Friday, 15 May 2015
Keep Your Web Secure From Hackers
Each passing day brings with it news of a brand new leak of personal information over the Internet. Be it credit card information belonging to millions of users or their email IDs and passwords, personal nude pictures of celebrities or even top secret classified government data — the world of hackers has democratized the Internet and its lack of security at every possible level.
You might now be wondering what this has to do with your innocuous little blog or website that does not carry users’ credit card information or nude pictures of Scarlett Johnson.
Well, hackers can turn your nondescript website into a malicious spy bot in a matter of minutes, sending sensitive user data to hackers without your even realizing it. Worse, they can hack into your website databases and destroy or manipulate important information, injecting your content with malicious links and even hijack the hosting server to be used in bot net D Dos attacks.
But enough of this scare fest. It’s not all doom and gloom out there on the Web. There are things that you can do to secure your website from hackers and becoming a target for on-line vandals. Here’s a roundup of the easiest steps you can take:
Keep All Software Updated
Whether your website was built from scratch by your development team or you chose to create a DIY site on a third party turnkey platform, as a site owner it’s your job to ensure that every piece of software you run is up to date.
CMS providers like Word-press, Joomla and their ilk work round the clock trying to plug any holes in their systems and release regular patches and updates that make their software less vulnerable to attacks. Ensure that you run these updates and have the latest version supporting your site at any given point in time.
If your site uses third party plug-ins, keep track of their updates and ensure that these are updated on time as well. Often, many sites include plug-ins that fall into disuse over time. Clean out your website of any unused, old and non-updated plug-ins — they are sitting ducks for hackers to be used as a gateway to enter your site and wreak havoc on it.
Build Layers of Security Around Your Site
Just as you lock your doors before leaving your house and install anti-virus software on your desktop computer before browsing the web, you should also have a security system to serve as your website’s first line of defense against hacking attacks. A Web Application Firewall is that first line of defense. These solutions are designed to inspect incoming traffic, provide and weed out malicious requests –- offering protection from SPAM, brute force attacks, SQL Injections, Cross Site Scripting and other OW ASP Top 10 threats.
Until just a few years ago, Web Application Firewalls were only available as hardware appliances, but today a few Security-as-a-service (SECaaS) providers are revolutionizing the industry by using cloud technology to cut down prices of security solutions previously found only in enterprise level setups.
Consequently, all website owners can now “rent” a cloud-based Web Application Firewall, without committing to pricey security appliances or even owning a dedicated hosting server. Better yet, these plug-and-play services don’t require you to hire security experts or attempt to learn every aspect of web security. (Most of us just don’t have the time to become cybersecurity experts too.)
With hundreds of thousands of websites hacked every year, it’s becoming clear that hosting providers are not sufficiently equipped to handle all website security threats because frankly website security is not within their primary agenda. Now cloud-based Web Application Firewalls are filling that void.
Use Strong Passwords, Change Regularly
This one’s another no-brainier. Brute force attacks that try guessing user-name password combinations have multiplied at alarming rates over the last couple of years with thousands of attacks being detected on a daily basis across the web.
Using strong passwords is an effective way to limit if not completely eliminate brute force and dictionary attacks. Strong passwords are not just a requirement for your email or financial transactions on-line, they are also imperative for your website server, adman and database passwords.
Make sure your password is a combination of alphanumeric characters, symbols, upper and lower case characters and is at least 12 characters long to prevent brute force attacks.
Do not use the same password for all your different website logins. Change your passwords regularly to keep them doubly secure. Store users’ passwords in encrypted form. This ensures that even if there is a security breach, attackers do not get their hands on actual user passwords.
Make Ad-min Directories Tough to Spot
An ingenious way hackers gain access to your site’s data is by going straight to the source and hacking into your ad-min directories.
Hackers can use scripts that scan all the directories on your web server for giveaway names like ‘admin’ or ‘login’ etc. and focus their energies on entering these folders to compromise your website’s security. Most popular CMS’s allow you to rename your adman folders to any name of your choice. Pick innocuous sounding names for your adman folders that are known only to your web-masters to greatly reduce the possibility of a potential breach.
This is such a basic and easily avoidable hacking scenario, that it’s astonishing how millions of websites still ignore it.
Conclusion
Most of us go through life with the philosophy ‘It won’t happen to me’. However, that philosophy has been proven not t be true in the world of on-line
security. A successful attack on your site not only leads to compromising of users’ data and your own information, it can also lead to a blacklisting of your site by Google and other search providers as your infected site risks spreading malicious content throughout the web.
Erring on the side of caution works best in this area. Implement at least these basic steps right away, to avoid being a soft target for malicious hackers.
Now Face-book Messenger Has a Web Version
Face-book users have gotten used to chatting with connections on the mobile Messenger app. Now, Face-book has launched a new Messenger version for Web browsers. This means users can now chat on the Web without being on the Face-book page.
For now, this new Face-book Messenger Web version will not be replacing messaging on Face-book. This means you will still be able to send and receive messages on your Face-book page directly. Rather than replacing the Face-book chat, Messenger is a standalone app separate from the rest of the site. It’s a little confusing if you’re not a mobile Messenger user but could have some benefits.
The Web version is supposed to make messaging easier and less distracting, away from the news feed, notifications, and overall business of Face-book. Instead users can focus on their conversations and pay more attention to the messages they send.
The recent unveiling of Business on Messenger may show Face-book plans to do more with this Web version than just idle chatting. With Business on Messenger, companies will be able to connect with their customers, answering questions, confirming orders, and tracking shipping. A separate Face-book
Messenger Web version could help businesses take full advantage of what Messenger has to offer.
You will still need a Face-book account to use Messenger, of course. But once you’re logged in, Face-book chats and messages will appear full screen. This is a step up from the tiny box used on the Face-book site.
The Face-book Messenger Web version looks like it will offer many of the same features as the mobile version: message notifications, photo and video sharing, and even payments. Users will also be able to call each other with either video or just voice.
All in all, the Web version of Messenger is not particularly innovative, though it can probably be expected that Face-book will expand on the service. Right now, the Web version is only offered in English. However, undoubtedly other languages will become available in the near future.
Top 11 Steps for Promoting Your Live Event with Social Media
For many companies hosting an event means tweeting out the day and time, maybe throwing up a Face-book
post to tell people when the event is happening, and then it’s back to the chaos and stress of planning the event.
While some social promotion is better than nothing, it’s important that you take all of the opportunities social media has to offer in terms of promotion. You may be overwhelmed with details of hosting the event, but that doesn't mean that promoting events with social media is something that can be put on the back burner.
It takes time and energy and you need a plan when it comes to social promotion, but once you map out your social strategy you’ll find that the event will be much more successful.
The more people talking about your event, the better chance you have that people will attend, get your brand name out there to their social communities, and the more likely it is that all your hard work will pay off in the end.
Promoting Events with Social Media
Below are a few advanced tactics for promoting events with social media and subsequently earn your brand more visibility:
What to Do Before the Event
Create a web-page specifically for the event. This gives you a great space to feature videos and images, write blog posts, and keep people updated on the event (discussed in the next section). Not only will this give you a great page to share on your social accounts and hope others share, but it’s an opportunity to earn natural links if anyone chooses to mention your event on their website.
Create a hash-tag for the event. In 2015 this is a must-do, and more and more companies are starting to catch on to the trend. Having a hash-tag specifically for the event will help create brand recognition and unify all of the videos, pictures, and posts that people make about the event. It gives everyone one place to visit, on every social network, if they want to look at anything event-related.
Consider creating a promotional video. Before the event starts, consider creating a video to get people more engaged and excited about what is going to happen. If you've held this event before in the past, use music and video shots from last year to create a collage of what to expect. Once you create one video and have that published on your web-page and social accounts for a while, you can create another video just before the event to tell people what they need to do before the event, when they arrive, etc. This keeps the momentum going and keeps you earning the benefits of video.
What to Do During the Event
Have a contest or a giveaway for social participation. Creating some sort of contest or giveaway that asks attendees to do something on social media is a great way to jump-start higher brand visibility on social. This could be taking photos, asking questions on social media, “liking” your social media page, inviting others to like your page, etc.
Encourage visitors to take pictures and videos. This piggybacks on the last point. If you have a contest or some sort of giveaway, have the rules have something to do with posting photos and videos. It’s something easy that everyone can do quickly, so it’s a great option to earn more promotion.
Take your own video footage of the event for after. During the event you should also be taking photos and video so that you have the option of creating something after the event. This will give you something to use after the event to keep the momentum going and have something to post after the event.
Talk with attendees and try to connect on social. During the event, you should always be networking. Getting an email address is usually your best option, but if there is an opportunity to connect on social media that’s a great connection to make and help your promotion in the future.
What to Do After the Event
Follow-up with leads (not necessarily through social). After any event, it’s important to send an email or make a phone call to follow up with your leads. Connecting on Linked-In is also a great way to get in his/her social circles while still remaining professional.
Update the event web-page with content and graphics. After an event, you should update the web-page you created with new videos and images from the event. Hopefully you will have some attendees also getting involved!
Write a blog post about the event and then promote. It’s always a good idea to write a Blog post in addition to updating your web-page so that you have another outlet for people to share on their social accounts. Promote this using all of the tactics listed above and you have yet another opportunity for natural link building and visibility.
Don’t forget about your next event. Just as a side note, it’s a good idea to pay close attention to who responds and comments about your event after it’s over. Keep these people in mind and be sure to send them a personalized social message to let them know you’d love to see them at your next event.
The Takeaway
In the end, social media and event marketing should go hand-in-hand. If you stop at simply making mention of your event on social media, you’re missing out on opportunities not only for more social sharing, but also natural links and other forms of visibility for your company.
Remember, event marketing does more than just help promote an event — it helps promote your business as a while. For more ideas and information, I highly recommend visiting this article from Social Media Today.
Do you have any tips or tricks for promoting events with social media?
Social Media is Impacting A Best Web Design
Social media has been everywhere these days. And it is affecting almost every walk of life.
It is often noticed that social media has its impact on the off-line
world as well. So, it is quite obvious that the world of the Internet would be impacted the most by social media platforms.
For businesses to be successful these days, creating a social media strategy is a must. And for almost everything they do, they need to follow a process that integrates social media in it. Web design is no different when it comes to this. It has experienced a sea of change since the advent of social media on the Internet.
Social Media Impacting Web Design
Social media has been able to exert its impact on Web design to a great extent.
Almost all the companies these days have their presence on social media. And what can be a better platform to let people know about this than the home page of the business website? This is why almost all the websites have the icons of different social media websites. And a click on any of those would lead the website visitor to the company’s social media page. This is becoming imperative for any website these days.
Attractive Design for Social Media Pages and Profiles
The advent of social media has made the Internet more of a live and interactive marketplace than ever before. It’s no more the same drab thing. In addition to creating an attractive website, it is also extremely important to have a prominent social presence. And for that, you need to design how you want to present yourself in front of your potential customers through the social media platforms.
For example, if you want your business to be present on Face-book through a page, it is important to design the Face-book fan page of your business properly. The same holds true for Twitter and other platforms as well. The profiles that you have on these social media websites need to be designed in such a way that they can grab the attention of the viewers with immediate effect.
Perfect Design Necessary for Ads on Social Media
With social media becoming more and more popular with every passing day, increasing numbers of people are joining these websites. For example, Face-book alone has its number of active users in 2015 at a whopping 1.41 billion. This is driving the companies to use these platforms to reach out to their target audiences. So, they are preparing ads for the social media websites. And the focus is more on design.
The ads are being specially designed for different platforms. The objective is to increase their effectiveness and garner more clicks. The designs of the ads will also play an important role in ensuring that the company is able to gather leads, which should be converted to earn revenues. Moreover, the designers are also required to create different other stuff, such as banner ads, mimes, and so on.
Interactive Designs
Social media has helped to create a penchant among people for content that is more interactive and interesting. This is where Web design is expected to play an increasingly important role. Web designers need to shape the websites as well as the social media pages of the companies in such a way that they attract more interaction from the potential as well as the existing customers. This will help them understand what their customers are looking for and where they are going wrong.
Using Images for Social Media Communication
Social media has been able to change the way businesses are run. They are the perfect field to interact with the customers, know what they want from you, and help you decide how you should plan your offerings.
The designs should be planned in such a way that they drive the interaction of hundreds of customers on a regular basis. A picture speaks a thousand words and hence, they are among the best components for communication. So, most of the social media platforms need images. This is where a Web designer becomes relevant. Attractive images need to be created. Moreover, the images should also be resized to meet the requirement of different social media platforms.
Increasing Importance of Web Design on Social Media
Is the importance of Web designing going to diminish with the passage of time?
This is a question that’s haunting the on-line world after the advent of social media. But that is not expected at all. In fact, the importance of Web designing is likely to increase further soon. This is because the companies will need attractive Web design to keep the audience captivated on their social profiles.
Opera Mini Software
Opera is a Web browser that provides some advantages over other browsers from Mozilla or Microsoft. Much smaller in size, Opera is known for being fast and stable. Opera is available for a number of operating systems, including BeOS, Symbian OS, Linux, Mac OS, OS/2, Solaris, and Windows. It offers the same capabilities of the more popular browsers including integrated searches and instant messaging, support for JavaScript, cascading style sheets and e-mail. Because Opera is so compact, it has been promoted for use in hand-held Internet devices, including smartphones that use the Windows Mobile operating system.
The feature you notice first after installing Opera is a menu or "hotlist" that serves as both a directory to the Web and a bookmark file. The hotlist can be easily removed and you can use the full viewing space to look at multiple Web sites at the same time, either tiling or cascading the windows. You can choose to have the sites you were last looking at restored the next time you open the Opera browser. Opera offers keyboard as well as mouse control of its features. Plug-ins such as RealAudio, RealVideo, and Shockwave can be added. Opera does not support Active-X or Visual Basic.
Opera began in 1994 as a research project for the national phone company in Norway, Telenor. It is now on its 9th version. Opera is free for download to all supported platforms. Opera is the browser for Nintendo's Wii gaming console.
Other Web browsers include Firefox, Internet Explorer, Apple Computer's Safari and Mosaic, developed in 1993 and the original code base for Netscape's browser, Lynx.
Secure Your Facebook Account
Following Three Security Options makes your Facebook Account Secure and Hack Proof.
1) You can enable Login Notification so that whenever any body (or a hacker) tries to login with your User ID and Password, you will receive a Notification on your cell phone and you will come to know that it's time to change your password right now because the hacker has got your password and is trying to log in to your Facebook Account.
To Enable Login Notification
Go to Home -> Account Settings -> Security -> Login Notification. Put a Check Mark on your proffered
option and
click Save Changes button.
Always check your Active Sessions. If you notice any unfamiliar location or device, it means your Facebook Account is at risk. Just click on End Activity and don't forget to change your password after that.
To Check Active Sessions
Go to Home -> Account Settings -> Security -> Active Sessions.
3) Enable Secure Browsing to make your account more secure.
Go to Home-> Account Settings -> Security -> Secure Browsing
Keep Your Computer Dust-Free
Dust bunnies are real — and they seem to reproduce as fast as their namesakes. But you can banish that dust from your PC and get back to work or play. Here are the computer-dusting procedures:
1.Open and dust your PC at least once a year.
Consider it a birthday present for your computer. Unscrew or unlatch your PC’s case and use a can of compressed air to blow any accumulated dust from the motherboard, adapter cards, and cables (as shown in this figure). If allowed to accumulate, that dust can act as a heat-retaining blanket over your PC’s circuitry, and overheated components have a significantly shorter lifespan.
Enlarge
2.Remove dust that’s settled on the fan blades.
Speaking of fans, use your compressed air to get rid of any additional dust on fan blades and within air intake holes (see this figure). To properly ventilate and cool your PC, these openings need to be free of dust bunnies.
Enlarge
3.
Wipe down your PC’s case and your monitor with a clean, dry cloth every few months.
You should never use any household solvents to clean your PC’s case, but antistatic cleaning solutions and cloths are made just for cleaning computer hardware, like the ones shown in this figure.
File Sharing Window XP
One of the handy features of Windows XP (and Windows 2000, for that matter) compared to earlier Windows versions like 95/98/Me is its support for user-level security, which gives you fine control over who can access what information on a system. In this article, we'll show you how to set up your Windows XP Professional computer so you can share files and folders with other Windows computers on a network, while making sure that only desired users have access.
In Windows 95/98/Me, you share data by assigning a password to a shared folder, and anyone that knows the password can gain access to the data. That may be adequate in a small home network where, for example, Mom and Dad know the password to the family's financial data, but Junior doesn't. But it isn't practical in a networks with lots of potential users, since it's hard to keep a password secret amongst a large group of people.
Windows XP Professional replaces password-based security with two alternatives:
Simple File Sharing is enabled by default on Windows XP Professional systems that are members of a workgroup (typically used in small networks) rather than a domain (typically used in large corporate networks). For full details, see our article on Simple File Sharing. There are no passwords or access restrictions and, with one exception described in the article, everything that's shared is accessible by everyone on the network. Simple File Sharing is the only type of sharing available in Windows XP Home Edition.
By disabling Simple File Sharing, you can specify an Access Control List (ACL) for each shared disk or folder. Using an ACL gives you much greater control over shared data, since it lets you determine the specific users that will have access as well as the level of access they will receive.
We'll show you how to configure Windows XP Professional to:
Disable Simple File Sharing for increased security and control;
Create user accounts and user groups;
Share a disk or folder;
Set up Access Control Lists;
Allow network access by users without passwords.
To illustrate the concepts, we'll:
Create user accounts for four people: Alistair, Fraser,
Iona, and Catriona;
Create shared folders called Girls tuff, Boystuff, and Kid stuff, which will allow different levels of access to different people. Boy stuff will be accessible to Alasdair and Fraser, Girl stuff will be accessible to Iona and Catriona, and Kid stuff will accessible to them all;
See how the users access the shared folders.
Finally, we'll show you how to access Windows XP Professional's shared disks and folders from another client computer on the network, adding some information about file permissions in the NTFS file system, and giving solutions for some common network access problems.
Secure Your Wireless Network
1. Login to your wireless router
a) If you've never logged into your wireless router, look up the make and model of the router, and find
the default IP Address, username, and password, then login.
b) For example, if your wireless router has a default IP Address of 192.168.1.1, default username of
admin, and default password of blank. Login by doing the following:
1. Open Internet Explorer and type in the address http://192.168.1.1
2. When prompted, the username would be admin, and the password would be blank.
c) If the router's password is still set to the default password, it is important to change this password to
something else to keep an intruder from effectively kicking you off of your own network.
2. Enable MAC Filtering
This is probably the easiest way to keep intruders off of your wireless network although the least secure.
You can enable a White-list of MAC Addresses and then only the MAC Addresses that you specifically
put into this list will be able to use your Wireless. You'll have to remember this if a friend comes over
and tries to use your wireless network.
3. Enable Encryption
It's important to use encryption on your wireless network. Not only does it keep intruders off of the
network, it also keeps eavesdroppers from listening in on your network traffic. The two major types of
wireless encryption are listed below. Please also note that any encryption enabled on the wireless
router must also be enabled on each Wireless Device that needs to connect to the internet.
a) WEP – This is still the most common type of encryption enabled on most wireless routers. Please
note that this can be broken by serious hackers in about 2 minutes, but will keep out most neighbors
and passerby's.
b) WPA2 – This is becoming the most common type of encryption and is enabled on most new wireless
routers. WPA2 is much more secure than
WEP and has not been compromised yet, but is not
available on some older types of Wireless Devices.
Deciding between WPA2, WEP, or MAC Filtering
WPA2 Encryption is the most secure method for keeping intruders off your network.
If you have older devices that will not support WPA2, WEP is encouraged.
If you are unsure how to setup encryption, MAC filtering is least secure, but easiest to setup.
Page 1
4. Disable SSID Broadcasting
This option decides whether people can or can not see your wireless signal. This is not necessarily
recommended because although this will keep your network invisible to the common nosy neighbor, it
will not protect your network from any serious hackers. It can also make setting up your own devices on
your wireless network more difficult. So, it's good to know how this works, but always use encryption
and don't rely on just disabling SSID broadcasts to keep your network secure.
5. Install Who's On My WiFi
Download and Install Who Is On My WiFi Software onto a desktop computer that is always on at your
home or office. Who's On My WiFi acts as a detection engine by scanning your network every few
minutes to see if anyone has gotten onto your network. People could get in by breaking WEP
encryption, faking through a MAC Filter, somehow breaking WPA2, or by good old fashioned hard line
plugging into your router directly instead of connecting through the wireless. Monitoring for intruders is
the final step in securing a Wireless Network.
Learn How To Create A Website
Thanks for a new free website just launched, business owners and entrepreneurs can follow a simple step by step tutorial to build their own professional looking websites.
Sarasota, FL, USA - October 28th, 2013 /Marketers Media/ -- In this day and age a website is an essential tool for most small businesses and entrepreneurs. It acts as a business card, a promotional advertisement and a sales tool all working together. But in the past small businesses have had to outlay thousands of dollars to get a basic website online.
A new website:SimpleWebTutorial.com hopes to change all that. Setup by long time web developer Brock Hamilton, as a way for anyone to build and maintain their own professional looking website at a fraction of the cost it would usually require.
"Even people with absolutely no experience in web design or programming, can have a basic website up and running in under 30 mins." Says Hamilton
The website consists of a range of step by step tutorials that take first time web builders through the process of registering a domain name, setting up web hosting and then building the actual website.
"Everything they need to know to get setup is in our main tutorials, and then there are a series of 42 additional videos that show users every aspect of managing and maintaining their websites". Hamilton says.
"The idea for the website came after dozens of friends and friends of friends had asked me to help them setup a basic website for their small local business, or for a business idea they had and wanted to test out without spending thousands on web development."
"I started off helping them get a website setup on a one by one basis, but to be honest, I got sick of explaining the same "very basic" things over and over again, so I decided to setup a website that took them step by step through the process, so they could do it themselves." Hamilton explains.
The website is completely free to use, and remuneration is made by way of affiliate commissions for various recommendations. But remuneration is not required to use the site's tutorials.
About Brock Hamilton:
Brock Hamilton is a web developer with over 10 years experience building websites for small to medium sized businesses as well as selected bespoke personal sites. He has also published an eBook
(released exclusively on Amazon Kindle) where he attempts to lead small business owners and would be web developers down the path of building and running their websites for a fraction of the normal costs associated with the practice.
How To Purchase A Nice Domain
If you have a web site, you should seriously consider registering your own domain name. A domain name is a name like "the site wizard.com" or "the free country.com", which you can use to refer to your website. Note that you do not have to be a company or organisation ("organization" in US English) to register a domain name. Any individual can do it too.
Importance of a Domain Name
There are a number of good reasons for having a domain name:
If you ever change your web host, your domain name goes with you. Your regular visitors or customers who knew your site name as www.thesitewizard.com (for example) would not have to be informed about a change of web address (also known as "URL"). They would simply type your domain name and they'd be brought to your new site.
If you are a business, a domain name gives you credibility. Few people will be willing to do business with a company that does not have its own domain name.
If you get a domain name that describes your company's business or name, people can remember the name easily and can return to your site without having to consult their documents. In fact, if you get a good name that describes your product or service, you might even get people who were trying their luck by typing "www.yourproductname.com" in their browser.
If you want good sponsors (advertisers) for your website, a domain name is usually helpful. It tends to give your website an aura of perfectibility.
Registration Overview
Getting a domain name involves registering the name you want with an organisation called ICANN through a domain name registrar. For example, if you choose a name like "example.com", you will have to go to a registrar, pay a registration fee that costs around US$10 to US$35 for that name. That will give you the right to the name for a year, and you will have to renew it annually for (usually) the same amount per annum.
Some web hosts will register it and pay for the name for free (usually only the commercial web hosts), while others will do it for you but you'll have to foot the registrar fees.
My personal preference is to register the name directly with a domain name registrar rather than through my web host. I've heard stories, in the past, of less-than-reputable web hosts that registered the domain under their own name, making them the owner of the domain rather than you (although I don't know if such web hosts still exist today). Registering with a domain name registrar allows me to make sure that I am registered as the owner, the administrative and technical contacts. Being the owner is vital — if someone else places himself as the owner (such as your web host), he can always decide to charge you some exorbitant fee for the use of the name later, and there is little you can do. The various other contacts are less vital, but may still play important roles, depending on your registrar. For example, for some registrars, the administrative contact's approval is required before a domain name is transferred out of a web host (or at least, it used to be). If he/she cannot be contacted, the technical contact is used.
Domain names disappear extremely fast. Many people claim that all the good domain names are gone. I doubt that — but it is probably true that most good domain names that are descriptive of products and services have been taken. If you want a domain name for your site, I suggest you act now, or face the anguish of having lost that name later. After all, US$10 (more or less) for a year's ownership of the name is pretty cheap when you realize that you're securing a good name for your website.
Step By Step Instructions
If you want to register a domain name, here's what you need to do. Please read it all before acting.
Think of a few good domain names that you'd like to use. It won't do to think of only one — it might already be taken (it probably is!). You can find some tips on choosing a good domain name from my article, Tips on Choosing a Domain Name, at http://www.thesitewizard.com/archive/domainname.shtml
There's more to it than meets the eye.
You will need either a credit card or a PayPal account to pay for the domain. This is a requirement of most if not all registrars. It will allow you to claim and get the domain name immediately on application. This is not an option (unfortunately).
If you already have a web host, obtain from them the names of their primary and secondary nameservers. Don't worry if you don't understand what these things mean. Just save the information somewhere. The information can usually be obtained from their FAQs or other documentation on their site, usually under a category like "domain name" or "DNS" or "domain name transfer" and the like. If you can't find it, email them. You'll need the information to point your domain name to your website after you buy your domain. Having said that, if you don't have a web host yet, don't worry. Just read on.
If you do not have a web host, you can always allow the registrar to park your domain name at a temporary website specially set up for you. This way you can quickly secure your domain name before it's too late and still take your time to set up the other aspects of your site. As far as I can tell, most registrars (or probably all) automatically park your domain by default whether you ask them to or not, so if this is your situation, you probably don't have to do anything special to get it done. Some of those registrars also provide you with a free email address at your own domain name while it is parked at their site, like sales@example.com (where "example.com" is your domain).
List of Domain Name Registrars
There are numerous domain name registrars. Listed below are just a few, along with my comments, if I know anything about them. Note that the domain name industry is highly competitive, with prices wildly fluctuating throughout the year, every year, so it's impossible to really mention accurate prices below unless I spend all my time updating this page. Please check their sites for the latest rates. (Note: all prices below are in US dollars.)
World's Largest Registrar - GoDaddy.com — This extremely popular registrar (probably the biggest today) offers .com domain names for $9.99 (plus 20 cents) per year (or $6.99 plus 20 cents if you transfer from another registrar). They have a web interface to manage your domains, free web redirection (where people who visit your domain will get transferred to another web address of your choice), free starter web page, free parked page or free "for sale" page, and an optional private domain registration where your domain is registered in the name of a proxy company. They offer .com, .us, .biz, .info, .net, .org, .ws, .name, .tv, .co.uk, .me.uk and .org.uk, etc. Note that (as with all registrars) the exact price varies depending on which domain you are registering (for example some domain suffixes are more expensive than others). Both credit card and PayPal payments are accepted.
Name cheap — This company provides .com domains for $10.69 (plus 18 cents) per year ($9.69 if you transfer from other registrars). Along with your domain, you get free email forwarding, free web redirection (where anyone going to your domain is automatically directed to another address of your choice), free domain name parking, etc. For the first year (or at least, at the time I checked their prices), you can also have their Who's Guard (where your particulars are masked from public view) for free. They have a wide variety of domain name extensions available, including .net, .org, .biz, .info, .us, .co.uk, .co, .de, etc. You can use either a credit card or PayPal for your purchases.
1&1 Internet — This is primarily a large web host that is also a domain name registrar. You are charged $6.99 for .com, .org, .net, .us domains. They also offer .info domains for $0.99 (first year only) and .biz at $8.99. The fee includes private domain registration, which means that your particulars are hidden from public view (done by registering the domain in the name of a proxy company). You also get a free email account, DNS management, domain forwarding and masking, and a starter website with each domain. Both credit card and PayPal payments are accepted by this registrar.
Thursday, 14 May 2015
Anyone looking to unload an Android or Black Berry smart phone can now turn to Apple.
The company expanded its trade-in program on Monday to accept certain models of rival phones, including Android, Black Berry and Windows Phone handsets. Your old phone scores you store credit, which you can then use to purchase a new i Phone 5c, i Phone 6 or i Phone 6 Plus, though not an Apple Watch, according to Apple news site 9 to 5 Mac. The program is available in the US, UK, Canada, France, Germany and Italy, an Apple spokesperson told CNET.
Apple is constantly working to gain more traction over Android device makers, most notably Sam-sung. A report from market researcher Gardner
this month showed that Apple inched past Sam-sung in worldwide smart phone sales in the fourth quarter.
Apple didn't formally announce the expansion of its trade-in plan, aka its Reuse and Recycling Program. But individual Apple Store pages now show the Reuse and Recycling Program section with the following line: "Get credit when you recycle your eligible i Phone, i Pad, or select smart phone from another manufacturer."
The program also now accepts PCs from manufacturers other than Apple, allowing you to trade in your Windows computers for store credit that you can apply toward a Mac.
The new trade-ins will be available at Apple retail stores and Apple's on-line site, the Apple spokesperson confirmed. Apple's UK site has been updated to reflect the changes, but Apple's US site has not yet been updated.
Apple has offered an on-line trade-in program through a third-party vendor called Bright-star. The Bright-star page for the UK shows several non-i Phone brands that you can trade in, including Sam-sung, Sony, Nokia, and Black Berry. But the Bright-star page for the US still shows only iPhones as acceptable trade-in devices.
Similarly, the UK page for Apple's Reuse and Recycling Program says: "Get credit for your i Phone, i Pad, or Mac, and eligible smart phones and PCs from other manufacturers. Depending on the device, take it to an Apple Retail Store or get started on-line." But the US page still displays only Apple devices as eligible for on-line trade-in.
USB And Its Function
Just about any computer that you buy today comes with one or more Universal Serial Bus connectors. These USB connectors let you attach mice, printers and other accessories to your computer quickly and easily. The operating system supports USB as well, so the installation of the device drivers is quick and easy, too. Compared to other ways of connecting devices to your computer (including parallel ports, serial ports and special cards that you install inside the computer's case), USB devices are incredibly simple.
In this article, we'll look at USB ports from both a user and a technical standpoint. You'll learn why the USB system is so flexible and how it's able to support so many devices so easily -- it's truly an amazing system.
Anyone who has been around computers for a while knows the problem that the Universal Serial Bus is trying to solve -- in the past, connecting devices to computers has been a real headache.
Printers connected to parallel printer ports, and most computers only came with one. Things like external storage media, which need a high-speed connection into the computer, would use the parallel port as well, often with limited success and not much speed.
Modems used the serial port, but so did some printers and a variety of odd things like personal digital assistants (PD-As) and digital cameras. Most computers had at most two serial ports, and they were very slow in most cases.
Devices that needed faster connections came with their own cards, which had to fit in a card slot inside the computer's case. Unfortunately, the number of card slots is limited and some of the cards are difficult to install.
The goal of USB is to end all of these headaches. The Universal Serial Bus gives you a single, standardized, easy-to-use way to connect up to 127 devices to a computer.
Wednesday, 13 May 2015
Contact Face-book Support
Contacting Face-book can be a difficult ordeal, which most Face-book issues’ highly personal nature exacerbates. A blocked account or lost password puts a complete block on one’s ability to interact with friends and family via Face-book, while a stolen or hacked account can be even more personally disruptive.
Whether the user’s Face-book account has been taken over, there are technical difficulties, or the user just wants to consult a real person about Face-book’s features and policies, the list below provides a place to start.
Face-book’s On-line Help Section
The first place to check for information re the issue is Face-book’s On-line Help Section. If there are any questions that a typical on-line help center or Frequently Asked Questions page can address, Face-book’s help center can certainly provide useful information. The URL is http://www.facebook.com/help/.
Other Forms of Contact
Face-book is a difficult company to contact and their service and support departments have received media attention for poor customer service. Achieving satisfying communication is possible though, and there are other ways to attempt to contact Face-book with dilemmas, requests, or complaints.
By Email
Facebook has several email contact departments. Each address is specific to a certain issue, so users should send emails to the most pertinent department. Email addresses to direct concerns include:
privacy@facebook.com
login@facebook.com
info@facebook.com
disable@facebook.com
appeals@facebook.com
Face-book email correspondents are known for taking a long time to respond, probably due to the volume of emails and communication attempts they receive on a daily basis. Be persistent and patient and do not hesitate to send another email every few days until contacted. Be polite despite the frustration and anger that can be involved in personal issues such as social media. Also, the email should be detailed. The reader should be left with no questions about what the user’s difficulties are and how to correct them. Essentially, the user should practice successful communication skills in every way he/she can.
By Phone
Unfortunately, Face-book does not offer telephone support. Face-book has a telephone number, 650-543-4800, but the only option is to leave a voice-mail. Actually getting a response to this voice-mail is unlikely.
How You Can Unblock Face-book
On occasion, Face-book and other popular sites such as Orkut, You-tube, and Hulu may block users. Fortunately, users may use a proxy to unblock themselves. However, this may not work as Face-book and similar sites rely heavily on JavaScript for basic functionality. That is to say, although the user will be able to visit the site, using any web proxy without JavaScript enabled will not work.
Therefore, JavaScript enabled proxies may solve this problem. Many proxies do not support this, but those that do are not enabled by default. There is often a "Remove Scripts" check-box that should be unchecked for JavaScript to work. "Allow cookies" should be checked. The same should apply for other JavaScript heavy sites. Hulu users must find a proxy in the US.
This proxy list may have some web proxies that work, but most of them have problems accessing Face-book and other pages. Some of them are infested with ads that make it impossible to enter login information.
HTTP port proxies are probably the best options. They are IP addresses and ports that are entered into the browser proxy settings so the browser goes through them when it tries to fetch a web site. Such proxies can be found on Anonymous, High Anonymity, CoDeeN, Transparent, and Non Transparent proxy lists.
Here are a few recently tested Code En proxies. If they stop working, please alert the author of this article in the comments section so that the list can be updated:
203.178.133.2:3124 (Japan)
174.142.24.201:3128 (California)
222.165.130.82:3128 (Sri Lanka)
149.169.227.129:3127 (US)
189.115.182.22:3128
To use these proxies in Firefox, open Firefox preferences by going to Tools, Options (or Firefox > Preferences on Mac), then to Advanced Network, and click Settings to get to a page for configuring proxies. Click "Manual proxy configuration" and put the IP address in the HTTP Proxy field, and the port in the Port field. The port is the number after : in the above addresses.
It should look something like this when the first proxy above is entered in:
Chrome users should go to the Chrome menu ( Chrome menu button), then Preferences, then go to the "Under The Hood" tab and click on the "Change proxy settings" button in the Network section to access the operating system's proxy settings.
Once the proxy is set up, go to Facebook.com and the browser should load over a proxy. If the proxy does not work, go back to the list and try another until one works.
After logging on to Face-book successfully, the site might tell the user that he/she is visiting from an unknown location (the location of the proxy server) and that it wants to verify the account. Just follow the steps and everything will be fine. Account verification might involve answering a catchup
, answering one of the user's secret questions, or recognizing and selecting friends from pictures.
Users Of Face-book often see the heart symbol
Face-book users often see the heart symbol“?” on status updates and want to know how to apply it to their own updates. The process is simple and can be accomplished in three ways:
Direct Input into Face-book
The fastest way to enter the heart character on Face-book is to use the less than three method. Users should place “<3″ wherever they want a heart to appear on their status. For example, if a user wants to say “I ? this song” they should type “I <3 this song”.
Alt Code Input
Another option is using the Alt code. Hold down the “Alt” key and press the numbers that correspond with the symbol needed.How Do You Make a Heart on Face-book?
Note: The “Number Lock” must be enabled on the keyboard for the Alt codes to work.
To make the “?” symbol with the Alt codes, hold down the “Alt” key and press the number 3 on the numerical keypad once, then release the “Alt” key. This will create the heart symbol wherever the text cursor is located.
Someone that wants to say “I ? waffles” would need to type this in “I (Alt+3) waffles”.
Note: Not all characters placed on Face-book this way will appear.
Copying and Pasting from Windows Character Map
The Character Map is a useful tool that allows Windows users to view available characters for any font installed on their system. Users can open up the character map in two ways:
Run Command – By holding down the “Windows” key (to the left of the alt key) and pressing the letter “R,” the Run window will appear. In the Run window, type in the word “char-map” and hit Enter or click “OK” to open up the Character Map.
Start Menu – Click Start, “All Programs,” “Accessories,” and “System Tools” to find the Character Map program.
Once the Character map is open, scroll down to locate the heart symbol. Double click the symbol or click once then click on “Select” to place it in the writable space. Click “Copy” to copy it to the clipboard.
Simply place the cursor back on the Face-book page (or any other text based application) and right-click and select paste to paste the heart wherever the cursor is.
Someone that wants to say “He ? his wife!” would type in “He” then paste the heart character and continue typing “his wife!”.
Note: Although there are several different symbols available in the Windows Character Map that can be copied this way, some will not show up in Face-book and other text input locations.
10 Best Ways Of Face-book Can Get You Into Trouble
Face-book is a website that have done an amazing job of connecting people throughout the world. However, because it is so far-reaching, it is capable of causing many problems for those who use it. Here are ten ways that Face-book can get its users into trouble.
1. Investigations By Employers
People have a habit of putting a lot of their activities on Face-book. Sometimes, these aren't things you would want your boss or potential boss to see. However, employers increasingly make a point of checking the social media accounts of employees and especially potential new hires. Embarrassing photos of drunken escapades and profanity-laced comment wars are not going to reflect very positively on a potential employee. It’s always a good idea to clean up one’s Face-book page and set more stringent privacy settings before a big interview, but old posts could still resurface and convince the employer not to offer the job.
Atlas OF Facebook And Server
For years, digital marketers have been shackled to an increasingly outdated technology known as the cookie, which are still used to measure and target digital ads.
Cookies — bits of code dropped into web browsers — are known to generate poor approximations of how many people view a digital ad, inaccurate estimates of how many times any given individual sees an ad, not to mention unreliable measures of clicks and sales. Worst of all, cookies are a non-starter within mobile apps.
In a new in-depth explainer and report from BI Intelligence, we dive into how Face-book-owned Atlas aims to take digital marketing beyond the cookie. Atlas is notable for how it leverages anonymous Face-book identity data to correct cookies' inaccuracies and shine a light into what's happening within the cookie-less world of mobile apps. In addition, Atlas' ambition is to be able to connect off-line purchases and conversions to digital ads shown across mobile and the web.
Purchase the full report »
Here are a few of the report's main takeaways:
Face-book's Atlas is an ad server that also allows ad buyers to measure, target, and optimize digital and mobile ads across digital (i.e., not just on Face-book). Atlas operates separately from Facebook, does not access personal information from the social network or share marketing data with Face-book.
Atlas is pitching itself primarily based on the claim that it can go far beyond cookie-based measurement to more clearly establish the ROI of digital ads, particularly when mobile is involved. Taking measurement beyond the cookie means marketers can focus on metrics beyond the last click, and observe the multi-device process that often leads in purchasing on-line or off-line.
Atlas' ambition is also to be able to connect off-line purchases to digital ads shown across mobile and the web. To do so, it must have access to advertisers' customer data or consumer data from third-party data vendors.
Atlas has a particularly strong advantage when it comes to measuring mobile ads. Cookies don't work in mobile apps, so many marketers are flying blind when it comes to in-app ads. Atlas matches device-ID data with anatomized identity data of the user that accesses Face-book on the same device.
It's important to remember that Atlas works with ad buyers, not ad sellers. Some major brands and agencies are already using or at least testing Atlas.
Despite some clear advantages, Atlas has some crucial limitations, which are spelled out in the report. The principal one is that it will be very difficult for Face-book to wean the digital-media ecosystem off its reliance on Google's Double-click
platform, which is so well-entrenched.
In full, the 22-page report:
Explains how Atlas plans to take digital advertising beyond cookies, and the advantages this entails
Lists the limitations and barriers faced by Atlas in the context of the ad-server space
Discusses how a few agencies and brands have moved tentatively to adopt Atlas as their ad server
Includes 8 charts and 3 explainer slides on how ad serving works, how Atlas measures mobile ads, and how Atlas measures ads within browsers
Analyzes the difference between ad serving and measurement and how Atlas advances each function
Delves into market-share numbers for ad servers in the digital-ad industry
New And Latest Android Mobile Samsung S5
Samsung started pushing the Android 5.0 Lollipop update to the Galaxy S5 flagship smart phone late last year.
Soon after the update rolled out, users began reporting various bugs in the final Android 5.0
Lollipop build for the Samsung Galaxy S5. This even led the company to pause the Android Lollipop update in European regions for a major period. Samsung Norway back in March while replying a user on Facebook had confirmed that the update caused various bugs.
The company is set to fix issues with the Galaxy S5's Android 5.0 Lollipop build however, with Samsung Mobile's UK Twitter handle acknowledging the issues in Android 5.0 Lollipop will be resolved by "micro-updates" that have begun being rolled out.
It said, "Our engineers are currently sending out micro updates to help resolve any issues caused by the update. Thanks for your patience." The company was replying to a Galaxy S5 user who wanted to know when Samsung is releasing Android 5.0.1 update for the 2014 flagship. The Twitter user's query read, "When is the 5.0.1 update coming out for Galaxy S5, I've had nothing but problems since I bought the phone in January!!!"
Some of the issues affecting Samsung Galaxy S5 users after updating to Android 5.0 Lollipop include forced app crashes; heart rate sensor functionality issues; overheating, and battery drain.
A recent Android Lollipop issue reported by a Verizon Wireless consumer using the Galaxy S5 on Discussions page notes, "I just updated my Samsung S5 to [Android] Lollipop 5.0 two days ago. Now the heart rate monitor light comes on anytime the screen is on and something is near it or it is sitting face up on the desk. The Wi-Fi also is constantly scanning and changing networks. The phone also went into cool down mode today and the battery is draining from a complete charge in 6 hours with little use."
Despite Samsung promising micro-updates coming soon for the Galaxy S5 though the South Korean is yet to list the issues affecting various users updating to Android 5.0 Lollipop.
Top 6 Ways New CEOs Tips
In many industries, innovation always wins over tradition, regardless of how rich a company’s history may be. No matter who your founders or customers are or what industry acclaim you have to boast, the fact is you’re only as good as your last innovation.
This was the message I had to communicate when I walked through the doors of Avention, a 20-year-old business-intelligence company that had recently undergone a rebrand. The company was going through some big changes, and although the technology team was stellar, the product was strong and the market was hot, A
vention was in need of a new leadership team that could reestablish a value system, reinvigorate culture and help the company reach its market potential.
Like any new CEO, my first big decision was where to start. How can a complete stranger walk into an established organization and expect to quickly transform the internal brand? There’s no magic formula, but here is the process that worked for me:
Related: The One True Measure of a Great Leader
1. Introduce yourself and establish expectations.
When you’re the new guy at an established company, building trust and respect is paramount. Start off on the right foot by taking the time to meet as many employees as possible during your first couple weeks. It may sound obvious but many new leaders get so overwhelmed at the beginning that they forget to allot time for simply walking around the office and shaking employees’ hands. These initial conversations also give you the chance to set clear expectations, both in terms of what employees can expect from you as well as what you expect from them.
2. Open the lines of communication.
As a new CEO, you can spend hours poring over historical documents and financial reports to identify the company’s challenges and opportunities. But when it comes to developing culture and values, the most valuable intel comes from veteran employees. Not only can these people articulate what they think the current value system is but by observing their behavior and questions, you start to gain a clear sense of what (and sometimes who) is missing.
I remember at one of the first town halls I hosted at Avention, I presented some of the company’s financials and immediately noticed that most of the team looked shocked. It was clear that this type of financial information -- good or bad -- had previously been kept behind closed doors. I knew then that the values system we developed would need to emphasize the importance of transparency.
3. Establish values.
When you’re leading a company during a transitional phase, it’s incredibly important to establish clear values that employees can rally around. Some people say that corporate values are the epitome of phoniness and that’s true if all you’re doing is sticking them up on a wall or your website. But it’s important to remember that companies don’t have values; people have values. When you start to think that way, a value system becomes a guiding force for hiring, performance reviews and the way people approach their day-to-day work. Values help ensure that your employees, especially those who may feel jaded, lost or disengaged, have something to stand behind. This ultimately makes it that much easier to attract and retain a world-class workforce, something imperative for any new CEO.
4. Align people with values.
Once values are in place, a new CEO has a clear framework to help him or her build the right leadership team. It’s important to act swiftly, as the people who lead various aspects of the company will be the strongest representation of the internal brand you’re working to build.
Related: Give Your Employees an Identity Worthy of Ownership
One thing I emphasized early on at Avention was the importance of sharing bad news and giving candid feedback -- something that hadn’t been happening before. When I met with current or potential members of the leadership team, I always asked them: “What should I be doing better?” If they said “nothing” or could not come up with an answer, it was a clear sign to me that they did not embody our values. It’s never easy to let people go, especially when you’re the new guy, but the more transparent you are at first, the less surprised the team will be about your hiring decisions.
5. Inspire the team.
Once you have the right team in place, you need to establish structures that will enable the new value system to thrive. At Avention, one of our new values was “A Passion for the Customer.” To ensure that this truly stayed top-of-mind with employees, I had to do more than just tell them it was important, I had to show them. One of my first priorities was to create an incentive program designed to reward all team members -- not just the sales team -- for helping increase renewal rates, promoter scores and customer engagement. This sent a clear message and helped instill relevancy for team members across the company.
6. Seek outside input.
As a new leader at an established company, there’s no question that you’ll have to face plenty of tough decisions during your first few months. Having an unbiased third party who can help you think through these decisions can be invaluable.
The Best of Mozilla: Fast Second Follow
Mozilla rarely moves the consumer needle with its own inventions. Rather, the company is at its best — and its best is revolutionary — when it takes an existing product and re-envisions it as a public benefit product, where the people making have a top-down directive to never include revenue as part of a decision making process.
Mozilla, a nonprofit, must capitalize on its record of fast-second-follow success, identifying products that have already found consumer traction and then remaking them Mozilla-style.
Five years ago, I joined Mozilla as part of an aqui-hire. I was a founding member of Mozilla Labs, and served as creative lead during the Firefox 4 release. While I am no longer on the paid staff, I carry Mozilla DNA and often find myself reiterating Mozilla mantras. Safe to say, any critique I offer here is not meant as a slight; every company has strengths and weaknesses, and it’s important to know how to play to those fortes. “Once a king or queen of Narnia, always a king or queen of Narnia”, noveslist C.S. Lewis famously wrote. And, so it goes in open-source projects: Once a contributor to Mozilla, always a contributor to Mozilla.
When Firefox debuted in 2002, Microsoft had all but abandoned its Internet Explorer development team. By streamlining and improving an existing product, Mozilla revitalized the stagnating browser space to protect the most important shared resource of our times. Today, the space is intensely competitive, with browsers from Apple, Google, and Microsoft each vying to be the fastest, most capable and most compliant. The majority of web now surfs on open-source browsers. That’s a huge Mozilla victory, and a huge victory for the open web.
The story of Thunderbid, Mozilla’s desktop email application, recapitulates the theme. Thunderbird started strong as a second-mover with tens of millions of users. But, as technology and consumers moved to web solutions — relying on heavy servers and light clients that provided rich and instant access to email from anywhere — desktop clients became less and less relevant. Mozilla is culturally distrustful of any product that centralizes user data, so it invested in desktop-centric, server-agnostic solutions. It lost the email space not for lack of trying: Mozilla created its first and only spin-off, Mozilla Messaging, to tackle the problem. Caught between an inability to innovate as a first-mover on mobile and culturally unable to be a second-mover on the web, Mozilla’s email presence atrophied. Mozilla Messaging was soon rolled into Mozilla Labs and the company quietly lost the war, letting the the future of communication fall into the control of companies that are ultimately beholden to their bottom line, and not the user’s best interest. This isn’t a conspiracy-theory what-if: In 2006, Yahoo was called to testify before congress for yielding to the Chinese government’s demand for access to a journalist’s email. Yahoo’s capitulation, which resulted in 10 years of jail time for the journalist. This is, of course, just one example of many.
Late or Strategic Second-Mover?
When it comes to mobile, there’s still hope. Mozilla is a second-mover with the Firefox phone. The company has taken something that we know works for consumers and recreated it with open DNA — the user interest trumping the commercial. It’s a make-or-break moment for Mozilla.
Let’s take another example: Instagram.
The app now has more than 100 million users, nearly a fifth the size of Firefox, with an accelerating growth curve. Its square photos document a society grappling with the sudden ubiquity of cameras capable of capturing and broadcasting every moment. Instagram has always been a good actor, with a fantastic set of APIs, but should we trust the future of this shared resource to Facebook?
MySpace and Neopets taught a generation how to mess with HTML, covertly turning consumers into producers. Mozilla can bring that same educational opportunity to Instagram. We can make it open and add the ability to analogously “view-source.” Why not use Javascript to modify, create and share new filters? Or change the layout of your profile? Or clone and host your own version of Instagram that has video? In other words, let both users and developers remix Instagram.
In doing so Mozilla could become a powerful second-mover in the market. But why stop with Instagram? We should be prying open Mailbox, Gmail, AWS, and many others. By amplifying an existing product and injecting it with our DNA, Mozilla can defend the open web.
Developing products that embody openness is the most powerful way to shape the policy conversation. Back those products with hundreds of millions of users and you have a game-changing social movement. Expanding those social movements beyond the browser is the legacy that Firefox deserves.
How to get Money with YouTube
Hi, my name is George Strompolos. I’m the CEO and founder of Full screen. We help people grow their channels on YouTube with business services, technology support, and advertising opportunities. And today we’re going to be talking about how to earn money on YouTube. So YouTube has a relatively newer program called YouTube Rentals. The partner program is obviously based on sharing the advertising revenue when videos are viewed. Rentals are a little different — they don’t function through advertising, they function through viewers actually paying a small fee to watch a video. So let’s say you created a short film, and you want to allow people to rent that film for maybe $1.99. So you as the creator, you upload the film, you set up the rental to have a certain price point, and then you publish it to YouTube. Now when people watch that video there actually only presented with typically a trailer or a short preview of the video, and they’re asked to then pay the price in order to "rent the video." Now when you rent a video as a user, you’re basically getting the option to view that video for, I believe, 24 hours. It’s really a video-on-demand service provided by YouTube. Some people aren’t willing to leave their content up to the advertising revenue sharing program, but they are willing to have it there if they get paid a certain amount, and that’s what function rentals provide.
Definition of Satellite:
Definition of Satellite:
It is an object that orbits about some body (i.e planet, dwarf planet, asteroid, or star of a larger size.) capable of exerting a gravitational force.
ADVANTAGES:
1) Used in long distance communications such as in television,fax,internet etc
2) Used in television and radio broadcasting etc
3) Weather for casting (i.e) in prediction of rainfall, snowfall, storm etc
4) Agricultural monitoring (i.e) crop disease, crop failure.
5) Collecting information about other planets, stars and other celestial bodies
Generally, a satellite has been classified in following classes:
(i) Natural Satellites
A natural satellite is a celestial body that orbits a planet or other body larger than itself. The term is normally used to identify non-artificial satellites of planets, dwarf planets, or minor planets. Such objects are often called moons. There are upto 240 known moons within the solar system, including 163 orbiting the planets, four orbiting dwarf planets.
Earth's Moon is the most obvious example and was the only one known until the discovery of the Jupiter in 1610. All the solar system's planets except Mercury and Venus have moons, which vary greatly in size, composition (from rock to mostly ice), and activity (from cold and inert to volcanic). Some asteroids are also known to have their own moons.
The orbital properties and compositions of natural satellites provides us with important information on the origin and evolution of the satellite system. Especially a system of natural satellites orbiting around a gas giant can be regarded as a miniature solar system that contains precious clues for studying the formation of solar systems.
Irregular vs Regular Satellites
Natural satellites have been further divided in two classes:
(a) Regular satellite is a natural satellite following a relatively close and generally prograde orbit with little orbital inclination or eccentricity. They are believed to have formed in orbit about their primary, as opposed to irregular moons, which were captured. The regular satellites are two of Mars, inner five of Jupiter, inner seven of Saturn etc.
(b) Irregular satellite is a natural satellite following a distant, inclined, and often eccentric and retrograde orbit. They are believed to have been captured by their parent planet, unlike regular satellites, which form in situ.
(ii) Artificial Satellites:
Artificial satellite is a man-made device placed in orbit around the earth, moon, or another planet used for communication and transmitting scientific information to earth.
The electrical power required by satellite is provided by panels of solar cells and small nuclear reactors. Satellites are kept in the correct position by small rocket motors called thrusters. They orbit with their disc aerials pointing to Earth. When the thrusters run out of fuel, the satellite eventually drifts out of position and becomes unusable. Satellites are equipped with radio transmitters, radio receivers and electronic circuits for storing data.
The first artificial satellite, Sputnik I, was launched by the USSR on October 4, 1957 into orbit around Earth. Since then, thousands have been sent into orbit around Earth as well as the Moon, Venus, Mars, Jupiter, and other bodies.
Artificial satellites have many uses, including relaying communication signals, making accurate surveys and inventories of the earth's surface and weather patterns, and carrying out scientific experiments.
Functions and Types of Satellites:
Satellites can be divided into six principal types based on their functions i.e.
(i) Research
(ii) Communications
(iii) Weather
(iv) Navigation
(v) Applications and
(vi) Military satellites
(I) Research satellites:
These measure fundamental properties of outer space, e.g., magnetic fields, the flux of cosmic rays and micrometeorites, and properties of celestial objects that are difficult or impossible to observe from the earth. Early research satellites included a series of orbiting observatories designed to study radiation from the sun, light and radio emissions from distant stars, and the earth's atmosphere. Notable research satellites have included the Hubble Space Telescope , the Compton Gamma-Ray Observatory, the Infrared Space Observatory, and the Solar and Heliospheric Observatory.
(ii) Communications satellites:
These provide a worldwide linkup of radio, telephone, and television. The first communications satellite was Echo 1, launched in 1960. Relay 1 and Tel star 1, both launched in 1962, were the first active communications satellites; Tel-star 1 relayed the first live television broadcast across the Atlantic Ocean. In principle, these can provide complete coverage of the earth's surface, instantaneous communications throughout the world and a variety of telecommunications tasks.
(iii) Weather satellites or meteorological satellites:
These provide continuous, up-to-date information about large-scale atmospheric conditions such as cloud cover and temperature profiles. Trios 1, the first such satellite, was launched in 1960; it transmitted infrared television pictures of the earth's cloud cover and was able to detect the development of hurricanes and to chart their paths. Current weather satellites can transmit visible or infrared photos, focus on a narrow or wide area, and maneuver in space to obtain maximum coverage.
(iv) Navigation satellites:
These were developed primarily to satisfy the need for a navigation system that nuclear submarines could use to update their inertial navigation system. This led the U.S. navy to establish the Transit program in 1958. Transit satellites provided a constant signal by which aircraft and ships could determine their positions with great accuracy. It provides greater accuracy in a shorter time; users can obtain information 24 hours a day. These satellites were of enormous help to transportation companies, especially transportation over water and through the air.Navigation satellites are also used for distance measurements for instance between buildings.
(v) Applications satellites:
These are designed to test ways of improving satellite technology itself. Areas of concern include structure, instrumentation, controls, power supplies, and telemetry for future communications, meteorological, and navigation satellites.
(vi) Military Satellites
Satellites also have been used for a number of military purposes, including infrared sensors that track missile launches; electronic sensors that eavesdrop on classified conversations; and optical and other sensors that aid military surveillance. These are Very similar to weather satellites but generally with higher resolution cameras and instead of normal communications equipment, they use encryption as well.
Satellites can be divided into six principal types based on their functions i.e.
(i) Research
(ii) Communications
(iii) Weather
(iv) Navigation
(v) Applications and
(vi) Military satellites
(I) Research satellites:
These measure fundamental properties of outer space, e.g., magnetic fields, the flux of cosmic rays and micrometeorites, and properties of celestial objects that are difficult or impossible to observe from the earth. Early research satellites included a series of orbiting observatories designed to study radiation from the sun, light and radio emissions from distant stars, and the earth's atmosphere. Notable research satellites have included the Hubble Space Telescope , the Compton Gamma-Ray Observatory, the Infrared Space Observatory, and the Solar and Heliospheric Observatory.
(ii) Communications satellites:
These provide a worldwide linkup of radio, telephone, and television. The first communications satellite was Echo 1, launched in 1960. Relay 1 and Tel star 1, both launched in 1962, were the first active communications satellites; Tel-star 1 relayed the first live television broadcast across the Atlantic Ocean. In principle, these can provide complete coverage of the earth's surface, instantaneous communications throughout the world and a variety of telecommunications tasks.
(iii) Weather satellites or meteorological satellites:
These provide continuous, up-to-date information about large-scale atmospheric conditions such as cloud cover and temperature profiles. Trios 1, the first such satellite, was launched in 1960; it transmitted infrared television pictures of the earth's cloud cover and was able to detect the development of hurricanes and to chart their paths. Current weather satellites can transmit visible or infrared photos, focus on a narrow or wide area, and maneuver in space to obtain maximum coverage.
(iv) Navigation satellites:
These were developed primarily to satisfy the need for a navigation system that nuclear submarines could use to update their inertial navigation system. This led the U.S. navy to establish the Transit program in 1958. Transit satellites provided a constant signal by which aircraft and ships could determine their positions with great accuracy. It provides greater accuracy in a shorter time; users can obtain information 24 hours a day. These satellites were of enormous help to transportation companies, especially transportation over water and through the air.Navigation satellites are also used for distance measurements for instance between buildings.
(v) Applications satellites:
These are designed to test ways of improving satellite technology itself. Areas of concern include structure, instrumentation, controls, power supplies, and telemetry for future communications, meteorological, and navigation satellites.
(vi) Military Satellites
Satellites also have been used for a number of military purposes, including infrared sensors that track missile launches; electronic sensors that eavesdrop on classified conversations; and optical and other sensors that aid military surveillance. These are Very similar to weather satellites but generally with higher resolution cameras and instead of normal communications equipment, they use encryption as well.
Subscribe to:
Posts (Atom)