Saturday, 11 August 2007

Fight Spam Strategies and Software to take back your Inbox

Efficiency and accuracy in communication may be more important today than at any time in human history. The number of spam messages passed between individuals and businesses continues to increase significantly each day, to the point that some are literally overwhelmed by their sheer volume. Now, more than ever, it is vital that true non-spam email messages be absolutely accurate and arrive at the correct location, on time.

According to most studies, Americans are doing their part in adding to the vast number of electronic messages, but they are also creating a huge number of unwanted, unnecessary messages. One set of statistics shows that as many as 4 of every 10 spam items come from U.S. addresses. Europeans are far worse, however. Half of all emails originating there are spam, according to some statistics.

But what is spam, really? Of course, most people know about the canned food made from pork products (a Hawaiian delicacy). The definition widely used in electronic messaging and email defines spam as a "disruptive, commercial message that is unsolicited and usually sent indiscriminately." The sheer number of unsolicited messages is enough of a problem in that the sheer handling of this additional traffic slows the entire process of communication. In addition, those messages contain symbols, code etc. that actually cause system disruption or total failure. The resulting damage can be costly.

Some of the top stories in the world of email and electronic messaging recently have focused on the motivation behind spamming. In the end, it is mostly greed/money that motivates these "spammers" who spend their time distributing spam full-time through automated bots and zombie computer networks. Many of those who watch this industry carefully acknowledge that current Federal laws in the United States and at the individual State level fall short of controlling this type of "white collar" crime.

So, what can be done to remedy this situation? Actually, a number of steps can be taken to ensure that individual and business email is safe and efficient. Just making sure the inbox is free of unwanted messages is an obvious place to start. But how is that done?

Much of the spam sent to worldwide email addresses is meant to introduce products, in the hopes that the receiver will be enticed to buy. Financial schemes (the dreaded Nigerian Email scam) and illicit pharmaceutical adverts make up a significant portion of spam; as does pornography and offers for adult material.

Basic e-mail filtering (determined by the content of the e-mail) is a simple step each and every user should be taking at the start of each day and at the start of each email session. In essence, this filtering can be initiated by certain words or phrases that automatically send messages to the trash. Beyond this initial effective step, there are black hole lists (DNS-based) of known spammers, as well as email addresses that are not intended to be used except to capture spam (spamtraps) which offer more intermediate ways to combat the problem at the computer user level.

Some of the best methods employed by individuals and businesses have not been enough to stop the most determined of spammers, however. The most aggressive will use false names and addresses to establish multiple accounts across multiple ISP's. The use of "buffers" or third-party senders, helps to isolate the actual spammer from recrimination. Spammers have found and will continue to find open paths to unsuspecting inboxes, with the added risk of virus-infected messages a growing concern.

Spam and viruses are a particular risk to companies with extensive communications networks. While many of the simple steps noted above will help keep a system clean (with constant attention by administrators), more aggressive tactics are needed to ensure the continued success of larger, commercial internal communications networks.

New technology, such as highly intuitive anti-spam filtering software, may be the answer to many of the problems caused by a worldwide increase in spam. Current email users can download these anti-spam software updates in real-time and in doing so will help keep their network current. This type of technology is at the top of the list for users looking for email maintenance and for help in maintaining the efficiency and integrity of an entire communications system. Among the key focus areas for general email users are virus-free stability, lower maintenance and upgrade costs, email search capabilities for customized spam surveillance, archive services and anti-spam tools that put the daily maintenance in the hands of the local administrator.

Spam continues to grow, as senders find motivation to increase their efforts. At one time only a few hundred people received these unwanted messages. But over the years, the problem has exploded and now affects billions of email users and businesses each day. By one estimate, only about 15% of email is truly wanted and needed by the end receiver. Companies have come to realize this inefficiency cannot be supported over the long-term and are turning more and more to professional software protection options for help.

Don't let spam win, make sure your email messaging system is protected by a robust anti-spam software solution and take back your inbox today!

Author: Casey Markee
Article Source :http://www.articlesbase.com/spam-articles/fight-spam-strategies-and-software-to-take-back-your-inbox-186163.html

Wednesday, 8 August 2007

Cisco CCENT / CCNA Certification Exam Tutorial: What Are Broadcast Storms?

The Cisco CCENT exam demands that you master the fundamentals of networking, and it doesn’t get much more fundamental than broadcasts! Every network has them, and every network administrator needs to be aware of what broadcasts are and their potential impact on network performance.

When a device on a network generates a message, it’s one of three types – a unicast, a multicast, or a broadcast. A unicast is a message intended for one other host; a multicast is intended for a group of hosts; a broadcast is intended for every host that can possibly receive it – and that’s where the trouble can begin.

Why? Because not every other host needs or wants to receive that message, and if “Host A” should not receive broadcasts sent by “Host B”, we should configure the network accordingly. Everything we do on a network has a cost in performance, and if a host is regularly processing messages that it doesn’t need, that will result in a decline in that host’s performance. That decline may be slight, but if the host in question is receiving many unnecessary broadcasts, the decline in performance may be significant. Worse, the impact to our network as a whole may be significant as well.

Broadcasts tend to result in more broadcasts, and if hosts on the network continue to answers broadcasts with broadcasts, we end up with a broadcast storm. Broadcast storms start small, but just like a snowball, they can end up being very big – so big that normal network operations are compromised and/or prevented!

Don’t let the threat of a broadcast storm make you nervous about broadcasts, though. Broadcasts are part of a network’s normal operationArticle Search, and we’ve got quite a few methods available to prevent these storms. We’ll discuss those in a future Cisco CCENT exam tutorial!

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Chris Bryant, CCIE #12933, is the owner of The Bryant Advantage, home of free Cisco CCNP Certification and CCNA Certification Exam tutorials, The Ultimate CCNA Study Package, and Ultimate CCNP Study Packages. You can also visit his blog, which is updated several times daily with new Cisco certification articles, free tutorials, and daily CCNA / CCNP exam questions! Visit his blog and sign up for Certification Central, a daily newsletter packed with CCNA, Network+, A+, and CCNP certification exam practice questions. A free 7-part course, “How To Pass The CCNA”, is also available. Pass your CCENT Exam with The Bryant Advantage!

Looking at Different Belkin Wireless Network Cards

Before you buy a Belkin wireless network card, you really ought to gather information first. By asking people for their opinions and reading reviews, you would be able to save a lot of time on deciding later. You will also be able to separate the hype from the truth. In doing so, you will be able to make sure that you make a decision which you will not regret later. Here are some facts about Belkin wireless network cards to help you get started:

N1 wireless adapter – This Belkin wireless network card is actually sold as a companion to the N1 router, which is Belkins' first 802.11n product. The N11 wireless adapter is actually pretty easy to install since the software driver that comes with it is pretty straightforward with easy-to-understand instructions. Another great thing about this Belkin wireless network card is the fact that it actually costs less than its other-branded counterparts. Let's not kid ourselves: we all like being able to save cash on a purchase.

However, there are a few disadvantages to this Belkin wireless network card as well. One of the most noticeable would be the fact that it doesn't actually take advantage of the 802.11n technology. This means people might be expecting a lot more than what this product delivers. Sure, it performs just as well as other products, but that really isn't much, is it?

Wireless G plus MIMO notebook card – This Belkin wireless network card is quite disappointing when you compare it to the performance of other products in the Belkin line. Basically, this Belkin wireless network card just performs a lot slower than its predecessors –proving that "new" doesn't necessarily mean "better". The wireless G plus MIMO notebook card installs easily and can be configured quite well because of the included tools. However, these advantages are overshadowed by this Belkin wireless network card's shortcomings performance-wise.

The bottom line is, if you truly want to go with the brand, you are better off buying other models.

Pre-N PC card – This Belkin wireless network card is quite fast. We all know that what people look for the most in a network adapter is fast performance. This Belkin wireless network card also has a great range which means that, with this product, wireless does mean freedom. A lot of wireless network cards today claim to bring you freedom through wireless technology when in fact, the range of the adapters virtually confines you.

With this Belkin wireless network card, you also get easy, hassle- free installation. You just insert the accompanying installation disk, follow the wizard, and voila –you're done!

Of course, this convenience cannot come free. One thing you have to know about this Belkin wireless network card is the fact that compared to other products, it can be quite pricey. However, you need to learn how to recognize a good investment when you see it and this is definitely a good investment.

Wireless notebook 54 Mbps – This Belkin wireless network card is designed specifically for notebooks. If you want your laptop to have the power of high-speed wireless network access, then this is the card for you. It is actually quite cheap at just 35 dollars, but it packs quite a punch. Of course, the performance of this Belkin wireless network card does suffer when used in a mixed-mode environment but on the wholeComputer Technology Articles, it can be a worthy investment.

Source: Free Articles from ArticlesFactory.com

ABOUT THE AUTHOR

Rajesh Karavadia owns http://www.thewirelessnetworkdesign.com, providing information on wireless network setup and wireless network security

Repair your iPod Mini using Linux

This guide is a great walkthrough to fix a bricked iPod. By bricked, I mean beyond repairing with the windows iPod restore tool. Very easy to follow and a lifesaver. It says its for the mini, but it can be used to fix any type of iPod.

This process involves using a Linux Boot CD, an iPod Mini (4GB), and a local Harddisk! It was tested with a friends nuked iPod Mini. You need to follow these instructions EXACTLY. If you are worried about erasing your own local PC Harddisk in the process, take it out and use another disk or use a test-PC you may have etc.. this process should only touch your local HD for READING, but if you make a typo you could accidently write the ipod firmware to your own local HD and that would render your PC USELESS! OK!? I also hope I wrote this up proper.. I've re-read it a few times! Also, I guess this process goes against your warranty or somein.

This process has been tested with: iPod Mini 4GB WINDOWS version using USB connection, Knoppix Live CD v3.4, Windows 2000 SP4, Pentium 3-500 PC.

NOTE! - This process has been tested using a USB connection, I have not seen the firewire connection and therefore most of this document would be irrelevant for that connection type!

NOTE! - The MAC iPod Mini is slightly different (disk structure is 3 partitions instead of 2), and since I haven't even seen a Mac iPod none of the below applies to a Mac iPod!

NOTE! - This process has been tested with a 4GB iPod Mini. Larger size Mini's should also work since we are not specifying a size for the 2nd partition, but that is untested OK!.

Have Fun!

Problem

iPod appears nuked, only shows folder icon and ! on its LCD and is unmountable under windows? (running iPod Updater just does nothing - does not even detect the device as an ipod!)

This is likely due to complete loss of Harddisk boot sector, structure and areas.

Basics


iPod structure: (WINDOWS iPod Mini version)

Hard Disk (4GB) -> Partition 1 = 32MB for Operating System -> Partition 2 = ~4GB (4161536MB?) for User Data (FAT32 file system)

Boot sequence: (?)

Arm ARM7TDMI CPU init -> Execute ROM init and code -> Boots HD Boot Sector -> Boots HD Partition 1 (Operating System, Arm code) -> System Up!

Requirements

- iPod Mini (tested : 4GB UK model) - iPod Updater software (tested : 2005-03-23) - Resource Hacker program (v3.4.0) - Knoppix Live CD Linux v3.4 or later (other Linux versions would abviously work, I guess you need kernel 2.4.x, dd, mkfs.x, fdisk etc) - .. adventurer's spirit hey!

The Process

Firstly, you need to extract the firmware binary file out of the iPod Updater program. Use Resource Hacker under Windows, open the iPod Updater exe file, open the FIRM folder. Now you need to open the IDR_FIRMWARE-3.2.5 folder, and then select the 1033 file. Now extract this resource as a binary file to somewhere on your local HD (eg: c:\mini325.bin).

Shutdown windows.

Turn off PC.

Plug in your iPod Mini. (tested : USB connection)

Boot your PC from your Knoppix Linux Live CD.

Once Linux is up and booted, it should have mounted your local HD, probably as hda1. I would mount it manually anyway!

Open a Terminal session, get into root user with "su -", you should have: ~Knoppix[root]$: (or something like that).

Mount your local HD

Make a local mount point directory (where you will access your local HD) mkdir /mnt/localhd

Mount your local HD: (NTFS drives, windows xp, 2000 etc) mount -t ntfs /dev/hda1 /mnt/localhd

Mount your local HD: (FAT32 drives, windows 98, me) mount -t vfat /dev/hda1 /mnt/localhd

Do a directory listing to check contents of your local HD: cd /mnt/localhd ls -la

You should see "mini325.bin", your ipod mini firmware! (or the file you called it!)

Of course, if you stored the firmware on a slave HD, you need to mount that instead. In the end of the day you need access to the firmware binary file.

Prepare Your iPod Mini

Your iPod Mini should have attached as a fake scsi device /dev/sda.

To check this, "more /dev/sda" should show it is there. (Ctrl+C to quit moreing)

Now we need to prepare the disk stucture on the iPod:

fdisk /dev/sda

Use "p" to print out the current disk structure, it should be blank! no partitions! (if there are partitions then you are in unchartered terriroty and perhaps should delete them all - untested!)

Now we need to make two new partitions, one for the boot area, one for the user data.

Follow exactly: { explanations are in curly brackets, do not type these }

{ setup first partition, 32 MB in size } n p 1 +32M

{ setup second partition, the rest of the hard disk } n p 2

{ change type of partition 1 to 0, no format } t 1 0

{ change type of partition 2 to b, ie: FAT32 } t 2 b

{ show partition layout, should be two partitions now } p

{ write partition layout to the iPod } w

{ quit fdisk back to command prompt once complete } q

You should now be back to the good ol' ~Knoppix[root]$: prompt. (or similar!)

Format Partition 2

From the command prompt:

mkfs.vfat -F 32 -n "name" /dev/sda2

This will format the 2nd partition of the iPod, and give it a volume name "name".

After this you are returned to the command prompt ~Knoppix[root]$: etc.

Write Firmware to Partition 1

From the command prompt:

dd if=/mnt/localhd/mini325.bin of=/dev/sda1

This will write the input file mini325.bin from your localhd mount to the 1st partition of the ipod mini (the partition for the operating system).

This may take a few moments, you will be returned to the command prompt when complete!

Mount your iPod under Linux

Out of curiosity, mount the 2nd partition of your iPod to check it is ok!

mkdir /mnt/myipod mount -t vfat /dev/sda2 /mnt/myipod cd /mnt/myipod ls -la

There should be no files, but it should mount ok like any other fat32 disk!

Shutdown Linux and turn off your PC!

Unplug your iPod Mini from your PC.

Switch the iPod on, it should require you to plug into your mains power supply!

Plug in power, switch power on, iPod will boot up like any other booting computer, complete with loading progress bar and screen refresh . After this, you should be able to select language and use your iPod again!

Next up - ditch i-tunes because it is a bit of a demon and use Anapod or Gnupod or something and enjoy your iPod as you should! Freee...

Thank heavens for Linux eh!! and thank heavens for people trying to stick linux their pods, reading up on that is where I figured all this stuff out.

Forgotten Credits - these guys did all the hard work - Alan DonovanFree Reprint Articles, Pedro Diaz. Without them this would not have been so easy!

Thats all folks..! iPodFixed

Source: Free Articles from ArticlesFactory.com

Combating Viruses with Security Software

Help, I was sitting in front my computer and it started acting strange! Pop-ups were on my screen and I was not even surfing the web. My home page was changed somehow and so did other web settings. My programs are at a crawl and overall my computer is just not working the way it should be.

If this sounds like your computer, chances are you have been infected with some type of malicious software. Several types of software can infect your computer; some of these are spyware, a virus, a Trojan, and a worm. That is why you need security software.

Below is a brief and simple description of the software that can infect your computer and cause poor performance.

· Spyware is a program that gathers information about the user through the internet without their knowledge. It monitors your web activity and passes this information to another party without your knowledge. Spyware is designed for commercial gain, thus when it is installed in your computer you will probably receive unsolicited pop-up advertisements. It can also gather your email addresses, passwords, and credit card numbers stored on your computer.

· A virus is programming code or a piece of code that loads onto your computer without your consent. A virus is also self-replicating by inserting copies into an executable code or documents. Any virus is dangerous as it uses up memory and brings your system to a halt.

· A worm is much like a virus in the fact that it is self-replicating but differs in the fact that it does not need another program to do so. A worm can spread itself without any action from the user. A worm can attach itself to you address book and send a copy to everyone in it, then attaches itself to the receivers address book in addition, send it out to everyone in that address book. Worms are dangerous and in the end can cause networks to crash.

· Trojans are designed as legitimate software that you can download onto your computer. Once installed though, they can be annoying and/or malicious. Annoying activities of a Trojan would be changing your desktop around or silly icons appearing. Malicious damage from a Trojan is capable of deleting files on your computer and allowing personal and confidential information to be collected without you being aware.

Preventing spyware and other malicious software from infecting your computer through security software is lots easier going online and finding a reputable online scanning site after the fact. Sometimes if your computer is infected, you may not even be able to get online. Therefore, prevention is better than fixing.

You can protect your computer from malicious programs in many ways. Here are a few tips to consider.

Always have the latest version of anti virus and anti spyware technology on your computer. You will also need to keep the program files up to date in order to protect against newest threats.

Only download files from a trusted source. If you are not sure, run a virus scan on the file before downloading it or saving to your computer.

There are limitless resources on the internet offering anti spyware and antivirus programs. Many sites offer free online scans, and provide instructions for removal of any malicious programs on your computer. Once you have selected a well known, (well-known being the optimal word) follow the instructions for installation carefully to ensure that the scan will work properly. Below are the most common and well-known virus and spyware removal programs.

McAfee (mcafee.com) virus remover features up-to-date protection from the latest viruses and web activity threats for the user. They have three main anti-virus and anti-spyware programs that you can choose perfect for home and business uses.

Microsoft has an anti spyware (microsoft.com) removal tool that you can use to scan your computer. This functions mainly by reviewing and checking your files for unwanted software contents, and once found can be selected and removed depending on the procedures indicated on the program. Just follow the tools and guides on how you can remove the infected files.

Ad Ware Personal provided by Lavasoft.com features scanning and fixing infected files and drives, detection of known and unknown but potentially damaging software with its Code Sequence Identification (CSI) technology. This program also has a spyware removal and capabilities of removing other damaging programs in your system.

The above sites are just a few of anti spyware and anti virus removal programs that are available on the web. Take the time and do the research and you will find the right security software for your needs. Once again, it is imperative that the site you select for your computer security is credible.

Author: David Chandler

Saturday, 28 July 2007

Using syslog-ng on FreeBSD

To replace syslogd with syslog-ng.

Installation

cd /usr/ports/sysutils/syslog-ng
make & make install


After installation completely , edit /etc/rc.conf to let the system use syslog-ng instead of syslogd.
add this line on /etc/rc.conf
syslog_ng_enable="YES"

syslogd_enable="NO"


To kill process syslogd process.

kill `cat /var/run/syslog.pid`


copy syslog-ng.conf.sample to syslog-ng.conf

cp /usr/local/etc/syslog-ng/syslog-ng.conf.sample /usr/local/etc/syslog-ng/syslog-ng.conf


In case you don't want to change sylogn-ng configuration. you can start syslog-ng process by running this command

usr/local/etc/rc.d/syslog-ng.sh start

Saturday, 14 July 2007

RFID - The future

Radio Frequency Identification (RFID), the technology of thefuture, has long established itself in our everyday lives. It isalready deployed in various areas ranging from efficientinventory management and road toll collection through to timingthe performance of individual participants in mass sportingevents. With its enormous potential it is only right that RFIDis on everyone's lips. RFID technology builds a bridge between the physical world of aproduct and the virtual world of digital data. The technologythus meets the demands of companies cooperating in a closelyknit value chain and is being deployed promisingly in allsectors of the economy. RFID will soon be considered anindispensable part of the chain. RFID - An Overview RFID or Radio Frequency Identification is a system that usesradio waves to transmit an object's identity. There are severalmethods of identifying objects using RFID, but the most commonis to store an ID or serial number that identifies a specificproduct along with other information, on a tag, which is a smallmicrochip attached to an antenna. The antenna enables the chipto transmit whatever identification information it contains to areader. The reader converts the radio waves from the RFID taginto digital information that software systems can use forprocessing. Typically, when a reader reads a tag, it passes three things toa host computer system: the tag ID, the reader's own ID, and thetime the tag was read. By knowing which readers are in whichlocations, companies can know where a product is, as well aswhat it is, and by tracking the tag data by time, they can knoweverywhere it's been. Most industry analysts argue that tagging is a transformational software developmentactivity that will ultimately change the way businesses plan,price, distribute, and advertise products. But for the present,enterprise application vendors are extending their products tohandle an expected boom in RFID data. Until recently, a bar coded item used to sit on a retail shelfand did not generate any data until it was scanned by a bar codereader. And then the data was read only once. RFID, on the otherhand, is a passive technology that does not require humaninteraction to scan. A reader can extract location and productdescription data from a tagged item every 250 milliseconds. Somereaders are capable of reading data from 200 tags per second.The result is a data increase of more than one thousand timesabove traditional scanning methods. With the rate at which the market competition is rising,inefficiencies in a company's value/supply chain and theircontinuous efforts to shore up internal security are driving therising demand for RFID. The retail trade is playing a decisivepart in the broad-based roll-out of RFID projects. RFIDrepresents an all-encompassing structural business concept thatfar transcends simply superseding the bar code. Considering thecurrent scenario, RFID systems are rapidly gaining significance.This holds especially in areas where they can be used to manageprocesses within the value chain. With this favorable situation,the market for systems are likely to grow globally from EUR 1.5 bn to EUR 22 bnbetween 2004 and 2010 (average growth rate: +57% p.a.). Duringthe same period, the RFID market in the EU-15 is expected toexpand from EUR 0.4 bn to EUR 4 bn (+47% p.a.). RFID is such an intriguing business concept, as it cutsinventory and supply chain costs through its implementation. Theultimate goal is for RFID to replace barcodes. RFID allows forindividual product identification, not for product lineidentification like barcodes. If this takes place, individualproducts can be read letting stores locate those items ifneeded. Stores can also track when items leave the storeallowing them to easily replace items when one is purchased. Furthermore, shipments can be easily and quickly sorted andaccepted by the receivables department. With the reader,products can be received without even opening the pallet cuttinglogistical needs. Obviously isa great tool for the supply chain and companies wishing tobetter track their products and inventory. RFID will also serve as a tool. It will replace manualprocesses for tracking supplies in warehouses and at loadingdocks, e.g. as a crate passes by, a networked portal on a loading dock can transmit information about it to abackend system. This facilitates automated creation of shippingmanifests and other data, whose generation currently involvessome degree of manual labor. In principle, speedy datageneration by RFID means that information about, say, a crate oforanges, can reach a destination even before the oranges areloaded onto the truck. In other words, RFID is a form ofautomation support for the supply chain management systems oftoday. Metro and Wal-Mart were the pioneers when it comes to deployingRFID tags in the supply chain. Their suppliers are increasinglyattaching RFID tags to cartons and pallets, mostly withconventional bar code labels on the front so that bothprocedures can be used complementarily. This level is expectedto become ever more widespread in logistics in the coming years. RFID current and future trends RFID - smart radio tags - are the keystone of the emerging'Internet of Things' that will connect objects and places. Theywill create many new opportunities for software softwaredevelopment and other businesses alike and society at large. Current trends indicate that the RFID market will grow fast inthe coming years. With 1.02 billion tags sold in 2006, the valueof the market, including hardware, systems and services, isexpected to increase by a factor of six between 2007 and 2017. Business applications using RFID such as transport andlogistics, access control, real time location, supply chainmanagement, manufacturing and processing, agriculture, medicineand pharmaceuticals, are expected to grow strongly. FID deviceswill also influence Government (e.g. eGovernment, nationaldefense and security), and consumer sectors (e.g. personalsafety, sports and leisure, smart homes and smart cities). RFIDand bar codes will coexist for many years, although the formertechnology is likely to gradually replace the latter in somesectors. Asset tracking applications will see the most rapid growth inthe next few years and will grow disproportionately as comparedto the RFID market as a whole. Interoperability across variousRFID systems, companies, and countries is critical for achievingwide-scale deployment of the technology. Conclusion RFID, in its broadest sense, does not onlyrefer to next-generation barcodes, but to a compact class ofwireless computing devices. There is a broad spectrum ofradio-frequency technologies, including more highly functional(and expensive) technologies such as Bluetooth®, mobile phones,and WiFi. The future holds applications of RFID that go farbeyond mere bar-coding. A ubiquitously RFID-tagged and networkedworld offers a transformational extension of the World Wide Web.It will become not just a World Wide Web of data, but also aWorld Wide Web of things. The world will be very different once readers and RFID tags areeverywhere. In an RFID-enhanced future, the benefits wouldaccrue not just to businesses, but also to consumers.

Author: Ashwin

About the author:Author is a Marketing Executive with an Offshore SoftwareDevelopment Service provider located in India. The company dealsin offshore softwaredevelopment and offshore outsourcing. For more detailedinformation about the company and its services visit: http://www.otssolutions.com.

Stay Spyware Free With Anti Spyware Download

From the day one you start browsing the internet, your computeris under serious threat. The threat is due to the Spyware andAdware programs. Knowingly or unknowingly both Spyware andAdware programs work their way into computers and can become ahassle by damaging in a variety of ways. The only possible solution to get protected from the spyware andadware is to run an anti spyware and anti adware software. Thisanti spyware protects your computer from internet securitythreats that are arising mainly from spyware and adware. Due toits online protection, it safely keeps the PC from furtherdamage. Technically, an adware is considered to be a legitimatealternative offered by software companies to consumers who donot wish to pay for a software application. The tricky thing isthat adware can be distributed as a software application, music,game, or any program and can be given as freeware which we arefond of. When you run the freeware some sponsored advertisements pop-upmaking you to click on them. This click leads to another pop-upadvertisement and this goes on until you sign up or register bypaying money to that. Even when you don't open the freeware thepop-up ads show on the desktop which is a clear nuisance whileyou are seriously at the work. The only remedy to stop the nuisance caused by these pop-up adsis to get an adware removal tool. The anti adware not onlyremoves the present adware on the PC but also blocks the adwarewhen you are online giving you a permanent solution to thepop-ups. Spyware, on the other hand, may work and look like anadware but is usually a separate program which secretly works.The most possible source for the spyware is through freeware.Once the freeware has been downloaded (with your consent), thenthe spyware finds its way into your computer (without yourconsent), and starts doing the dirty deeds. The spyware programs monitor your internet browsing activity andtransmit that information to the spyware program creators. Eventhey monitor the computer keystrokes to record the private andsensitive information such as membership details, passwords,credit card numbers and email addresses. The spyware programtotally infects the hard drive and spreads itself into the otherparts of the PC without multiplying. Get a good anti spyware program from a reliablesource and perform a full system scan. To get a real onlineprotection from spyware programs, it is essential to download ananti spyware software and keep it up-to-date. The anti spywaredefinitions should be up-to-date and thus your PC will bespyware free and functions as if a brand new PC.

About the author:Cher K Markov is an Internet Marketer. In her quest to protecther own PC, she has researched into PC security resourcesincluding antispyware. To ensure high protection for your PC, you can getthe details about the most suitable Free Anti SpywareDownload .

Sunday, 17 June 2007

Types of Spam Filters

Spam filters are designed to block unwanted messages generated
by unethical senders. Presently, there are different spam filter
programs in the market available for email users to purchase.
These programs are designed differently, which means that their
methods of detecting spam vary.

Businesses which require email messaging for information
dissemination would find it helpful to know the different
methods used by spam filters. This will in turn help them tailor
there message's content as well as their mailing procedures.
Thus, being aware of spam filter programs can help in the
optimization of any internet campaign.

The most common type of spam filter is the Content-Based Filter.
This type of filter as the name suggests, looks on symbols,
words or phrases in the subject line, headers and content of the
message which are suspicious. The filtering process is very
dependent to phrases and words chosen by the user as spam, this
means that spam messages with words or phrases not included in
the list of the user will make it to the inbox time and again
unless the user creates another filter to deal with those words
and phrases. The good side of this filter is, it can be
fashioned in anyway the user wishes to.

Another type of spam filter is the Bayesian Filter, unlike
content-based filter; Bayesian filter undergoes 'training' where
the filter learns the difference between a spam and a legitimate
email. During this 'training' messages are broken into tokens
and these tokens are then stored in databases (tokens of good
messages are separated from those of spam). This type of filter
requires minimal maintenance and can adapt easily to users'
usual message, just like if the user is a medical practitioner,
anything that relates to medical field will be considered as
good. The primary drawback of Bayesian filter is that optimum
filtering will not take place immediately, since the filter is
dependent on the messages on which it is trained.

In addition, there is a Blacklist-Whitelist filter where the
whitelist is composed of the 'good' email addresses and the
blacklist is composed of email addresses believed to send spam.
This kind of filter ensures that received emails are from
whitelisted senders only and any address aside from the
whitelisted ones will be blocked. With this, email users can
expect a zero false negative. The main disadvantage of this
filter is that, whenever a real-time blacklist (RBL) is used,
there is a tendency that the whole IP is considered as spam
sender, though only a part of it used to send spam.

Challenge-Response Filter on the other hand sends messages to
unknown senders asking them to do further action/step to justify
their intention of sending the email. These further actions can
be a request for the senders' website to ensure that the email
is legitimate. This type of filter is quite applicable to low
traffic email users.

Community filter is another type of spam filter. This filter has
a central server where users can send suspected spam; the server
itself then saves the 'fingerprint' of the message to the
database. When enough users flagged the message as spam, the
'fingerprints' of the message will be blocked in the future. But
before a spam is blocked, many users have already opened it.

If your business makes use of email in sending promotional or
newsletters, you should at least know if your email address is
in the real-time blacklists so that you can apply for
whitelisting. And at least know the basic symbols, words and
phrases to be avoided in sending emails. Try visiting href="http://www.emailreach.com">www.emailreach.com for
more information about spam filters.

About the author:
Registered Electronics Engineer

Author: Roderick
Article:

New eBay Phishing mail scares users into revealing information

What do you do when you receive an email from an online
financial company that you regularly deal with, informing you
about the completion of a transaction that you never did in the
first place? There's a good chance you might lose your senses
for a short while. That's exactly what people behind this new
Phishing scam targeting eBay customers are hoping for!

The advanced AntiVirus, AntiSpam and Content Security solution
provider MicroWorld Technologies says a new email in circulation
tries to pilfer confidential account information of eBay
customers by sending them a tricky phishing mail. Appearing as a
routine confirmation message from eBay, it tells the recipient
that she has sent $249.20 to an email address at aol.com.

Then it shows a Transaction ID and Subject to numb the
unsuspecting victim. To view the details of the transaction, she
is told to click on a link. It ends with a 'thank you for using
eBay' line, deliberately used to aggravate the user. Once she
clicks on the 'view details' link, a new page opens up where her
account information will be captured by online criminals behind
the scam.


"At the end of the day, a phisher's goal is to make you visit
the spoof website of any reputable organization, and they will
try every trick in the trade to achieve this end," observes
Sunil Kripalani, Vice President, Global Sales and Marketing,
MicroWorld Technologies. "With so much awareness being spread by
various agencies and considerable coverage in mainstream media,
one would tend to think that it's hard to fool people in this
fashion any more. But the facts tell you a different story."


According to Sunil, Phishing scams still manage to loot millions
out of people's bank and other accounts every year, while the
far reaching impact of loss of personal information like Social
Security Number, Date of Birth and Mother' Maiden Name goes
largely unnoticed by many.

"The most disturbing trend in Phishing in recent times is the
rise of Man-in the-Middle Attacks which enable an online
criminal to sit live between the spoof site and the original,
and manipulate the stolen data to his advantage in real time. It
means a few seconds after the criminal gets the data from the
Phishing site, he loots the victims account. With customizable
kits available in the online grey market, even a not-so tech
savvy guy can run such an attack,"
explains Sunil.

MicroWorld Technologies provides highly advanced protection for
their users from Phishing mails and other spam mails by
employing a multi-layered email filtering mechanism. Its eScan
and MailScan range of products are used by over a million
customers worldwide in safeguarding their computers. *Phishing:
Identity Theft using spoofed emails

MicroWorld

MicroWorld Technologies (www.mwti.net) is the developer of
highly advanced AntiVirus, Content Security and Firewall
software solutions eScan, MailScan, and eConceal. MicroWorld
Winsock Layer (MWL) is the revolutionary technology that powers
most of MicroWorld products enabling them to achieve several
certifications and awards by some of the most prestigious
testing bodies, notable among them being Virus Bulletin,
Checkmark, TUCOWS, Red Hat Ready and Novell Ready.

For more information, please visitwww.mwti.net

About the author:
Btv Raj is the Content Writer and Creative Visualizer of
MicroWorld Technologies.

Author: btv raj
Article:

Who Else Wants Complete Protection From Computer Viruses?

With simply a computer and an Internet connection you can access
an infinite number of Web servers, Web pages, individuals from
across the globe and other digital entities from around the
world but it also endangers your PC and the confidential data it
contains about you.

Every day of the week virus, spyware, and adware creators come
up with new, ingenious ways to gain access to your PC. These
simple pointers will help keep the hackers at bay:

Stop and think before you click: Downloaded files that end with
.exe, .com, .bat, and .scr, (also files with .doc and .xls
extensions), can render your computer completely useless with a
single click. Many e-mail programs block access to any
attachments so take the extra time and think for a few seconds
before you decide to open it or not.

Use an anti-spam filter: Most viruses and spyware are installed
by various methods of Internet browser hijacking however, e-mail
is still a very common source. Use of a junk-mail filter will
significantly reduce the likelihood of running harmful scripts
contained within messages.

Keep your antivirus software up to date: Using antivirus
software that has expired past it's subscription period is
definitely not an option: Not only do you lack the crucial virus
database updates, but you expose your system to malware that
targets known flaws in antivirus software.

Prevention against WORMS and Viruses: Install antivirus
software, update regularly, and use it regularly. Never open
unsolicited e-mail attachments with the file extensions VBS,
SHS, or PIF.Disconnect your network or modem cable when you are
not using your computer.

Antivirus software is software that is installed on your
computer that protects you from viruses. Antivirus software
programs contain in the region of 40,000 - 100,000 "malicious
software definitions" that are updated on a daily or as needed
basis.

I highly recommend Grisoft AVG Anti-Virus (Free) for antivirus
protection.

If in doubt try online: You should only install and use one
single antivirus program at a time on your computer because
multiple antivirus programs will conflict with one another and
cause your computer to completely grind to a halt. If you have
any doubt about your antivirus program's effectiveness, you can
use a free online virus scanner, such as Panda Software's
ActiveScan) or Trend Micros HouseCall.

Download with care: Any program you download and run on your
computer system could potentially result in spyware or virus
infection. Download software only from reputable online sources
that guarantee that all software is free from malicious
software.

Use a two-way firewall: Windows XP and Vista each come with a
firewall that blocks unwanted or unexpected incoming traffic; it
is enabled by default in Windows XP Service Pack 2 and later.
However for the best protection possible, you will also want to
block unwanted outgoing connections made by spyware, viruses and
scripts on your PC that attempts to either connect to a remote
server or send out spam.

Windows Vista's firewall does have that fucntionality, but
configuring it is not entirely simple enough for the average
Windows user. Instead, you can get one of several free
bidirectional firewall programs, such as Zone Labs ZoneAlarm
Free, or Agnitums Outpost Firewall Free.

Make use of antispyware program: Anyone who uses a computer can
succumb to spyware infection. In fact, 9 out of 10
Internet-connected PCs are infected with some kind of virus.
Spyware can be any application that tracks your online or
offline PC activity, serves you adverts, redirects your pages
and bombards you with pop-ups. If you use the Internet, its
possible that some form of virus threats are already active at
work on your PC system.

Spyware can ocassionally go unnoticed however, it is more likely
that you will notice that it is present on your computer system
due to the obvious symptoms that your computer may experience.
It is EXTREMELY difficult to get rid of but not entirely
impossible.

Even if you suspect you have successfully removed an unwanted
program manually, a remaining dormant file can trigger a
complete reinstallation the next time you restart your computer.
And as a survival tactic, spyware programs often leave similar
traces elsewhere on your system so you can often never eliminate
it completely after only one attempt.

Spyware, adware, and some scripts / trojans slow down your
system, cause crashes, and track your online activity.
Antispyware utilities work much like antivirus software,
detecting and removing the unwanted software from your PC.

One free tactic you can employ is to upgrade from Windows XP: As
Microsoft service Pack 2 makes Windows XP much safer, although
the operating system still has many security flaws which can be
exploited, and it remains prime target for spyware creators.

If you still have a href="http://www.slowcomputerhelp.com">slow PC after trying
the software above and you think it may be due to spyware, you
can find more help and information on fixing your href="http://www.website.com">slow computer at href="http://www.slowcomputerhelp.com">Slow Computer Help.

About the author:
Steve Ross is a Microsoft certified computer technician and has
developed many solutions for beating Spyware, computer Viruses
and Adware. More information on his techniques can be found at
Slow Computer
Help
.

Author: Steve Ross
Article:

Prevent and Get Rid of Spyware Now

The best way to get rid of spyware is not to get it in the first
place. To avoid getting spyware on your computer, beware of
certain kinds of sites. Peer to peer (P2P) is almost a guarantee
for getting spyware. You think you're downloading your favorite
band's new song, but you don't know what is attached to that.
Porn sites are loaded with spyware and adware; beware of what
you're viewing and what you're getting because of it.

Certain browsers are more susceptible to spyware than others.
Because internet explorer (IE) is the most used internet
browser, it is the most targeted for spyware. Vulnerabilities
and unpatched security holes can allow spyware to infiltrate
your system without your knowledge. Use Firefox instead as it is
more secure and has plug-ins designed to eliminate spyware
sneaking in.

Email is another way to leave your system open to spyware.
Double check who the sender is and never click on open
attachments. If it looks like spam, don't bother opening it. If
you open some spyware it might send it to your whole address
book so make sure to check your emails before opening them.

Beware of the free software you're downloading. A comment trick
spyware distributors use is linking it with free software. Never
download anything unless you need it and know the source is good
and well trusted. A lot of spyware programs are offered using
annoying pop-ups that end up in your face. Take the time to
download a pop-up blocker and rid yourself of both the annoyance
and the possible danger.

Once you have spyware, your computer will be much slower.
Spyware uses hard drive space to run on so a slow computer is
often a sign that you have spyware. If you're having lots of
annoying pop-ups (more than usual), you may have a problem with
spyware. If strange new sites come up in your favorites or your
default settings are changed, that is a clear warning. If you
have any of these symptoms or several of them, you should
definitely be wary of a spyware problem.

Get spyware software from a trusted site and scan your computer
every couple weeks. Some programs work by blocking the spyware
from installing on your computer. Others work by scanning your
computer every day, week, or month and erasing the spyware
already installed. Whichever method you choose, still use
precautions while surfing the net to avoid spyware altogether.

About the author:
For more information visit href="http://lose-weight-review.blogspot.com/">Weight Loss and
Fitness and href="http://alphadawg.bezoogle.com/pp/weight-loss/">Better
Health and Fitness.

Author: Ashley Bigham

Article:

How to Avoid Phishing Scams

Phishing scams can sabotage a user's personal information and
lead to multiple problems in safeguarding confidential
information. Phishing scams are on the rise as more people turn
to the internet for online banking, shopping, and other
financial transactions that are connected to their personal bank
accounts. As a result, hackers and criminals are taking steps to
catch these consumers as they enter information. A common
phishing tactic is to pose as a legitimate company and lure
visitors to a website; the user is asked to enter their login
information but do not realize they are sending this information
to a third party instead.

A phishing attack can have dangerous consequences, but there
are many ways to avoid title="Delete Spyware" target="_blank">phishing scams.
Phishers generally request immediate action, adding a sense of
urgency to each and every message. Knowing how to identify these
messages will help reduce or eliminate your risk as a phishing
target. The first step in avoiding phishing scams is to double
check the source of any e-mails. If you need to call the company
or financial institution to verify the source, then take the
steps to do so. It's important that you never share account
information over the internet, unless you are 100% sure the site
is secure and it is for a legitimate purpose. It's a good idea
to check your bank accounts on a regular basis, and learn about
any fraudulent behavior.

Many phishing attacks take place through bulk e-mail requests,
and these may or may not end up in your spam folder. Although
many large financial institutions send out bulk e-mails, it's
important to white list as many of these companies as possible.
This can help you sort through the legitimate correspondence and
any fraudulent ones, reducing your risk overall. Always be sure
never to fill out and send back personal information within an
e-mail, unless it has been verified or requested by a real
person. These are ideal ways for phishers to find victims,
especially when you are asked to enter personal financial
information.

It's important to be vigilant about e-mail links. This is the
primary tactic used by many phishing scams to redirect you to
another page. A link out of any e-mail may take you to an
insecure site or network, and it's likely that these sites are
also monitored or being recorded. If you are not well-protected
with the appropriate security software, you are increasing your
risk even further by visiting these potentially threatening
sites. Make sure you are using secure website software to
monitor web browser activity as often as possible.

Another strategy to prevent phishing scams is to make sure your
browser and computer are up to date, and that you have
downloaded any necessary security patches. You can avoid
phishing attacks simply by keeping your computer and performance
in good order. Reporting phishing attacks as often as possible
will also help reduce your risk of attack; when you detect
fraudulent behavior, be sure to contact the authentic site's
administration to report the incident or incidents.

About the author:
For more information pertaing to phishing, spyware, viruses
etc... Please visit http://www.deletespyware.ws

Author: Joshua
Article:

2007 - Top Ten Antivirus Software Programs Reviewed

Protecting your computer from a virus is getting more difficult.
Antivirus software is essential to a computer's ability to fend
off viruses and other malicious programs. These products are
designed to protect against the ability of a virus to enter a
computer through email, web browsers, file servers and desktops.

The programs reviewed below are the best from around the world.
In the United States we are familiar primarily with the Norton
and McAfee Antivirus programs, but there are many good programs
out there that merit serious consideration.

Top 10 Recommended Antivirus Software Programs

Below are my ten top antivirus software programs for 2007.

For a much more detailed comparison chart on these products you
can refer to
HREF=http://www.zunio.com/comparisons/antivirus_review.html>http:
//www.zunio.com/comparisons/antivirus_review.html

1) Editor's Choice: BitDefender Softwin, which owns BitDefender,
has been around since 1990, and boasts an international team of
technical experts who strive to continually improve software and
respond to new threats. 2) Kaspersky Founded in 1997 by Eugene
Kaspersky, the Moscow-based company has had great success
leading the industry in anti-virus protection

3) Norton Anti-Virus Owned by global security giant Symantec,
Norton Antivirus is by far the most popular and widely used
security system in the United States. Norton offers a small
range of products for the home user, small business owner and
large corporation with 1000+ users.

4) McAfee McAfee is another big name in Internet security and a
large competitor for Norton Antivirus, although their prices are
virtually the same.

5) F-Secure Based in Helsinki, Finland, F-Secure has been in the
computer protection business since 1988. The company offers
protection for the family computer, to home office users all the
way up to corporations with large numbers of telecommuters
spread all over the map.

6) Shield Anti-Virus 2007 PCSecurityShield offers protection
against viruses, hackers and privacy threats to help keep you
and your family surfing safely.

7) Protector Plus Proland Software offers virus protection with
its Protector Plus package, compatible with Windows Vista, XP,
Me, 2000 and Netware. Protector Proland is proud of its team of
experienced engineers, who have been working on anti-virus
software and computer protection programs since 1989.

8) DefendGate Canada-based DefendGate offers everything from
protection against viruses and identity theft to office
productivity suites and desktop accelerators.

9) PC DoorGuard This program is PC DoorGuard is designed for
those looking to protect their email from spam, viruses, Trojans
and worms.

10) CA Antivirus On its website, CA Antivirus says it provides
software to 98 percent of Fortune 500 companies and boasts that
it was the first antivirus software to be awarded certification
with Microsoft Vista in 2007.

Virus Prevention - Steps to take

A computer user should remain diligent and follow a few simple
steps to protect against the threat of a virus:

1. Evaluate your current computer security system. With the
threat of a new generation of viruses able to attack in a
multitude of ways, the approach of having just one antivirus
software version has become outdated.

2. Only install antivirus software created by a well-known,
reputable company. Because new viruses erupt daily, it is
important that you regularly update your antivirus software 3.
Make it a habit to always scan all new programs or files no
matter from where they originate.

4. Exercise caution when opening binary, Word, or Excel
documents of unknown sources especially if they were received
during an online chat or as an attachment to an email.

5. Perform regular backups in case your system is corrupted. It
may be the only way to recover your data if infected.

(c) 2007 Zunio.com

About the author:
Sue Dingerson writes computer software reviews for consumers.

For a more detailed review click on href="http://www.zunio.com/comparisons/antivirus_review_article.h
tml">Zunio.com 2007 Antivirus Software Review

Ten Secrets For a Killer Website

With millions of competing websites, designing a website, let
along a successful website with a high ranking, can be quite
daunting. The following "Ten Secrets for a Killer Website" will
help give you an edge on your competition:

1. Custom vs. Templated - A Custom website is a website that is
totally designed and formatted with original material. A
Templated website is constructed from a list of premade designs
and formats that you pick from. Which is the best route to go?
If you are interested in attracting customers to your site and
converting them to a paying customer, then a custom website is
the only way to go. A Templated website does not receive a high
search engine ranking in Google or Yahoo. Search engines do not
like sites that are duplicates of other sites, so they give them
a far less ranking. What is the use of a website if people can't
find you? A Custom site gives you a uniqueness that fits your
business and message. A templated website restricts you in
choice of colors, images, and layouts. Custom is the best way to
go.

2. Fonts, Content, and Placement - Do not use font sizes that
are too small. You should use 10 point or larger. Smaller font
sizes are too difficult to see and read. Never run more than 52
characters across the screen, so as to not lose the reader. That
is why news print is in narrow columns. It is easier to read.
Pick a font style that is widely used on the Internet and
personal computers. If you are using too fancy of a font, the
text becomes difficult to read. Some safe fonts to use are Times
New Roman and Arial. These are fonts that are available on most
all computers. If you use a font that is not supported by a
user's computer, they will not see the text in the font you
chose. They will see it in the font that is set to default on
their computer. It is very important to use only common fonts.
Make sure that the content (text) of your site is useful
information; information that your customer can use. Place your
most important content towards the upper left-hand corner of
your site. Research has shown that your visitor will start in
the left hand corner of a website and move across the page to
the right and then down. Use bolding and larger font size to
draw attention to a phrase or word. Do not use underlining, as
it has come to communicate that the underlined text is a
hyperlink. All of your text should be flush left and not
centered. It is more difficult to read if it is centered. Use
good headlines and subtitles to draw attention to an area.

3. Advertising (PPC) - Once you have a website, how are people
going to know about it? It is interesting that some people have
this idea that once they have a website up and running that
customers will flock to it. "Well," they say, "I now have a
website and people will do a search and find me there and come
to my site." Don't be fooled! How many other competitors do you
have selling your same product on the Internet? Let's say that
you sell printed business cards. So if you do a Google search on
the keyword phrase "Business cards printed," you'll find that
there are 20,700,000 listings for that search. That means that
there are over 20 million other sites competing for that
searcher's attention. How in the world can you compete with
that? Well, if you notice on the first few pages you'll see
"sponsored links". Some are in the top left section, and some
are down the right side of the page. These are your competitors
that are paying to advertise in top positions on Google. Does it
work? Absolutely, or you wouldn't be seeing so many every time
you do a search. These ads are called "paid per click" (PPC)
ads. This means that every time someone clicks on their ad,
Google charges them. Some ads can be as cheap as 10 cents per
click, and some can be as expensive as $20 a click. It is the
advertisers that determine the cost based on what they are
willing to bid for a position. The stiffer the competition, the
higher the bid price. You can learn more about PPCs by going to
http://adwords.google.com.

4. Keyword Frequency - It is important to use your main
keywords or phrases (words and phrases that people search on) in
the body of your text, as close to the top of the page as
possible. Search engines look at the website text, from top left
to right, to determine the relevancy of the site for ranking it
for the keyword searched for. Becareful to not load up on a lot
of duplicate words that don't make sense. Search engines don't
like that and will score you lower for trying to put too many of
the same word in your text.

5. Relevant Links - One of the aspects of getting a higher
ranking with Google and Yahoo is linking your website with
quality, reputable sites. The search engines are looking for
websites (hopefully yours) that provide the information that a
searcher is looking for. This is one of the areas the search
engines evaluate. Is your website linked from other relevant and
quality websites? For example, if your website is a hotel
reservation site, some good links to acquire would be car
rentals, restaurants, airport transfer services, art galleries,
etc. These should be links that are useful to the traveler. You
should consider links that are not necessarily competitors, but
supportive services to your business.

6. Flash Movement - Flash-based components add movement, sound,
and interactivity that usually cannot be achieved with a
standard static html website. Flash enhances the experience for
your visitor. It grabs their attention and helps make a rich
presentation to drive your message. With custom Flash you have
almost limitless design options. It allows you to provide a
variety of graphics, tutorials, film clips, and introductions,
has the state-of-the-art technology and professional look about
it. It creates an interactive environment. Generally, you will
not have this with a templated site.

7. Call to Action - Imagine walking into a retail store where
no one helps you, there are no "50% off" signs anywhere and
basically nothing there to motivate you to buy their product.
That is what happens when you put up a website with no "call to
actions" on it. A call to action is a reason for your visitor to
sign up or purchase your product or service. Call to actions are
very important in content and placement. A typical visitor to
your site is only there for a few seconds, so you need a "hook"
and a "call to action" to keep them there and motivated to buy.
It is important that you satisfy what they came looking for. If
they came looking for a nice picture for their office, you must
give them a reason to purchase your beautiful print and to
purchase it today. Remember they may have been shopping several
other sites before they landed on yours. Give them a special
deal if they purchase today. Do a two for one. Give them a free
article or eBook for signing up.

8. Contact Information - Make it easy for your visitor to
contact you. Your phone number and email information should be
prominent on each of your pages. You also need to give them a
reason to contact you. Ask yourself this question, "Why should
they call or email me?" Give them a reason. Take a look at the
websites you visit. What motivates you to fill out their form
with your information? There are a lot of sites that don't ask
for the visitor's information. What is the purpose of a website
anyway? Basically, it is to sell something or to provide useful
information. How are you going to sell something if you don't
have a way of communicating directly with your customer? These
are important questions to ask as you design your website.

9. Auto Responders - An Auto Responder is an email program that
captures your customers contact information from a form on your
website and automatically sends periodic emails from you. These
are emails that you have previously drafted and tell the Auto
Responder Program how often to send them. You can send out
emails to new contacts, your customer list or a list that you
purchase from a list copy. Statistically, these are your best
leads for converting sales. An Auto Responder gives you an easy
way to stay in contact with them. It is important that the
information you send them has value and substance to it.
Generally, people won't mind receiving an email from you if it
is something they can learn or use. For more information on auto
responders go to these sites: www.aweber.com;
www.activecampaign.com.

10. Images and Graphics - Graphics and Images are extremely
powerful in leading the eye through your landing page. They
should not just be there to make a site look pretty, but to push
actions and indicate eye pathways. An appropriately placed image
can draw attention to a headline or title. You should consider
making your images a clickable link because visitors tend to
click on them. You could show a larger pop up image or more
information about the offer or product. The type of image needs
to have purpose with your page. Don't just throw any image on
the page. It needs to fit in with your theme. Images of nice
looking people looking directly at you seem to attract more
attention and give the visitor a warmer feeling than objects. If
you are selling a product, make sure you have a very clear and
quality type image of the product. Customers want to see what it
is they are buying. It is also important to keep your image file
size small. The larger the file size, the longer it takes to
load the image to the site. Remember, the average visitor is
only there for a few seconds. If your site is loading slowly,
they will move on. Also, when you are saving your image to a
file, try to save it as close to the same size as you will be
displaying on you site. Trying to take a large sized image and
squeezing it into a small sized image on your site creates a
picsolated (grainy looking) picture.

Brad Stone is CEO of Heritage Web Solutions, a USA Based
Company, specializing in Designing and Hosting Affordable
Websites for Small and Medium Size Businesses. With a staff of
over 160 employees, Heritage Web Solutions has grown to a
multi-million-dollar company in just 4 years, achieving a Top 1%
National Ranking as reported by WebHosting.Info. For more
information, call 866-754-1474, or visit
www.heritagewebdesign.com.



About the author:
Brad Stone is CEO of Heritage Web Solutions, a USA Based
Company, specializing in Designing and Hosting Affordable
Websites for Small and Medium Size Businesses. With a staff of
over 160 employees, Heritage Web Solutions has grown to a
multi-million-dollar company in just 4 years, achieving a Top 1%
National Ranking as reported by WebHosting.Info.

For more information, call 866-754-1474, or visit
http://www.heritagewebdesign.com

Article:

To Spam or Not To Spam: Is That A Viable Question?


To Spam or Spamming is the abuse of electronic messaging systems
to send unsolicited bulk messages, which are generally
undesired. The most widely recognized form of spam is Email
Spam: otherwise referred to as Unsolicited Bulk Email or Junk
email. Email Spam is both unsolicited by the recipient and sent
in substantially identical form to many recipients
simultaneously or over a period of time. Spam or Junk email can
be either commercial mail such as an advertisement or
noncommercial such as a chain letter or a joke.

The origin of the term "spam" is rather interesting as it
actually came into being long before email reached it's current
popular form. As you know, spam is a form of canned meat sold by
Hormel. The term "email spam" actually originated from a Monty
Python sketch. During the 25th show of Monty Python's Flying
Circus, a three and a half minute sketch was played. The scene
was set in a restaurant referred to as the Green Midget Cafe in
Bromley and centered around a disagreement between a waitress
and a customer. Almost every menu item had spam as one of the
main ingredients. The customer did not want anything with spam
in it: thus, an argument ensued that repeated the word spam some
132 times.

The menu is shown below so you will appreciate the humor aimed
at Hormel's now famous spam.

Egg and bacon Egg, sausage and bacon Egg and spam Egg, bacon and
spam Egg, bacon, sausage and spam Spam, bacon, sausage and spam
Spam, egg, spam, spam, bacon and spam Spam, spam, spam, egg, and
spam Spam, spam, spam, spam, spam, spam, baked beans, spam,
spam, spam and spam Lobster thermidor aux crevettes with a
Mornay sauce garnished with truffle paté, brandy and with a
fried egg on top and spam Spam, sausage, spam, spam, spam,
bacon, spam, tomato and spam (this is only in the radio
version's menu, but the TV version features the Hungarian trying
to order it)

The phenomenon, some years later, of marketers drowning out
discourse by flooding Usenet newsgroups and individuals' email
with junk email advertising messages was named spamming,
recounting the repetitive and unwanted presence of Spam in the
sketch.

There are several types of spam in use by spammers all over the
world. Not one single country or location can claim fame to
control the wide use of spam. According to Sophos, a security
software developer, the major sources of spam from April to June
of 2006 were the United States (accounting for 23.3% of messages
sent), while China accounted for 20.0% and 7.5% from South
Korea. By continent, Asia leads the pack at 40% followed by
Europe at 27% and then comes the USA at 26%.

And according to information compiled by Spam-Filter-Review.com,
email spam can be broken down by category. Products leads the
way with 25%, then Financial scams at 20%, Adult-19%, Scams in
General-9%,Health-7%, Internet-7%, Leisure-6%, Spiritual-4% and
all other amounted to 3%. My personal experience is that I
receive on average of 5-6 Financial scams daily and sometimes
more. Fortunately for me my ISP spam filters eliminate the
majority of the hundreds of spam emails daily before they reach
my Outlook in-box.

Spam violates the AUP (Acceptable Use Policy) of almost every
ISP (Internet Service Provider). If you are considering a bulk
email campaign, be aware that you are putting yourself in
jeopardy of loosing you ISP account as most will enforce their
AUP. And all it takes in most cases is just one complaint from a
disgruntled spam recipient.

The quantity of spam is staggering. Sometimes it depends on who
you are but Bill Gates receives 4 million emails a year and most
all of them are spam. And then the guy who owns acme.com
receives over one million spam emails per day. In the year 2005,
30 billion spam emails were sent every day, 2006 it grew to 55
billion, 2006 it jumped again to 85 billion pre day and in
February of 2007 it is shown to continue it's growth to more
then 90 billion spam emails per day. It is speculated that over
90% of all emails sent are spam emails!

Although spam laws are being passed in most major countries, it
is obvious that another deterrent needs to be developed.
Countries taking affirmative legal action by passing anti-spam
laws include:

-The Untied States-CAN_SPAM Act of 2003 -Australia-The Spam Act
of 2003 -The European Union-Directive-Article 13- The member
countries are Austria, Belgium, Bulgaria, Cyprus, Czech
Republic, Denmark, Estonia, Finland, France, Germany, Greece,
Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta,
Netherlands, Poland, Portugal, Romania, Slovakia, Spain, Sweden,
and the United Kingdom.

Even though there is a concerted effort throughout the world to
curb spamming, legislative efforts have been for the most part
ineffective and counter productive. As an example the CAN-SPAM
Act of 2003 requires that each email have a way for the
recipient to opt-out of the senders list. Most believe that if
you opt-out to a spam email, you are doing nothing more then
confirming to the spammers that they have reached a working
email address. In 2002, the Center for Democracy and Technology
found that 16% of websites tested with opt-out requests
continued to spam.

To Spam or Not to Spam: well, you be the judge for yourself. The
biggest concern I think one should have is loosing their ISP
accounts. I have heard of spammers just going form one to
another or having multiple ISP accounts to insure that they will
maintain up time.

Hope you didn't find this too long but the more research I did
for this article, the more practical information I found to
include for your reading pleasure.

About the author:
Jimmy Oakley-Author-2007- Jimmy is an Internet Marketer that
discount markets the Premier Email Marketing and Internet
Marketing Courses online. The courses he markets are continuosly
updated and never outdated. Learn the right ways of marketing on
the Internet by visiting
http://www.makeyourlivingonlinetraining.com now and learn
Internet Marketing techniques found nowhere else.

Botnets: The Story of How My PC Became a Zombie!

Botnets: The Story of How My PC Became a Zombie!

Several weeks ago, I received a call from my ISP's Security
Department. The lady, who was a little short on etiquette,
launched into this short story about having to suspend my
account due to the fact that someone had hijacked my email login
and password. Well, I was at that time not on the Internet but
was at my desk so I cranked up the old PC and hit connect on my
DSL icon. Well, that's as far as I got: there was no way I was
going to connect using my ISP's icon.

Oh no, "Don't tell me I have been relegated once again to using
a dial up account," I said to myself. My DSL is slow enough as
it is and I have the fastest available broadband connection
there is so I can't imagine how slow dial up is going to be?

The Security Agent told me that all was not lost. But there were
certain things that I had to do in order to "plug the hole" that
the hacker had crawled through. The first thing I had to do was
to make sure that my firewall was activated and working
properly. And if I did not have a firewall, I was going to have
to find a suitable one and upload and install it to my system.
In my case, I already have a firewall in place: however, I did
go into preferences and set the filters to high, which makes
them quite a bit more sensitive and makes my PCless vulnerable
to a hackers breaking through the protection that is in place.

Although I had only recently changed my password for access to
this account, I also had to do so again. Actually, once Security
reactivated my account, they had already switched passwords for
me so all I had to do is go in and change it to something I
wanted.

As a next step, if I did not have a current and up to date virus
protection program, I would have to buy and install one of those
too. This crook of a hacker could have cost me a couple of
hundred dollars in hard cold cash just in software costs alone,
not to mention the damage he was doing by controlling my PC
email and using my bandwidth. Fortunately, I also had a current
anti-virus software program running so I did not have to buy
one. (A Lot of good it did me, huh? I guess everything has its
weaknesses.)

The primary reason my ISP chose my account to shut down was due
to the fact that my account had all of a sudden received several
thousand complaints. The assumption is that the hackers used a
botnet of zombies to compromise my email account in order to
send out a large quantity of spam emails, many of which filed
complaints with my ISP. I didn't know about this sort of thing
before but found that it is quite normal for hackers to gain
access to a remote computers email account, then set up fake
email addresses and then they hit the send button and plaster
the Internet with their viruses, worms or Trojan horses. In my
case, there about 15 bogus email addresses on my account. They
must have sent out hundreds of thousands of spam emails from my
email address before my ISP was tipped off.

Unknown to me, my computer had been enlisted into a botnet (a
collection of robots or bots which run autonomously). The term
botnet generally refers to a collection of compromised computers
running programs. These botnets are run in the background so the
average computer user is not aware of their presence until
notified by their ISP Security people like I was. Each computer
that is compromised is referred to as a zombie computer. Zombie
computers are machines that have been compromised by a super
cracker, a computer virus, or a Trojan horse. A botnet (network)
is made of a multitude of zombie computers, often times hundreds
of zombie computers.

Zombies are used extensively to send email spam: in 2006 an
astounding estimated 80%-85% of email spam was delivered by
botnets through their zombie computer networks. When a spammer
uses a zombie computer to send spam email, it allows them to
avoid detection and also reduces their bandwidth costs as they
are using your email account to send these nefarious spam
emails. So there is also theft of services involved with botnets
hackers.

If you are notified that your system has been compromised there
are ways to rid yourself of the zombie designation. The very
first thing, as mentioned, is to ensure that you have an
anti-virus program running and that your anti-virus software is
current and up to date. You must make sure that you have set
your software up to update automatically in order for it to be
able to catch the most recent viruses that may infect your PC.
Then you need to run your virus protection program and clean out
any virus that is found. If you do not have an anti-virus
program or if you have a hard time spending the $50.00 or more
most software companies will charge you, then may I recommend
that you go to AVG dot com and download their free anti-virus
software. It is reputed to be every bit as good as the paid
kind. Actually, I recommended to my daughter recently that she
install AVG and she is delighted with it.

Another critical step to take is to ensure that you also have a
firewall set up to protect your PC from hacker attacks. The
firewalls main function is to isolate one network (compartment)
from another in your PC but still allow traffic to flow but to
make a long story short, it detects an attempt by a hacker to
access and control your system and blocks same from doing so. If
you need a firewall but have a hard time digesting the cost of
the more popular brands, then may I suggest that you go to
zonealarm.com and download their free firewall software. You may
also wish to check out the Comodo free firewall software which
can be found by going to personalfirewall.comodo.com.

In order to learn more about these topics, you wish to run a
keyword search for botnets, zombie computers, spammers or spam
email or any other appropriate term you can think of. Thanks for
reading!

About the author:
Jimmy Oakley-Author-2007- Jimmy Oakley is an Internet Marketer
that markets many of the most sought after Advance Email
Marketing and Internet Marketing Courses online: the courses he
markets are continuosly updated and never outdated. Learn the
right ways of marketing on the Internet at the most acceptable
prices you will find! Visit his Grand Slam Special Event now!
Jimmy invites you to visit
http://www.theinternetbizwizards.com/spg1.ht

Author: Jimmy Oakley

Article:

Saturday, 16 June 2007

10 Scams to Screen from Your Email

10 Scams to Screen from Your Email

1. The “Nigerian” Email Scam
2. Phishing
3. Work-at-Home Scams
4. Weight Loss Claims
5. Foreign Lotteries
6. Cure-All Products
7. Check Overpayment Scams
8. Pay-in-Advance Credit Offers
9. Debt Relief
10. Investment Schemes

source: http://onguardonline.gov/spam.html

Wednesday, 13 June 2007

SPAM vs HAM

What do you think when someone talk about SPAM and HAM ?

For me, I know SPAM is unwanted or junk e-mail, HAM is good e-mail. For Non-IT , SPAM and HAM is just food . Let see this.


Tuesday, 12 June 2007

What's Spyware?


Software that sends information about your Web surfing habits to its Web site. Often quickly installed in your computer in combination with a free download you selected from the Web, spyware transmits information in the background as you move around the Web. Also known as "parasite software," "scumware," "junkware" and "thiefware," spyware is occasionally installed just by visiting a Web site


What's signal your computer is infected spyware. ?

1. see pop-up advertisements all the time.
2. settings have changed and I can't change them back to the way they were
3. web browser contains additional components that I don't remember downloading.
4. computer seems sluggish.

How to prevent your computer from spyware ?
1. Enable a firewall
2. Update your software
3. Tune your Internet Explorer secuiry settings, Microsoft recommends that you set the security settings for the Internet zone to Medium or higher.
4. Download and install antispyware protection
5. Surf and download more safely

Saturday, 9 June 2007

Postfix and Spamassassin:

Postfix is a widely used mail transport agent (MTA) used on many popular Unix/Linux systems. Nowadays, networks are overwhelmed by SPAM mail, fortunately, there is a way to filter them with software such as spamassassin.



1. Getting Started



If your SMTP server running with postfix. There is a couple of package we need to install: spamassassin and its client spamc



$sudo apt-get install spamassassin spamc



spamassassin package includes a daemon which can be called by user programs such as procmail... but can also be integrated into a Mail Transport Agent such as postfix.


2. Using spamassassin as a standalone daemon


In this part of the tutorial, we are going to make spamassassin run as its own user (default on debian sarge is root), configure some settings and make postfix use spamassassin as an after-queue content filter, which means that the content is going to be filters through spamassassin after postfix has dealt with the delivery.


2.1. Setting up spamassassin


Installed spamassassin from debian repository, on default settings, spamassassin runs as root user and is not started. To fixed the problem, to create a specific user and group for spamassassin. As root user, run the following commands:



#groupadd -g 5001 spamd
#useradd -u 5001 -g spamd -s /sbin/nologin -d /var/lib/spamassassin spamd
#mkdir /var/lib/spamassassin
#chown spamd:spamd /var/lib/spamassassin



Change some settings in /etc/default/spamassassin and make sure you get the following values:

ENABLED=1 SAHOME="/var/lib/spamassassin/"

OPTIONS="--create-prefs --max-children 5 --username spamd --helper-home-dir ${SAHOME} -s ${SAHOME}spamd.log"

PIDFILE="${SAHOME}spamd.pid



When run spamd daemon as user spamd and make it use its own home dir (/var/lib/spamassassin/) and is going to output its logs in /var/lib/spamassassin/spamd.log


2.2. Configuring spamassassin


Setspamassassin some rules. The default settings are quite fine, but you might tweak them up a bit. So let's edit /etc/spamassassin/local.cf and make it looks like that:




use_bayes 1
use_bayes_rules 1
# Enable Bayes auto-learning
bayes_auto_learn 1
# Enable or disable network checks
skip_rbl_checks 0
use_razor2 0
use_dcc 0
use_pyzor 0



Here, we set spamassassin' spamd default settings to rewrite email subject to [***** SPAM _SCORE_ *****], where _SCORE_ is the score attributed to the email by spamassassin after running different tests, only if the actual score is greater or equal to 2.0. So email with a score lower than 2 won't be modified.


To be able to use the _SCORE_ in the rewrite_header directive, we need to set report_safe to 0.


In the next section, we tell spamassassin to use bayes classifier and to improve itself by auto-learning from the messages it will analyse.


In the last section, we disable collaborative network such as pyzor, razor2 and dcc. Those collaborative network keep an up-to-date catalogue of know mail checksum to be recognized as spam. Those might be interresting to use, but I'm not going to use them here as I found it took long enough to spamassassin to deal with spams only using it rules.


Start spamd with this command:


#/etc/init.d/spamassassin start



We are almost done, we still need to configure postfix in such a way that it will pass all mails delivered to local mailboxes to spamassassin.


3. Make Postfix call Spamassassin


Now, we need to tell postfix to use spamassassin. In our case, spamassassin will be invoked only once postfix has finished with the email.


To tell postfix to use spamassassin, we are going to edit /etc/postfix/master.cf and change the line:


smtp inet n - - - - smtpd


to:



smtp inet n - - - - smtpd -o content_filter=spamassassin



and then, at the end of master.cf, let's add:


spamassassin unix - n n - - pipe user=spamd argv=/usr/bin/spamc -f -e /usr/sbin/sendmail -oi -f ${sender} ${recipient}


and here we go, our spam filter is setted up, we need to reload postfix settings and everything should be ready.


#/etc/init.d/postfix reload


 


 

Anti-Spam for Outlook Express (Episode #2)

SPAMfighter Standard if you are looking for a Outlook/Express tool to remove spam from your inbox, look no further. SPAMfighter is the tool you are looking for. Simple, reliable and efficient.
A lot of anti-spam products rely on filters and other rule based technologies, but spammers work every day to stay out of these filters. What works one day doesn't work the next. SPAMfighter Standard is an Outlook utility software that filters spam and phisning attempts.


SPAMfighter works completely different. SPAMfighter is using the power of a very large community of people that instantly report if they receive a spam mail. When several people have reported the same spam mail, it's automatically filtered for the rest of the community.


The key features of "SPAMfighter Standard":



  • SPAMfighter Standard is 100% free for private use· Award winning spam blocking technology· Protects against "phishing", identity theft, and other email fraud· Used by more than one million happy users around the World· Protects all the email accounts on your PC

  • Unique language filtering tool that empowers you to stop emails written in specific languages· Unique picture filter that can recognize spam which is sent as a picture· Automatic "real mail" protection - means no lost business mails!· Blacklist domains and emails

  • Spam Abuse Reporting with one click· Automatic Whitelist management· Privacy Guaranteed - we don't see any of your email· Does not filter based on simple phrases or "trigger" words. Allows any content

  • Language support: English, German, Spanish, Chinese, French, Italian, Greek, Dutch, Swedish, Norwegian, Suomi, Russian, Bulgarian, Portuguese, Japanse and Danish


System Requirements:


  • Email client: Microsoft Outlook, Outlook Express and Windows Mail

  • Memory: 64 MB minimum

  • Disk Space: 10 MB


Limitations:


  • SPAMfighter Standard is 100% free for private use.


Anti-Spam for Outlook Express

If you face spam while using MicroSoft Outlook, Outlook Express or Eudora.

you may try Spampal for filtering spam .

System Required:

  • A machine running Windows 95, 98, ME, NT, 2000, 2003 or XP.
  • A POP3 or IMAP4 mailbox.
  • A standard email program such as Outlook, Outlook Express or Eudora

How does SpamPal work?

SpamPal sits between your Outlook express and your mailbox, checking your email as you retrieve it. Any email messages that SpamPal detect to be spam will be "tagged" with a special header; you simply configure your email client to filter anything with this header into a separate folder and your spam won't be mixed up with the rest of your email anymore!




Q: how does SpamPal know what is spam and what isn't?
A: It uses what are called DNSBL lists. Patterned after the famous MAPS RBL, these are lists of parts of the Internet that in one way or another facilitate spam.


Any email you get from a machine on one of these lists has an increased probability of being spam. Some ISPs already block all email from machines on some of these DNSBL lists, but many do not.

How to protect your e-mail address from spammer.

• Only share your primary e-mail address with people you know. Avoid listing your e-mail address in large Internet directories and job-posting Web sites. Don't even post it on your own Web site
• Set up an e-mail address dedicated solely to Web transactions. Consider using a free e-mail service to help keep your primary e-mail address private. When you get too much spam there, simply drop it for a new one.

• Create an e-mail name that's tough to crack. Try a combination of letters, numbers, and other characters eg. 2g0al@example.com (substituting zero for the letter "O"). Research shows that people with such names get less junk e-mail.

• Disguise your e-mail address when you post it to a newsgroup, chat room, blog, or other public Web page-for example, BeeGood At GoodDomain DoT com. This way, a person can interpret your e-mail address, but the automated programs that spammers use often cannot.

• Watch out for pre-checked boxes. When you buy things online, companies sometimes pre-select check boxes by which you indicate that it's fine to sell or give your e-mail address to responsible parties. Clear the check box if you don't want to be contacted.

Google