Seven Internet Marketing Tips to Improve Your Productivity and Make More Cash

Internet Marketing Tips 1

Establish very clear targets for your business and for your monthly, once a week and day-to-day tasks. These must be very specific, in writing, have a day for a conclusion and be quantifiable and measured. It aids if you write them down, read them daily and consider them in the present tense; as though they have actually been completed.

internet tips

Internet Marketing Tips 2

Invest 90% of your time on cash making activities. Those consist of advertising and marketing or generating leads, interacting with those leads, interacting with people already on your list or in your organization, and developing content. The material you put out on your blog or in your write-ups or video clips is exactly how you establish value and draw in folks to you. Your success or failure with these activities will certainly determine whether or not you make money online. Fancying up your blog header is not always a cash making activity so don’t spend a lot of time in that sort of activity.

Internet Marketing Tips 3

Produce routines for every little thing you do. Similar to the way you have a specific routine for the various exercises you perform in a physical body building routine, so too ought you have detailed regimens for your daily tasks as you set about marketing your business.

Set regimens for when you rise in the morning when you go to sleep, when you handle email and return telephone calls, and all the other things you do. These all support the formation of great habits and if practiced continually will boost your online marketing performance in all areas.

Internet Marketing Tips 4

We cannot manipulate time; it marches on with or without us. We can, however, take care of how we use our time. This is closely associated with Marketing Tips 3 as previously noted, however, it is not simply a routine. Specify exactly when you will embark on a certain task as well as the quantity of time you will devote to that job. This is applicable to actions pertaining to your emails, phone calls, creating material, working out, etc.

You might think about using Google Calendar or a similar tool to keep you on track. When it’s time to move to the next scheduled task, having a timer on your work desk that will sound an alarm at the appropriate time can be effective.

This, in fact, is probably one of the most vital of the online marketing tips I have. Since it’s easy for you to lose track of time when you are immersed in one job, without some method to help keep to your schedule you may find at the end of the day you have actually not finished other essential tasks.

Internet Marketing Tips 5

This is among my preferred bits of marketing advice. It is essential to get into the proper frame of mind before commencing your advertising and marketing activities for the day. It is additionally among the marketing tips that many individuals ignore. Mindset or attitude is often not given enough importance as individuals develop their business building and daily marketing plans.

Lots of people consider it useful to get some cardiovascular physical exercise early in the day to help get themselves primed for action and energized. While doing these workouts, they often picture the tasks they have actually planned for the day and see themselves efficiently completing them. Then they undertake some personal development by reviewing publications, tapes or videos regarding elements of effective attainment of objectives in all areas of their lives. They are, after that, well prepared for a day of a max performance.

Internet Marketing Tips 6

Choose one, at the most 2, marketing approaches to be utilized in developing your business. Take command of the chosen advertising and marketing technique, master it and do not go on to an additional method until you acquire the production and success you want.

Advertising approaches you can utilize include things like video advertising and marketing, blogging, article marketing, social networks and so on. Choose one approach you are comfortable with and adhere to it. Your performance will certainly suffer and you will definitely not acquire the level of income you want if you neglect any of these internet tips. Not taking note of this particular one may cause your marketing initiatives to be scattered and ineffective, even if you are meticulous about doing the work. Jumping from one thing to another is counterproductive.

Internet Marketing Tips 7

The last of my tips deals with your individual life. Make time for friends and family. You possibly invest a great number of hours in your company which takes some time away from your family members. It is extremely important for you to arrange the time for your family and friends. You likewise should have time for leisure and entertainment. Unless you do so you’ll burn out and your connections with family and friends will deteriorate. That will not aid your efficiency and application of the various other tips I’ve talked about won’t be as efficient as they could be.

To be successful with any business you have to be a self-starter with a great deal of dedication to being as efficient and productive as possible. It is necessary to be diligent, well-organized and persistent if internet marketing success is to be obtained. I am hopeful this series of comments about some of the more vital things you can do to make the most of your productivity has been of help to you.

You can get access to an on-line training, advertising, and marketing system that provides all the technology, training and online marketing techniques required to develop an effective internet marketing program by clicking the links below or contacting me. I look forward to helping you succeed.

 internet tips

Internet marketing can be overwhelming. There are many elements and processes required to get your product or services in front of the right people; your potential customers and partners. You need to be proficient at keyword research and the numerous marketing methods that can be used to get your promotional material noticed by your preferred audience. In addition, there are a plethora of marketing systems to be found, many of which entice the uninitiated with promises of easy money and effortless marketing that will allow even the complete novice to sell their products online almost immediately.

Secrets To Making Money On The Internet – Achieving The Best Results From The Internet

Using The Internet To Boost Your Business’ Profit – Taking your business to the web is going to offer you spectacular enhancements. When you build a website, you are offering a convenient alternative to your customers that they will appreciate. When they don’t have the time to make it to your location, they tend to go to your site and do everything they would have done with you in person. You can also collect emails, contact information from your customers and clients and use them as a cheaper and faster means of reaching them and delivering important information. Businesses on the internet can make money in a different way. Whatever you can possibly imagine a market for; you can make a business online for it. Interestingly, the internet has allowed room for new and innovative businesses to be created.

internet tips

Using The Internet To Boost Your Personal Pocket – As individuals, you can earn from the internet, marketing information or the other. If you are looking forward to starting a business, you have got options to choose from, you can market your skills independently as a designer of any kind, as a writer, a publisher, as an affiliate and so many other disciplines you will learn about from this page as we move on. Whatever skill you have, there is a market for it; there is an opportunity to make money while adding value to your consumers or your clients on the internet. It is with great pleasure I welcome you to this page. I will be taking you by the hand through the walls of the internet and we will discuss the various ways and opportunities you can earn online genuinely and also promote you offline business. The chances of making money on the internet depend on many factors. I must let you know that there are several secret tips/rules you need to put into consideration if you must succeed in making money using the internet or using the internet to transform your offline business. Your ability to keep to these rules will save you money, stress, anger, frustration that many people experience today on the internet.

1. Objectives and goals- you must have reasons you are going into the internet, write out your objectives and goals and what you expect to achieve at a specific time. I could say make a budget for yourself over the next one year, this will help you to gradually evaluate each stage as your go deep into the internet.

2. Make a schedule – yes, many people fail on the internet because they take the internet business as an easy work that can be done at anything. You should already know what you are going to do on the internet every passing day. Make a plan as you would do in any given job you’ve got off line. You need to discipline yourself with a schedule as this will enable you achieve positive results.

3. Create folders or files for information and have backups – many people waste time searching for documents that they’ve been working on or purchased online or downloaded online. “Everything seems to have gone into my documents folder” and you end up searching without ending. Make new folders for new area of findings, folders for your books, products, software, your contact list, your personal activities, downloads and lots more. It helps you know where to go immediately there is need for anything and saves you hours of work. More so, have backups of your business, you may need someday. Don’t rely on just one means of saving files and backups. Get an external drive, off site and more.

4. Learn how to write – you must be able to write with good grammatical tenses and structures to be able to succeed online. Communication in the internet is almost everything about your business. If you are not able to position yourself in good English, people will tend to pass you by. You loss clients. Many good internet users could tell the quality of a product when you are able to communicate with them in good and simple English. You need good English to be able to respond to your follow-ups mails to correspondents, email, you sales copy, articles for sale or to be published on your site. The high point is that you need to effectively communicate with others on the internet.

5. Don’t off your lamp – you should be ready to accept practically everything people will come up to say about you and what you are up to on the internet, you will face criticisms online and offline, many will call you a scammer or fraudster, don’t be hard or lash out at them. You never know where you will meet that person someday. Do not ignore any mail no matter how insultive, reply every mail with courtesy and politeness while you settle every disagreement. You may just gain the interest of the person{s} without you knowing. Keeps your lamp burning no matter how tough the wind may be.

6. Shine your eyes – the internet keeps changing daily. Keep your eyes open for any change, positively or negatively that can help your business. By staying on top what is latest, you remain hot on the internet.

Internet

7. Create products – you may start with other people’s products but at the long run, you must try to create your own product and have people work for you as affiliate on the internet while you pay them.

8. Forums and social networks – when I start internet business in my early days, forums help me greatly to learn, ask questions and contribute my own quota, forum as the word implies is a place you share information with one another for the common good of all. Join forums, tell your difficult{ies} and see how people will jump towards rendering help to you on the internet. Social networks sites help you meet people who may be interested in your product or services. There are good forums and social networks which you can benefit from.

9. Build a website or blog for your business – As you are growing bigger in your business, I usually advise you create a website or blog so that people could always visit you and liaise with you when you are not online.

10. Be determined to succeed – Always have it in mind that you are a champion and be determined to succeed no matter the hard times you will pass through at the early stage even when you are a guru in it, you still pass through terrible times that you would wished you’d never started, just be determined and have a positive attitude towards success.

11. God first – Call God into every step and actions you take for He is the Author and Finisher of our faith.

Killer Resumes – 7 Power Resume Tips

A tight economy forces a competitive job market. What people are now finding is that they are competing for administrative jobs with over-educated and over-qualified job applicants.

Internet

Now is the time to turn up the heat on your resume.

If you haven’t written a resume for awhile, or find yourself in the midst of a layoff, or just need to beef up what you already have then these tips will help give you that opportunity.

My former company received over 200 resumes a day and it was my job to separate the ‘good’ from the ‘bad.’ It is an acquired skill to be able to read a resume by dragging your finger down the middle of the resume page and deciding if it goes into the in-basket or the circular file.

Just as important as they are now, they were also at least that important back then. Key Words. I am talking about keywords, except back then they were known as “Power Words.” Most professional resume readers can make a decision to keep a resume in less than two minutes. Your resume had better be good for that only reason. Right now for every one job opening, there are 100 PLUS resumes and applications being turned in – And those statistics only count if the job is not advertised.

If you have not considered starting your own business by now, then you might give it a toss to see if it would be worth your while. The reason is that this economy is the best to start a business in. You are allowed many more opportunities to see if you can succeed or not. You get more chances to fail in this type of economy and the failure ‘penalties’ aren’t as rigid as they are in a thriving economy.

The best way to succeed is to gain as many failures under your belt as you can. A sure path to success is one failure at a time. Just like my golf instructor told us, “The best game you have is because you are moving forward – Always be moving forward!”

But, for those who are more interested in getting their resume put together (you will need it for your business plan anyway – when you start your own business), here are some killer tips.

1 – Write great content. No, not story-telling content – Great content! Use words you would use that are descriptive, not dull (boring). If you need help, use some free internet keyword tools like Google Free Keyword Tool.

Write down a list of the things you did for each of your jobs – You’ll want at least four main points per job. Think about what you really did in a way that helped your company. This is your time to shine, so you better make your words count. Words are often the only armor you have to get your foot in the door.

Example: BEFORE

SKILLS:

TEAM PLAYER
WORK WITHOUT SUPERVISION
WROTE EMPLOYEE MANUALS

Example: AFTER

SKILLS:

Effective Team Director For Multi-Cultural Environment
Established Validity in Successful Team Projects
Awarded Direct Supervision Of Work Projects To Prosperous Completion
Implemented Superior Supervision Techniques Resulting In Completion of Projects On Time And Under Budget, Saving Company Revenues an average of eight percent per project.
Streamlined Employee Manuals to Increase Company Efficiency, resulting in 22.3 percent savings in payroll costs.

Don’t make things up – Big “No-No,” and you will get slapped for it in an interview situation. Use statistics whenever you can to make a visually graphic point about how you work. Most resume readers see words in pictures and they like numbers. Can’t think of a word – Look up a synonym on the internet.

TIP – Market yourself as if you were your own product. If you were in charge of something or someone – Payroll, for instance, then do not say you were a payroll manager. Write your title down in more descriptive terms – Payroll Specialist For 50-employee Technician Unit.

2 – Resume Design Format must be sharp and consistent. Read your resume over and over and over again to check for typos, and off-alignments in spacing, tabs, holding, dates, consistency. If you say you pay attention to detail and you miss even one of these items – your resume goes in the circular file.
You want to avoid the visual clutter that forces the eyes to skip jaggedly along your resume – the reader should be clean and easy with no skips to snag the eyes away.

Let another person read your resume before you send it to anyone. The second set of eyes will always catch those things you miss.

Good Example: Good spacing, plus this resume reads well, and is easy on the eye to follow down the page without interruption or changing spacing sequences, or other visual cues.

EXPERIENCE:

Catering Business Owner 2005-2010 Newport, California
1. Job Responsibility
2. Job Responsibility
3. Job Responsibility
4. Job Responsibility

Dog Walking Business Owner 2004-2005 Ensenada, California
1. Job Responsibility
2. Job Responsibility
3. Job Responsibility
4. Job Responsibility

POOR EXAMPLE: Spacing, tabs are jagged, (notice spacing too – see dashes between years – 1 has to space and 1 does not), indents – All are uneven and inconsistent formatting leaves the reader hopping around the page like a bunny. The impression you leave an employer is that you are lazy, unreliable, and high maintenance. Business owners and Human Resource personnel do not have time to decipher sloppy resumes.

EXPERIENCE: (poorly spaced, typos, grammar, punctuation, etc.)

Dog Walking Business Gurl 2004 – 2005 Ensenada, California

1 Job Responsibility
-Job Responsibility
3 Job Responsibility

– Job Responsibility

3 – If you struggle to find the right words then take the job description you have and take the words from that description and duplicate those same words in your resume. Trained eyes are looking for that kind of information.

TIP – State and Federal job applications are especially notorious for using this technique in choosing job applicants to interview.

If you really do not have the experience but have relevant experience that prepared you for that job duty – Put it down.

It is called transferable skills and those skills can keep you in the applicant pool or get you tossed out. If the skills you put down are NOT truly transferable, then you will look ignorant and lack good sense for listing them. It says that you did not read the job description before you applied and if you are sending out a lot of resumes it can be the kiss of death if the same person gets your resume twice for two different jobs.

Example: from the website – 50 state jobs (dot)com:

“Work closely with law enforcement, District Attorneys, Patient Attorneys, public advocacy organizations and other DHS agencies throughout the state, and the Oregon State Police, Drug Enforcement Division, whose role it is to enforce the program’s statutes and rules. Monitor, track and/or respond to:”

Buzz words to use from this job description paragraph – “Work closely with,” “role it is” “to enforce the program’s statutes and rules,” “Monitor, track and/or respond to”

4 – Make sure you match the job description and your bullet points in the same order so that you are using what the employer considers to be important with what you consider to be important – If the job description lists a hierarchy of duties, have your resume bullets in the same hierarchy of importance.

5 – Sell yourself. Do you truly want a beginning position in a company, or would you be over-qualified, get bored and quit if you had to start at the beginning with those parameters?

Imagine what would happen if you put on your resume that you were, “Seeking management of a company division operating with $50,000 __________ you fill in the blank (in receivable accounts, net sales profit,… ), instead of, “Seeking a starting position with a growing company. Being humble only has openings for mail clerks and messengers.

6 – Do your homework. Go online and find out what the company you are applying for really does and create more than one resume. Use your research for a better resume. Write a cover letter directly targeting specific niches, specific keywords, specific duties, specific companies and divisions within companies – Know who owns the company and some one thing about that person. Ask for an interview in your cover letter.

Example: “I am available for an interview Monday through Wednesday, _______ (date) from 8:00 am-12:00 noon. Please contact me at ____________ (phone, email) to arrange a date and time to discuss my qualifications and your needs.” “I look forward to hearing from you.”

One woman I know was thrilled to see an opening for a company she just loved and could not wait to apply for the job. With about half an hour of research, she found out that they were horrid to work for and found a better position with one of their competitors in a position she still has and still loves ten years later.

internet tips

7 – Call you references AHEAD OF TIME. Make sure you have the current phone number, address and email information on your Professional and Personal reference sheet. You would be so completely surprised how quickly out-of-date these things become and how FEW people bother to check their information for accuracy. This step should be a no-brainer, but sadly it is not.

TIP – Send a copy of your resume to your references so they know what to say on your behalf (coach them).

“The person who goes farthest is generally the one who is willing to do and dare.
The sure-thing boat never gets far from the shore.”

Tips on Child Mobile Internet Safety

Ask any kid from first grade to college to name the phone, media player or tablet that they covet the most and you’ll hear iPhone, iPod touch and the iPad. Brand awareness and demand for Apple products among the jungle gym crowd has never been higher. What most parents don’t realize though is that if appropriate safety checks aren’t put in place, Apple’s wonderful devices could be an unguarded gateway to dangerous forbidden fruits.

internet tips

While most parents know they should use parental controls on their home computers, according to a survey by McAfee, four out of five parents fail to turn such software on. Nearly a third of parents left their kids alone when surfing, and almost half of parents said they didn’t know if their kids had social networking accounts at sites like Facebook. (Think your kid is too young? Over 20 percent of 4th – 5th graders have a social networking profile. According to a Cox Communications study, 72 percent of teens have a social networking profile and nearly half have a public profile viewable by anyone.)

Over half of parents don’t monitor their kids’ desktop or laptop usage (according to an MSN Europe survey). When it comes to mobile Internet safety, even the most tech savvy parents find it next to impossible to monitor their kids’ mobile habits. Even if kids only use their mobile devices during the commute to and from school, they need to use them safely. Personal monitoring is not always possible. Even when they’re in the same room, a parent can’t read what’s on a small screen without sitting right next to their child.

Fortunately, there are technologies that can help. Parents can create mobile safety for their children, and it isn’t as difficult as they may think.

Mobile computing is the fastest growing technology sector, with youth market penetration rising higher each day. Seventy-six percent of all eight to 18-year olds have iPods or other MP3 players. Teens spend at least 49 minutes a day consuming media on mobile devices, according to a Kaiser Family Foundation Study.

Mobile technology can expose young people to the good, the bad and ugly of the Internet. According to a Pew Internet study, 70 percent of teens are exposed to pornography accidentally on the web.

The Apple of every kid’s eye:
With over 120 million iOS devices sold, as of September, 2010 (67.6 million iPhones, 7.2 million iPads, 45.2 million iPod touches), Apple dominates the mobile market. Beyond its obvious cool factor, the availability of thousands of kid-friendly apps means that youth brand loyalty is already locked in. In addition to being “cool”, iOS devices are changing the way learning happens in the classroom and at home.

There are pilot programs using mobile learning in all 50 states. Many are centered around the iPod touch as the primary computer to replace all textbooks, coursework, graphing calculators, etc. The iSchool Initiative estimates each $150 iPod touch would save at least $600 per student per year. Those powerful numbers mean that more school programs will require an iPod touch. (A few schools will even standardize over to the iPod touch’s brother, the larger and more expensive iPad, which runs on the same iOS platform.)

Both parents and school districts will need to find ways to secure these devices to make them child-friendly at home and in the classroom. This isn’t just a matter of safety, there’s money involved. Schools that enable mobile learning need to implement Mobile Child Internet Protection standards to enforce a standard of Internet safety and remain eligible for federal funding.

As more school systems test Apple’s iOS products in the classroom, both parents and educators need to make sure that the first defense against inappropriate content (web filtering software) is set on kids’ iPhones, iPods and iPads.

Some think that the parental controls on iPods, iPhones and iPads are insufficient. While parental controls are important for desktops and laptops, mobile parental controls need to happen above and beyond what is built into the technology of the devices. To ensure that your mobile kids are safely surfing the mobile web, here are 10 tips to keep your child safe online.

Child mobile Internet safety tip #1: Safari could be a safari of unfiltered content.
As great as Safari is at displaying sites (as long as they don’t use Flash), it has no web filtering parental controls. None. Zip. Zilch. If your kids want to chat on PredatorsRUs.com, Safari will let them. First and foremost, change the iPod’s Safari browser to one that allows web filtering.

Child mobile Internet safety tip #2: Invest in a leading online content filtering service.
Services like Mobicip ( http://www.mobicip.com/ ) have won Parent’s Choice awards and are used by school districts across the country to filter dangerous online content. There are a number of child-safe iPod browsers on the market. Read the reviews and choose the best-rated child-safe iPod browser in your youngster’s age range.

Child mobile Internet safety tip #3: Use the iPod’s basic parental controls.
Once you have installed the child-safe iPod browser, disable Safari. But be warned, kids are clever. If kids don’t like using a child-safe iPod browser, they will simply download another browser. Here’s how you stop them.

On the iPod’s Settings menu, choose Restrictions, and turn off Safari, YouTube, Installing Apps and Location. You can also turn off the camera, if that is appropriate.

While you are at it, restrict the kind of content they can download from iTunes to age appropriate levels. Turn off In-App Purchases.

Child mobile Internet safety tip #4: Search is king.
Search is where the action is. (That’s why Google has a market cap of a $151 billion.) Children most often encounter inappropriate content by accident through searches. You need a child-safe iPod browser that enforces safe searches on all popular search engines. Make sure that this feature cannot be disabled by changing the search engine preferences.

Child mobile Internet safety tip #5: Keep your blacklist updated automatically.
There are hundreds of thousands of new web sites created every day. (Spammers alone create 57,000 new sites each week.) If you block PredatorsRUs.com today, the bad guys will create Predators4Friends.com tomorrow. Make sure your child-safe iPod browser constantly updates its list of threats.

Child mobile Internet safety tip #6: Use ratings as a guide.
Even the most dedicated parent can’t surf and judge every new web site, so make sure your child-safe iPod browser uses ratings such as the Family Online Safety Institute’s movie style ratings to choose which sites your kid can visit.

Child mobile Internet safety tip #7: Use a browser with real-time filtering.
Because your child may be the first to discover an inappropriate site, make sure your child-safe iPod browser can detect inappropriate content on the fly.

Child mobile Internet safety tip #8: Encrypt your kid’s traffic.
Bad guys use free WiFi hotspots to snoop on people’s Internet traffic. That guy over there isn’t working on his novel, he’s watching your child’s iPod use remotely. Get a child-safe iPod browser that encrypts web traffic over unsecured WiFi hotspots.

Child mobile Internet safety tip #9: Wireless safety extends to 3G and 4G too.
Apple has restricted some iPod, iPhone and iPad functions to WiFi only, while others work on your carrier’s 3G or 4G signal. Make sure your iPod’s child-safe browser’s safety measures stay intact when you switch from cellular to WiFi, or vice versa.

Child mobile Internet safety tip #10: Allow age appropriate web use.
Keep in mind that as your kid ages, you’ll want a child-safe iPod browser that has graduated levels of web access for older kids.

Mobile Internet safety solutions start first and foremost with web filtering. Block the sites that are going to cause problems. But by far, the best way to protect your kids is to sit down and discuss mobile Internet safety. Here are a few sites to get you started.

internet tips

Protecting Kids on Mobile Devices – Online Safety
Online safety is vastly underestimated by parents and children alike. Here is a compilation of popular resources available online for the discerning parent.

 

Connect To The Desktop Of Your Home Computer Via The Internet

We live in the age of global communication and connectivity. Could you imagine 10 years ago if you had told someone you’d be sitting in a coffee shop, connected to a worldwide network, with no wires connected to your laptop, reading the latest news or even playing a game with your friends?

internet news

They would have suggested that you are mad! Fortunately, that is not the case and we do live in a world where global communications are standard and almost everyone has their own permanent connection to the internet via broadband.

What if, via this worldwide communications network, you could not only read the latest news or do your grocery shopping online; you could actually remotely control your PC at home! Think about this for a minute, what would this allow you to do? Would it allow you to remotely use any applications you may have installed at homes, such as accountancy applications, spreadsheets or documents? Allow you to check any downloads you may have progressing at home? Check on emails that only come into your email client? The possibilities really are endless. There is a solution at hand, and in this article, I will focus on using the inbuilt features of Microsoft Windows XP Professional, namely, Remote Desktop.

If you have never used remote desktop before, don’t be worried. It’s a simple feature that does what is says, presents you with your desktop via a client. If you look in Start -> Programs -> Accessories -> Communications, you will see a Remote Desktop Client application.

Using this application, you can enter a computer name or IP address to connect to. You can even map your home computers hard drives as well so that they appear in windows explorer, and even print to the printer beside you, from your home computer, over the internet!

Try it at home if you have two computers. You need to make sure that Remote Desktop is enabled first, and this can be done by selecting System from Control Panel, selecting the remote tab, and ensuring that “Allow users to connect remotely to this computer” is enabled. If you plan to do this at home, take note of the “Full computer name”, as this is what you will need to enter into the remote desktop client to connect to this computer.

I know you are worried about security at this point, but don’t worry – we’ll address that later.

Now, if you do have two computers at home, try it and see what happens! You should be presented with the familiar login box, and once logged in – ta-da! You are now on the desktop of the other computer, using the remote desktop application on your local computer!

Now – what if this functionality could be extended; so that you can connect to your home PC from anywhere in the world provided you are connected to the internet? Fortunately, this can be done! There are seven steps that we need to do in order to achieve this.

1. Ensure that your computer will accept remote desktop requests

2. Make sure your password is strong!

3. Note down your IP addresses

4. Change the port number that remote desktop responds on (this will aid with security)

5. Ensure any local firewalls are not blocking the Remote Desktop Port.

6. Create the necessary port forwarding rules on your home router

7. Sign up to a Dynamic DNS service (ignore if you have a static IP address from your ISP)

Let me explain these steps and how to perform each one.

1. Ensure your computer will accept remote desktop requests. As above, you need to select the System icon from Control Panel, and, from the remote tab, ensure that “Allow users to connect remotely to this computer” is enabled.

2. Make sure your password is strong! If your password is not very secure, make sure you change it so that it has at least 8 characters, at least one uppercase character and at least one symbol. One way to do this is to use symbols/numbers as a substitute for letters. For example, say I wanted my password to be the name of my son, Benjamin. Instead of using Benjamin as my password, which as you can see, is a lot more secure than Benjamin.

3. Note down your IP addresses. We need to make a note of your internal and external IP addresses. To do this, go to Start -> Run and type cmd. Then click OK. Type config and look for the IP address entry. In this example, we will use 192.168.01. This is your internal IP address. Take a note of your IP address, in this example, we will use 1.2.3.4. This is your external IP address.

Things will get a bit techy from this point on. The tasks we need to perform are pretty straight forward, however, if you have any questions, please ask a technical friend first or consult online help from the internet as an error in the below steps could cause your computer to malfunction or cause you internet connectivity problems.

4. Change the port number that remote desktop responds on. This will require you editing the registry. Go to Start -> Run and type regedit. Then click OK and you will be presented with the Windows Registry. I won’t get into detail about the registry now, there are books as thick as encyclopedias written on the windows registry, suffice to say, if you don’t know what you are doing, don’t mess around with it!

Now, if you browse through the tree to
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal ServerWinstationsRDP-TCP. Once there, look for an entry in the right-hand pane called “PortNumber”. Double click this entry and select decimal. Now, this will be 3389 by default. Make sure you change this to a number of your choosing, above 1024 and below 65534. In this case, lets you 23456. I highly recommend making this number as obscure as possible to avoid people discovering an open port via portscan! Click OK, and close down Registry Editor.

One caveat to this, what port you decide to use, may affect the usability of this feature. Some companies will block ports that are not in common use, so 23456 will be blocked. Other companies allow all ports, as do most home users. If you choose a common port, such as port 80 or 443, it may allow you more access from secure networks, however, will allow hackers to more easily see your PC on the internet.

Even using a higher port number will still render you vulnerable to certain attacks, however, the risk is severely minimised when using a higher port number. I and a number of colleagues have used this technology for a number of years without incident; however remember when allowing any connectivity over the internet, there is always a risk! This choice in functionality is up to you.

5. Ensure any local firewalls are not blocking the Remote Desktop Port. This step will most likely require you to check the instructions with your particular desktop firewall product. What you will need to do here is ensure that anyone is allowed to connect to the port number used above. This is usually in the form of a firewall rule and looks similar to the below:

Allow Anyone using protocol TCP 23456 in both directions to connect to My computer. Once again, this will require consulting your desktop firewall instructions.

Now, before we go any further we need to make sure this change has taken effect. Reboot your computer, and, if you have another computer on your LAN, try and remote desktop to your computer with the “: you port number” at the end, for example. My computer:23456, or your IP address, 192.168.0.1:23456. Make sure this works before continuing or else the next steps will not work.

6. Create the necessary port forwarding rules on your home router. This step will depend on your particular home router. You will need to connect to this and define a port forwarding rule similar to the following:

Allow anyone -> Using Port TCP 23456 (substitute for your port number above) to connect to 192.168.0.1 (substitute for your internal IP address). You may need to consult the manual for your router regarding port forwarding for this. You may need to define a particular protocol or server for TCP 23456 (substitute for your particular port number above). This is the hardest step of all so it may take you a while to achieve.

7. Sign up to a Dynamic DNS service (ignore if you have a static IP address from your ISP). If you know your external IP address will never change, ignore this step. If however, you have a dynamic IP from your ISP, you will need to perform this step.

This step is to ensure that your external IP address changes, it will be registered on the internet so you can still connect to your PC. The best service.

Sign up here and enter a hostname that you would like to use, ie, myname.dyndns.com. Follow the instructions here to ensure that your external IP address is always updated on the internet.

8. Finally, you are ready to go. If you have completed all the steps above successfully, you’ll want to test this out. The best choice will be to go to a friend’s house with home broadband, and test connecting in. Once connected to the internet, load up your remote desktop client, and enter either you external IP address or DNS name, eg 1.2.3.4:23456 or myname.dyndns.com:23456.

Chances are this may not work the first time, so, I have included below tests that you can perform at each stage to determine where the problem may be.

1. Ensure that your computer will accept remote desktops requests. The best way to check this is to go to Start -> Run and type cmd . Then type “telnet 127.0.0.1 portnumber” ie, “telnet 127.0.0.1 23456”. This should return a blank cmd window if successful, and an error if unsuccessful. If this is successful, move on to the next step. If this is unsuccessful, make sure Remote Desktop Connections to you PC are enabled and the port number is correct. You can do this by typing “telnet 127.0.0.1 3389” in the same cmd window as before, and if this is successful, your remote desktop port number has not yet changed. You may need to reboot your PC or check the above registry entry.

2. Make sure your password is strong! This test I will leave to you to ensure your password is correct.

3. Note down your IP addresses. Make sure that all your IP addresses are correct!

internet news

4. Change the port number that remote desktop responds on. You can check this has been set successfully by going to Start -> Run and type cmd . Then type “telnet 127.0.0.1 portnumber” ie, “telnet 127.0.0.1 23456”. This should return a blank cmd window if successful, and an error if unsuccessful. If this is successful, move on to the next step. If this is unsuccessful, make sure Remote Desktop Connections to you PC are enabled and the port number is correct. You can do this by typing “telnet 127.0.0.1 3389” in the same cmd window as before, and if this is successful, your remote desktop port number has not yet changed. You may need to reboot your PC or check the above registry entry.

5. Ensure any local firewalls are not blocking the Remote Desktop Port. The best way to test this functionality, if you can, is to use a PC on your LAN. From a PC on the same network as yours, type “telnet “, ie “telnet 192.168.0.1 23456”. If you receive a blank cmd window, then this is working OK. If you receive an error, and all the above tests are successful, then this indicates that something on your PC is blocking this connection. You will need to look at any local firewalls that may be preventing this access (including the inbuilt Microsoft Firewall).

If this step works, also ensure that your local firewall is not just allowing computer on your local network and nothing else to connect. I stress again, make sure you read the instructions that came with your desktop firewall.

6. Create the necessary port forwarding rules on your home router. This is the most problematic part of the process. To check this, you will need to be on another broadband connection. Once connected, navigate to Start -> Run and type cmd . Then type “telnet ” ie, “telnet 1.2.3.4 23456”. Once again, this should return a blank cmd window if successful and an error if unsuccessful. If all the tests above have been successful, and this command is unsuccessful, then this problem indicates there is an issue on the router port forwarding the Remote Desktop request. Ensure that you have read the manual and port forwarded this successfully.

7. Sign up to a Dynamic DNS service. You can test this simply by performing the same command as above. If “telnet externalip portnumber” works, and “telnet myname.dyndns.com portnumber” does not, then there is a problem with this service. From a cmd window, type ping myname.dyndns.com and see if it returns a reply. If not, then you will need to check the online help with regards to this service.

That should be it; you should now be able to connect to your home PC from almost any internet connection. Remember you can use advanced features of the remote desktop client such as connecting your local drives, printers etc.

The Future of Internet TV

We are already beginning to see what the future holds for Internet TV. If you miss your favorite television program you can go to the network’s website and watch the episode in its entirety that you missed. In fact, many networks are promoting the fact that you can catch up on all the episodes that you may have missed in order to be caught up on popular serial dramas such as Lost and 24. Missing one or two episodes of those programs can leave a viewer confused as to what is happening in the series and can alienate the viewer.

internet

That, however, is just the tip of the iceberg. Technology is changing at warp speed and part of the allure of internet television is that the viewers can decide when they choose to watch the programming. They no longer have to be in front of the television for “Must See TV” as they once did. That is why network executives are trying to come up with ways to make Internet TV an interactive experience for viewers and figure out how they can reap the rewards of such efforts.

Most households outfitted with cable or satellite television services are familiar with video on demand. Users can select from a list of available movies, documentaries, and cartoons what they would like to view and the time that they want to watch the program. A fee is added to the service for each program that is selected. The interactive TV model would build upon the popularity of video on demand and enhance the service.

The latest advance in Internet TV is called IPTV or Internet Protocol TV, also known as interactive personalized TV. It is attempting to bring television viewing to home watchers in a way that has been personalized just for the viewer. IPTV is taking advantage of mash-up technology so there are various layers of music, graphics, video, and text on a screen. As a viewer, you can select what information you want to be displayed.

For example, there might be scrolling text shown to the viewer as he positions the remote control in a certain way that would be hooked into an entertainment database such as IMDB. The text will give the viewer an actor’s name and past movie and television credits. If the viewer was watching sports, he would be able to get access to the player’s stats. With another remote control button, the viewer could find out what outfit the actor is wearing and order it for himself right from the comfort of his own recliner or sofa. Users will be able to interact with their television the way that they currently do with their computer. This functionality adds a new dimension to voting polls that so many reality television shows use today.

IPTV is currently being tested now to work out the delivery system. The programming will be delivered by network infrastructure such as a broadband device. In order for the product to become a success, there will need to be sufficient infrastructure to handle the demands of the users. No one will be happy if the feeds are slow or if the picture pixilated or breaks up during the transmission. The ongoing testing will also be trying to determine the average user interest in such a service. How much would people be willing to pay in order to have the interactive television?

Streaming video and live video feeds are becoming more popular, but users currently can only get this type of entertainment from the internet. After watching an episode of the reality show Big Brother, wouldn’t it be great to opt – in and buy the live video feeds to continue watching what happens in the house right from your television? The same technology will also make it possible to chat with other viewers of the video feeds. A separate device like a Sidekick that is attached wirelessly to your television would enable the viewer to chat and text each other while watching the streaming videos.

You can get a taste of online TV by putting “online TV” into any search engine. The results will be lists of online TV aggregators. The aggregators gather television programming from all over the world and allow users to watch the programs online. All videos require Windows Media Player or Quick Time real Player to be installed on your computer in order to watch the programs. If you were curious to see what a news programming from Vietnam or Italy looks like, you can watch it from your computer.

Online TV allows you to choose which programs you are interested in from a variety of different ways. You can select programming by country of interest or genre. Genres consist of cartoons, children’s shows, games, drama, comedies, humor, news, and adult programming. Big players in online movie programming are Hula. Hula is a joint venture of NBC and News Corp. Full-length prime time television shows are available to watch for free as are full-length major motion pictures. The site generates revenue by the advertising it runs. It is free to all viewers who live in the United States.

Television networks are embracing the Internet. The CBS network signed an agreement with YouTube to show various clips of their programs on the popular social network site and have reported an increase in network television viewing since the clips have hit YouTube. The network is reaching viewers that they have not been able to reach before.

internet

Television is starting to embrace the model of operation similar to the music industry. A recording artist releases his album and all of the songs are available to the public should they decide to listen to the music whenever they wanted to hear it. Television networks have been operating on the network’s programming schedule and not the television viewers schedule. That is about to change with the advances that are being made with IPTV. You won’t have to wait a whole week to see the next installment of The Office. The series will be out in there as video on demand is now for viewers to decide to watch whenever they choose.

Internet Marketing – Computer Information

When you need to get a contact phone number for a company, sometimes it takes a while to get to the right page. Bing will give you the number right on the search results page. No need to even visit the website.

internet

If you want a preview of a web page without having to visit the website, Bing shows you the information, just scrolled over the desired search result and a preview box will appear. The text will give a short description of the web page, and shows what other links appear on the page.

GOOGLE ADVANCED NEWS SEARCHES

Google offers Advanced News Search, allows a visitor to scour headlines by date, location, exact phrases or publication. People can use it retrieve articles from more than 4,500 news outlets publishing on the Web.
Check out Google’s official guidelines for quality listings. They offer a re-inclusion request option that will give your business an opportunity to appeal if a listing is removed too.

In some other Google-related news that online businesses and business with websites might be interested in, they have introduced a new Sitemap Generator.

Google is planning to include website load time as one of the Ranking factors in an algorithm in 2010. This is not a done deal, but it could be a good idea to check your load speed.

WEB PAGE TRANSLATION

This feature is particularly helpful if your search has non-English results. Google offers a facility to auto-martially translate a page for you in English. Currently, Google supports Italian, French, Spanish, German, and Portuguese.

For the best information on your site or to check your competitors for persons who use Google AdWords, try out the Google AdWords Keyword Tool.

False and Misleading Advertising What’s truthful? The FTC has attempted to deal with this question by establishing the following standards:

The intention to deceive is not what matters. What matters is the perception of the public. The test of whether or not an ad is misleading will be based on the effect on the average or unsophisticated person. Your advertising may also be deemed deceptive through omission or misleading implications. The bottom-line, just the facts.

SCREEN SAVERS

If you are looking for something different remember Windows has a great choice. Don’t unload any free ones from anywhere, could have bugs, and almost impossible to delete.

For windows screen savers, right-click on a blank area of the desktop. Click “properties”, “screen savers”. Click the arrow to the right of “screen savers” just below the monitor. Pick the one you want.

LIGHTSIDE

A teacher was getting to know the kids in her class by asking them what their father did for a living. The first kid she asked said: ” My name is John and my dad is a truck driver.” The next child she asked said: “My name is Bill and my dad is a striptease dancer.” The teacher quickly changed the subject.

Later, the teacher approached Bill privately and asked him if it was true that his father was a strip tease dancer and danced in the nude. Bill blushed and said: “No, he really is Information Director at Microsoft, but I am too embarrassed to tell anyone”.

COMPUTER WARNING, INTERNET MARKETING INFORMATION

Security company McAfee has prepared its predictions for hacker threats in 2010. It forecasts a troubling year for Adobe software, which McAfee believes will be heavily targeted in 2010.Nearly every PC and Mac in the world seems to have a copy of Adobe Reader, a necessary tool for reading portable document format files.

The prediction is not particularly surprising. Adobe itself admitted in early 2009 that it had seen attacks on its applications climb steadily in recent years.

Still, it’s not just Adobe and its many users that will need to be wary in 2010. Also steadily rising in popularity are social networking sites like Facebook, Twitter, and MySpace.

The tip on unplugging your computer from the wall outlet during a thunderstorm was sound advice. And we’re coming to the season when thunderstorms become more frequent. But let’s take that advice one small step further. Take the time to also unplug your modem from the telephone line! Surges can also pass through the telephone lines and even a small surge of static electricity can fry the delicate circuitry in your modem.

Your Clipboard can be seen by any hacker. For your protection, you should not copy passwords, credit card numbers or other sensitive information. To prevent this from happening to go to Internet Explorer: Click Tools, Internet Options, Security tab, Internet section. Go down to the Security level box, and click the Custom Level button. Scroll down to Scripting, and find the entry, “Allow Programmatic clipboard access” or “Allow paste operations via script”.
Click Disable or Prompt. Click OK.

Protecting your computer against malicious software is an ongoing activity and, at the minimum, all computer systems need to be regularly patched, have up to date anti-virus software, and a personal firewall installed.

Within the last several months, the FBI has seen a significant increase in fraud involving the exploitation of valid online banking credentials belonging to small and medium businesses, municipal governments, and school districts.

In a typical scenario, the targeted entity receives a phishing” email, which either contains an infected attachment or directs the recipient to an infected website. Once the recipient opens the attachment or visits the web site, malware is installed on their computer. The malware contains a key logger, which will harvest the recipient’s business or corporate bank account login information. Shortly thereafter, the perpetrator either creates another user account with the stolen login information or directly initiates funds transfers by masquerading as the legitimate user.

You can make a difference and help protect your own systems at home and at the office by taking these basic steps: Change your security passwords regularly, have a firewall in place on your computer, get the latest anti-virus software, and install current security patches for your computer’s operating system.

Also, take a time to visit the FBI’s cyber web page to learn more about how our cyber action teams, computer crimes task forces, Innocent Images program, and Internet Crime Complaint Centre are playing vital roles in protecting cyberspace. Can you avoid getting caught by a scam artist working the web? Not always. But prudence pays.

The FTC offers these tips to help you avoid getting caught by an offer that just may not click:

Read the fine print and all relevant links. Fraudulent promoters sometimes bury the disclosures they’re not anxious to share by putting them in teeny-tiny type or in a place where you’re unlikely to see them.

Look for a privacy policy. If you don’t see one – or if you can’t understand it – consider taking your business elsewhere.

Be skeptical of any company that doesn’t clearly state its name, street address, and telephone number.

The FTC has publicly Announced Its Newly Developed Cross-Border Fraud Guidelines. The FTC has joined with Hundreds of International Law Enforcement agencies around the world to form a combined force and aggressively combat what they see as the growing problem of Cross-Border Fraud.

This combined force has vowed to enforce the FTC”s Rules and Regulations on a world wide basis. They have really cracked down on Internet marketers, and actively going after those that don’t rigidly adhere to all their rules about disclosures disclaimers, terms of use, privacy and other legal documentation! They filed 45 criminal and civil law enforcement actions against Internet Marketers, in a single day.

Government agencies do not send unsolicited e-mails of this nature. The FBI, Department of Justice, and other United States government executives are briefed on numerous investigations but do not personally contact consumers regarding such matters. In addition, United States government agencies use the legal process to contact individuals. These agencies do not send threatening letters/e-mails to consumers demanding payments for Internet crimes.

Fake eCards.
You get a message with a link to an online greeting card but, when you click it, you end up with a virus on your PC. A couple of simple rules here. Delete any messages that come from someone you don’t know or that don’t address you by name. If they come from someone you know, email that person to check that they sent it before clicking the link.

Holiday rentals. 2009 has seen a surge in ads offering bogus vacation rentals. You pay a deposit or even in full to get a key and that’s the last you hear of them.

Scammers are experts at creating phony look-alike sites where you land after mistyping an address or by clicking on a link supplied in the email or ad. Always type in the URL and don’t just click on the link.

news

DROP SHIPPERS
You can get products to sell via eBay or/and your website by using the services of a drop shipper. A reliable drop shipper will not ask you for a fee. They will allow you to copy pictures of the products they sell. Prices are about half you would pay for retail. If you have a website they will allow you to move any listing on their site to yours. You set your price on the product/s you transfer. When an order comes in place the order they will ship it out for you under your shipping label and not include any of their material.

A good way to promote is to join as an affiliate, transfer a couple specials onto your site, with a link back to your affiliate page. The cost of setting up a website is minimum. Check out my website archive for drop ship firms.

Disclaimer: The Author of this article is not responsible for accuracy or completeness nor shall he be held liable for any damage or loss arising out of or in any way related to the information or utilization of it.

 

Why Amateurs Encounter Crooks and Frauds Instead of Money in Internet Marketing

Almost everyone who gets into internet marketing wants only one thing -“Money!” And the mindset most feel is “the quicker they get it, the better.” Most people fail to realize that internet marketing is like any other offline business: You need to have something to sell, and to sell “that thing,” you need to market your business.

internet news

You also need to have some form of the payment processor to bill your customers for your service. People make money by either working for a business or starting their own business. In the online world, you do the same thing. If you need to make money online, then you need to start delivering products or services that add value to your customers. If you are not delivering value, you will not make a living online (or in a business offline, either)!

There is no “get rich quick scheme”

If you are new to Internet Marketing, then you will see a lot of “bright, shiny objects.” This is the name veteran marketers give to the latest fads that claim to help you make a lot of money, very fast. These are scams run almost totally by fraudsters. Their only intention is to extort money from those who do not know better. Their target market is the new people venturing into Internet Marketing. Namely, you!

The e-books or the videos these guys supply is information that is available for free online. These books will do you no good, no matter how good they claim to be. Avoid purchasing e-books and guides without getting your feet wet in the Internet Marketing world. If you will just take a little bit of time to do your own research, you will be able to save a lot of money.

My adage, that I continue to harp to my clients in my membership training classes, is to “never purchase any product (other than the basics to get set up) until you make the money through your business to actually purchase it.” In other words, get your website and business up and running BEFORE you buy an of the “latest gadgets and software” that claim you can make millions of dollars by this time next week!

The Good News

You need to start learning what works and what does not work by learning from people who actually make money online. Search for Internet Marketing forums and blogs by other Internet Marketers. You can meet a lot of professional marketers as well as a lot of like-minded amateur Internet Marketers in these forums. Go and read through the pages. Look for free resources and tools which can enable you to set up your own website. Never shy away from searching and learning about something that you do not know. You will be amazed at the information that is readily available online – for FREE!

The first website that I started was a ministry website. But I stumbled around and finally found someone who was able and willing to answer my questions and help me in the setup. The only cost associated was the hosting fee and the domain name. I finally got the website to where I liked the “feel” of it – and began to advertise it. I never went in for the “fads” of the time. I did it all myself. The results? I began to receive some orders for the products (books and CD’s) where were offered for sale through the website. I could have wasted thousands of dollars using “the next best thing” when the old-fashioned way saved me money (and made some money)in the process.

About three years ago, I decided to enter the Internet Marketing business for myself (separate from the ministry, which continues to operate – but is a “not for profit” ministry. This business venture was set up as if I had a traditional “business” for the intent to “make money in exchange for services or products”).

The most important lesson I learned quickly about online business was the need to reinvest the money you make online in order to make more money. There is risk involved. But it is a business and Internet Marketing is a very serious business. I spent thousands of dollars chasing “the latest fad” (the bright, shiny objects) before I learned the main lesson I now live by and teach. “Start with the basics and when the money comes in – then and only then – decide on what product will help your business grow.”

I purchased a “done for you” website done by a “guru.” I did not know how to add to the content, change the content or even how to operate it. I had to “go through them” for everything. After about two months of no sales at all – I canceled. Guess what, after I cancelled, I had “zero” customer support! I basically dumped the website and started over. Once I learned how to set up a website, I discovered I had more control over it. I was able to get professional designs to suit my website and style.

Having your own website, though, is just the beginning. There is a lot of work involved to make your website a success. My definition of a successful online business is “having a website that makes money for you by providing valuable service to the customers who use the website.” The websites maintenance cost comes from the income of the website itself.

Growing your online business

Once I had found that I was achieving a small level of success, I stopped writing content for the website. I was making money through “Ad Sense” advertisements (you can search for what it is and how it works on YouTube) and I became lazy and unmotivated. My income started dwindling because my regular readers left the blog due to the lack of fresh content. By the time I realized the mistake I was making – I had not updated the site in almost three months! I was adding more advertisements on my website trying to make more income from the traffic coming from the search engines. This was another big mistake (and it lost my search engine rankings in the process as well). In other words, I lost all the way around!

From studying my mistakes, I discovered that you need to keep growing your business at all times. It is a never-ending process. So I started writing regular content again. I slowly changed from strictly selling products to a membership program. I also introduced a newsletter for my free members. The newsletter enables me to send emails to my subscriber’s with ease. The membership program is designed to provide information on how to start and grow your business while avoiding the traps that I (and others) encountered.

news

Believe me when I say that making money online is possible – if you play the game right and put in a lot of hard work and creativity. Do what is necessary to grow your business instead of looking for an e-book or “latest and greatest” gadget that claims to provide you with an “overnight” success story.

Slow and steady will win just about every time! The membership program started small. It took a little while to catch on. But I continued to manage it as if it had 100 members. This “practice” identifies the bumps and things that you must do to work better. Don’t try to get rich overnight – you will lose almost every time. Less than 1% actually make the overnight success story.

Activity Internet Online Marketing Information, Computer, Fraud Tips

NETWORKING

You didn’t learn it at school, or at the office. Would you believe your mother?

Networking is more than shaking hands and giving out business cards. Forget about the endless networking skills you may have learned at the office. We just have to put the few lessons mother taught us into practice. As a kid, we were always in a hurry to find something better. Our mothers taught us patience.

internet news

If you are in a hurry you miss the value that can be built taking time with building relations in networking. Establishing a relationship by taking time, gives you a solid framework in networking building.

Your mother worked hard as an example. This is one of the better examples in networking she gave you. That’s why it is called networking, not sit work. For networking to be successful you have to work hard and put out the effort.

Remember her telling you to share your things with others? Some of our best resources are time, money, and information we are willing to give to the relationship. They appreciate us when we are willing to give to the relationship.

She always made you clean up after yourself. In networking, follow-up is required. Whether it’s a promise to meet someone, or just a thank you is one of the most important lessons of networking. These life lessons we learned from the mother during childhood are solid bases for strong networking skills.
Thank you, mother, for all your help.

The biggest time spend in selling, more so in mail order or on the Internet is developing a relationship with your customer and building trust. If you did a good job in the first two, closing a sale will take the smallest of your time spend with your customer.

CARD TRANSACTIONS REPORT TO IRS

Starting in 2011, banks or other companies that process credit cards must report the amount of the payments a merchant receives on card transactions to the IRS. The law will not apply to merchants doing less than 200 transactions totaling less than $20,000.

SCREENSAVERS

If you are looking for something different remember Windows has a great choice. Don’t unload any free ones from anywhere, could have bugs, and almost impossible to delete.

For windows screen savers, right-click on a blank area of the desktop. Click “properties”, “screen savers”. Click the arrow to the right of “screen savers” just below the monitor. Pick the one you want.
For the best information on your site or to check your competitors for persons who use Google AdWords, try out the Google AdWords Keyword Tool.

ADVANCED NEWS SEARCHES

A new offering from Google – Advanced News Search, allows visitors to scour headlines by date, location, exact phrases or publication. People can use it retrieve articles from more than 4,500 news outlets publishing on the Web.

WEB PAGE TRANSLATION
This feature is particularly helpful if your search has non-English results. Google offers a facility to auto-martially translate a page for you in English. Currently, Google supports Italian, French, Spanish, German, and Portuguese languages.

LIGHTSIDE

A GOOD NIGHT’S SLEEP

All the rooms were taken when the soldier got into town. After pleading with the desk clerk, the clerk remarked. “Well, I do have a double room with only one occupant, but to tell you the truth he snores so loudly that people in an adjoining room have complained. I am not sure it would be worth it to you”. “No problem.” The tired army guy assured him, “I will take it’.

When he came down for breakfast the next morning the clerk asked, “How did you sleep?” “Never better”, replied the soldier. The desk clerk was impressed. “No problem with the other guy snoring”, the clerk asked?” “No I shut him up in no time”, explained the soldier. “How did you manage that?” asked the clerk.

“Well, he was already in bed, snoring away, when I walked into the room, so I gave him a kiss on the cheek”, explained the soldier”. “Then, I whispered in his ear Good night beautiful, and he sat up all night watching me.

COMPUTER WARNING

The tip on unplugging your computer from the wall outlet during a thunderstorm was sound advice. And we’re coming to the season when thunderstorms become more frequent. But let’s take that advice one small step further. Take the time to also unplug your modem from the telephone line! Surges can also pass through the telephone lines and even a small surge of static electricity can fry the delicate circuitry in your modem.

Your Clipboard can be seen by any hacker. For your protection, you should not copy passwords, credit card numbers or other sensitive information. To prevent this from happening go to Internet Explorer: Click Tools, Internet Options, Security tab, Internet section. Go down to the Security level box, and click the Custom Level button. Scroll down to Scripting, and find the entry, “Allow Programmatic clipboard access” or “Allow paste operations via script”.
Click Disable or Prompt. Click OK.

The American Federal Bureau of Investigation (FBI) is warning that hitman scam is back in a big way. The hacker behind it is sending out a flood of emails threatening to kill the recipient if he does not receive several thousand dollars.

This scam first popped up in December 2006, then again this last February. Some personal info is included in the emails, to make it look like the crook knows all about you.
The FBI advises that you just ignore the email. Report it to the Internet Crime Complaint Center.

ONLINE RENTAL FRAUD

June, August, September, January is competitive months for rental suites.

There are a lot of fraudulence ads being placed free on Craigslist etc. Crooks ply on the shortage of apartments by placing ads on these sites. When someone answers they are informed owner had to go out of the country for a funeral or whatever. They had no one that they could have left the keys with so the apartment could be checked.

Now comes the kicker. If you’re interested in renting the apartment, send $900.00 as damage deposit, and $1200.00 for the first month’s rent and the key would be courier to them.

There is a limited supply of apartments on the market, so this is a huge target for scammers.

Don’t fall for this scam. People need to do their homework, physically see the apartment, talk to the owners’ and have a written contract.

WARNING, CAR JACKERS IN MALL

CST. Eric Doran #656 Chatham – Kent Police Court Services
Here’s the latest tactic by car thieves.

Heads up, everyone! Please keep this circulating. You walk across the parking lot, unlock your car and get inside. You start the engine and shift into reverse when you look into the rear-view mirror to back out of your parking space. You notice a piece of paper stuck to the middle of the rear window. So, you shift into Park, unlock your doors and jump out of your car to remove that paper (or whatever it is) that is obstructing your view.

When you reach the back of your car, that is when the car-jackers appear out of nowhere, jumps into your car and take off. They practically mow you down as they speed off in your car. And guess what, ladies? I bet your purse is still in the car. So now the carjacker has your car, your home address, your money, and your keys. Your home and your whole identity are now compromised!

Men, you too are at risk. You can say good bye to your briefcase, and if you’re like many guys, who keep their wallet in the glove compartment, with your driver’s licence, credit cards, plus.

If you see a piece of paper stuck to your back window, just drive away, remove the paper later and be thankful that you read this e-mail. I hope you will forward this to friends and family, especially to women. A purse contains all kinds of personal information and identification documents, and you certainly do NOT want this to fall into the wrong hands.

Phishing still catches millions of persons who give out their personal information, believing the e-mail they received was from a bank, PayPal, taxation branch, or some other Government
Department. Further, instead of typing in the URL supplied by the Phisher, they just clink on it. Just because the URL has the proper heading doesn’t mean it is going to a legit URL. In phishing they have it redirected if you click on the URL and they get your personal information.

We trust our Government to safeguard the information we give them. But did you know that the government is among the biggest sources of ID leaks and that penalties for ID theft are rarely imposed on those who are negligent.

For more information on how to protect your computer and ID theft check out the website below.

NEW WEBSITE FIGHTING CRIME

The B.C. Crime Prevention Association has just launched a new website last week. Originally set up to support law enforcement, now available to everyone.

Information on cyber bullying, resource guides, blogs, printed materials including copyright law, stalking, fraud awareness, I.D.theft, senior safety, and crime-proofing property.

PROTECT YOURSELF AND YOUR COMPUTER TOO.

Internet Explorer sports websites for you, the Internet, local Internet, trusted sites, restricted sites.

If you don’t see the slider in any zone, click the default button. For Restricted sites zones, I would suggest the slider be at the very top, on high. It is the safest way to browse. It also is the most restricted. But with all the sites that could have harmful content that may damage your computer, necessary.
Don’t forget to click OK to exit.

COMPUTER SECURITY TERMS

Adware is software that causes advertising to pop up on your computer display; without your permission.

Malware is malicious software that includes viruses, spyware, and other types of harmful programs.

Badware is adware or spyware that tracks your online activities and provides that information to others without your knowledge.

Spyware is software that’s installed on your PC via downloaded programs. It transmits data to others about your business, behavior on line.

A virus is typically a small, malicious program that can infect programs and replicate itself.

Spam, Virus, Spyware, Phishing, is still big headaches for people online.
Consumers have lost over $9 billion; more than 3 million computers have had to be replaced because of viruses.

DROP SHIP, WHOLESALE

SaleHoo makes importing easy. SaleHoo is a leading directory of drop ship, wholesale, liquidation and manufacturing distributors, and presents a constant and reliable supply of wanted items. Start your importing adventure with SaleHoo, and then spread your wings over the world.

news

ADVANCED NEWS SEARCHES

A new offering from Google – Advanced News Search, allows visitors to scour headlines by date, location, exact phrases or publication. People can use it retrieve articles from more than 4,500 news outlets publishing on the Web.

WEB PAGE TRANSLATION

This feature is particularly helpful if your search has non-English results. Google offers a facility to auto-martially translate a page for you in English. Currently, Google supports Italian, French, Spanish, German, and Portuguese languages.

 

It Isn’t News – It’s Theft

Those who unplugged to go somewhere remote for the Labor Day holiday weekend missed the news of dozens of famous women falling victim to a crime. The rest of us couldn’t escape it, as news of the flagrant violation of their privacy quickly spread – outpaced only by the stolen images themselves.

internet news

Celebrities including Jennifer Lawrence, Rihanna, Kirsten Dunst, Mary Elizabeth Winstead and many others were the targets of an effort to leak their private images onto the Internet. The nude and intimate photos and videos were initially posted to 4chan, which quickly removed them, but then resurfaced on various websites across the Internet.

In reporting on the story, The New York Times chose the headline, “Nude Photos of Jennifer Lawrence Are Latest Front in Online Privacy Debate.” (1) But characterizing the fallout of this incident as a “debate” is ludicrous.

There is no gray area here, no debate worthy of the word. It is not a question of editorial judgment or taste, as was the case in showing pictures of murdered journalists in their last moments, a parallel drawn in the Times article. There is no news value in these celebrity images. Everyone has a body; the display and image of that body, in private, is the private property of the body’s owner unless she agrees otherwise. I don’t know how anyone could be a stronger proponent of First Amendment protections of expression than I am, but there is just no First Amendment issue in play here.

This incident is a clear instance trafficking in stolen property, plain and simple. CNN reports that some of the victims have engaged with the FBI; in a similar case a few years ago, a Florida man received 10 years in federal prison for hacking the email accounts of 50 entertainers, an incident that also resulted in the spread of private photos. (2)

Culpability for this crime does not run only to the people who initially stole the images, however. It also runs to those who maintain a marketplace in which such goods are valued and traded. This is a concept we readily recognize in connection with child pornography, for example. The images in question belonged to people whose computers were electronically burglarized. And unlike the loss of, say, an heirloom watch, these women are repeatedly victimized by each new exposure of the stolen images.

Sites that use these images to generate traffic, and purveyors of gossip like celebrity blogger Perez Hilton who use them for the same reasons, are as guilty of an offense against the victims as Amazon would be if it maintained a market in stolen Toyotas.

Granted, it is impractical for websites like Twitter to intercept media such as the stolen images in every case when they are first posted. And it is certainly true that once something is on the Internet, it is there forever. But that does not in any way justify reputable businesses allowing their users to disseminate these images freely. The absence of child pornography on these sites demonstrates that they have ways to shut down such abuse of their services.

Note, too, the response from sites such as Reddit when the discussion shifts from exploiting adult women to running afoul of laws protecting minors. McKayla Maroney, the Olympic gold medalist, is currently 18 years old and was among the leak’s alleged victims; her legal team has contacted a variety of websites that have hosted the images, demanding they be removed on the grounds that she was a minor when the images were taken. (Maroney herself initially denied that the photos of her were authentic.) Reddit moderators warned that all images allegedly of Maroney would be immediately removed, as they qualified as child pornography under the site’s rules. As of this writing, the adult women’s images reportedly remain up. (I am not going to further assault the victims by checking for myself, and I certainly never would ask my associate Amy Laburda to subject herself or the hacking victims to such “research.”)

I see two circumstances in which this sort of corporate misconduct will stop for good. The first is a situation in which a highly placed employee at a big-name website – say, Yishan Wong, Reddit’s current CEO, for example – ends up the victim of this type of crime. If Wong found nude pictures on Reddit of himself, or of his wife (more likely, since this sort of behavior is blatantly gendered), it is hard to imagine that such exploitation would not stop immediately.

The alternative is a victim, such as Jennifer Lawrence, choosing to go to court and winning a judgment that costs a major website a lot of money. The legal and publicity teams of several of the alleged victims, including Lawrence, Kate Upton, and Victoria Justice, have expressed an intention to prosecute not only those who stole the images but those who have disseminated or duplicated them too. They may sue for infringement of intellectual property or the intentional infliction of emotional distress. And let’s not grant even a shred of doubt that such exploitation by Reddit and other offenders is intentional. I am sure the lawyers for the victims will find other grounds for legal action as well.

internet news

There is no controversy, notwithstanding the Times’ thoughtless headline. All decent people will refuse to look at or traffic in these pictures. Respectable businesses, online or off, will not take part either. Those who do should not be surprised when the rest of us, quite possibly including the courts, conclude that they have ventured beyond the pale of journalism.