Home Blog Page 36

Your PC may come with malware pre-installed

0


It is rare to find a new PC that doesn’t come with additional bells and whistles in addition to the operating system itself. The “bloatware” that PC vendors add on often includes useful tools like third-party security software. It seems, though, that some PCs also come with something more insidious—pre-installed malware. Microsoft researchers investigating counterfeit software in China were stunned to find that brand new systems being booted for the first time ever were already compromised with botnet malware right out of the box. Microsoft has filed a computer fraud suit against a Web domain registered to a Chinese businessman.
The suit alleges that the Nitol malware on the new PCs points the compromised systems to 3322.org. Microsoft believes the site is a major hub of malware and malicious online activity. Microsoft claims that site in question hosts Nitol, as well as 500 other types of malware. A Washington Post report states that it’s the largest single repository of malicious software ever encountered by Microsoft.

Most users—particularly most users of the Microsoft Windows operating systems—are aware of the many online threats. They’ve been conditioned to install antimalware and other security software, and update it frequently to ensure it can detect and block the latest, emerging threats. It’s a problem, though, if the PC is already compromised with malware before the antimalware software is even installed or enabled. Part of the concern lies in how the pre-installed malware works, or how deeply embedded it is. Most malware can still be identified and removed by security software after the fact. However, malware threats that are planted at the kernel level of the operating system, or in the PC BIOS operate at a level that is too deep, and can avoid detection by most antimalware tools.
Malicious software is big business, and the criminals running the business are often quite clever and innovative when it comes to finding new ways to spread it. Planting malware in PCs, smartphones, or tablets before they’re even purchased and unboxed is certainly one way to go about it.
What can you do then to defend against these threats? For starters, buy your PC, tablet, or smartphone hardware from established, respected vendors. If you buy an HP, Dell, Acer, Sony, or other such brand name PC the odds of it being compromised with pre-installed malware out of the box are pretty low. If you buy an Apple iPad, Google Nexus 7, or Amazon Kindle Fire you will most likely get a device free of malware infections. But, if you go bargain shopping online and buy a PC or knock-off tablet from a shady, unknown site the risk is higher.
Regardless, don’t assume that just because your PC or mobile device is brand new that it must be safe and free from malware. And, you might not want to trust the pre-installed security software, either, since you can’t verify that it’s legitimate and free from malware itself. Make sure you install a reliable cross-device security tool to detect and identify malware that may already be present.

Firefox 15.0.1 Fixes Bug That Exposed Websites Visited in Private Browsing Mode

0

Mozilla released Firefox 15.0.1 on Thursday in order to fix a bug that potentially exposed the websites visited by users while in “Private Browsing” mode. The goal of the “Private Browsing” mode is to enable Firefox users to surf the Web without leaving any traces of the visited websites behind.
According to a support article on Mozilla’s website, while running in Private Browsing mode the browser shouldn’t save visited pages, form and search bar entries, passwords, download entries, cookies, or temporary Internet files, which are collectively known as cached Web content.
The cached Web content consists of images, script files and other resources downloaded automatically by the browser from visited websites. These files are saved and loaded directly from the disk when a Web page is revisited in order to decrease the page’s overall loading time.
The bug addressed in Firefox 15.0.1 caused temporary Internet files to be saved inside the browser’s disk cache instead of its memory cache when browsing in private mode. Unlike the disk cache, the memory cache is automatically cleared when the browsing session is terminated.
Because temporary files are saved inside the cache together with their original URLs, they can expose what websites users visited while the browser was running in Private Browsing mode.
According to a discussion on Mozilla’s Firefox bug tracker, the bug was introduced in Firefox 15.0, but was also present in development builds of Firefox 16, 17 and 18.
Users should be aware that when upgrading from Firefox 15.0 to Firefox 15.0.1, the temporary files already stored in the browser’s disk cache are not automatically removed.
While in Private Browsing mode, Firefox 15.0.1 will no longer create temporary files on the disk, but the files already created because of the Firefox 15.0 bug will persist until manually removed.
Instructions on how to clear the entire Internet cache in Firefox are described in a support article on Mozilla’s website.
Users who want to review their disk cache entries can type about:cache in the browser’s address bar and click on the “List Cache Entries” link from “Disk cache device” section.

Windows Server 2012 embraces the data center

0

Microsoft has taken its server OS a giant step forward with Tuesday’s release of Windows Server 2012, making this version the first that can be controlled remotely so it is more suitable for data centers.“Microsoft has delivered on the promise of an operating system that can be completely managed from the command line,” said Don Jones, an author of a series of Windows 2012 instructional videos that have been released by the training firm CBT Nuggets. “The technologies are in place to manage 100 servers as easily as you can manage one server.”
The first major upgrade since 2009 features a bevy of new features, most designed to make it more suitable for large-scale data-center deployments. Satya Nadella, Microsoft president for Server and Tools, has touted this release as Microsoft’s “Cloud OS.”
Microsoft’s Hyper-V virtualization can now support up to 64 virtual processors and 1TB of memory for guests, a marked improvement from the old limit of four virtual processors and 64GB of memory. The Server Message Block (SMB) network communication protocol has been updated to handle faster data transfers and the OS’s Server Manager has been updated to handle multiple servers at once.
But perhaps the most significant enhancement is one that may not be noticed among these flashy new features. Thanks to the inclusion of the PowerShell, first introduced six years ago, this will be the first version of Windows Server that can be completely controlled through the command line, making it controllable remotely.

PowerShell provides the Windows similar capabilities that chief competitor Unix has long offered, such as the ability to forward, or pipe, the output of one process to the input of another process. It even adds a few new tricks, such as the ability to handle software objects, which have come about from studying Unix’s limitations. “It is an incredibly well-designed shell,” Jones said.
Of course, the GUI is still available for those who require it, but “you can remove the GUI and it will be a fully functional server,” Jones said. Doing away with the need for a GUI (graphical user interface) means that servers can be managed more efficiently in multiple numbers, Jones said. “If you are still using management techniques where you are still physically touching the server, you need to move to the 21st century and managing it like a server in a data center.”
For instance, an administrator may now have to execute a routine task on a server once a week — such as backing up data — by clicking through a series of options on a graphical program. With the command line, the administrator can write a script in PowerShell to run though all of those steps automatically and that script can run against multiple machines.
PowerShell may require some studied learning for those used to GUIs, but it is time well invested, Jones said, adding that his videos were designed to help give users an introduction to the technology. In addition to PowerShell, Windows Server 2012 also features a data-center-friendly installation method called Server Core, which provides a way to install the OS over the network.
One hardware partner, Dell, has wasted no time in updating its line of servers to run Windows Server 2012. The company designed its PowerEdge 12th generation (12G) servers around Windows Server 2012. The new blade, rack and tower servers run Intel Xeon E5-2600 processors and feature extreme memory density, hot-swappable hard drives and solid state drives, and a range of advanced features to support networking.
Microsoft “engineered the Windows Server 2012 for the private cloud. Our part of the equation is to deliver hardware and systems that are enabled for virtualization,” said Brian Payne, executive director of Dell PowerEdge servers. The 12G was designed to host the many multiple virtual machines that Hyper-V can host, he noted. Dell also designed software to take advantage of Windows Server 2012’s ODX (Offload Data Transfer) protocol, which allows data to be moved among different server nodes without the need of the server CPU.

Apple device IDs hacked: What you need to know

0

A hacker collective known as AntiSec has published over a million Apple device IDs that it claims were captured from the laptop of an FBI agent. If you own an iPhone or iPad, you might be wondering what this hack means to you, and you might also be curious about why the FBI had your Apple UDID in the first place. The information was acquired and released by the hackers as a political statement. The lengthy diatribe posted on Pastebin along with the hacked Apple ID info rants about government oppression and hypocrisy.
Why does the FBI have 12 million Apple device UDIDs on a laptop?While the group has published one million and one hacked Apple device IDs, it should be given at least a little credit for restraint. The details stolen from the FBI laptop included more personal information as well—such as full names, cell phone numbers, addresses and zip codes.
According to the letter from AntiSec, there were approximately 12 million Apple device IDs stored in the file on the FBI laptop. It chose to release just a portion rather than publishing all 12 million. AntiSec could have simply published the data it acquired without scrubbing it first, but the point it’s trying to make is against the government and the FBI—not the individuals whose information happened to be in the hands of the FBI.

Andrew Storms, director of security operations for nCircle, stresses that the Apple device UDID information itself doesn’t really pose a risk to users. “UDIDs in isolation aren’t a big deal. In fact, Apple used to permit apps to spew UDIDs all over the place, so there’s a lot of UDID data already in the public domain. For a while, there were a lot of apps using UDID and personal data to track users activity and selling it to advertisers.”
But, the hack of an FBI laptop yielding information on 12 million Apple devices does bring up another very valid question. As Storms puts it, “This release does make you wonder what the heck the FBI and the DOJ were doing with 12 million UDIDs. Are they working on a case involving Apple or an app maker? And, assuming there is a legitimate reason for the FBI to have this data, why wasn’t it better protected?”
I have reached out the FBI Office of Public Affairs seeking an official explanation or statement regarding why the FBI was in possession of the Apple device UDID information at all, as well as whether or not there should have been stronger protection in place to guard such sensitive data. As of this moment, the FBI has not yet responded.
[Update]
The FBI has issued a statement flatly denying that the hacked Apple device IDs published by AntiSec came from an FBI computer, or that the FBI is in any way involved in collecting such data in the first place:
“The FBI is aware of published reports alleging that an FBI laptop was compromised and private data regarding Apple UDIDs was exposed. At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data.”
The FBI statement puts the ball back in AntiSec’s court. One side or the other isn’t being completely honest here. AntiSec does seem to be in possession of vast quantity of Apple device ID data. The question is, if the data didn’t come from a hacked FBI laptop, where did the information come from and how did AntiSec acquire it?

Protect your devices from Web and email threats

0

Smartphones and tablets are vulnerable to attack, too. Here’s what to look for in a comprehensive security solution. By now you should already know the basics of online security: Don’t send money to a Nigerian prince, don’t click on that picture of Britney in a bikini, don’t call the Rev. Father from senegal and don’t run your PC without a security suite. All those basics still apply, but as technology moves forward, so do threats to your privacy and your devices. Today, we need to protect not only our computers, but also our smartphones and tablets. Fortunately, protecting yourself and all your devices can be easy with the help of some sound practices and good software. The first step, however, is to understand what threats are out there.

Never forget that your smartphone or tablet is actually a full-fledged computer in a smaller package. You can surf the web with it; check email; and use it to download and upload documents, photos, mp3s, videos, and software in the form of apps. That’s why we love handheld devices, of course, but it also means they are susceptible to attacks just like PCs are. To make matters worse, your phone or tablet can be the seed that carries an attack to all the hardware devices in your network, as well as those of anyone you email, text, or share data with.
Know The Threats
There are so many different kinds of threats out there, it can be hard to keep track: worms, botnets, viruses, spyware, phishing… You’ve probably heard of all of these without knowing exactly what they look like or how they work. They’re all basically different types of software threats, known collectively as “malware,” or malicious software.

  • A worm is malware that is designed to spread itself from computer to computer across the Internet. Once it’s in your system, device, or network, it can make your computer perform unwanted actions.
  • A botnet is malware that turns infected hardware (like your PC or phone) into an unwitting host for its creator. You won’t necessarily know you’re infected, but meanwhile your hardware is being used as part of a large, powerful network of similar “bots” that their programmer weaves together into one big system. Botnets can be used to attack other networks, such as the “denial of service” attacks on the news to sites like Amazon, Citibank, and even the U.S. government.
  • A virus is self-replicating malware that is usually attached to legitimate programs or files, so that when you launch the infected program or file, the virus launches too. Similar to a virus is a Trojan horse, which starts out as a file that you feel confident opening, such as a picture or presentation file, but is actually a virus in disguise. Once a virus is on your computer, it can make a wide variety of unwanted changes to your files.
  • Spyware is any type of software that collects information about the user of an infected device. Some spyware can be legitimate—parents or others might install spyware to monitor how a computer is being used. When spyware installs as a threat, it often arrives as a Trojan horse or through adware, which is any advertisement that installs malware after it is clicked.
  • Phishing is a type of threat that requires you to interact with it. Typically, the purpose of a phishing attack is to collect your information—like your web logins, passwords, and credit card or bank account information. Phishing attacks are often disguised as emails or websites for large banks or online retailers, prompting you to click a link to log in and enter personal information. If you do as prompted, you will be giving your login info away to a predator.

Why You Should Care
All of these types of attacks can compromise smartphones and tablets just as readily as they can hit your PC. These threats can come to you through email, text message, social networks, QR codes, or even through cloud computing—all of which you probably use on a regular basis, if you’re like most people with a PC, smartphone, or tablet.
So, what can happen if you fall prey to these threats? First of all, most threats will slow your device down because they are using up memory running malware. Sometimes they even install programs that can make it impossible to use your device. And many of these threats can steal your personal data and use it for fraudulent purposes. Your information might even be used to give someone a passport or government identification using your name, social security number, and other details. In milder cases, your Facebook login, email account, and other personal data can fall under the control of malicious strangers intent on stealing from you and your friends.
Solve It with Software
Now that you know the worst of it, what can you do to stop these threats? Good security software can keep you off the victims list, and there are also several simple things you can do just by changing how you use your device settings.
Start by buying a trusted security suite that protects all of your connected devices. Be sure to choose a product that will protect smartphones and tablets in addition to your computer. Considering the number of things we plug into our computers these days—from “thumb” drives to smartphones—having single, trusted source of protection is a huge advantage. If you choose separate antivirus protection for each piece of hardware, you’ll lose the advantage of having a single place to see and control all of the threats on your network. A single piece of software also has the advantage of only having to “learn” a threat once, rather than risking that it will be caught every time it hits one of your devices.
Good security software should be highly customizable, so that it can automatically run checks on your system as often as you like and check exactly what you ask it to check. Some software will even watch over you as you surf the web and signal that a given site or link is safe to use. These automatic checks can even extend into your social networks, showing which posted links are safe. If you need to check an individual site to find out if it’s safe, you should only be a click away, with icons for the software appearing on your desktop and in your browser.
Buying and using antivirus software is critical, but it’s also important to use good sense as you use your online devices. Many threats come in predictable forms: attachments in email, links that set off malicious downloads or lead to malicious apps, or QR codes from unknown sources. All of these have one thing in common: You have to set them off. Without your input, these threats are harmless. Learning just a little about malware and phishing can give you almost everything you need to beat these threats on your own. Almost, that is. Unfortunately, the folks who build malware tend to be pretty sneaky, so it’s essential that you have up-to-date software on all your devices to back you up.
Full Service, Please
In addition to security scanning, backup is another feature your full-service security software should offer you. By backing up your data automatically into the cloud, you can be sure that regardless of what happens to your hardware—broken, lost, stolen, or hacked—you will have access to all of your files. What about protecting the files left on a lost device? You’ll want to look for the ability to remotely lock your device and wipe your files from it. With these software features, your loss is minimized to merely hardware instead of all your valuable data.
Smartphones and mobile computing have solved many problems in modern life, but they have created some new ones, too. Everyone knows someone who has lost his phone or had her computer stolen from a public place. Harassing calls and texts, whether from bill collectors or angry exes, are also a 21st century problem. A robust software solution should give you the ability to track a lost device via GPS mapping, as well as to filter calls or text messages from an unwanted source.
Mobile computing, whether by laptop, tablet, or smartphone, has permanently changed how we live our lives, mostly for the good, but there are new threats as well. To protect yourself, learn all you can about the threats that exist, use common sense practices, and, most importantly, find a turnkey antivirus software that protects all of your devices and offers a wide range of services to access your devices remotely. Relying on one good cross-device software solution will make responding to threats fast and easy, giving you peace of mind as you bravely go forth to surf the web.

Universal Master Code Calculator: Unlocks Phone and Modems

5

Universal MasterCode Tool is a free software that can be used to calculate unlock codes for ZTE, NEC, LGk110, Nokia, Huawei and VK phones and USB modems. It’s one the tools required to unlock stubborn E303 Glo Bolt modems. Needless to say, the software can be used to unlock other USB modems including MTN, Etisalat, Airtel and Glo Modems. It has a very light, portable and user friendly interface. Even the biggest computer novice can use it.

Universal Master Code Calculator to Unlock my Phone and Modems
Universal Master Code Calculator to Unlock my Phone and Modems

The try-to-success rate of the Universal Master Code Calculator app used for Unlocking several models of Phone and Modems is amazing for an app of this size.

It answered the question of how to unlock my phone for us back in the days and so, should be a reliable tool for unlocking a wide range of modem and mobile internet devices.

Huawei Supported Devices

E156 E155, E1550 E1552, E156G E160, E160G E161 E166,
169 E169G, E170, E172, E176 E1762 E180 E182E E196 E226 E270,
E800,E870 E880 EG162 E880 EG162 EG162G EG602 EG602G,
E271, E272, E510 E612 E618 E630 ,E620 E630+ E660 E660a,
VODAFONE
K2540, K3515 , K3520, K3565, K3520, K3565

File Info

Type of File: Application (.exe)
Description: universal calculator
Size: 540 KB (553,472 bytes)

Click Here to Download Universal MasterCode Tool

How to Protect Your Social Network Accounts from Hackers

0

A tech journalist learned a tough lesson recently. But using two-factor log-ons help guard your Google, Facebook, and Twitter accounts from being hijacked. If you haven’t read about Wired reporter Mat Honan’s ordeal at the hands of malicious hackers, take some time and read it now. (I’ll wait.) His story about how a passel of juvenile hackers managed to get into his Apple account and wipe all the data off his iPhone, iPad, and Mac— as well as hijack his Google, Twitter, and Amazon accounts – should be required reading for anyone who uses those services, and especially those of us who’ve blithely linked our social media accounts together using the same e-mail address. Honan didn’t do anything to tick those hackers off. He was targeted simply because they coveted his @mat Twitter handle. Which means that the same thing could happen to you or me just as easily, and we wouldn’t know we’d been jobbed until far too late.
One thing Honan notes with regret is his failure to turn on two-factor authentication for his Gmail account. If he’d done that, anyone who tried to access his e-mail would have also had to enter a six-digit PIN, which is randomly generated and sent via text message to his phone.
So your first order of business for today: Setting up two-factor authentication for Google. To do that, you’ll need to go into your Gmail Settings (it’s the icon that looks like a little gear in the upper right corner of your inbox). From there:

  1. Select Settings, then Accounts and Import.
  2. Under Change account settings select “Other Google Account settings”.
  3. That will take you to a Web page for your Accounts. Select Security from the left-hand menu. You may be prompted for your password again.
  4. Under “2-step verification” you’ll see “Status: OFF.” Click the Edit button next to that. That will take you to a Web page wizard that will walk you through the process of having a six-digit verification code sent to you via text or a robo-call.


Enter the code into the appropriate box, and you’re all set – for that device, anyway.
Admittedly, this is not as easy as simply using a password. You’ll have to do this for every device and every application that uses your Gmail logon, and every device and application doesn’t work exactly the same way. For example, I was able to log on to Gmail using a PIN on my desktop, laptop, and iPad, but not my Android tablet or Windows smartphone. For those, I had to set up separate one-time-use “subtokens” that look something like this: fztz dgpm oxfi uthb.
You’ll need to go back to the Accounts Security page and select the Edit button next to “Authorizing Applications and sites” to set up disposable passwords for each device and app. You can also use this tool to manage your list of trusted devices and applications, and revoke access to them at any time.
So that covers Google. What about Facebook? Here, too, you can beef up your security settings with two-factor authentication. This will prompt you to enter a similar SMS code whenever you log onto Facebook from a new device. The drill is remarkably similar:

  1. Go to your Facebook Account Settings page (found under the down arrow next to the Home tab).
  2. Select Security from the menu on the left.
  3. Under “Login Approvals” click edit and put a check in the box that appears (see below). You may have to adjust your browser settings to accommodate the cookie that Facebook wants to deposit.
  1. In the dialog box that appears, click “Set up now.” You may be prompted again for your Facebook password and to add your mobile phone number if you haven’t provided one already.
  2. Click Continue. If you’ve done this correctly you should receive a six-character PIN. Enter that and the name of your device into the dialog boxes that appear.

Like Google, this won’t work with every device or application Facebook supports (like the Xbox or Skype). So again you’ll have to generate a disposable app password, which you can do via the same Security Settings dialog box. If you have an android device, you can download a free Code Generator app that can produce usable passcodes without having to send you a text.
Twitter does not offer two-factor authentication at this time. But you can make it harder for attackers to reset your password by changing a setting in your profile that requires you to provide additional info, such as an e-mail address or phone number, when requesting a new password.
From your Twitter profile page, click Edit your profile. Then go into your Account settings, scroll to the bottom, and put a checkmark in the box next to “Require personal information to reset my password.”

The flaw in all of these schemes: If the attackers manage to get hold of your phone as well as your log-ons. Then, my friend, you’re totally screwed.
Credits:
For more computing news, visit ITworld. Story copyright © 2011 ITworld Inc. All rights reserved.

InstallFree Nexus Brings Microsoft Office to iPads, Via the Cloud

0

Earlier this year, the Internet was abuzz with what appeared to be a version of Microsoft Word running on the iPad. Today, we’re no closer to seeing Word as a native iPad app than we were when it was spotted briefly in the wild six months ago. That doesn’t mean that you can’t edit or create Word documents on an iPad. There are a number of offerings that bring the Microsoft Office experience to the iPad, such as DataViz’s Docs to Go or Quickoffice, as well as services such as CloudOn, Nivio Online Desktop and InstallFree Nexus. You can even use Microsoft’s web apps to edit Word documents in a pinch, if you have Google’s web browser, Chrome, installed on your iPad.
Of the various alternatives available to Word lovers, InstallFree Nexus is an intriguing one, even though it seems to be ill named. Its use of “Nexus” is bound to get the app confused with Google-backed hardware of the same name. Moreover, there’s nothing to “install” — the service runs entirely from the cloud — and there’s nothing “free” for subscribers who want to use Microsoft Office apps from the service over the long haul.
Joining the service is fast and easy. During the registration process you provide an e-mail address, create a password and associate a cloud storage service with your account. Storage services supported by InstallFree Nexus include Dropbox, Skydrive, Google drive and Box.com.

Once logged in to InstallFree Nexus, you can swiftly import files from your cloud storage service then work on them in any Microsoft Office program. When you’re finished, you can save your file to your cloud storage and return to it from any device that can run a browser, including the iPad’s version of Safari.
On the iPad, gestures can be used to work within Word or other applications. A three-finger tap, for instance, displays a virtual keyboard in Word with a traditional QWERTY layout, including numbers and symbols in the top row, and embedded function keys, F1-F12.
Apple’s Bluetooth keyboard can also be used with Word in InstallFree Nexus. However, it does require that the virtual keyboard be shut off from the settings menu.
A problem Word users will immediately find with using the word processor on the iPad is that most of the icons on the ribbon bar are too tiny to be very useful. And with the ribbon bar and keyboard displayed on the screen, very little text space is left on the tablet’s screen.
As a service, InstallFree Nexus doesn’t seem ready for prime time either. Word crashed occasionally. Sometimes the site freezes. My link to Dropbox was dropped and I couldn’t access my files from within Word. And the performance within Word was sluggish. All of which added up to not a very pleasant experience.
Currently, InstallFree Nexus is offering a free 60-day trial of its service that includes use of Office 2010 apps. After that, those apps are offered on a subscription basis: $4.99 a month/$49.99 a year for students; $19.99 a month/$199.99 a year for non-students.
In addition to offering cloud access to Microsoft programs, InstallFree Nexus offers free access to the LibreOffice suite.

Biometric ID Tool Benefits Questioned in Light of Privacy Concerns

0

Moss Bluff Elementary School in Lake Charles, La., wanted to speed up the cafeteria line and reduce errors in lunch accounting. So the school bought a Fujitsu PalmSecure biometric ID system, which has a scanner that reads the unique patterns of blood vessels in a human palm, enabling a positive ID, much like a fingerprint would. When school officials sent out a letter announcing the program, some parents freaked out.
The parents had concerns centering around the belief that all forms of biometric ID constitute what the Christian Bible calls “the mark of the beast.”
Wait, what?
Here’s what it says in Revelation 13:15-18: “And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, OR the name of the beast, or the number of his name … and his number is six hundred threescore and six.”
I was surprised to learn while researching this column that opposition to any sort of biometric ID systems for payment might be widespread among some Christian groups.
A Christian blogger named Elwood Sanders summed up the biblical case for rejection of biometric ID like this: “Let me state my position clear: NO BIOMETRIC ID CARD! PERIOD! Every evangelical Christian needs to say NO to this kind of thing.”
The case of Moss Bluff Elementary highlights our current reality with biometric ID technology: It’s becoming so mainstream that schools are using it in their cafeterias. But some people are rejecting it based on religious grounds.

So will pervasive biometric ID be adopted? Or rejected? The answer is less clear than you might think.
How evil is biometric ID?
Opposition to biometric ID is pretty widespread, and most of that opposition is based not on prophecy, but on concerns about privacy.

A Senate hearing last month revealed the U.S. government’s own concerns about the use of facial-recognition technology, both by government law enforcement agencies and private companies like Facebook.
Europe is broadly resisting Facebook’s facial recognition initiative, especially Germany.
A professor from Spain’s Universidad Autonoma de Madrid told the Black Hat conference recently that researchers there have come up with a way to hack iris recognition systems that fools the systems into identifying one person as another, raising fears that the main benefit of biometrics — certainty — may not be as reliable as promised.
There are many privacy organizations and advocates with serious reservations about the use of biometric identification technology of any kind.
Moreover, many people associate fingerprinting with criminality, and they just
Credit:
For more enterprise computing news, visit Computerworld. Story copyright © 2011 Computerworld Inc. All rights reserved.

This Bulb Lets Your Phone Control the Lights in Your Home

0

If you’re one for setting the perfect mood in your home by brightening or dimming the lights, you’ll know how annoying it can be when you need to get up to adjust the light. Thanks to smartphone apps and Bluetooth, though, you can actually continue to recline.

[Credit: Bluetooth Bulb]

The Bluetooth Bulb is probably one of the weirdest gadgets you’ll install in you home. Like a typical bulb, you just screw it in to get it to light up the room. But this light bulb, as the name suggests, can be controlled from your phone via Bluetooth.
Not only does this light bulb-app combo let you adjust the brightness in a room from your phone,it also comes available as an RGB bulb, so you can pick a number of colors to light your room. Tinkerers can also easily change the chips (useful if it stops working, too) or play with the software, so you can have it do things like automatically switch off at a specified time.
Unfortunately, there is a small catch. The light uses Bluetooth 4.0, so only a small handful of phones or computers can work with support it. At present, you’d need an iPhone 4S, iPad 3, Samsung Galaxy S III,
Droid RAZR, Mac Mini, or MacBook Air in order to use the Bluetooth Bulb. Also, the light can only be controlled within 164 feet–that’s the length of an Olympic swimming pool.
If the above doesn’t put you off though, or you think it’ll make a great addition to your home automation project, the impressive-sounding bulb will be available within the next two months from Bluetooth Bulb‘s online store.
[Bluetooth Bulb]

How To Install IntenseDebate Comment System In Blogger

  Last week I wrote an article on Why You Must Quit Blogspot Comment System. As expected  many of you contacted me, asking me how to change your default blogger comment system, in regard to that I want to start by telling you how to install IntenseDebate comment system on your Blogger platform.

CommentLuv
One of the most popular used 3rd party comment system on Blogger.com is IntenseDebate. What attracts most people is the ability to use the Plugin CommentLuv.
In a way, it is to encourage and also as a reward to commentators who took their time to comment on one’s blog. CommentLuv rewards your readers and helps to discover new and interesting posts by automatically adding a dofollow titled link to the comment authors last blog post when they comment.

HTML Formatting
You can also customize your links and add some photos to your comments. IntenseDebate supports the following HTML tags: <a>, <b>, <i>, <u>, <em>, <p>, <blockquote>, &lt;br&gt;, &lt;strong>, <strike>, <img>
Gravatar
Intensedebate offers full Gravatar support. If you have a Gravatar they will automatically upload your Gravatar when you signup for IntenseDebate. You can choose to use your Gravatar or upload a different profile pic.
In this tutorial, I’m going to show you (with pictures) on how to install CommentLuv on your Blogger blog.Note: You will not loose your old comments when you install IntenseDebate
 Features Of IntenseDebate:

IntenseDebate is one of the most popular feature-rich comment system for WordPress, Blogger, Tumblr and many other blogging/CMS platforms.In this tutorial I am going to explain how to add IntenseDebate comment system to Blogger blog.
With IntenseDebate,you can do many things than your default comment system.These are some main features of IntenseDebate comments.

  •  Commentluv
  • Comment Threading.
  • Reply-By-Email.
  • Email Notifications.
  • Commenter Profiles.
  • Moderation/Blacklisting.
  • Reputation Points & Comment Voting.
  • Plugins API.
  • OpenID.
  • Widgets.
  • Twitter Connect.
  • Facebook Connect.
  • RSS Readers & Tracking.

HOW TO INSTALL INTENSEDEBATE ON BLOGGER PLATFORM Follow the following steps below to Install IntenseDebate On Your Blogspot. Before you start this process,you must backup your blogger template first.Save the backup template file on your hard drive.

Step 1 – Download your Blogger blog template

  1. Signin to your Blogger account
  2. Navigate to Template
  3. On the top right hand corner, select Backup/Restore
  4. Select Download full template and save it on your computerHow To Add IntenseDebate's CommentLuv To Blogger

Step 2 – Create and setup your IntenseDebate account

  1. Open a new browser tab and sign up for an account on IntenseDebate here How To Add IntenseDebate's CommentLuv To Blogger
  2. After confirming your account, sign into Intense Debate
  3. On the top bar menu, under Sites, select Add blog/site or use this link: http://intensedebate.com/install How To Add IntenseDebate's CommentLuv To Blogger
  4. Fill in your blog’s URL and select Next Step
  1. Select the Blogger platform How To Add IntenseDebate's CommentLuv To Blogger
  2. Next, you’d need to choose how you want to display your IntenseDebate comment. To keep your old Blogger comments, choose All new posts (IntenseDebate will only appear on new posts and posts without comments). To start your comments from scratch, choose On all blog posts (IntenseDebate will hide your previous comments). How To Add IntenseDebate's CommentLuv To Blogger
  3. Scroll down and upload the Blogger template that you’ve downloaded in step 1 and select continue How To Add IntenseDebate's CommentLuv To Blogger
  4. You will be brought to a page where a new set of template code is created
  1. Copy the codes 

How To Add IntenseDebate's CommentLuv To Blogger
Step 3 – Install IntenseDebate comment system

  1. Return to the Blogger tab in step 1
  2. Navigate to Template
  3. Select Edit HTML and then Proceed
  4. Select Expand Widget Template
  5. Replace all the template codes with the new codes that you’ve copied previously Select Savetemplate


Step 4 – Install CommentLuv plugin

  1. Return to the IntenseDebate tab in step 2
  2. Select configure this IntenseDebate accountHow To Add IntenseDebate's CommentLuv To Blogger
  1. On the left hand side menu, select Plugin

Scroll down till you find CommentLuv and select Activate

Done!

iPhone App Cardiio Can Tell Your Heart Rate With Nothing But A Video

[Credit: Cardiio]

 Ming-Zher Poh, a PhD Student at MIT’s Media Lab, is the creator of what may be the most interesting thing on the iOS App Store today: An app called Cardiio that makes use of the iPhone’s camera and nothing else to produce a estimate of your heart rate.
The science behind the Cardiio is almost as fascinating as the concept itself. Poh’s algorithm captures a video of the user’s face with the help of a tracking software before distilling it into RGB channels which are, in turn, analyzed to determine a rough BPM based on reflectivity.
And it’s surprisingly accurate. At least one study has shown that the technology behind Cardiio is accurate to within three beats per minute. You
might not see it at your doctor’s office, but it could be useful for tracking your heart rate when you exercise.
Cardiio isn’t Poh’s first attempt at using light to measure heart rate, but it’s probably the most popular. According to Co.Design, even though it’s only been around for a few days, Cardiio is already one of the most highly rated health and fitness apps on iTunes. Arguably, it’s also one of the creepiest–Cardiio will, among other things, attempt to provide you with your estimated life expectancy. Eek.
[Cardiio via Co.Design]

5 Online Business You Can Start With Little Capital

0

By: Joseph Onyemakonor

Most times when people hear start a business online, they think you have to be involved in some short of Advance Fee Fraud (popularly known as “yahoo yahoo”) before you can make a good make online but they are 100% wrong. It is absolutely possible to make money online, in fact it is quite similar to any business you own at home or in your local because you have to put in your time and effort to it if you want your business to be successful in the business. Starting a business in Nigeria can be quite demanding, you need capital, land, Labour (depending on what you want to go into)  but online quite different because you will put in Little Capital and start making a good amount of money when it is time to rip, but first you have to make the move by investing. Here are some business to you can start online that is sure to yield income:

  1. Blogging: This is one of the many  ways of making money online. With About N6000 you can start a blog. People will pay you to advertise their product on your blog and you will get to make money online. It can also be a steady source of income. Take a Look at how much the owner of Jaguda, one of Nigeria most popular music blog makes per day. Blogging can be a very lucrative business to go into online. Not because you will make money from it eventually, it gives you the opportunity to put your thoughts in decent lines and reach out to people in need.
  2. Bulk SMS: Bulk SMS is a service that provision customize messages .i.e. you can send message with sender name as NairaTrain. With N10,000 you can start your own block SMS service with a reseller account. Aside the fact that people will buy SMS units from you online, you can also make money with this by sending for Organizations, Schools, Churches, Mosques e.t.c. A popular SMS site that you can get started with is linkosms  their pricings is quite affordable

–>

  • Marketing:  Marketing online is similar to that offline. It requires a capital less than N2,000 to start up. You will be required to sell information, books, products e.t.c. to a customer and he pays into your bank account directly. You can also sell other people products and get commission for it.
  • Article Writing: If you are a good writer, you can start writing for other bloggers and get paid once your article is reviewed and accepted. This is also another business you can investing full time. They are also sites that hire writers to continuously write for them.
  • Website designing Compay: If you have skills in website designing, you can start a website design company online. The market is wider there and you are liable to more business online. Starting this business requires you to a website only and maybe a few port folio of previous work.

Once you get started online, business, it can serve as a support to your job offline or you can face it full time. It may take some time before your business gets fully established online but when it does, you will enjoy the benefits.

How to Start a Bulk SMS Business/Venture in Your Area

0

By: Joseph Onyemakonor  

Now a days, the need to communicate and distribution information is very high. People are always looking for ways to share information at a cheaper, more convenient, and faster means. Bulk SMS is a way of sharing information to thousands of people at a time using special customized names as sender id. It is also relatively cheap. While most people keep going online to send this messages to organizations for free, some few has started it as a venture. I will further tell you that one can make a considerable amount of money rendering this service.

Bulk SMS

Starting a Bulk SMS business is very cheap and requires you to put a little time and money into it. It requires you to have no special skills what so ever, all you need is internet connection (I will suggest A cyber café ). Now lets get started


Goto www.googlebulksms.com or www.linkosms.com (They sell at very affordable prices), register with them and locate the pricing page. Depending on the quantity you are starting with, the price of each unit can range from N1 – N1.5. Start by buying 2-3000 units which will cost about N2,500. Payment most times is made either through bank deposit or using your local ATM card.

Its not buying the SMS that matters, it what you do with it. Next thing you need to do is to spread the word, you can do that by posting simply hand bills. You do not need to goto any press to do this, just type on Microsoft word and print it then make multiply photocopies and post it around.

In most cases, the people that use this service are Churches, Mosques and Schools. Prepare proposal and send to all of them. You proposal should be very interesting and versatile. Tell them they get to send the SMS with Customized Name of their own organization and it is also at a very affordable price too.

Submit your proposal to as much organizations as possible and you will get more profit from it.

When charging them from the service, charge from N4 –N10 per sms. You bought at N1 per SMS. When you send to about 500 people from a particular organization, you make up to N4000.

Start now and write a proposal and send  out. You will make over N10 -50000 once you get start with this little venture

One Time Pop-Up Or Slide-Out Facebook Like Box With Cute Subscription Form.

With Subscription Form
Without Subscription Form

I got this trick  from an old friend -Helltrick.

It’s such a fantastic widget to force your site visitors to subscribe to your updates via email, like your facebook page or follow you on twitter.

Not only do we acquire the services of an amazing facebook like page we have yet another but extremely beautiful and easy to edit subscription form dozed with new CSS effects. This widget will keep pop-up/slide-out neat and clean and will surely attract visitors to subscribe.


Demo

To see this widget in action kindly our demo page to see a live preview on how it works.

HOW TO ADD A ONE TIME POP-UP / SLIDE-OUT FACEBOOK LIKE BOX WITH CUTE SUBSCRIPTION LINK TO YOUR BLOG.

 

In Blogspot:

  1. Login to your blogger dashboard
  2. Select Layout from your blog menu
  3. Add a new Javascript/html Gadget.
  4. Copy and paste the following code
<style>

/*
ColorBox Core Style:
The following CSS is consistent between example themes and should not be altered.
*/
#colorbox, #cboxOverlay, #cboxWrapper{position:absolute; top:0; left:0; z-index:9999; overflow:hidden;}
#cboxOverlay{position:fixed; width:100%; height:100%;}
#cboxMiddleLeft, #cboxBottomLeft{clear:left;}
#cboxContent{position:relative;}
#cboxLoadedContent{overflow:auto;}
#cboxTitle{margin:0;}
#cboxLoadingOverlay, #cboxLoadingGraphic{position:absolute; top:0; left:0; width:100%;}
#cboxPrevious, #cboxNext, #cboxClose, #cboxSlideshow{cursor:pointer;}
.cboxPhoto{float:left; margin:auto; border:0; display:block;}
.cboxIframe{width:100%; height:100%; display:block; border:0;}
/*

User Style:
Change the following styles to modify the appearance of ColorBox. They are
ordered & tabbed in a way that represents the nesting of the generated HTML.
*/
#cboxOverlay{background:#000;opacity:0.5 !important;}
#colorbox{
box-shadow:0 0 15px rgba(0,0,0,0.4);
-moz-box-shadow:0 0 15px rgba(0,0,0,0.4);
-webkit-box-shadow:0 0 15px rgba(0,0,0,0.4);
}
#cboxTopLeft{width:14px; height:14px; background:url(http://1.bp.blogspot.com/-FiJ_Xz7txEg/Txrt0sy1TiI/AAAAAAAAFWk/Llzvkeyy_J8/s1600/controls.png) no-repeat 0 0;}
#cboxTopCenter{height:14px; background:url(http://1.bp.blogspot.com/-TcJGMnSfOCY/TxrtzzHDLVI/AAAAAAAAFWc/mdndgrisRuA/s1600/border.png) repeat-x top left;}
#cboxTopRight{width:14px; height:14px; background:url(http://1.bp.blogspot.com/-FiJ_Xz7txEg/Txrt0sy1TiI/AAAAAAAAFWk/Llzvkeyy_J8/s1600/controls.png) no-repeat -36px 0;}
#cboxBottomLeft{width:14px; height:43px; background:url(http://1.bp.blogspot.com/-FiJ_Xz7txEg/Txrt0sy1TiI/AAAAAAAAFWk/Llzvkeyy_J8/s1600/controls.png) no-repeat 0 -32px;}
#cboxBottomCenter{height:43px; background:url(http://1.bp.blogspot.com/-TcJGMnSfOCY/TxrtzzHDLVI/AAAAAAAAFWc/mdndgrisRuA/s1600/border.png) repeat-x bottom left;}
#cboxBottomRight{width:14px; height:43px; background:url(http://1.bp.blogspot.com/-FiJ_Xz7txEg/Txrt0sy1TiI/AAAAAAAAFWk/Llzvkeyy_J8/s1600/controls.png) no-repeat -36px -32px;}
#cboxMiddleLeft{width:14px; background:url(http://1.bp.blogspot.com/-FiJ_Xz7txEg/Txrt0sy1TiI/AAAAAAAAFWk/Llzvkeyy_J8/s1600/controls.png) repeat-y -175px 0;}
#cboxMiddleRight{width:14px; background:url(http://1.bp.blogspot.com/-FiJ_Xz7txEg/Txrt0sy1TiI/AAAAAAAAFWk/Llzvkeyy_J8/s1600/controls.png) repeat-y -211px 0;}
#cboxContent{background:#fff; overflow:visible;}
#cboxLoadedContent{margin-bottom:5px;}
#cboxLoadingOverlay{background:url(http://1.bp.blogspot.com/-PPvu-446sn4/Txrt1QsGH1I/AAAAAAAAFWw/_jWYVoR1HX8/s1600/loading-background.png) no-repeat center center;}
#cboxLoadingGraphic{background:url(http://1.bp.blogspot.com/-31strss_1-E/Txrt1J6NThI/AAAAAAAAFWo/4P12CJPj924/s1600/loading.gif) no-repeat center center;}
#cboxTitle{position:absolute; bottom:-25px; left:0; text-align:center; width:100%; font-weight:bold; color:#7C7C7C;}
#cboxCurrent{position:absolute; bottom:-25px; left:58px; font-weight:bold; color:#7C7C7C;}
#cboxPrevious, #cboxNext, #cboxClose, #cboxSlideshow{position:absolute; bottom:-29px; background:url(http://1.bp.blogspot.com/-FiJ_Xz7txEg/Txrt0sy1TiI/AAAAAAAAFWk/Llzvkeyy_J8/s1600/controls.png) no-repeat 0px 0px; width:23px; height:23px; text-indent:-9999px;}
#cboxPrevious{left:0px; background-position: -51px -25px;}
#cboxPrevious.hover{background-position:-51px 0px;}
#cboxNext{left:27px; background-position:-75px -25px;}
#cboxNext.hover{background-position:-75px 0px;}
#cboxClose{right:0; background-position:-100px -25px;}
#cboxClose.hover{background-position:-100px 0px;}
.cboxSlideshow_on #cboxSlideshow{background-position:-125px 0px; right:27px;}
.cboxSlideshow_on #cboxSlideshow.hover{background-position:-150px 0px;}
.cboxSlideshow_off #cboxSlideshow{background-position:-150px -25px; right:27px;}
.cboxSlideshow_off #cboxSlideshow.hover{background-position:-125px 0px;}
/*———————————————————————————–*/
/* Facebook Likebox popup For Blogger
/*———————————————————————————–*/
#subscribe {
font: 12px/1.2 Arial,Helvetica,san-serif; color:#666;
}
#subscribe a,
#subscribe a:hover,
#subscribe a:visited {
text-decoration:none;
}
.box-title {
color: #3B5998;
font-size: 20px !important;
font-weight: bold;
margin: 10px 0;
border:1px solid #ddd;
-moz-border-radius:6px;
-webkit-border-radius:6px;
border-radius:6px;
box-shadow: 5px 5px 5px #CCCCCC;
padding:10px;
line-height:25px; font-family:arial !important;
}
.box-tagline {
color: #999;
margin: 0;
text-align: center;
}
#subs-container {
padding: 35px 0 30px 0;
position: relative;
}
a:link, a:visited {
border:none;
}
.demo {
display:none;
}
</style>

http://ajax.googleapis.com/ajax/libs/jquery/1.5/jquery.min.js
http://yourjavascript.com/11215013191/jquery.colorbox-min.js
<script type=”text/javascript”>
jQuery(document).ready(function(){
if (document.cookie.indexOf(‘visited=true’) == -1) {
var fifteenDays = 1000*60*60*24*30;
var expires = new Date((new Date()).valueOf() + fifteenDays);
document.cookie = “visited=true;expires=” + expires.toUTCString();
$.colorbox({width:”400px”, inline:true, href:”#subscribe”});
}
});
</script>
<!– This contains the hidden content for inline calls –>

<div style=’display:none’>
<div id=’subscribe’ style=’padding:10px; background:#fff;’>
<h3 class=”box-title”>Receive all updates via Facebook. Just Click the Like Button Below<center><p style=”line-height:3px;” >▼</p></center></h3>
<center>

//www.facebook.com/plugins/likebox.php?href=http%3A%2F%2Fwww.facebook.com%2Fspan%20style=

</center>
<style>
.mbt-email{
background:url(http://4.bp.blogspot.com/_MbejYjGokMM/TSeZHmWJ6oI/AAAAAAAAALE/93ELYyzmi64/s1600/email.png) no-repeat 0px 12px ;
width:300px;
padding:10px 0 0 55px;
float:left;
font-size:1.4em;
font-weight:bold;
margin:0 0 10px 0;
color:#686B6C;
}

.mbt-emailsubmit{
background:#9B9895;
cursor:pointer;
color:#fff;
border:none;
padding:3px;
text-shadow:0 -1px 1px rgba(0,0,0,0.25);
-moz-border-radius:6px;
-webkit-border-radius:6px;
border-radius:6px;
font:12px sans-serif;
}
.mbt-emailsubmit:hover{
background:#E98313;
}
.textarea{
padding:2px;
margin:6px 2px 6px 2px;
background:#f9f9f9;
border:1px solid #ccc;
resize:none;
box-shadow:inset 1px 1px 1px rgba(0,0,0,0.1);
-moz-box-shadow:inset 1px 1px 1px rgba(0,0,0,0.1);
-webkit-box-shadow:inset 1px 1px 1px rgba(0,0,0,0.1); font-size:13px;
width:170px;
color:#666;}

</style>

<div class=”mbt-email”>
Or Receive Updates via Email
<form action=”http://feedburner.google.com/fb/a/mailverify?uri=blogspot/XylXo” id=”feedform” method=”post” target=”popupwindow” onsubmit=”window.open(‘http://feedburner.google.com/fb/a/mailverify?uri=blogspot/XylXo‘, ‘popupwindow’, ‘scrollbars=yes,width=550,height=520’);return true”>
<input gtbfieldid=”3″ class=”textarea” name=”email” onblur=”if (this.value == &quot;&quot;) {this.value = &quot;Enter email address here&quot;;}” onfocus=”if (this.value == &quot;Enter email address here&quot;) {this.value = &quot;&quot;;}” value=”Enter email address here” type=”text” />
<input type=”hidden” value=”XylXo” name=”uri”/><input type=”hidden” name=”loc” value=”en_US”/>
<input class=”mbt-emailsubmit” value=”Submit” type=”submit” />
</form>
</div>
<p style=” float:right; margin-right:35px; font-size:9px;” >Powered By | <a style=” font-size:9px; color:#3B78CD; text-decoration:none;” href=”https://ewtnet.com” rel=”nofollow”>EWT</a> Pop-Up Box <a style=” font-size:9px; color:#3B78CD; text-decoration:none;” href=”https://ewtnet.com/2012/08/one-time-pop-up-or-slide-out-facebook.html” rel=”nofollow”>Get This Widget</a></p>
</div>
</div>

Website

If you need to use this widget on any website platform other than the blogger platform, simple copy the above code to anywhere in the <body></body> section of your website.

Make The Following Changes :

Change Green to custom text or leave it as default, Pink with your facebook username, Blue with your RSS feed Title.


Finally, Save your widget and you are done! Enjoy!

7 Sure Ways to Make Money Online

0

By: Joseph Onyemakonor 

How to make money online:There are so many articles on “How to make money online” and over 1000 get rich quick schemes jobs online which has proven useless and abortive in assisting you in earning online. Before I continue, I want you to know that this is not a get-rich-quick scheme and I am going to tell you why it is not. This article does not promise you any sure means, through which you can make money online doing little or no jobs neither is it an investment program that you go into and sit and home. In a nutshell you have to work hard to make money through the methods you will be seeing below.

In making money online, the first thing to have in mind is that you have to be offering a service before you get paid. The services you may offer can be affiliate marketing, selling your self published e-book or someone else’s,blogging e.t.c.

1. Blogging: This is one of the most discussed means of making money online. Although most successful bloggers will just tell you to start a blog and start earning, making money online with a blog requires effort, time and hard work to keep your readers loyal. Some of the advantages of owning a blog is that you get to share your thoughts and opinion, build an audience and make cool cash eventually. You should be ready to put in your best if you want to succeed as a blogger. You can’t make money online free

–> 2. Freelancing: This is another way of making money doing various jobs online for people, organizations and companies. This method of making money is not that popular and most people do not know they can make over $1000 each week if you are skilled and have at least four (4) hours a day to put into freelancing.

3. Simply Jobs website: Another way of making money online is doing jobs for people in five $5 jobs websites. You can make money with this by selling or reselling e-books, coming up with cool ideas and selling it to people for $5. An example of this kind of website is fiverr. If you can do 5 – 6 jobs a day, you will realize up $30 daily.

4. Internet Marketing: This is another widely discussed means of making money online. You can sell your services or be an affiliate marketer (Help someone else sell their products and services and get commission on sales). If you are a writer, you can start selling your books online or become an affiliate marketer. If you don’t have any idea or experience in writing, you can go to any freelancing sites and pay a freelancer to write for you. This can serve as a steady source of income for life. You should have in mind that this also is not easy too and requires effort.

5. Website Flipping: You can start flipping websites today after you are able to build traffic to that site. It requires time and effort. I will recommend this for people with experience in making money online and building website traffic.

6. Investment programs: You can start today and invest online and watch your money grow. Before you go into this, have in mind that you earn according to what you invest. One of the fastest growing and stable investment program right now is Justbeepaid they will lend you $10 dollars to invest with first, this will enable you understand what the program is about and how quick your money can grow

7. Articles writing: Everyday, more and more people are joining the blogging community, and they are all looking for new and unique contents to publish. If you are a good writer, you can start writing today. The best place to start is with a freelancing site. You can be paid about $2 per 400 word articles. This requires creativity and experience in SEO. You can learn all about SEO writing on ezine articles courses. You can also start your own articles websites where your write and sell articles.


Have in mind that making money online is not easy. It is a gradual process, which you have to put your time and effort to. When you become established, yoiu can earn upto $5000 monthly. Its not possible to make money online fast

Blogging Tips: Tips on Becoming a Successful Blogger

By: Joseph Onyemakonor

Tips on Becoming a Successful Blogger: The internet has been one of the widest sources of knowledge and income, and blogging is one of the ways to make some good cash. There are over 10 million blogs and this number increases every day. Blogging is very good and interesting, especially when you are not going into it because of the money you could make. It allows you to share your opinion with the world at large and also reach out to people in need of help and advice. Some people will just rush into blogging without knowing what it involves. You must read this article and know why you shouldn’t start blogging. Here are some facts about blogging you should know and have in mind Tips on becoming a successful blogger

THE GOOD Tips on Becoming a Successful Blogger

Blogging has its advantages and is interesting once you get it started fully. Some of the advantages of blogging are

  • You get to share your opinion and ideas and meet people with similar views
  • You can build a steady audience and sell products to them which also serves as a source of income
  • You will make a good amount of money from it through advertising.
  • In some countries, you can win awards of best blog of the year.
  • Blogging is a major investment online.

Blogging gives you the advantage of extra income to support your earnings and with time it can grow into a steady source of income. I know a blogger who earns $300everyday through advertisement and adsense. Once you have a blog and have successfully build a steady audience you can sell your blog and make over $10,000. Now isn’t that a very good investment?.

THE BAD

As good and profitable a blog can be, it has its disadvantages as well. Some of the disadvantages includes;

  • Blogging is highly time demanding and can affect your daily life and routine. Most successful bloggers know the great deal of work they put to get their blog when they first started before they could become freelance bloggers.
  • It requires new and interesting contents constantly: If you want your blog to grow fast, you should never copy and paste content from another site, you have to create new and unique contents. This is very difficult to do and most bloggers hire writers constantly. Now if you do not have the fund or resource to hire a writer then you might find it difficult running a blog
  • Once you start blogging you will spend a long time facing a Screen, this can damage your eye sight and even cause headaches. You have to be ready to face this. I will advice you do not blog if you already have any eye defect.

THE UGLY

There is also a very ugly part of blogging. After you must have put much effort into your blog, and also spend time on it, you may not succeed. You may constantly continue to loss money without making any profit. Do not give up on blogging. This should give you an idea on what you are going into if you decide to choose blogging as your way of making money online

Why You Must Quit Blogspot Comment System.

Google over the years has brought a lots of amazing  features to improve Blogger platform but they seems to forget about the comment system (is probably one of the worst comment system in existence) or probably they consider it unimportant.

Like most of you I have always admired the comment system of other blog platforms like wordpress, but has waited (I’m still waiting though!) patiently hoping to see a better comment system one day. (Looks like we are not going to see one in the future either).

Why You Need To Quit  Your Blogger Comment System??

One of the most effective ways of retaining readers to your blog is by building a little community in your blog, like I mentioned before; Blogger has one of the most crappy comment system in existence; which is the area I think they still need to improve. On my cause of making my blog convenient for you I went for a journey, With a little research (Google Of-course 🙂 ) I managed to grab some Ideas I think I should share with you. My Discoveries!Ouch: This is a very unusual title to give to reason 🙂 but honestly I can’t think of a better title to give to it (you probably should suggest one for me). While I was still using the blogger comment system, I made a very crucial error while posting a long reply on a user comment, that was when I voiced the word “ouch” what do I do? There was no Edit or Preview Option, I had to delete and re-write the entire comment (so bad I guess?). The worst is coming……   No Threading Comments: In other comment system you might have seen a  REPLY  button or link attached immediately after or below each comments; this is known as threads comment. This all important feature enable you and your readers to reply directly under each comment (Not the ‘@’ trash we normally use), Without having to do some advance xml editing.    Now, this is a very important feature for any blog comment system,  our dear default blogger comments system do not allow you to reply directly to a comment, this can lead to confusion and Ioften see bloggers having to use ‘@’ to specify which person the were replying to for example ‘@quoyo’ ‘@gotmelsh’ I can now post a reply and it will be attached to the bottom of each comment.   Enticing Comment Form: The comment form you probably have seen on wordpress comment system allow users to comment as a guest with their Name and URL, This feature entice your readers to comment on your blog post. ‘Would you want to comment on a blog that doesn’t give user the privilege to share there own blog/site?’ ‘Other people probably won’t like to either’ (that’s the devil’s tempting offer you can’t reject’) or if they have a wordpress account they can comment with that profile.But they can also comment with their social network and online profiles like *Twitter *Facebook *Yahoo *OpenId (Did You Know Your Blogger URL is an open Id?).    When you leave a comment you can also add an image or video to your comment instead of adding an image or video URL that will take users out of your blog. Now that’s is a good example of a good comment system.We have ‘that devil’s tempting offer’ but please do not spam us 🙂   Email Options: This is probably the most important feature that blogger comment system lack. ‘Ask me why?’ This is becourse these option allows your readers to choose if they want to receive new comments or replies posted to the posts they have earlier commented on directly to their email whereby helping the user to know when a reply is posted to his reply… What you probably don’t know is that this feature help you a great deal to maintain a good number of returning visitors. please, remember to choose this option while commenting here becourse I would love to see you again.   Ratings: Many of you know that I’m on bloggers, most time what really takes me to bloggers is to check how many people that voted (Rate) for my talks (comment). If there are so many people who does the same thing out there, then you can imagine how many returning visitors who will often come back to your blog to check if anybody voted for them. Our blogger comment system lacks this feature too… “You are beginning to realize how much features you are missing” Hold on I still need to tell you something and please do not forget to tell me something too 🙂 Your comment is very valuable to me.
Moderate Options:  Most Comment system other than blogger comment system allows you to reply your post comments directly from your dashboard and email. You receive an email when a new comment or reply is posted on your blog post, the same as with Blogger comments however the options to reply to a comment are much more versatile.

When I’m away from the computer for a few hours if I have received for example fifty comments I can go to my Intensedebate dashboard to manage the comments.From here I can read the comments and see which posts the comments were posted on.I can click on each comment and reply or delete the comments from the dashboard, now i can reply to comments on one page without the need to go to the blog.
I Have Heard Enough! Give Me Alternative? Well I have that too, I will be lying if I said I did it all my own but I can assure that about 60% of them are actually my on Idea and please, before I share mine with you promise me you would share yours with me, ‘Ok Deal!’ Lets ride on…. I will be providing you with my idea source,. With this lets move on to our next topic.       Top Five Alternatives To Your Blogger Comment System If you want to get rid of default blogger commenting system and get a better commenting interface, then you can opt for any of these commenting systems.

intensedebate-

Intense Debate – I don’t know why I mentioned this first, maybe becourse I’m currently using it on this blog, but what ever the reason might be I want to assure that this is one the best comment system in existence ‘don’t know if it is the best, you will tell me???’  Though most bloggers complain that it does not have the option to export your old blogger comments to your Intensedebate data base, this is true as you might have noticed that most of our posts still have that ‘archaic’ blogger blogger comment system. This is due to we choose to install intensedebate only on new post. I will be publishing an article soon on how to add intensedebate comment system on your blogger blog so make sure you subscribe to our update via email, twitter or facebook. (I promise I won’t spam you; I hate spam too).  This is now owned by  Automattic, the makers of WordPress and is totally free!Features:

  • Comment Threading
  • Reply By Email: Respond to and moderate comments with ease via email
  • Commenter Profiles: Special Profiles for commenters so that there is more interaction between people.
  • Moderation/Blacklisting
  • Reputation Points & Comment Voting
  • Twitter: Tweet your comments
  • Widgets: widgets like blog’s comment stats, the most recent comments made on blog, most popular posts and the most recent comment
  • FriendFeed:(Best Feature)When comments are made in the context of a blog on FriendFeed, IntenseDebate will republish them back on the blog.
  • Plugins API:Developers can enhance the comments by plugins like Seesmic video comments, PollDaddy polls, YouTube videos, smileys.
  • Gravatar support.
  • Facebook Connect and Twitter Sign-in: People comment via their facebook and twitter profiles and can further broadcast the content.
  • Commentluv: This is not a new name to wordpress users, just incase you don’t know; this ‘luvly’ feature automatically put the latest post of your readers to their comments. (You can choose to deactivate it)

IntenseDebate In Action

intensedebate-commenting-system
disqus

DISQUS  -While on my re-search journey, I happen to read some user reply and discover that this is really the bloggers choice ‘– It is the same thing that Mashable.com uses for its comments.’ (I’m not saying is the best; you still have to me which is the best) I once used it on my blog ‘not this one’ but had to remove after I learned about the commentluv (yes, there is no option for commentluv). One Interesting feature of disqus is the option to export old blogger comment to your disqus comment system database: By so doing you will not loose any of comments.Features:

  • Social Media Reactions: (Best Feature) Display mentions and comments about post from other services around the web (e.g. Twitter, FriendFeed, Digg, YouTube).
  • Trackbacks
  • Seesmic Video Comments
  • Pagination
  • Threading
  • Facebook Connect and Twitter Sign-in: People comment via their facebook and twitter profiles and can further broadcast the content.
  • Widgets like Popular posts and top commenter’s widgets.
  • Blacklisting as well as whitelisting people.

Disqus In Action

disqus-commenting system

JS-Kit (Echo) This is also another JavaScript based commenting system.Echo offers both free and paid packages!The free package comes with threaded comments and an interface where the commenter can add videos,images,similes, etc.The commenter can also format his comments using a simple WYSIWYG comment editor. I really don’t know much about this system (and couldn’t quite link to the source page) as I have never tried them before but I do hope that their a some of you out there that do know one or more things it ‘I honestly hope you share your ideas with me; I’m very Interested’ Or you could as well try it and share your experience with us.Features:

  • Spam control with Akismet
  • Banning : Ban a person by the user name or by IP address
  • Gravatar Support
  • TrackBack/PingBack: Trackbacks/Pingbacks can be automatically be included in comments.
  • Comment Ratings and Karma: Users can rate comments.
  • Blogger Comment Sync: (Best Feature) Transparently switch back and forth between native Blogger comment system and JS-Kit Comment system with no loss of comments because comments are always synchronized with Blogger.
  • Emoticons: 16 emoticons are available.
  • Threads: Threading is also available
  • Pagination: Comments can be paged.
  • Commentluv a feature to give love to your commenter is available to only this commenting system
  • Photo as well as video comments.

JS-KIT (ECHO) IN ACTION

js-kit-commenting system

Important: Please make sure to backup your blogger templates before trying any of this system so as to remain on the safer side.

These are the three most popular commenting systems.They come with threaded commenting with Gravatar based profile images,which can make you commenting system look more professional.I personally prefer Intense Debate over the others.

Note: These comment forms come with an option to show the comment form on new posts only(means posts with 0 blogger comments)!That means your old comments will stay intact and will use the old blogger comment form.(This is optional.. you can also revert all posts to use the new commenting system.But in that case, you cant display the existing comments easily..)

These are nothing  but my own lame idea and re-search, I know there hundreds others but it’s your turn to tell me about them (Remember the promise you made to me earlier). ‘to share with me’ 

Your Recipe For Long-Term And Targeted Traffic: Generating Traffic To Your Website!

Generating traffic to your website can be easy if you know the little secrets about how to drive massive volumes of traffic at no cost.
This article presents some secret ways through which you can easily boost traffic to your website.

  • Have your own website’s discussion board or forum, and invite people to visit and participate on your forum. This generates traffic to your website and all the posts on your website’s forum will help to improve your search engines position, which will boost traffic to your website. People who visit your forum will also visit your website, hence driving massive amounts of volume to your website.
  • Offer an e-zine on your website and invite people to subscribe to your free e-zine. When people subscribe, they will give in their email address. Every time they read your e-zine, it will remind them to return to your site since you will have your website URL in your e-zine.
  • Invite people to bookmark your website. This is particularly effective if you have high quality content on your website which makes people want to spend more time reading all the useful content on your site. Give away free content to other web masters for them to add on their websites. By allowing your visitors and other webmasters to use your articles on their own web site or in their e-zine, including your resource box, you are effectively advertising your website through their web sites. In addition, allow your visitors to give away your online freebies, and these will include your website URL, thus effectively multiplying your traffic.
  • You can also ask your website visitors to refer your web site to their friend(s) who may benefit from visiting your website. This will increase traffic to your website.
  • Invite your visitors to sign your guest book. When people sign your guestbook they may give you valuable feedback that will help you to improve your web site. This in turn will help you increase traffic to your web site by providing a useful website.
  • Offer an affiliate program. Having hundreds of affiliates advertising your website is an effective way of generating traffic to your website.
  • Give some testimonials or product reviews including your website URL to websites that get high volumes of traffic. By having a testimonial on a website that is visited by thousands of people, you are getting free publicity and free advertising and traffic for your website.

Use the secret tips outlined above to easily generate high volumes of traffic to your website and boost your online profits.

Important Tips For Listing On Ebay That You Should Follow To Succeed In Your Ebay Business

0

The way you list your merchandise on Ebay influences the success you can achieve in your business. Your merchandise listing is like your shop front, and people will decide whether to buy your products or not based on your product listing and description. This article outlines some essential tips that you can use in your listing to make sure that you succeed in selling your merchandise on Ebay.

  • Have your products’ keywords in your product description.
  • The titles of your product listing must grab the readers’ attention.
  • Make your product description as detailed and accurate as possible. Make sure that your product description will help people to know the nature and condition of what you are selling. Put yourself in the shoes of a potential buyer, and in your description, provide as much detail as you would wish to get about the product if you were considering buying it. Don’t lose bids and sales simply because people don’t know what you are selling precisely. If a potential customer asks you a question about the product that you have listed, make sure that you reply them as soon as possible.
  • Add photos or images of your products as this will help the potential customer to see how the product looks like.
  • Make sure that your product is listed in the most accurate category.
  • If the product that you are selling needs to be shipped to the buyer, provide enough information about the shipping, the cost of shipping and the estimated time it will take to ship the product. It is also easier if you sell products that are not heavy and bulky. You must also offer fast or slower delivery options so that people who want to get the products delivered early have an option to get the products on time.
  • If your products need shipping, you must specify your location as this will help the buyer to know that they will need to pay for shipping.
  • Provide several payment options so that your potential customers can use the payment method that suits them best.
  • It is also important that you list your products with low prices. This will encourage many people to bid.

These tips can help you to list your products effectively so that you get a lot of bids on your Ebay products.Credits:
Read more http://obasimvilla.com/blog/important-tips-for-listing-on-ebay-that-you-should-follow-to-succeed-in-your-ebay-business/

Sponsored