|
Free
Search Engine Marketing & Optimization Tools: Keyword
Suggest
|
================================================================= | WEB MARKETING EZINE The Human Face of Web Marketing ================================================================= May 1st., 2002 Issue #188 ISSN 1444-2027 Contents -------- 1. Sponsor's Message 2. First Word 3. Tips, Tools, News and Views - Free eBook: 'eBooks: A Complete Guide To Publishing' - A Superior Free Web Host - A Cool Tip on Link Popularity - What Are The Laws on Spam? - More PayPal Problems - Free Training Course of The Week: SE Optimization - E-Commerce Term Of The Week: Firewall 4. A Touch of Humor: Getting To The Bottom of AOL's Marketing 5. Classified Ads 6. Free Training Courses 7. Feature Article: Help! There's an Intruder in my Computer 8. Our Companion Ezine 9. Administrivia Visit our companion website at http://www.WebMarketingEzine.com Want to read this online? For your convenience, the Current Issue of WME is posted each week at the WME website. Just visit http://www.WebMarketingEzine.com/currentissue.shtml ================================================================= 1. Sponsor's Message ================================================================= Professional Web Design Secrets the Pros Don't Want You to Know If you're marketing a product or service on the Internet, a professional looking website is an absolute essential part of your success. Although learning HTML is the first step, you'll find that most HTML tutorials only provide you with very basic information. You're then forced to spend countless hours trying to achieve a certain design and locate special effect codes. Until Now... Web Design Mastery is a complete Internet Marketers Reference Guide. Not only will you learn how to design a professional website, but you'll also learn in the easiest possible fashion -- with hundreds of copy & paste codes... For More Information http://www.webmarketingezine.com/cgi-bin/a/t.cgi?wdm ================================================================= 2. First Word ================================================================= Hi All! I received a lovely note from Shelley Lowery, webmistress of web-source.net "Your new site looks great! You've done a wonderful job and I wish you the best of success." I really value Shelley's opinion, as she's been writing on good web site design for years. Shelley wrote one of the classic articles on the subject, and used to review websites for an Award program she ran. Now she's released a valuable new eBook on the subject, "Web Design Mastery". I believe it's selling strongly, and I'm not surprised! You can find out more details in the Sponsor's Message (above). Till next week, have a good one! John Thought For the Week: "When a finger points at the moon, the imbecile looks at the finger." - Confucius ================================================================= 3. Tips, Tools, News and Views ================================================================= Free eBook: 'eBooks: A Complete Guide To Publishing' ---------------------------------------------------- If you'd like to learn how to produce your very own eBooks and infoproducts, then Shelley Lowery's FREE eBook is for you. Topics covered include; - Researching - Brain Storming - Designing Your Ebook - Compiling Your Ebook - Uploading Your Ebook - Designing Your Ebook's Website - Writing Effective Sales Copy - Creating a Download Link - Promoting Your Ebook - Accepting Payment - Setting Up an Affiliate Program - Increasing Your Ebook Sales - and Much, Much More! To get your FREE download, just click on the link... http://www.webmarketingezine.com/cgi-bin/a/t.cgi?ebg (Disclosure: I am an affiliate for Shelley's 'eBook Starter') A Superior Free Web Host ------------------------ Think of using a free web host for business, and you immediately run into problems. Most free hosts; - don't allow you to use your own domain name - carry banner or pop-up advertising - don't allow you to FTP your files - don't provide you with a cgi-bin - give you a small amount of space I'f you choose to use a free web host, but don't want these restrictions, check ou Portland Communications. They provide a very handy package, with 15MB of space, at http://www.portland.co.uk A Cool Tip on Link Popularity ----------------------------- I'm currently enjoying Dennis Gaskill's excellent Search Engine Optimization Course. To learn more about the Course, visit http://www.webmarketingezine.com/freetrainingcourses.shtml As we've been talking about linking and link popularity in WME recently, I just had to bring you this great Tip from the Course; "Here's a neat little way to find good sites to trade links with, sites that you know get a decent amount of traffic. This is especially useful if your site is new, because without having an established presence with decent traffic, you'll be somewhat limited in the sites you'll find willing to exchange links with you. The free page tracking service called Extreme Tracking makes their stats available to the public. The trouble is, they don't list them anywhere for you to conveniently click and view. Alta Vista to the rescue! If you go to Alta Vista and type in: link:extreme-dm.com/AND your_keyword ...make sure to include the word AND in there, a space, and then your keyword; and then click the search button. Alta Vista will return a list of sites that link to Extreme Tracking and also contain your keyword, so odds are many of them will have relevant content. Most of these will be found by Alta Vista through the code they use to track their hits. Click to go to a site, find the Extreme Tracking icon and click it, and you'll go to their stats pages. The Extreme Tracking icon is a little black square with a blue globe, with white glowing edges and a Jupiter type ring circling the globe. The ring has a jagged place in the front of it like it's electrified. Sometimes webmasters hide the icon by reducing it to 1x1 pixels in size, or by other means, so you may have to look at the source code to find it. If it's not in the source code they may have removed it from the page and the search engine is returning results from a page it hasn't updated recently. Find the busy sites and request a link trade. Good little trick!" Good one, Dennis, good advice as always. To receive Dennis' free email course, visit http://www.boogiejack.com/seos.html Sponsor---------------------------------------------------------- Discover "The Invisible Path to Success"! FREE five lesson class shows you a refreshingly original and shorter path to improving your finances, relationships, spiritual life, career, enjoyment of life and more. To enroll (free) visit: http://www.webmarketingezine.com/cgi-bin/a/t.cgi?lct ----------------------------------------------------------------- What Are The Laws on Spam? -------------------------- The laws on spam differ from country to country, and from state to state. David E. Sorkin is Associate Professor at The John Marshall Law School's Center for Information Technology and Privacy Law. He maintains a listing of laws covering spam at http://www.spamlaws.com/ For readers who want to go deeper into the subject, there is an extensive list of articles on spam, and legal case studies. More PayPal Problems -------------------- Inspired by my rant about PayPal's so-called Consumer Protection last week, WME reader Mika Gruber sent us this note... "John: I know exactly how you feel. I went through almost the exact same thing with another merchant whose claims led me to believe I was purchasing "almost new" and "in 9-1/2 out of 10 condition" merchandise. However, upon arrival it was damaged, and very dirty & even rusty. I even paid for USPS Priority Mail, and Insurance. It was sent without insurance, and at bulk package class rates. Not only did the same thing happen with PayPal, it went the same with eBay, too. They did send some email back and forth, being the middle-man, but in the end I lost $57 plus the shipping of $17. Thanks for the mention of this alarming fact in your e-zine. I too WAS a (happy) PayPal merchant. Sincerely, Mika" WME readers interested in this subject will enjoy a very thorough and balanced article on PayPal published by one of our Friends, Dr Ralph Wilson. It's called "Assessing Criticism of PayPal", and you'll find it at http://www.wilsonweb.com/wct5/paypal_assess.htm Sponsor---------------------------------------------------------- Do you Publish a Newsletter or Buy Ad Space in Them? If so you need EzineAdAuction.com. Only Ezine Ad Auction brings publishers and advertisers together to buy and sell ad space at great prices in an auction setting. If you're not advertising in newsletters you really should be....It's a great way to increase your website traffic. Free to register- BONUS products valued at over $300.00 just for signing up. Go now to http://www.EzineAdAuction.com ----------------------------------------------------------------- Free Training Course of The Week: Search Engine Optimization ------------------------------------------------------------ Search Engine Optimization Strategies is a free seven week course in legal search engine optimization, written by our old (or is that middle-aged?) friend, Dennis Gaskill. His Boogiejack.com website is an excellent example of a highly-useful, content-rich site. The course covers all the important topics, and NO spam techniques or illegal methods are taught that can result in your site being banned from the search engines. A valuable read. To learn more about this, and many other free training courses, visit out Free Training Courses page at http://www.webmarketingezine.com/freetrainingcourses.shtml E-Commerce Term Of The Week: Firewall ------------------------------------- A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. There are several types of firewall techniques: Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses. In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted. -Source: http://www.webopedia.com/TERM/f/firewall.html ================================================================= 4. A Touch of Humor ================================================================= Getting To The Bottom of AOL's Marketing --------------------------------------- A COMPUTER magazine that Patrick Flynn bought recently came with a free CD. Inside the envelope containing the CD was a card from AOL which gave him a registration number and password and invited him to use them in a free trial. The password was "GECKO-CLOACA". He was rather surprised to be invited to use the words for a lizard's anus as his Internet password. -Source: New Scientist ================================================================= 5. Classified Ads ================================================================= ----------------------------------------------------------------- Ezine Advertising WORKS! Showcase your ad. in "The Human Face of Web Marketing", at just $20 for four insertions. Just go to http://www.webmarketingezine.com/advertise.shtml ----------------------------------------------------------------- ----------------------------------------------------------------- How Much Is One Good Sales Letter Worth To Your Business? http://www.webmarketingezine.com/isl.htm ----------------------------------------------------------------- Make Your Site Sell- The Most Important Free Download You'll Make http://www.webmarketingezine.com/myss.htm ----------------------------------------------------------------- FREE five lesson class shows you how to improve the your results http://www.webmarketingezine.com/lct.htm ----------------------------------------------------------------- WOMEN! THIS LIST IS FOR YOU! THE BALANCED WOMAN! Send a blank email to mailto:[email protected] ----------------------------------------------------------------- Read about your business's future at: http://www.webmarketingezine.com/ezm.htm ----------------------------------------------------------------- Improve Your Search Positions-Get your FREE WebPosition Software http://www.webmarketingezine.com/wpg.htm ----------------------------------------------------------------- Earn Advertising Income From Your Website Or Mailing List! http://www.webmarketingezine.com/onres.htm ----------------------------------------------------------------- Article Announce - The Free Writer & Publisher Connection Subscribe: mailto:[email protected] ----------------------------------------------------------------- Your own infoproduct? Take the FREE InfoProduct Masters course! Just send a blank e-mail to mailto:[email protected] ----------------------------------------------------------------- Serious about writing that book? Look at this site! http://www.writeabooknow.com ----------------------------------------------------------------- Become a high-earning Affiliate-take The Affiliate Masters course Send a blank e-mail to mailto:[email protected] ----------------------------------------------------------------- ================================================================= 6. Free Training Courses ================================================================= Increase your knowledge; hone your skills; improve your results! Take advantage of some of the finest FREE training courses on the Web by visiting our Free Training Course listing at; http://www.webmarketingezine.com/freetrainingcourses.shtml ================================================================= 7. Feature Article ================================================================= Help! There's an Intruder in my Computer ---------------------------------------- by June Campbell Do you have passwords, love letters, naughty pictures or sensitive business information stored on your computer's hard drive? If you have a continuous Internet connection such as cable, xDSL, ISDN or other, you should know that it's almost embarrassingly easy for a hacker to break into a networked computer. Once in, they can use your private information any way they see fit. As well as getting your personal documents, the hacker can damage your system files or install software on your disk that allows your computer to be used in Denial of Service attacks and other destructive activities. Similarly, the hacker can activate your interior microphone or interior video recorder without your knowledge. This lets them record and distribute sound and video files of the conversations and activities taking place in your work area. How Hackers Do It Every Internet-connected computer has a unique set of identifying numbers called an IP address. Using special software applications, hackers send out probes over the Internet looking for live IP addresses. If they locate your computer, they look for "holes" or vulnerabilities that leave your system insecure. For example, a computer is likely to have multiple applications (email, web browser, etc.) running on the same IP address. Each application is assigned a number called a "port" that uniquely identifies that service on a computer. Ports that allow an application to send or receive information from the Net must be "open". In some unprotected systems, even ports that are not in use have been left open -- practically inviting attack! When hackers discover an unprotected, open port, they can use that opening to gain access to your system. An unprotected broadband connection is easiest to hack because both the connection and the IP address remain constant. If a hacker or a "script kiddie" finds your computer once, they can readily find it again. (Script kiddie is a derogatory name used by professional hackers to describe simple scripts used by young and inexperienced hackers). The threat is less severe for persons connecting to the Internet via dial-up modems. Dial-ups usually connect with a different IP address each log-on. Therefore, if hackers have found a system once, the changing IP address will make it difficult (not impossible) to find it again. However, if a trojan horse or back door program has been installed on a system, the trojan horse could "phone home" with the IP address each time an Internet connection is made. Back door programs allow remote users to control a system without the owner's knowledge. They are installed on computers by hackers, or sometimes come secretly bundled with software applications that the user installs. Well-known back door programs for Windows computers include Back Oriface, NetBus and SubSeven. Firewalls: Your First Level of Security Firewalls are software applications or hardware devices that you install on your system. They are designed to prevent unauthorized access to or from a private network that is connected to the Internet. When a firewall is installed, all incoming or outgoing messages pass through the firewall. Those that do not meet the specified security criteria are blocked. Most home firewalls are software applications. How Firewalls Work There are various types of firewalls, and they work through different processes. However, the following is true for most of the home or personal firewall software that is used today. Information over the Internet is sent in "packets" of data. These packets travel from a source machine to a destination machine -- which could be two feet away or two continents away. Each packet of data contains the IP address and port number of the originating machine. The firewall software inspects every packet of data that arrives at the computer -- BEFORE that data is allowed entry into the system and before it connects with an "open" port. The beauty of a firewall lies in its ability to be selective about what it accepts and what it blocks. The firewall has the ability to refuse any suspect data. If the incoming data is ignored and not allowed in, that port will effectively disappear on the Internet and hackers cannot find it or connect through it. In other words, instead of receiving a signal that a port is open, the hackers receive nothing back and have no way of connecting. Several firewall applications are available to the small business operator or the home computer user. Before changing firewalls or installing one for the first time, it's wise to check out the comparative testing that has been done on these applications. Persons already running a firewall could test it's effectiveness by trying the Shields and Ports test available at Gibson's Research Corporation (GRC) web site, or by downloading and running the LeakTest software available on the site . GRC's Steve Gibson has some surprising test results posted in conjunction with LeakTest's personal firewall scoreboard . The best-rated one is free. Not only did Zone Lab's Zone Alarm score best in Gibson's testing, but the firewall has been recognized for excellence by CNET, PC World, PC Magazine and Home Office Computing . Other well-known firewalls include McAfee firewall, Sygate Personal FW, Symantec/Norton and Tiny Personal FW. Now, the bad news. A firewall protects you from open ports, but it does not protect you from data coming and going through ports that you allow. Malicious code can invade your system from email attachments or by visiting a hostile web site. And remember -- even well trusted web sites can suddenly be hostile if hackers have added malicious code without the site administrator's knowledge. Test your security against malicious code at Finjan Software's web site. Many of you will be dismayed to find that your supposedly secure system is vulnerable. Malicious code blocking software such as Finjan's Surf n' Guard analyzes incoming data and decides whether the code could be harmful. ZDNet recommends that code-blocking software be used in addition to firewall and your antivirus software. Too Late? What if you think you've been hacked? Call your computer guru to help, or check out the information at sites like HackFix. ----------------------------------------------------------------- About The Author: How to Write Business Plans, Business Proposals, JV Contracts, Human Resource Package, and More! No-cost ebook "Beginners Guide to Ecommerce". Business Writing by Nightcats Multimedia Productions http://www.nightcats.com/ ----------------------------------------------------------------- ================================================================= 8. Our Companion Ezine: A Better Life:ItsYourFuture! ================================================================= ======================= ITS YOUR FUTURE! ======================== Enjoy Humor, Inspiration, Romance, Fitness, Nutrition & Personal Finance- all aimed at helping YOU to take control of YOUR future! Subscribe FREE by sending a blank email to: mailto:[email protected] =========== BE HAPPY BE HEALTHY LIVE LONG & PROSPER =========== ================================================================= 9. Administrivia ================================================================= Website: -------- http://www.WebMarketingEzine.com Contact Information: -------------------- to subscribe: mailto:[email protected] to unsubscribe: mailto:[email protected] Note: This is an Ezine. So sorry, NO postings are accepted contact John Payne: [email protected] NO SPAM PLEASE Advertising Information: ------------------------ Please go to: http://www.webmarketingezine.com/advertise.shtml Disclaimer: ----------- This publication was designed to provide accurate and authoritative information with regard to the subject matter. Subscribers are sent this free weekly e-zine with the understanding that the publisher is not engaged in rendering legal, or other professional advice. If legal advice or other professional assistance is required, we advise seeking the services of a competent professional. John Payne does not accept any responsibility for any liabilities resulting from any claims in articles or advertisements published in WME, or the actions of the parties involved. This publication is for informational purposes only. Copyright: ---------- © Copyright 2000-2002 John Payne All rights reserved. Web Marketing Ezine may only be redistributed in its unedited form. You are welcome to forward it to as many people as you like, with our thanks. Written permission must be obtained to reprint or quote original material published in Web Marketing Ezine. ----------------------------------------------------------------- This e-zine is a member of Ezine PUBLISHERS ASSOCIATION Join Free At: http://www.EzinePublisher.org ----------------------------------------------------------------- ================================================================= Web Marketing Ezine is published by John Payne =================================================================
|
|
|
Web Marketing Home Current Issue Back Issues Our Mission Free Training Advertise in Web Marketing Web Marketing Articles Privacy Our Friends Web Marketing Canberra Add URL Typo Index Contact Us Canberra Business Discount Cigars Online Environmentally Friendly Products©WebMarketingEzine.com
2000-2015 |