Daftar Isi - 1

Sunday, February 22, 2009

Aggressive marketing

If you get an email with a title like 'Don't Ever Trust Me Again!' and continues along the lines of '... then you don't have to take my advice ever again!'

My advice is - Don't *


Perhaps it's because I'm skeptical of the number of "miracle" products, "great deals", 'limited time offers' or 'incredible packages' that are advertised online every day. Perhaps it's because I have bought more products than I can possibly use for now. Perhaps it's because there are probably more people trying to sell this particular package than the number of packages that are available. Or, perhaps it's because I received an email with almost identical content from too many different sources. Whatever the reason, don't make the same mistakes as I have in the past.

* It may be a good deal. It may be exactly what you are looking for. But if you receive emails with exactly the same content from different sources, think carefully before you buy. There are some good internet marketers that I have every respect for. However, there are an increasing number of 'marketers' that show little thought or consideration for others. They will take from you but offer nothing in return. You may disagree with the last statement. If you buy a product from them and you are happy with that product and they are happy with the money earned from selling you that product it's a win-win situation.

That's all well and good until you look more closely at the process. To do this, other factors must be taken into account. These include cost, value, convenience, time, and most importantly trust. You've probably heard of the phrase. "The money is in the list". I wouldn't disagree with that and it's easy to see why many of the "big list" hitters are successful in the percentage game. But unless they offer you something more than somebody else's 'sales pitch' ignore them. Many of these people come and go. Make sure they don't go with your money.

With regard to the email in question, here is a quote from a 'trusted' ezine that I subscribe to "This is only of interest to you, Bryan, if you really need some brand new products to sell. If not, don't bother." At least, this is honest and straight to the point. I know who I'd buy from. On occasion, time may be more important than trust. If this is the case, then make sure you have a use for the product before you buy it. We are all guilty of impulse buying. It can be all too easy to buy something that will seldom, if ever, be used.

If you subscribe to an ezine or newsletter, it's often useful to keep tabs on the sender. By doing this you will learn to recognize if the content is original or simply a copy of someone else's work. You'll also quickly discover if the sender is only interested in using you as a means of earning a 'fast buck'. This is obvious if there is little or no content, excessive affiliate URLs, or emails that are repetitive or delivered more often than necessary.

If you like the newsletter or email subscription, that's great. If you don't, you can usually 'unsubscribe'. If this fails, then try 'whitelist' filtering to weed it out. If you think the email is from a spammer, then be careful. Don't click on any URL or 'unsubscribe' option, and unless you are absolutely sure of the originator, never open an attachment.

If you use eBay or PayPal, you will no doubt be aware of the fake or spoof emails that are periodically blasted out. Well, the spin cycle has begun again. A good tutorial on spoof emails and how to recognize them can be found at http://pages.ebay.com/education/spooftutorial/index.html

Tip - If you have your own website, don't use your default address for your PayPal or eBay account. Use a different address and you will quickly spot the spoof email in the 'To' line of the email.

About the author:
Bryan Quinn
ebook-site news
Provides a unique monthly ezine with a subscriber only members' area.

http://www.ebook-site.com

All about spam

Feel free to reprint this article in newsletters and on
websites, with resource box included. If you use this
article, please send a brief message to let me know where
it appeared: kara333@earthlink.net

Word Count = 375
Word Wrapped to 60 characters per line
URL: http://www.karathecomputertutor.com
author photo: http://www.karathecomputertutor.com
date of copyright: March 2005


All About Spam
by Kara Glover
kara333@earthlink.net
Spam is annoying. Period. Why people would want to send all of us stupid messages about buying prescription drugs or getting some outrageously good mortgage rate is beyond me. Well, not really.

You might ignore those emails. But not everyone does. And that's why they're sent. Emails cost so little (or nothing) to send. So sending out a million of them could be a cakewalk. Let's say one out of every 1,000 recipients falls for their ploy. Someone just got 1,000 new customers!

How in the heck did those spammers get your address in the first place? Well, they actually use a variety of techniques. They use programs called spambots to search the web and pick up any email addresses that could be listed on websites. They use what's called the "Dictionary" technique, where they take a well-known email extension (earthlink.net, for instance), and make up all kinds of possible user names to go with it. For example, with me they could try the usernames "kara", "kara1", "kara2" and so on, until they can confirm one of those connected to an earthlink.net extension is a valid email address. Kinda like going page by page through the dictionary.

Ever fill out a registration form on a website and find a little checkbox, probably near the bottom, asking if you want to receive additional information, newsletters, or something of that nature? Often the box is checked, and in order NOT to receive the info, you have to UNCHECK it (or else). Well if you miss those types of boxes on the wrong kinds of sites, your email addresses may be handed to spammers on a silver platter. Well, almost. Often a zillion email addresses are sold for next to nothing to spammers on CDs. (Couldn't you almost call those silver platters?)

Many internet service providers (those guys that keep you connected to the internet so you can send and receive email) use a variety of methods to block spam before it ever gets to you. Nevertheless, we all know that some spam inevitably gets through to our inboxes. That's when we need to take a proactive stance and install some sort of software to filter it out!
© 2005 by Kara Glover

About the author:
For help on installing anti-spam software, check out this article on Kara Glover’s website: http://www.karathecomputertutor.comYou can also find more articles, tips and tutorials on topics such as Microsoft Word., Excel, and PowerPoint there. Kara is a Computer Tutor and Troubleshooter.

Internet security basic

The explosive growth of the Internet has meant that thousands of people are today experiencing the joys of being online for the first time. With growth there always comes pain. Be it your growing pains as a child or the growth and development of this part of our culture called the Internet.

Firstly we need to quickly explain what the Internet is and where it came from. The Internet is the offspring of a military project called Arpanet. Arpanet was designed to provide reliable communication during global nuclear war. A vast network of interconnected computers was set up all over the world to allow the various branches of US and NATO forces to communicate with each other.

Nuclear war never came (thankfully) and the world was left with a massive network of computers all connected together with nothing to do. Colleges and universities started to use these computers for sharing research internationally. From there it grew and spread outside colleges to local homes and businesses. The World Wide Web was born and its father was a guy called Tim Berners Lee.

When you're connected to the Internet you're sharing a vast network with hundreds of millions of other users. This shared network provides resources that 15 years ago were never thought possible. Unfortunately when something is shared its open to abuse. On the Internet this abuse comes from hackers and virus creators. Their sole intent is to cause chaos and/or harm to your computer system and millions of other computer systems all over the world.

How do you combat this? You need an Internet security system. This might sound complicated but your Internet security system will be quite straigtforward being comprised of just 2 - 3 Internet security products. We'll look at each of these products in more detail now:

AntiVirus Software

The first and most critical element of your Internet security system is antivirus software. If you don't have up-to-date antivirus software on your PC you're asking for trouble. 300 new viruses appear each month and if you're not constantly protecting your system against this threat your computer will become infected with at least one virus - it's only a matter of time.

Antivirus software scans your PC for signatures of a virus. A virus signature is the unique part of that virus. It can be a a file name, how the virus behaves or the size of the virus file itself. Good antivirus software will find viruses that haven't yet infected your PC and eliminate the ones that have.

Antivirus software can only protect your computer from viruses trying to infect it via email, CD-Rom, floppy disk, Word documents or other types of computer files. Antivirus software alone will not keep your computer 100% safe. You also need to use firewall software.

Firewall Software

The use of firewall software by home computer users is a relatively new occurence. All Internet connections are a two way process. Data must be sent and received by your computer. This data is sent through something called ports. These are not physical things rather aspects of the way your computer communicates online.

Firewall software watches these ports to make sure that only safe communication is happening between your computer and other computers online. If it sees something dangerous happening it blocks that port on your computer to make sure your computer stays safe from the person who is trying to hack into your system.

An easier way to understand a firewall would be to picture your computer as an apartment complex. At the front door of this complex there is a security guard. Every person who enters the complex must pass this security guard. If the security guard recognizes the person entering as a resident he allows them to pass without saying anything. If, however, the person entering the complex is unknown to him then he will stop that person and ask for identification. If they have no business being at the apartment complex he escorts them from the building.

If you are not currently using firewall software your computer will get hacked into - that's a guarantee.

PopUP Blocker

You can get a good popup blocker at no cost. An easy way to do this is to install either the Google or Yahoo toolbar. Both of these come with popup blockers built in. Popups are not necessarily dangerous but are a nuisance and using either of these toolbars will make your life that bit easier.

A simple rule for practicing online security is: "If in doubt then don't". If you don't recognize the file, the email address, the website or if your gut feeling says "no" then don't click that button.

About the author:
This article was submitted courtesy of the Spyware
2005 - All Rights Reserved