Secure Payments Anywher in the World by Free Paypal Account

Sign up for PayPal and start accepting credit card payments instantly.

Wednesday, June 16, 2010

What is Keystroke Logging ?


What is Keystroke Logging?

Keystroke Monitoring is a process by which a computer system administrator views or records both the keystrokes entered by a computer user and the computer's response. Examples of keystroke monitoring would include viewing characters as they are typed by users, reading users' email, and viewing other recorded information typed by users. Some forms of everyday system maintenance record user keystrokes; this could incorporate keystroke monitoring if the keystrokes are saved together with the user identification so that an administrator can determine the keystrokes entered by
specific users.

Keystroke software provides system administrators with the ability to capture keystrokes entered by the computer users, both alphanumeric and invisible characters. Gather usernames and passwords, capture hate messages and 2-sided chat conversations.

Keylogger Removal

Some keyloggers may fall under the category of "Spyware". Spyware is any software program used to track your computer activity, thus put you and your personal information at risk.

If a keylogger is not an invisible one, then it should be relatively easy to detect it and remove it. If it is an invisible one or running in stealth mode, it can be a difficult procedure.

The safest way to remove stealth mode keyloggers is to use an anti-spyware program or a keylogger removal program, both of which can be downloaded from the Internet.

Another way to remove keyloggers is by going into your registry editor and searching for traces of keyloggers and physically deleting them. Please note that the registry editor is a highly sensitive area of you computer

and great damage to your computer can be caused if the wrong files get tampered with or deleted by mistake. If either of the two options above are not something you are comfortable carrying out, please contact your local computer dealer.

Advanced Keylogger

Advanced Keylogger by Eltima Software is a powerful key logging program that will allow for full keystroke recording including usernames and passwords. Once recorded, Advanced Keylogger then encrypts the data and sends it in an easy to read format to a previously specified email address, providing the the most flexibility to computer monitoring. Here are some other neat features of Advanced Keylogger:

  1. Take screenshots periodically of previously visited webpages
  2. Monitoring of text and graphics copied to the clipboard
  3. Runs completely in stealth/invisible mode
  4. Monitors printing
  5. Monitors modified files and folders

Advanced Keylogger is a free to use program and a quick search in your favorite search engine should lead you to a download page. Advanced keylogger runs on Windows 95/98/2000/ME/NT/XP.

Protecting Yourself Against Keyloggers

Those who utilize computers with Internet access in free public places such as Internet Cafes have no way of knowing if the computer they are sitting at has a Keylogger installed. These users have no reliable way of knowing if they are protected from a spy keylogger, and no alternative to typing in passwords or credit card numbers.

Here is a simple trick to help keep your information safe when using public Internet terminals.

If you are accessing sensitive information and are required to type in a password or credit card number, follow this procedure. Once you are looking at the screen that contains the password or credit card number field, open up another program that will allow you to type in characters such as notepad or wordpad (anything that will allow you to type characters will do). Because keyloggers record characters in succession regardless of where they are typed, we are going throw a few extra characters into the mix.

So now you have two windows open and you are ready to type your password. Let's choose an easy password to use as an example:

Password = lizard2

What you are going to do is start by typing a couple of random characters into the notepad or wordpad like this:

Example = 8y3

Then move to your password or credit card field and type the first or first couple of letters or numbers of your password or credit card. Continue to switch between the notepad and the actual password or credit card field adding a few characters at a time to each until you have completed adding your password or credit card number. Once you are finished, the data that the keylogger has recorded looks something like this:

Example = 8y3li8yz3ear7jd2

If you look closely, you will see the password of lizard2 mixed in with all of the other characters!

Hardware Keyloggers

A hardware keylogger is a device that connects between your keyboard and the computer. Once installed, the hardware keylogger starts to capture keystrokes as they pass through, to it's own internal memory.

An obvious benefit of a hardware keylogger is that it cannot be detected by software or spyware scanners. Another notable benefit, if the computer being monitored is connected to the Internet, the hardware keyloggers ability to store sensitive data in its own internal memory chip keeps the data from being accessible remotely or copied to a disk. Physical access to the keylogger would be required to gain access to the data.

Hardware keyloggers can also be broken into 2 sub-categories:

  1. Unsecured onboard memory
  2. Encrypted (secured) onboard memory

If a hardware keylogger does not encrypt or secure its data then the data is essentially available to anyone who can gain physical access to it.

If the hardware keylogger uses strong encryption to secure its data, it then becomes impossible for someone to gain access to its internal memory for the purpose of stealing the data.

Software Keyloggers

Software keyloggers are programs that most often run in the background of a computer recording keystrokes that are pressed, and saving the recorded data to a file on the hard drive.

Software based keyloggers and be broken into two sub-categories:

  1. Viewable in the Task Manager
  2. Invisible or Stealth Keyloggers

Visible keyloggers can easily be disabled by the user by entering the Task Manager (CTRL+ALT+DEL), selecting the keylogger from the list of running applications and clicking on End Task.

Some keyloggers that are invisible or stealth can also be noticed and disabled but not so easily. A user must have the appropriate access to do so as the program does not show up where users with restricted access to see it.

One thing to remember about all software keyloggers is that recorded information is stored locally on the PC where it is recording. This information can be obtained by someone locally or by an intruder, altered and removed for whatever purpose they see fit.

Is A Keylogger Program Appropriate For My Business?

There are numerous uses for Keyloggers. Similar to a telephone recording system in a call center, the Keylogger silently or invisibly records all keystrokes typed, including emails, word documents, chatroom activity, IRC, instant messages, website addresses and web searching.
Many businesses use Keyloggers on their computers to monitor employees for Internet and computer usage compliance. Keyloggers can monitor and record the activity and allow a company to act on unauthorised activity before it becomes too late.

If your business falls under any of the falling categories, then a Keylogger may be required:

  1. Companies dealing with Financial Information
  2. Companies dealing with Security Information
  3. Law Enforcement Agencies
  4. Coding Companies
  5. Education Facilities

A keylogger is a tool that you may require in your company if your staff is dealing with sensitive information. Financial Institutions, Education Facilities and Law Enforcement Agencies are all examples of businesses where the uses of keylogger would be an asset to ensure private information is not misused.

Key Recorder Settings - What Can I Capture?

Key recording software works as a recording tool capturing nearly every keystroke that gets entered through a keyboard. From the data that gets recorded, you configure the program to flag certain events. You can configure the software flag when certain words get typed or to flag when certain words show up on webpages. This recorded data then gets stored on the PC for you to later retrieve. Some keystroke recorders have the built in functionality to send an email to a specified email address for you to view recorded data remotely. One thing to note is that if you configure your keystroke recording software to send the recorded data to you via an email, and there is a firewall running on the same PC, there will be notification to the user using the PC at that time that there is suspicious activity going on. The firewall software will detect that "something" is trying to send an email from you computer. This could eliminate the element of invisibility.

A Keystroke Recorder is configurable to flag certain criteria based on your needs. WebWatcher's Keystroke Recorder sends all recorded data and flagged data to a remote web page for you to view privately and away from the person being monitored. The flagged data can be certain typed words in a particular program or particular words view on a web page. What's more is that you can have the software take screen shots as well, if your criteria are met.

What Is An Invisible Keylogger?

Invisible to the human eye, an Invisible Keylogger is just that! While each keystroke is being recorded from both sender and receiver, both parties are none the wiser. There are no program directories that show up, no presence in Add/Remove Programs, and no keys in the registry. To the user on the computer, nothing has changed, well... almost nothing!

Keyloggers can come in two different forms, hardware and software. Hardware Keyloggers plug in between the keyboard and the computer and are visible to the user. Software Keyloggers are software applications that get installed on the computer and run in the background. Some software versions are invisible to the user and some are not. Keylogger software by WebWatcher is a completely invisible Keylogger to the user and shows not trace of it running anywhere on the PC.

Should I Use A Keylogger On My Home Computer?

Depending on who is using the home computer, and what your reasons are for using one will depend on whether or not a keylogger is right for you. If you have young children who are not actively using chat programs, or email and really only have a couple of websites that they visit, then a keylogger is not likely required for monitoring purposes.

If you have older children who are on the Internet frequently, using email and chat programs, or perhaps a spouse or significant who you feel may be up to no good, then a keylogger is probably a tool to have working for you.

If you are questioning the use of the computer in your home and what what users are doing on it, then a Keystroke Logger is something that should be a part of your monitoring solution. Have questions answered by being able to record and see what is being typed on you computer, both online and offline.

Common Terminologies used in Internet Security


If your a newbie in Internet security,you have come to the right place.The following is information on some common terms used in Internet security.So,next time you don't have to scratch your head when someone uses these on you or when you use it.

Firewall: is a system acts that acts as a barrier between your computer network and the internet.A firewall controls the flow of information according to security policies.

Hacker: can be anyone specializing in accessing computer based systems for illegal purposes or just for fun of it.

IP spoofing: is an attempt to access your system by pretending like another system.This is done by setting up a system with an IP address that you normally trust.

Sniffing: is the spying on electronic transmissions to access data. This mostly occurs in privately owned LAN networks connected to the web.

Trojan Horse: a program pretending like useful software,while its actual strategy is to access,steal or destroy user data and access authorization.Apart from destroying information, Trojan's can also create back door on your system for stealing confidential information.

Virus: is a program that attaches itself to a programmer file. This allows it to spread across networks and cause damage to software and hardware. To operate, viruses require execution of the attached file.

Worm: A worm is almost similar to a virus, except that it doesn't need the execution of any executable file to get activated. It can also replicate itself as it travels across networks...

What Is CRM Software System ?


Customer relationship management is a broadly recognized, widely-implemented strategy for managing and nurturing a company’s interactions with clients and sales prospects. It involves using technology to organize, automate, and synchronize business processes—principally salesmarketing, customer service, and technical support. The overall goals are to find, attract, and win new clients, nurture and retain those the company already has, entice former clients back into the fold, and reduce the costs of marketing and client service.

OR IN SIMPLE LANGUAGE

CRM is the accepted purpose of Customer Relationship Management is to enable organizations to better manage their customers through the introduction of reliable processes and procedures for interacting with those customers. In today's competitive business environment, a successful CRM software solution cannot be implemented by only installing and integrating.

CRM software application designed to support CRM processes. A holistic approach to CRM is vital for an effective and efficient CRM policy. This approach includes training of employees, a modification of business processes based on customers' needs and an adoption of a relevant IT CRM system (including software and maybe hardware) and/or usage of IT CRM Services that enable the organization or company to follow its CRM strategy.

CRM Services can even replace the acquisition of additional hardware or CRM software application licences.The term CRM "Customer Relationship Management is used to describe either the CRM software or the whole business strategy (or lack of one) oriented on customer needs. The second one is the description which is correct. The main misconception of CRM is that it is only a software solution application, instead of whole business strategy. Major areas of CRM Software System Solutions focus on service automated processes, personal information gathering and processing, and self-service. It attempts to integrate and automate the various customer serving processes within a company.

A CRM software solution application can manage and run your entire business. From prospect and client contact tools to billing history and bulk email management. The software CRM Sosystem allows you to maintain all customer records in one centralized location that is accessible to your entire organization through password administration. A front office CRM software system is set up to collect data from the customers for processing into the data warehouse. The data warehouse is a back office CRM Software system used to fulfill and support customer orders. All customer information is stored in the data warehouse. A back office CRM software application makes it possible for a company to follow sales, orders, and cancellations. Special regressions of this data can be very beneficial for the marketing division of a firm.

A integrated CRM software system is often also known as front office solutions. This is because they deal directly with the customer.
activities, but also those for Once simply a label for a category of software tools, today, it generally denotes a company-wide business strategy embracing all client-facing departments and even beyond. When an implementation is effective, people, processes, and technology work in synergy to increase profitability, and reduce operational costs.

Benefits

These tools have been shown to help companies attain these objectives:

  • Streamlined sales and marketing processes
  • Higher sales productivity
  • Added cross-selling and up-selling
  • Improved service, loyalty, and retention
  • Increased call center efficiency
  • Higher close rates
  • Better profiling and targeting
  • Reduced expenses
  • Increased market share
  • Higher overall profitability
  • Marginal costing

Samsung Mobile Phone Codes To Perform Various Actions


Most popular and widely accepted
codes for some samsung mobile phones.


code: *2767*JAVA# -this code provides a Java Reset.
code: *2767*MEDIA# -this code will delete All Sounds and Pics and other media on the phone.
code: *2767*WAP# Wap -this code will erase or delete any wap settings from your samsung phone.
code: *2767*CUST# -this code will Reset EEPR0M memory chip of your samsung phone.
code: *2767*FULL# -this code will completely earse all the contents of EEPR0M.
code: *#06# -this code is same as in nokia for IMEI code
code: *#9998*4357# -to open the Help Menu
code: *#9998*5282# -Java menu for gprs and csd setings.
code: *#9999#0# -to enable Monitor Mode
code: *#9999# or *#9998*9999# -to know Software Version of the phone
code: *#8888# or *#9998*8888# -to know the Hardware Version of the phone like manufacture date etc.

List of RUN Commands In Windows


Run command is very useful, but sometimes it is forgotten. Use it sometimes and you will find how powerful it is.

  • Accessibility Controls - access.cpl
  • Accessibility Wizard - accwiz
  • Add Hardware Wizard - hdwwiz.cpl
  • Add/Remove Programs - appwiz.cpl
  • Administrative Tools - control admintools
  • Automatic Updates - wuaucpl.cpl
  • Bluetooth Transfer Wizard - fsquirt
  • Calculator - calc
  • Certificate Manager - certmgr.msc
  • Character Map - charmap
  • Check Disk Utility - chkdsk
  • Clipboard Viewer - clipbrd
  • Command Prompt - cmd
  • Component Services - dcomcnfg
  • Computer Management - compmgmt.msc
  • Control Panel - control
  • Date and Time Properties - timedate.cpl
  • DDE Shares - ddeshare
  • Device Manager - devmgmt.msc
  • Direct X Troubleshooter - dxdiag
  • Disk Cleanup Utility - cleanmgr
  • Disk Defragment - dfrg.msc
  • Disk Management - diskmgmt.msc
  • Disk Partition Manager - diskpart
  • Display Properties - control desktop
  • Display Properties - desk.cpl
  • Dr. Watson System Troubleshooting Utility - drwtsn32
  • Driver Verifier Utility - verifier
  • Event Viewer - eventvwr.msc
  • Files and Settings Transfer Tool - migwiz
  • File Signature Verification Tool - sigverif
  • Findfast - findfast.cpl
  • Firefox - firefox
  • Folders Properties - control folders
  • Fonts - control fonts
  • Fonts Folder - fonts
  • Free Cell Card Game - freecell
  • Game Controllers - joy.cpl
  • Group Policy Editor (for xp professional) - gpedit.msc
  • Hearts Card Game - mshearts
  • Help and Support - helpctr
  • HyperTerminal - hypertrm
  • Iexpress Wizard - iexpress
  • Indexing Service - ciadv.msc
  • Internet Connection Wizard - icwconn1
  • Internet Explorer - iexplore
  • Internet Properties - inetcpl.cpl
  • Keyboard Properties - control keyboard
  • Local Security Settings - secpol.msc
  • Local Users and Groups - lusrmgr.msc
  • Logs You Out Of Windows - logoff
  • Malicious Software Removal Tool - mrt
  • Microsoft Chat - winchat
  • Microsoft Movie Maker - moviemk
  • Microsoft Paint - mspaint
  • Microsoft Syncronization Tool - mobsync
  • Minesweeper Game - winmine
  • Mouse Properties - control mouse
  • Mouse Properties - main.cpl
  • Netmeeting - conf
  • Network Connections - control netconnections
  • Network Connections - ncpa.cpl
  • Network Setup Wizard - netsetup.cpl
  • Notepad notepad
  • Object Packager - packager
  • ODBC Data Source Administrator - odbccp32.cpl
  • On Screen Keyboard - osk
  • Outlook Express - msimn
  • Paint - pbrush
  • Password Properties - password.cpl
  • Performance Monitor - perfmon.msc
  • Performance Monitor - perfmon
  • Phone and Modem Options - telephon.cpl
  • Phone Dialer - dialer
  • Pinball Game - pinball
  • Power Configuration - powercfg.cpl
  • Printers and Faxes - control printers
  • Printers Folder - printers
  • Regional Settings - intl.cpl
  • Registry Editor - regedit
  • Registry Editor - regedit32
  • Remote Access Phonebook - rasphone
  • Remote Desktop - mstsc
  • Removable Storage - ntmsmgr.msc
  • Removable Storage Operator Requests - ntmsoprq.msc
  • Resultant Set of Policy (for xp professional) - rsop.msc
  • Scanners and Cameras - sticpl.cpl
  • Scheduled Tasks - control schedtasks
  • Security Center - wscui.cpl
  • Services - services.msc
  • Shared Folders - fsmgmt.msc
  • Shuts Down Windows - shutdown
  • Sounds and Audio - mmsys.cpl
  • Spider Solitare Card Game - spider
  • SQL Client Configuration - cliconfg
  • System Configuration Editor - sysedit
  • System Configuration Utility - msconfig
  • System Information - msinfo32
  • System Properties - sysdm.cpl
  • Task Manager - taskmgr
  • TCP Tester - tcptest
  • Telnet Client - telnet
  • User Account Management - nusrmgr.cpl
  • Utility Manager - utilman
  • Windows Address Book - wab
  • Windows Address Book Import Utility - wabmig
  • Windows Explorer - explorer
  • Windows Firewall - firewall.cpl
  • Windows Magnifier - magnify
  • Windows Management Infrastructure - wmimgmt.msc
  • Windows Media Player - wmplayer
  • Windows Messenger - msmsgs
  • Windows System Security Tool - syskey
  • Windows Update Launches - wupdmgr
  • Windows Version - winver
  • Windows XP Tour Wizard - tourstart
  • Wordpad - write
  • How to recover the deleted blog ?TOS voilation

    Blogger is really going all out to delete blogs which are splogs (spam blogs) and those not confirming to their Blogger Terms of Service which unfortunately is resulting in many false positive (blogs deleted which are not splogs). I was a victim too when one of my environmental blog - Aerator - an environmental blog was deleted for supposed "TOS violation" which it is not. It is an environmental blog with an original innovation Method to increase efficiency of wastewater aerator

    If yours too had been wrongly deleted, follow the steps below which I used to get my blog restored:

    Step 1. You may have received an email informing you of the blog being deleted:

    Your blog at http://aerator.blogspot.com/ has been reviewed and confirmed as in violation of our Terms of Service for: SPAM. In accordance to these terms, we've removed the blog and the URL is no longer accessible.

    For more information, please review the following resources:

    Blogger Terms of Service: http://blogger.com/terms.g
    Blogger Content Policy: http://blogger.com/content.g

    Go to your Dashboard and scroll to the bottom where you will see that blog which had been deleted together with a link Restore (see screen shot below):

    Link

    Click on that Restore link and complete the captcha (word verification) in the resulting window to verify you are human.

    Step 2. Submit an entry to the Appeal Spreadsheet and enter your blog URL into the appeal box (see screen shot below) and click SUBMIT:



    Step 3: Post a report in Blogger Help Forum: Something is broken and wait 2 days. Remember to "Favorite" Google Forum star for favoriting a thread that thread and/or copy-paste the thread URL into a Notepad file to save somewhere safe for future reference so that you can get back to that thread when you need to.



    Incidentally, in that thread, I had mentioned in passing that the blog has an original innovation for its content and I do not know if that helped, but for sure, it would not harm my quest to get the blog restored.

    Step 4. If after 2 days your blog has still not been restored, go back to that thread and bump it up with an appeal to any Blog*Star to help escalate it to a Blogger Employee and then wait and pray.

    What is the difference between GSM and CDMA?


    1. GSM (Global System for Mobile Communications).....GSM is the “branded” term referring to a particular use of TDMA (Time-Division Multiple Access) technology. GSM is the dominant technology used around the globe and is available in more than 100 countries. It is the standard for communication for most of Asia and Europe. GSM operates on four separate frequencies: You’ll find the 900MHz and 1,800MHz bands in Europe and Asia and the 850MHz and 1,900MHz (sometimes referred to as 1.9GHz) bands in North America and Latin America. GSM allows for eight simultaneous calls on the same radio frequency and uses “narrowband” TDMA, the technology that enables digital transmissions between a mobile phone and a base station. With TDMA the frequency band is divided into multiple channels which are then stacked together into a single stream, hence the term narrowband. This technology allows several callers to share the same channel at the same time.

    2. CDMA (Code Division Multiple Access).......CDMA takes an entirely different approach from GSM/TDMA. CDMA spreads data out over the channel after the channel is digitized. Multiple calls can then be overlaid on top of one another across the entire channel, with each assigned its own “sequence code” to keep the signal distinct. CDMA offers more efficient use of an analog transmission because it allows greater frequency reuse, as well as increasing battery life, improving the rate of dropped calls, and offering far greater security than GSM/TDMA. For this reason CDMA has strong support from experts who favor widespread development of CDMA networks across the globe. Currently, you will find CDMA mostly in the United States, Canada, and North and South Korea. (As an interesting aside, CDMA was actually invented for the military during World War II for field communications.)

    3. The Main points of contention between TDMA and CDMA is as below:-
    a. Data Transfer Speed:.....With the advent of cellular phones doing double and triple duty as streaming video devices, podcast receivers and email devices, speed is important to those who use the phone for more than making calls. CDMA has been traditionally faster than GSM, though both technologies continue to rapidly leapfrog along this path. Both boast "3G" standards, or 3rd generation technologies. EVDO, also known as CDMA2000, is CDMA´s answer to the need for speed with a downstream rate of about 2 megabits per second, though some reports suggest real world speeds are closer to 300-700 kilobits per second (kbps). This is comparable to basic DSL. EVDO is in the process of being deployed. It is not available everywhere and requires a phone that is CDMA2000 ready. GSM´s answer is EDGE (Enhanced Data Rates for GSM Evolution), which boasts data rates of up to 384 kbps with real world speeds reported closer to 70-140 kbps. With added technologies still in the works that include UMTS (Universal Mobile Telephone Standard) and HSDPA (High Speed Downlink Packet Access), speeds reportedly increase to about 275—380 kbps. This technology is also known as W-CDMA, but is incompatible with CDMA networks. An EDGE-ready phone is required.

    b. Subscriber Identity Module (SIM) cards: ........In most of the countries only GSM phones use SIM cards. The removable SIM card allows phones to be instantly activated, interchanged, swapped out and upgraded, all without carrier intervention. The SIM itself is tied to the network, rather than the actual phone. Phones that are card-enabled can be used with any GSM carrier. The CDMA equivalent, a R-UIM card, is only available in parts of Asia . CDMA carriers require proprietary handsets that are linked to one carrier only and are not card-enabled. To upgrade a CDMA phone, the carrier must deactivate the old phone then activate the new one. The old phone becomes useless

    c. Roaming: .......For the most part, both networks have fairly concentrated coverage in major cities and along major highways. GSM carriers, however, have roaming contracts with other GSM carriers, allowing wider coverage of more rural areas, generally speaking, often without roaming charges to the customer. CDMA networks may not cover rural areas as well as GSM carriers, and though they may contract with GSM cells for roaming in more rural areas, the charge to the customer will generally be significantly higher.

    d. International Roaming:.......If you need to make calls to other countries, a GSM carrier can offer international roaming, as GSM networks dominate the world market. If you travel to other countries you can even use your GSM cell phone abroad

    What is SEO (Search Engine Optimization)?


    SEO is one of the fastest growing services in the globle market, SEO stand for Search Engine Optimization, use of various techniques to improve a web site's ranking in the search engines and thus attract more visitors, process of choosing targeted keyword phrases related to a site, and ensuring that the site places well when those keyword phrases are part of a Web search.

    SEO is the stand for Search Engine Optimization. There are lot of Search Engines available here in the Internet World such as Google, Yahoo, MSN, AOL Search, AltaVista, Netscape Search, Excite, Open Directory, Lycos, Gigablast, Ask, OnSeek, ExactSeek, HotBot and AllTheWeb. But there are only three Search Engines are famous in the fasion of Search Engine Google, Yahoo and MSN.

    Now describe what is Search Engine? Search Engine is computer program that searches web sites and then indexes of them using such information it has found. another is defination - is a website that contains a database of information from other web sites that users can query to find specific subjects. Search engines use software programs to gather and organize information. The difference between a search engine and a directory is that a directory uses people to verify and organize information.

    Now we are going to go Search Engine Optimization. before we go on Search Engine Optoimization we know about what is "Optimize" ? optimize means to improve the way that something is done. now we are turn on Search Engine Optimization - "SEO is the process of optimizing a website to get better results, ranking in major search engines." "is the process of choosing targeted keyword phrases related to a Website theme, and ensuring that the Website places well when those keyword phrases are part of a Web search." "Creating and improving a website so that it will rank high in the search engines and help potential customers or clients find the website."

    Now have a look at Internet Marketing first question arising that what is Internet Marketing ? Internet Marketing is the Strategies used to market a product or service online, such as search engine optimization, website design, online promotions, and email marketing etc. another defination is "Internet Marketing is promoting a website’s visibility through Search Engine Marketing’s umbrella services such as Search Engine Optimization, Pay Per Click and banner advertising. Link A connection to another website through the reference or navigation element found in a document."

    now we have look at Search Engine Marketing (SEM): A set of Internet marketing methods to increase the visibility of a web site in search engine results pages (SERPs). The three main methods are: Search Engine Optimization (SEO), Pay Per Click (PPC) advertising, and Lead Generation(Lead Generation (commonly abbreviated as lead-gen) is a marketing term that refers to the creation or generation of prospective consumer interest or inquiry into a business' products or services. Leads can be generated for a variety of purposes). Today, when over 85% of traffic is generated by search engines, the importance of high placement and high visibility is key to any online business or organization, regardless of market or size.

    How to increase Wi-Fi connectivity? Tips about Wi-Fi


    Wi-Fi is a trademark of the Wi-Fi Alliance that manufacturers may use to brand certified products that belong to a class of wireless local area network (WLAN) devices based on the IEEE 802.11 standards, which is by far the most widespread WLAN class today. Because of the close relationship with its underlying standard, the term Wi-Fi is often used as a synonym for IEEE 802.11 technology.

    The Wi-Fi Alliance, a global association of companies, promotes WLAN technology and certifies products if they conform to certain standards of interoperability. Not every IEEE 802.11-compliant device is submitted for certification to the Wi-Fi Alliance, sometimes because of costs associated with the certification process. The lack of the Wi-Fi logo does not necessarily imply a device is incompatible with Wi-Fi devices.

    Also wi fi occures as console to console.Most people mistaken it by beleiving another console to console which has another name


    As of 2010, IEEE 802.11 devices are installed in many personal computers, video game consoles, smartphones, printers, and other peripherals, and virtually all laptop or palm-sized computers.

    How it works ?

    Wi-Fi uses both single-carrier direct-sequence spread spectrum radio technology (part of the larger family of spread spectrum systems) and multi-carrier orthogonal frequency-division multiplexing (OFDM) radio technology. The deregulation of certain radio-frequencies for unlicensed spread spectrum deployment enabled the development of Wi-Fi products, Wi-Fi's onetime competitor HomeRF, Bluetooth, and many other products such as some types of cordless telephones.

    Where It is used ?

    A Wi-Fi enabled device such as a personal computer, video game console, mobile phone, MP3 player or personal digital assistant can connect to the Internet when within range of a wireless network connected to the Internet. The coverage of one or more (interconnected) access points — called hotspots — can comprise an area as small as a few rooms or as large as many square miles. Coverage in the larger area may depend on a group of access points with overlapping coverage. Wi-Fi technology has been used in wireless mesh networks

    So how to Increase Wi-Fi Connectivity ?


    Like set-top boxes, Wi-Fi connections are also an investment, so why not get maximum returns or benefits. With some simple tips, new hardware, you could extend your Wi-Fi connectivity’s range to cover your entire house or office.

    Upgrade your network

    Though heavy on pocket, the new 802.11n router scores on better speed, stability and range than 802.11b or g. Upgrading to 802.11n will help make your signal stronger and more reliable in every room, plus you’ll experience faster through put all around.

    Try a Range Extender or Repeater

    A lot of options are available in the market. However, it’s best if you select an extender of the same company as that of your router. Check out for high gain antennas as a replacement for the little ones on your router. They’re worth a try.

    Right positioning

    Wi-Fi signals are blocked by thick metal and concrete, so try picking the router up off the floor and putting it on a table or mounting it on the wall. Pulling the router out from behind your TV or entertainment center can also boost the signal dramatically. Experiment by watching, your Wi-Fi client’s signal meter to see if something helps.

    Antenna tricks

    Orienting your antennas differently can offer descent results with minimal effort. Experiment to see what works best.

    Change channels

    Most routers default to channel 1, 6 or 11, but if your neighbours are all on channel 6, then you might be seeing slow speed and lower range due to interference. Try one of the other channels.

    For this, you’ll need to get into your router’s management screen, either through an installed application or by typing the IP address of the router into a web browser. You’ll find a ‘Wireless Channel’ (or similar) setting in the wireless configuration portion of your router.

    You can start with 1, 6, and 11, but other channel numbers are worth try as well. If you see a sudden drop in range or speed, try a new channel.

    Sex - Stay healthier and younger

    Sex is not only the most economical entertainment for two, a vigorous session leaves you optimistic, younger and healthier, say scientists and researches. It must be true because an artificial knee and hip have not deterred Jane Fonda from abstaining. Here’s the scientific explaination.

    Keeps heart healthy:
    A study at Queens University in Belfast found that having sex three times a week could halve your risk of heart attack or stroke.


    Strengthens immune system:
    Having sex once or twice a week raises the levels of an antibody called immunoglobulin A or IgA, which can protect from viral and bacterial infections. According to a study, people who have sex more than once a week had 30 per cent higher levels of IgA.


    Fights disease:
    During sex,
    steroid DHEA is secreted and after an orgasm the level in the bloodstream soars to five times its normal amount. High levels of DHEA keep your body fitter and disease-free.

    Cuts risk of dying young:
    An Australian study found that people who had an orgasm three times a week had a 50 per cent lower chance of dying from medical reasons.


    Knocks off 10 years:
    Couples who have sex at least three times a week look more than a decade younger than people who make love less often, according to English neuro-psychologist Dr David Weeks’s 10-year study.


    Shifts weight:
    Thirty minutes of sex burns up to 150 calories per half-hour. If you have moderately active sex twice a week, you’ll burn 15,600 calories a year!


    Makes you more attractive:
    High sexual activity makes the body release more pheromones, the chemicals that enhance your appeal. And the more sex you have, the stronger your desire to have sex with your partner again gets.


    Erases wrinkles:
    Oestrogen, the hormone released during sex, plumps the skin. As oestrogen levels drop after
    menopause, skin becomes dry and wrinkled, which regular sex can combat.

    Imparts a glow:
    As sex is an aerobic form of exercise, it promotes skin renewal. Vigorous sex pumps higher levels of oxygen, pushing newer, fresher skin cells to the surface.


    Boosts self-esteem:
    Higher levels of confidence was one of the most important benefits noted by people having regular sex, says a survey made by the University of Texas.


    Eases depression:
    Sex causes your brain to release feel-good chemicals that boost your levels of serotonin that lifts your mood. Being intimate also eases mild depression.


    Reduces pain:
    Sex causes a surge in oxytocin and other endorphins, which reduce pain. Women say headaches, arthritis pain and PMS symptoms improve after sex.


    Helps you sleep:
    Oxytocin released during orgasm promotes sleep, according to research. Enough sleep has been linked to feeling happier, maintaining a healthy weight and controlling high blood pressure.


    Relieves stress:
    In a study published in Psychology Journal, researchers found that people who’d had sex in the past 24 hours coped better with stressful scenarios than those who had not.

    Excess SMSing damages teens´ minds & health


    They do it late at night when their parents are asleep. They do it in restaurants and while crossing busy streets. They do it in the classroom with their hands behind their back. They do it so much their thumbs hurt. Spurred by unlimited texting plans, American teenagers sent and received an average of 2,272 text messages per month in the fourth quarter of 2008, according to the Nielsen Company—almost 80 messages a day, more than double the average of a year earlier.
    The phenomenon is beginning to worry physicians and psychologists, who say it is leading to anxiety, distraction in school, falling grades, repetitive stress injury and sleep deprivation.

    Dr Martin Joffe, a paediatrician in Greenbrae, California, recently surveyed students at two local high schools and said he found that many were routinely sending hundreds of texts every day. “That’s one every few minutes,” he said. “Then you hear that these kids are responding to texts late at night. That’s going to cause sleep issues in an age group that’s already plagued with sleep issues.” The rise in texting is too recent to have produced any conclusive data on health effects. But Sherry Turkle, a psychologist who has studied texting among teenagers in the Boston area for three years, said it might be causing a shift in the way adolescents develop. “Among the jobs of adolescence are to separate from your parents, and to find the peace and quiet to become the person you decide you want to be,” she said. “Texting hits directly at both those jobs.”

    Psychologists expect to see teenagers break free from their parents as they grow into autonomous adults, Professor Turkle went on, “but if technology makes something like staying in touch very, very easy, that’s harder to do; now you have adolescents who are texting their mothers 15 times a day, asking things like, ‘Should I get the red shoes or the blue shoes?’”

    As for peace and quiet, she said, “if something next to you is vibrating every couple of minutes, it makes it very difficult to be in that state of mind. If you’re being deluged by constant communication, the pressure to answer immediately is quite high. So if you’re in the middle of a thought, forget it.”
    Michael Hausauer, a psychotherapist in Oakland, California, said teenagers had a “terrific interest in knowing what’s going on in the lives of their peers, coupled with a terrific anxiety about being out of the loop.” For that reason, he said, the rapid rise in texting has potential for great benefit and great harm.

    Texting may also be taking a toll on teenagers’ thumbs. Annie Wagner, 15, a ninth-grade honour student in Bethesda, Maryland, used to text on her tiny phone as fast as she typed on a regular keyboard. A few months ago, she noticed a painful cramping in her thumbs.

    Peter Johnson, an associate professor of environmental and occupational health sciences at the University of Washington, said it was too early to tell whether this kind of stress is damaging. But he added, “Based on our experiences with computer users, we know intensive repetitive use of the upper extremities can lead to musculoskeletal disorders, so we have some reason to be concerned that too much texting could lead to temporary or permanent damage to the thumbs.”

    Some Of The Most Curious & Health Related Facts About Kissing


    Everybody seems to know how to kiss. The question is: Are you aware of a variety of interesting facts and details about a kiss? Is kissing good or bad for you? How do they do it in Japan, France and other countries? Can you slim down by kissing too much? Below are some of the most curious things about kissing:

    • An act of kissing puts 29 facial muscles in motion. In other words, kissing can be used as an effective exercise to prevent the development of wrinkles.
    • Lovers swap saliva containing various substances e.g. fats, mineral salts, proteins while kissing. According to latest studies, the exchange of the above substances can give a boost to the production of antibodies which are made specifically to deal with the antigens associated with different diseases as they are encountered.
    • As a rule, 66 percent of people keep their eyes closed while kissing. The rest take pleasure in watching the emotions run the gamut on the faces of their partners.
    • According to U.S. statistics, an American woman would kiss an average of 80 men before she gets married.
    • A quick romantic kiss will burn about 2-3 calories, whereas French kiss (an openmouthed kiss with tongue contact) will obliterate more than 5 calories.
    • Sensitivity of the lips is 200 times higher than that of the fingers.
    • It is thought that men who kiss their wives goodbye before going to work live five years longer than those who just slam the door. Men of the latter category are said to be more prone to traffic accidents.
    • Smooching passionately for 90 seconds will elevate blood pressure and cause the pulse rate to go racing. It will also increase the level of hormones in the blood, thus reducing life by one minute.
    • French kiss is called a “juncture of souls” in France . Not only the lips do the job, the tongues come into play too. The passionate French invented another variety of the soul kiss in which only the tongues are employed.
    • Contrary to a popular belief, the Eskimos do not merely rub their noses against each other in a display of love and affection. The lips open up a bit once the olfactory organs of the kissing partners meet. Then the Eskimos take a deep breath and send the air out while holding their lips closed. After savoring the scent of each other, the partners press noses against each other’s cheeks and freeze for a minute of two.