same; you just end up with percentages.

Flexible grids use this approach. You can find several frameworks to help you craft your grid, such as Fluid Grid System, Fluid 960 Grid System (a fluid version of 960 Grid System)or Bootstrap sleek, intuitive, and powerful front-end framework. Moreover, several groups within the W3C have submitted new specs for better flexible grids, with some useful results.

CSS3 Grid Layout

The CSS3 Grid Layout (also known as Grid Alignment or, simply, the Grid), brings a typical grid system to CSS, similar to what XAML or Silverlight developers may be familiar with. At the time of this writing, the spec is an "Editor's Draft." It allows for defining regions in a layout, with columns and rows, spanning, spacing, padding, grid templates and more, enforcing full separation of concerns between HTML elements and CSS. Unlike HTML tables that are content, the Grid allows for placing HTML primitives into grid regions separate from actual content.

Combining the CSS3 Grid with media queries creates a powerful solution for building fluid, responsive applications.

The Grid specification is a welcome addition for implementing responsive web designs. Two other new CSS specifications are also worth mentioning: the Flexible Box Layout Module (Flexbox) and The Multi-column Layout Module. Both show a great deal of promise for designing responsive Web sites.

Flexbox, currently a working draft at the W3C, adds support for four new layout modes: block, inline, table, and positioned. It enables you to lay out complex pages with relative position and constant size, even when screen sizes change.

The multi-column layout module is currently a candidate recommendation at the W3C. This solution is for content that you need to lay out in columns and that flow from one column into the next. You can view an interactive example of multi-column layout in this lab.

Flexible Images and Media

The final aspect of responsive Web design is flexible images and media. Basically, this feature allows you to adapt your images or other media to load differently depending on the device, either by scaling or by using the CSS overflow property.

Scaling in CSS is pretty simple to implement for both images and video. You can set the media element's max-width to 100 percent, and the browser will make the image shrink and expand depending on its container. You should supply the image in the best quality and size possible and then let CSS adapt the image to the right size.

img, object {
max-width: 100%;
}


An alternative to scaling images is cropping them with CSS. For example, applying overflow:hidden allows you to crop images dynamically so that they fit into their containers as the containers resize to fit a new screen environment.

Having several options to scale and crop images in CSS might not be enough. Do you really need to take up all of a visitor's mobile bandwidth because you don't have a smaller version of an image? To better serve users, flexible images might mean using an alternative imaged Graphic Design.


We Design Responsive Website - torometech

We build business websites, online stores and social networks using open source technologies. Don't waste time thinking about website design if you have a business plan or ideas you think should be running on the web. Concentrate on your core business deliverables - Torometech will assemble the rest. We provide a comprehensive range of bespoke IT services including web design, online shopping carts and payment portals, content management systems (CMS), database design, corporate branding and Graphic Design.




read more



PayPal Buy Now Button Conundrum

PayPal Buy Button Conundrum Outside Of The USA
If you are a one man band or a small enterprise based outside the USA selling tangible goods over the internet using PayPal Buttons you will very soon encouter this problem. The thing is, PayPal seems to have one set of options (Buy Now Buttons) for customers in the USA and another for everyone else.

It seems Paypal business customers' setup is completely different depending on the country that you are selling from. PayPal sellers that reside in the United States have deeper customization for their shipping and postal rules than sellers from other regions or countries.The justification for this is still to be explained. I have a reasonable explanation - "sheer laziness". Because the functionality employed in customizing the shipping and postal rules in the USA can easily be ported to other regions and countries.

If you are a seller based in the USA you can automatically Calculate Shipping Charges Based On Shipping Location. Once you log in to your account in PayPal you can define the amount that an individual pays for shipping (or freight) for your products, and the amount can be re-calculated automatically with respect to other locations in the USA .You can setup rules for domestic (i.e. U.S. based sales) and you could define different shipping rates by state or for groups of states (including ALL states). You can also set different International rates based on the buyer's country or location. You can even get more granular with these setting if you so wish.

Here is how we came about this weird scenario. A customer we have designed a bespoke responsive website had requested a simple e-commerce integration - where they can initially start off with one tangible product (A book) andbrochure a pay per access online premium content. In our initial analysis PayPal was the obvious choice. It is global, simple, intuitive and no upfront charge. However though, you do need to create a business account and that is it.

Two Paypal Buy Now Buttons were setup, one for the book purchase and the other to provide access to the premium online content.

Post launch of the site, everything works as intended. The first week saw 10 online members accessing the premium content through a registration form and a Paypal Pay Now Button.There were 8 purchases of the book all based in the UK.However, a week later there was a purchase from Belgium. We had assumed that PayPal will automatically re-calculated the postal cost since it was outside of the UK. It never happened, thus the book postal cost of £2.50 within the UK had to be applied to Belgium as well - costing our client £5.00 extra for P&P.

We got back to Paypal customer's Profile and looked at all the options available to see if there were any shipping or postal options for customers outside of the UK - to our surprise there was none. We called Paypal and mentioned the fact that these options were available to Paypal Business customers in the USA but not in the UK? - still waiting for a reasonable response.

We came to the conclusion that for the time being, we had to solve the problem ourselves otherwise our client will sooner rather that later be incurring postal charges that the business can not afford. The solution was to implement upfront (before connecting to Paypal) a script that will detect the customer's location and display a single corresponding Paypal Buy Now Button for that destination with appropriate shipping or postal cost applied.

This was done with frontend technology jQuery- a fast, small, and feature-rich JavaScript library for it simplicity and broad support from the main browsers(Chrome,Firefox,Explorer,Safari and Opera) In the customer's profile in Paypal,5 new Buy Now Buttons were created - each corresponding to these six regions -

  1. North America
  2. South America
  3. Europe(excluding UK)
  4. Africa
  5. Asia
  6. Australia

These buttons were coded with the appropriate postal delivery cost from the UK included. Thus, the extracted paypal Code placed on the website would have the postal charges for the aforementioned regions taken care of.

On the page where a purchase is to be made, a form with a selection input request the customer to select their destination or location before any paypal Buy Now Button is displayed. On selecting their location triggers the JQuery script to display the appropriate paypal Buy Now Button for the location chosen ensuring the correct postal cost is added to the book price. Problem solved and we do not have to wait for a Paypal's solution. Design is all about thinking out of the box.

See how it works LIVE





read more









Get To Know Us Better

Service 1

Photo Gallery

Here you will see an assorted collection of photographs taken way back. And some very recent ones for you to reminisce, laugh, cry, sing etc, etc. All organised in distinct categories for easy viewing. Talk to us how we

Read more
Service 2

Word/Wisdom

Word and Wisdom introduces you to some of the important ideas and concept that was instiled to us at Osogbo. And and a whole lot more you too can learn something from - do give a try

Read more
Service 3

OsogboFactFile

Things you thought you knew about the Osogbo will be dispelled here. Read and understand the people and their way of life that has remained very much unsoiled by any so called western interest and then some

Read more







Email This Page To A Friend - easy.

Enter their email and your name - Done