5 Reasons Your Awesome Content Isn’t Going Viral

Originally posted on Red Website Design Blog:

Going viral is a dream for most marketers and small business owners. Imagine having something you created being seen by millions of people. Imagine the web traffic, links and potential new business that could bring.

The chances are you haven’t achieved such greatness yet so you might want to take a look at the infographic below from Who Is Hosting This which gives you 5 reasons why your content isn’t going viral.

View original

How to Start to Write an eBook and Actually Finish it in 30 Days

By: Jurij Burchenya 

http://blog.sellfy.com/tips-tricks/how-to-write-an-ebook/

In: Tips & tricks:

There are WAY too many authors today who believe that writing what they think their audience cares about is enough.

If only it were that easy…

If you’re serious about attracting an audience of a substantial size and actually selling your eBook, you need to be very careful about what and how you create.

Otherwise you risk using the cooked spaghetti method: throwing a bunch of stuff at the wall and praying that it sticks.

Well, today I’m going to show you a technique that almost guarantees that you will know how to write an eBook in 30 days that will sell.

Keep reading to learn how..

how-to-write-an-ebook-30-days-calendar

 

How to write an eBook?

Days 1-2: Pick Your Topic

You probably have some sort of idea in your mind already. Something you thought about last winter and now keep returning to every now and then.

Pick up a piece of paper or a Post-it note. If you always wanted to write something very important on a paper napkin, here’s your chance. Take a pen and write down a one-sentence summary of your idea.

Now put it in your desk and leave it there for the next 30 days.

I’m dead serious.

Chances are, you would enjoy writing about this idea, but do you know for sure that it’s something that your audience will buy? Because if it’s not, you just wasted your time writing something no one needs. And that is not the risk you should be willing to take.

What you need is a great eBook idea.

A great eBook idea should be specific.

“Don’t try to write a definite guide to your topic, as it’s overwhelming for your readers,” warns Ali Luke on Copyblogger. “And it doesn’t leave much room for your next eBook.”

It should also be useful. You’re reading industry blogs and following relevant discussion on forums. What problems come up again and again?

Ask your audience what they want and give them something to choose from. Set up a simplesurvey and tweet it to your followers or post it on your Facebook page.

Days 3-4: Create an Outline

Before you start writing, you need to get organized.

“You need to put all those wonderful ideas down on paper in a form you can use,” writes Andy Ingermanson on Advanced Fiction Writing. “Why? Because your memory is fallible, and your creativity has probably left a lot of holes in your story — holes you need to fill in before you start writing.”

There is no one foolproof approach to creating an outline. The best is the one that works for you, so choose wisely.

#1: Draw a mindmap.

You can use a tool like bubbl.us to do it without ever leaving your favorite browser. Put a topic you’re writing about in the center and start adding ideas as they occur to you. Use lines to connect different ideas or create a logical sequence. Put everything down, no matter how big or small it is. You’ll revise the whole thing later.

#2: Work backwards.

Start at the end. What do you want your reader to achieve once they’ve finished reading your eBook? Then take a step back – how will they get there and what do they need to learnbefore that can happen? How about before that?

#3: Write a list.

Make a bullet-point list in Evernote ( Word will do too ) for everything you can think of thatneeds to be in the book.

“Don’t worry about organizing it at this point, just brainstorm,” suggests author Lisa Nowak. “Take walks. Talk to other people. Do whatever is necessary to generate ideas.”

Once you’ve got the big pieces in place, write 3-5 key points for each chapter/section.

#4: Examine other eBooks.

And books. White papers or reports. Anything really. What topics appear in most of the outlines? Is there anything you should add to yours?

Days 5-25: Start writing (!)

Not suprisingly, the majority of your time should be spent on the actual writing.

Let’s assume that you’re aiming for approx. 70 pages, with a couple of images here and there. That breaks down to writing 750 words a day.

And it’s a good number too.

“250 words per page is considered to be the standard accepted number of words per page. So, three standard pages are about 750 words,” points out Buster Benson on 750words.com “It really just comes down to the fact that this amount of writing feels about right.”

It’s still a sizeable commitment.

But one month later you’re going to get your very own eBook.

Here’s a couple of tips on how to keep writing those 750 words a day every day for the next 21 days.

Write out your likely barriers.

Author and blogger Roby Blair would likely agree. His blog post, “Write Every Day in 2014: 14 Steps for Forming A Writing Habit” encourages you to ask yourself:

“Where are you going to mess up? Come on, you’ve been living with yourself for the last few decades. You’ve got a pretty good sense of what’s likely to keep you from succeeding.”

“Rather than pretending you can just “do better this time” or “will through it,” acknowledge and accept these barriers. Are you likely to sleep in? Feel burnt out and unable to write? Will your kids distract you? Write out the most honest possible descriptions of your likely obstacles,” he writes.

Figure out the right time of the day to work on your eBook.

If you’re at your best in the morning, write in the morning. If you’re focused at 10 pm, when there are less distractions, do your writing then.

Turn off distractions when you’re writing.

Turn off the Internet. Seriously. Do your research first and then leave everything else till the very end. If you do your research as you go, you’ll end up constantly switching back and forth.

Got other programs running in the background? Shut them down.

Turn off your cell phone and notifications. You don’t need to be talking to anybody while you’re writing.

Clear your desk. No papers, devices, chargers, nothing. Remove the visual clutter from your workspace completely, so that it’s not even a subconscious distraction.

Make writing your priority if it’s important to you.

Try using a distraction-free writing program like WriteRoom, Ommwriter or jDarkRoom.

Take breaks.

Set a timer for 25 minutes, then write until the time is up. Take a 5-minute break and then start again. You can learn more about this approach here. If you don’t have a timer, you can use one of the pomodoro apps. Just google it.

Don’t stop writing.

Sometimes you need to google something, look up a link or find a picture. Highlight the area that needs your attention with yellow marker or just include something like <!!!> in the text of your document, so that you know later that this needs your attention.

Don’t edit while you write.

Even if it’s the very first paragraph that you can’t get quite right. Leave it and move on. You will write faster if you separate writing and editing stages.

Another neat trick you can try is to:

“Copy your LAST sentence at the end of every writing day into an entirely new document. Then spend a minute writing out some directions for yourself about what you want to accomplish the next day,” says Daphne Gray-Grant on Publication Coach. “The next day, work only from this fresh document. This way you can’t be lured into editing your work before you finish writing it.”

Keep writing every day.

Try to create a habit of writing every day. While certainly hard at first, it will yield high rewardsafter.

Kevin Purdy on Lifehacker suggests that you…

“Stop writing mid-sentence to ward off writer’s block.”

The same approach can be used to continue writing every morning or night for the next 21 days.

I’ll let you in on a little secret. This is what one of the most successful comedians of all‐time, Jerry Seinfeld, did to write his jokes every day for years.

It’s quite simple really.

Every day that you complete your writing task, you get to put a big red X over that day on your calendar.

“After a few days you’ll have a chain. Just keep at it and the chain will grow longer every day. You’ll like seeing that chain, especially when you get a few weeks under your belt. Your only job is to not break the chain.”

This certainly has worked very well for me, so it should work for you too.

Days 26-28: Edit your eBook

Ideally, you would want to take a little break before putting on the editor’s hat. But since you’re on a deadline here, you’ll have to dive right into it.

For some people, this is the hardest part of writing. After starting to write, of course. But you’ve already gotten through that stage. In fact, you’re at the finish line.

So instead of waiting, print the whole thing out and look at your eBook like you didn’t spend the last 21 days writing it.

You can always just transfer it to your iPad or Kindle if you don’t feel like using that much ink and paper.

Now read it and pay special attention to things like:

  • Information that you’ve covered in more than on place;
  • Material that you wanted to include, but didn’t;
  • Chapters or sections that would read better if presented in a different order.

Don’t spend too much time trying to perfect every word; there will be time for that later on.

Obviously, fix the typos and mistakes that you spot, but avoid getting overwhelmed with it.

Spend these three days focusing on cutting out unnecessary bits, re-ordering sections or paragraphs and adding any quotes and stats you didn’t have time to look up earlier.

Then read the whole thing out loud. Yes, really. It may help you spot the issues you would otherwise miss.

Looking at your eBook at this point, you’re probably feeling proud of yourself. You should be. You have almost finished writing your eBook.

But there are still two days left. This means, you still have to…

Days 29-30: Proofread and make final changes

Your work in these two final days is what differentiates your eBook from the pack of unprofessional ones that appear in the interwebs every day.

So get your eagle eye on.

“Read your work backwards, starting with the last sentence and working your way in reverse order to the beginning. Supposedly this works better than reading through from the beginning because your brain knows what you meant to write, so you tend to skip over errors when you’re reading forwards,” writes Mignon Fogarty on Grammar Girl.

“Always proofread a printed version of your work. I don’t know why, but if I try to proofread on a computer monitor I always miss more errors than if I print out a copy and go over it on paper,” she continues.

Pay special attention to things like your/you’re and misused apostrophes, as these are the most maddening writing errors, as found out by Grammarly.

Check format last.

“Paragraph spacing, text wrap, indentations, spaces above and below a bullet list or between subheadings and text, and so on. Leave this for the end because contents may shift during handling,” warns Leah McClellan on Writetodone.

Now you try it

I hope you can see the potential in applying these techniques for writing your eBook.

Yes, it takes hard work to create something great.

But by following this strategy, you already know that you will get a finished eBook in 30 days.

You can then easily sell your eBook directly to your audience on social media and your website or blog using Sellfy.

I want you to give this approach a try and let me know how it worked out for you.

Do you know any good tips on writing? Have I missed anything out? If you have a question or thought, leave it in the comments section below.

Tagged:Tags:

Post by Jurij Burchenya on July 14, 2014
 

Article by Jurij Burchenya

Jurij is an Intern at Sellfy. He’s focused on inbound marketing, landing pages, copywriting, CRO and growth. You can reach Jurij on Twitter.

 

Meet CISA – Dianne Feinstein’s Latest Attack On Privacy, Civil Liberties And The Internet

Sally's Special Services:

CISA

STOP CISA! CISA IS AN ATTACK ON OUR FREEDOM OF SPEECH AND FREE ENTERPRISE!

THEY WANT TO SHUT US INDEPENDENT THINKERS UP! THEY DO NOT WANT US TO HAVE ALTERNATIVE MEDIA TO THE BIASED MSM THAT PRINTS WHAT THE CORRUPT COMMUNIST/DEMON-RATS TELL THEM TOO!!

WE MUST STOP THIS GOVERNMENT INTRUSION INTO OUR PERSONAL LIFE’S AND CIVIL LIBERTIES!

Originally posted on peoples trust toronto:

Submitted by Mike Krieger of Liberty Blitzkrieg blog,

here?s not much good you can count on Congress to accomplish, but when it comes to introducing and passing oligarch protecting, civil liberties destroying legislation, our ?representatives? are absolutely relentless in theirdetermination. Unsurprisingly, the only ?distinctly native American criminal class,? as Mark Twain described Congress, is at it again when it comes to institutionalizing spying and attempting a legal run around the Bill of Rights.

One thing that has become crystal clear since the Edward Snowden revelations, is that much of Congress has no problem at all with unconstitutional spying. Rather, they are primarily upset it was exposed and are dead set on making sure no other whistleblower can ever do the same. Enter CISA, orThe Cybersecurity Information Sharing Act.

I?ve spent much of today reading about the bill, and have compiled what I think are the most astute…

View original 1,497 more words

Software Entrepreneurs Must Go Mobile-First Or Die

Featured Image -- 3987

Originally posted on TechCrunch:

Editor’s note: Roger Lee is a general partner with Battery Ventures

Seven years ago when the iPhone was first introduced, smartphones were a novelty. Now they’re the default method of computing for most people. As of late last year, Americans spent 34 hours a month on their mobile devices, compared with just 27 hours accessing the web via a computer, according to Nielsen.

This mobile-first mindset has also deeply permeated the enterprise. Some 95 percent of knowledge workers own smartphones, and they reach for them first to do all kinds of tasks – from email and document sharing/management to meeting planning and videoconferencing.

Smartphones and tablets are also rapidly entering business sectors such as construction, shipping, manufacturing, healthcare, real estate, education, law enforcement, fleet management and others. Most people have noticed field workers using mobile devices equipped with industry-specific apps (everyone from rental-car agents to home contractors) to…

View original 889 more words

240,000 Illegal Aliens Since April – President Obama Intentionally Overwhelming U.S. Socio-Economic System To Cause Collapse….

Originally posted on Economic & Multicultural Terrorism:

Reblogged on WordPress.com

Source: swordattheready.wordpress.com

Economic & Multicultural Terrorism = Anti-White & Anti-Christian = Anti-American Treason! I have been writing and speaking out on the economic and multicultural treason taking place in America on many web sites, on political TV call in shows, and on talk radio call in shows all across our country for years now warning people of the treasonous events that are now out in the open as ‘Bob from Jamestown’. The left and right scoffed at the facts and evidence I presented back when I worked for Ross Perot’s first presidential campaign, and was attached for it by SEIU thugs. I was labeled as a conspiracy theorist…Not any more.

The important question that we as a nation should be asking ourselves at this historical juncture, is what are the white and Christian people of America’s founding posterity going to do in defense of their founding white…

View original 223 more words

Microsoft’s Top Lawyer Calls Supreme Court Cellphone-Warrant Case “Seminal”

Featured Image -- 3976

Originally posted on TechCrunch:

It’s been a busy week in the realm of policy and technology, with the Supreme court weighing in on a several issues impacting the industry, and the government releasing something akin to a transparency report regarding a portion of the NSA’s surveillance practices.

The unanimous Supreme Court decision on Riley v. California caused a stir because it set new precedent regarding digital privacy: To search a cell phone, the court ruled, the government must procure a warrant. The decision will set the tone for future legal action regarding technology, data, user privacy, and Fourth Amendment protections.

I’d like to highlight some commentary on the decision from a perhaps unlikely source, Microsoft.

Microsoft, in the past week, has become a leading voice for user privacy and a less active surveillance state. The company’s de facto spokesperson on the matter, its top lawyer Brad Smith, recently gave a lecture in which he called for…

View original 230 more words

Facebook Search Warrant Disclosure Reveals Scope of Government Requests

Featured Image -- 3974

Originally posted on TechCrunch:

Facebook announced Thursday it’s been pushing back against a bulk set of search warrants requesting private data from its user accounts since last summer.

In a blog post, the social media network announced a court in New York requested personal data for 381 users, including photos and private messages. The company argued the request was unconstitutional, but the courts prevailed and the information was turned over.

This information is just coming to light now as Facebook filed an appellate brief Friday in an attempt to force the government to return the data it had seized and retained. Facebook says the government responded by moving to unseal the warrants and all court proceedings, allowing the company to notify the users their information had been taken.

Only 62 of the 381 people who were subjected to the searches later had charges brought against them in a disability fraud case. The government…

View original 647 more words

How Governments (Including The US) Use Targets’ Phones To Spy On Them

Emma Woollacott


written by Emma Woollacott 
Contributor – Forbes
 06/25/2014 @ 9:35 AM

Security researchers have uncovered the widespread use of spyware that allows law enforcement agencies to take control of a suspect’s phone – with the US appearing to be the biggest user.

Teams at Kaspersky Lab in the US and the University of Toronto’s Citizen Lab have analyzed the use of a surveillance product called Remote Control System (RCS) from Hacking Team TISI +0.69% in Italy. The new research builds on Kaspersky’s previous analyses of RCS to uncover how the tool’s mobile modules work.

The malware, which targets Android, iOS, Windows Phone and BlackBerry phones, allows governments to take control of the device’s microphone, GPS and camera to record the user’s activities. They can log email, SMS and MMS data, track web use and call history and eavesdrop on Skype conversations. The software’s built for stealth, tweaked to keep battery consumption low and with the ability to transmit its hijacked data via wifi to avoid jacking up phone bills.

Victims can be infected by any of the usual methods used to spread malware, such as social engineering, exploits and spear phishing. In the case of the iOS version,, the malware waits until the victim connects his or her smartphone to perform an iTunes sync – at which point a Trojan jailbreaks the iPhone and installs the mobile spying component. The iPhone then reboots – the only noticeable sign that anything’s happened.

English: Iphone 4 Deutsch: Iphone 4

English: Iphone 4 Deutsch: Iphone 4 (Photo credit: Wikipedia)

“This technology is marketed as filling a gap between passive interception (such as network monitoring) and physical searches.  In essence, it is malware sold to governments,” writes the Citizen Lab team.

“Unlike phone monitoring and physical searches, however, most countries have few legal guidelines and oversight for the use of this new power. In light of the absence of guidelines and oversight, together with its clandestine nature, this technology is uniquely vulnerable to misuse.”

Kaspersky Lab has been monitoring the use of the spyware, and has found that the US is home to the largest number of command and control servers – 64 – followed by Kazakhstan with 49, Ecuador, with 35, and the UK with 32. It discovered 326 servers altogether.

Total control over your targets. Log everything you need. Always. Anywhere they are,” promises Hacking Team on its website. “Thousands of encrypted communications every day. Get them, in clear.” But the company denies that it sells products to repressive regimes.

“We review potential customers before a sale to determine whether or not there is objective evidence or credible concerns that Hacking Team technology provided to the customer will be used to facilitate human rights violations,” it claims.

“We will refuse to provide or we will stop supporting our technologies to governments or government agencies that we believe have used HT technology to facilitate gross human rights abuses.”

However, according to Kaspersky, servers are to be found in China, Russia and Saudi Arabia, as well as Azerbaijan and Kazakhstan.

Certainly, it can’t be proved that, just because a command and control server is in a particular country, it’s automatically controlled by the local government.

“Unfortunately, we can’t be sure that the servers in a certain country are used by that specific country’s LEAs [law enforcement agencies]; however, it would make sense for LEAs to put their C&Cs in their own countries in order to avoid cross-border legal problems and the seizure of servers,” says Sergey Golovanov, principal security researcher at Kaspersky.

“Nevertheless, several IPs were identified as ‘government’ related based on their WHOIS information, and they provide a good indication of who owns them.”

As the teams point out, the use of such malware is becoming far cheaper, meaning that it’s likely to be used increasingly widely.

“This type of exceptionally invasive toolkit, once a costly boutique capability deployed by intelligence communities and militaries, is now available to all but a handful of governments,” Citizen Lab warns.

“An unstated assumption is that customers that can pay for these tools will use them correctly, and primarily for strictly overseen, legal purposes. As our research has shown, however, by dramatically lowering the entry cost on invasive and hard-to-trace monitoring, the equipment lowers the cost of targeting political threats.”

Kaspersky says it’s identified around 30 victims, including activists, human rights campaigners, journalists and politicians – as well as a high school history teacher in the UK. “You don’t have to be a criminal, an influential businessman or even political activist to become a subject of such spying,” says researcher Serge Malenkovich.

It wants states to legislate on the export of surveillance technology and establish a system of recourse for people who have been the victims of surveillance and its consequences – sometimes including torture.

http://www.forbes.com/sites/emmawoollacott/2014/06/25/how-governments-including-the-us-use-targets-phones-to-spy-on-them/

We Thank Thee, Lord

Originally posted on Sally's Serenity Spot:

Some of the things that I am grateful for from my God. Number one for my God/Jesus, Number two, to be born in the USA to Christian parents, Number three, for my sobriety and recovery, my New Life since March 28, 1986. Number four, My loving family and friends. Number five, For all of our military Heroes past and present. Number six, for my wonderful Clients that are also good friends, and make my work a joy, like Arthur H. Van Slyke, Jr./T’ Quarius Music USA.

View original

The internet of things isn’t about things. It’s about cheap data.

Featured Image -- 3942

Originally posted on Gigaom:

The value that comes from connecting your thermostat to the internet isn’t that you can now control it from your smartphone, or that it’s a theoretical home for new ads. The value is that you suddenly have access to cheap information about the temperature of your home, and by collating other data points or simple extrapolation techniques, you also have access to detailed information about what is happening in the home.

This can be cool. It can be creepy. And it can be convenient. But as is always the case when we encounter technological shifts, the internet of things is really a tool. And like a hammer is used to expand the amount of force generated over a small area (allow you to hit something really hard), the internet of things is a tool is for cheaply delivering and gathering information.

What can a connected GE jet engine tell you? What can a connected GE jet engine…

View original 710 more words

SEO and Your Blog

Sally's Special Services:

And finally . . . post! The single most important thing you can do to increase your blog’s SEO is to post regularly. Even if you have a website with mostly static content, include a “Blog” or “News” section that you regularly update so Google can see that your site is active. All the SEO strategies in the world won’t help if you’re not adding content, so get to writing!
I wholeheartedly agree. I don’t visit blogs that have not posted anything for years let alone weeks. I think that you need to write a post at least once a week.

Originally posted on The Daily Post:

The blank page

Writing is the hardest part.
Image courtesy of Flickr user Rennett Stowe.

A couple of weeks ago, I wrote a post for the WordPress.com blog about how SEO works on WordPress.com, and today I’d like to discuss this here on The Daily Post. SEO stands for Search Engine Optimization, and it refers to things you can do to increase how high your site ranks in the search results of Google and other search engines.

SEO is a hot topic around the blogosphere, and you’ve likely heard a lot about it. Much often repeated SEO advice is untrustworthy and some of it is just plain bad.

The good news is if you have a site on WordPress.com we take care of the vast majority of the technical side of SEO for you. The only thing you really need to do for great SEO is write!

View original 869 more words

Introducing WordAds

Originally posted on WordPress.com News:

Over the years one of the most frequent requests on WordPress.com has been to allow bloggers to earn money from their blog through ads. We’ve resisted advertising so far because most of it we had seen wasn’t terribly tasteful, and it seemed like Google’s AdSense was the state-of-the-art, which was sad. You pour a lot of time and effort into your blog and you deserve better.

Well we think we’ve cracked it, and we’re calling it WordAds.

Blogs are unique and they shouldn’t be treated like every other page on the internet. There are more than 50,000 WordPress-powered blogs coming online every day, and every time I explore them randomly I’m always surprised and delighted by how people are using the platform to express themselves.

As a WordPress user you’re breathing rarefied air on the internet: the Creators, the Independents. Creative minds aren’t satisfied being digital sharecroppers on someone…

View original 81 more words

Gillmor Gang: Fits and Starts

Featured Image -- 3878

Originally posted on TechCrunch:

[tc_5min code="518235539"]

The Gillmor Gang — John Borthwick, Dan Farber, Keith Teare, Kevin Marks, and Steve Gillmor — take a walk on the wild side as The New York Times publishes all the news that fits. Except, that is, the news about itself. The Twitterverse is clogged with leaked Innovation reports, business model Kremlin Wall analysis, and newsroom disappearances galore.

For the record, we also stop in for another revealing of the Beats buys Apple story, even as there’s still doubt the deal will even go down. Whether it’s music or TV or eyes, ears, nose, and throat, our media orifices are up for grabs. Did I forget mention fragmentions? Now back to our movie — Gray Lady Down.

@stevegillmor, @borthwick, @dbfarber, @kevinmarks, @kteare

Produced and directed by Tina Chase Gillmor @tinagillmor

Live chat stream

The Gillmor Gang on Facebook

View original

Aiming for secure big data, ADVA puts line-side encryption into its 100G networking gear

Featured Image -- 3876

Originally posted on Gigaom:

ADVA Optical Networking, based in southern Germany, has released a new 100G technology for metro network deployments – generally, connecting data centers within a metropolitan area – that includes built-in encryption on the network layer.

The advantage of this kind of “Layer 1″ encryption is that it doesn’t slow down the data throughput much, but rivals such as Cisco(s csco) are not as yet supporting super-speedy 100Gbps data rates with such a product — ADVA, with the new version of its FSP 3000 optical transport “solution”, is. In short, this new multiplexer may hold appeal for enterprises and even telcos that want to be able to securely handle lots of data at high speed.

ADVA’s 100G Metro tech is protocol-agnostic, so it can handle Ethernet, fiber, Infiniband and so on. Its “line-side” encryption is based on the Advanced Encryption Standard (AES) and uses 256-bit keys, with over 60 key exchanges…

View original 164 more words

Beware The Russian Cyber Bear

Originally posted on Chainsoff's Blog:

Moscow’s hacker army helped take over Crimea and is busy spying on America,

Foreign PolicySHANE HARRIS

Image

Daniel Marsula/Post-Gazette

When U.S. officials warn of the threat foreign cyber spies pose to American companies and government agencies, they usually focus on China, which has long been home to the world’s most relentless and aggressive hackers. But new information shows that Russian and Eastern European hackers, who have historically focused on crime and fraud, now account for a large and growing percentage of cyber espionage, most of which is directed at the United States.

Individuals and groups in Eastern Europe, particularly in Russia and Russian-speaking countries, are responsible for a fifth of all cyber-spying incidents in the world, according to a global study of data breaches recently released by Verizon.

The spies are targeting a range of companies as varied as the global economy itself and are stealing manufacturing designs, proprietary technology and…

View original 1,109 more words

How to Reinstall Windows XP Without a CD

Sally's Special Services:

So, good that I had to repost.

Originally posted on Sally's Special Services:

By Chris Moore, eHow Contributor , last updated April 16, 2012

Over time, the Windows XP operating system can start slowing down, freezing and failing to shut down. This can be corrected by reinstalling the system on your computer. However, this can be a problem if your computer didn’t come with a CD copy of the OS software (many cheaper computers won’t). In these cases, there is a copy of the installment application saved on your main hard drive. You can access this software from the C: drive to reinstall the XP system and clean out your computer.

Instructions

    • Obtain the product key or serial number for your Windows XP operating system. This number is usually located on a label on the computer frame or within its original package. If you can’t find it, search though the computer’s registry or contact the computer’s manufacturer (not Microsoft) for help.

    • 2

View original 181 more words

USING WINDOWS ADMIN TOOLS LIKE A PRO / HOW-TO GEEK SCHOOL

Lesson 5: Learning to Use the Registry Editor Like a Pro

How to Geek School

In today’s edition of Geek School, we’re going to teach you how to use the registry editor, what some of those keys actually mean, and generally help you understand it a little better.

SCHOOL NAVIGATION

  1. Understanding Windows Administration Tools
  2. Using Task Scheduler to Run Processes Later
  3. Using Event Viewer to Troubleshoot Problems
  4. Understanding Hard Drive Partitioning with Disk Management
  5. Learning to Use the Registry Editor Like a Pro
  6. Monitoring Your Computer’s Performance
  7. Using Group Policy Editor to Tweak Your PC
  8. Understanding the Advanced System Panel
  9. Dealing with Devices and Drivers in Windows
  10. Using System Restore and File History

Over the years we’ve covered a lot of registry hacks, and while most people can handle the step-by-step instructions for how to make a registry change, or double-click a .reg file to insert it into the registry, you will be much better served having a solid knowledge of what the registry is and how it works.

The most important thing to know about the registry is that you probably shouldn’t just mess around and delete or change things for no reason. Deleting a big portion of the registry is never going to make your computer run faster, and there’s no registry hack that will speed up your computer or give you some major new functionality that doesn’t exist.

Almost all registry hacks involve either tweaking the behavior of some component in Windows, or disabling a behavior that you don’t like. For instance, if you want to disable SkyDrive / OneDrive from Windows entirely, you can use a registry hack to accomplish it. If you are tired of Windows Update forcibly rebooting your computer, you can hack the registry to make it stop.

What is the Registry?

The Windows Registry is a hierarchical database that contains all of the configurations and settings used by components, services, applications, and pretty much everything in Windows.

The registry has two basic concepts to be aware of: Keys and Values. Registry Keys are objects that are basically folders, and in the interface even look exactly like folders. Values are a bit like the files in the folders, and they contain the actual settings.

When you open the Registry Editor for the first time, you’ll see a treeview on the left-hand pane that contains all of the keys, with values on the right-hand side. It’s about as simple as an interface gets.

Registry Editor

The root-level keys that you see in the left-hand side of the screenshot are important. Each one houses a different set of information, so depending on what you are trying to do, you’ll need to know which section to browse down into.

The interesting thing that most people don’t know is that 3 of the 5 items on the root level aren’t actually there… they are just linked to items further down in one of the other keys.

HKEY_CLASSES_ROOT

Windows uses this section to manage file type associations, and it is usually abbreviated HKCR when being referenced in documentation. This key is actually just a link to HKLM\Software\Classes.

You can also use this section if you want to tweak the context menu for a particular file type.

HKEY_CURRENT_USER

Holds the user settings for the currently logged in user, and is usually abbreviated HKCU This is actually just a link to HKEY_USERS\<SID-FOR-CURRENT-USER>. The most important sub-key in here is HKCU\Software, which contains user-level settings for most of your software.

HKEY_LOCAL_MACHINE

All of the system-wide settings are stored here, and it is usually abbreviated as HKLM. You’ll mostly use the HKLM\Software key to check machine-wide settings.

HKEY_USERS

Stores all of the settings for all users on the system. You’ll typically use HKCU instead, but if you need to check settings for another user on your computer, you can use this one.

HKEY_CURRENT_CONFIG

Stores all of the information about the current hardware configuration. This one isn’t used very often, and it just a link to HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\Current.

Creating New Keys and Values

Right-clicking on any key in the left-hand side of the window will give you a set of options, most of which are fairly straightforward and easy to understand.

Registry Editor2

You can create a new Key, which will show up as a folder on the left-hand side, or a new value, which will show up on the right-hand side. Those values can be a little confusing, but there are really only a couple of values that are used regularly.

  • String Value (REG_SZ) – This contains anything that will fit into a regular string. The vast majority of the time, you can edit human-readable strings without breaking everything.
  • Binary Value (REG_BINARY) – This value contains arbitrary binary data, and you will almost never want to attempt to edit one of these keys.
  • DWORD (32-bit) Value (REG_DWORD) – These are almost always used for a regular integer value, whether just 0 or 1, or a number from 0 to 4,294,967,295.
  • QWORD (64-bit) Value (REG_QWORD) – These are not used very often for registry hacking purposes, but it’s basically a 64-bit integer value.
  • Multi-String Value (REG_MULTI_SZ) – These values are fairly uncommon, but it works basically like a notepad window. You can type multi-line textual information into a field like this.
  • Expandable String Value (REG_EXPAND_SZ) – These variables have a string that can contain environment variables and is often used for system paths. So a string might be %SystemDrive%\Windows and would expand to C:\Windows. This means that when you find a value in the Registry that is set to this type, you can change or insert environment variables and they will be “expanded” before the string is used.

Fun Fact: DWORD is short for “Double Word”, because a “Word” is a term for the default unit of data used by a processor, and when Windows was created that was 16 bits. So a “word” is 16 bits, and a “Double Word” is 32 bits. While modern processors are all 64-bit, the Registry still uses the older format for compatibility.

The Favorites Menu

One of the really useful features that nobody seems to notice is the Favorites menu, which is great when you want to check a registry location regularly. What’s really fun is that you can export the list of favorites and use it again on another computer without having to browse down to the keys and add them to the favorites menu.

It’s also a great way to bookmark something in the registry if you are looking around in multiple locations, so you can easily flip back to the last place you were at.

Registry Editor3

Exporting Registry Files

You can export registry keys and all of the values contained underneath them by right-clicking on a key and choosing Export. This is really important if you are going to be making changes to your system.

Registry Editor4

Once you’ve got your exported registry file, you can double-click on it to enter the information back into the registry, or you can choose Edit to take a look at the contents in Notepad.

Registry Editor5

The registry hacking file format is pretty simple – value names on the left, and actual values on the right.

Notepad

How to Make Your Own Windows Registry Hacks
Over the years, we’ve created many Registry hacks to customize and tweak your Windows computer. Today we’re going to give… [Read Article]

For more on registry hack files, make sure to read our guide on the subject.

Setting Permissions

Some of the registry keys won’t allow you to make changes by default. This is generally because you don’t have permission to those keys, but you can tweak the permissions scheme if you want by right-clicking a key and choosing Permissions, and then adjusting them from there.

Registry Editor6

 

We should note that this is not a good idea, and you should usually stay away from keys that require this much work to edit.

Loading Registry Hives

You can use the File -> Load Hive feature to load up a registry from an offline system. Perhaps you are troubleshooting another computer, and would like to see what is going on in the registry for a system that isn’t booting. So you boot the system from a rescue disk, or maybe a Linux live CD, and then copy the registry files onto your thumb drive.

Now you can open them up on another computer and look around by using the Load Hive option.

Registry Editor9

Where are these registry files stored?

You can find most of them in the Windows\System32\Config folder.

Registry Editor8

See those SAM, SECURITY, SOFTWARE, and SYSTEM files? They correspond to the same keys underneath the HKEY_LOCAL_MACHINE folder.

Registry Editor9

The data for the HKEY_CURRENT_USER branch is stored in your user folder, in a hidden file called NTUSER.DAT.

Backing Up Your Registry

RELATED ARTICLE

You might have noticed over the years that every site that advises you to hack the registry in some way also tells you to backup your registry. But what’s the best way to do that?

You can’t export the entire registry to a file, and it wouldn’t work very well to import it again either. You also can’t easily access the files themselves on the hard drive, because they are completely locked. So that’s not going to work.

The best option to backup your registry? Create a System Restore point.

Create a System Restore Point

Rolling back a system restore point is quite easy.

Some Important Things to Note

While many people refuse to agree, the fact is that registry cleaners are pointless and should not be used. Cleaning up a few hundred keys out of a database of millions isn’t going to provide any performance boost, and any errors in the registry that resulted in a component not loading properly would be caught in Event Viewer or elsewhere, and could be fixed without resorting to cleaning the registry.

And don’t even get us started on registry “defrag”, which is complete nonsense these days. Perhaps back on Windows 95 with dirt-slow hard drives, it made sense. But now, with modern hard drives, or solid state drives that don’t need defragmenting at all? Don’t do it.

http://www.howtogeek.com/school/using-windows-admin-tools-like-a-pro/lesson5/

How to: Upgrade Windows XP to Windows 7

 

Uploaded on Oct 15, 2009

It’s a painful install since Microsoft provides no direct upgrade path, but we can help. For more CNET videos, go to http://cnettv.cnet.com

Welcome to the world of tiered clouds

Featured Image -- 3819

Originally posted on Gigaom:

When Microsoft(S msft)  launched Azure Basic a few weeks back, it may have started a trend. Microsoft, while matching Amazon’s previously announced price cuts, also unveiled a set of “basic” general-purpose instances that are 27 percent cheaper than its own “standard” instances. What Basic doesn’t include is the load-balancing or auto-scaling that come as part of standard instances, according to a blog post. 

Fast forward to this week when Amazon roped off older EC2 instances from their newer brethren. When users go to buy EC2, they’ll be steered to the shinier, more muscular instances but if they really want the older stuff, it’ll still be there — if they look for it. At least for now.
aws old instances

Constellation Research analyst Holger Mueller expects we may see two-tier pricing from all IaaS vendors, with Microsoft Azure Basic blazing the trail.  Amazon did not respond to requests for comment.

Others characterize Amazon’s move as a continuation of…

View original 268 more words

iControl Networks Acquires Blacksumac, The Company Behind The Piper Home Monitoring Device

Featured Image -- 3736

Originally posted on TechCrunch:

Earlier this year, Google ushered in consolidation of the home automation and monitoring space with its $3.2 billion acquisition of Tony Fadell’s Nest. Today, iControl Networks followed that trend with its purchase of Blacksumac, which makes the Piper home automation device.

iControl historically has sold its products through various channels, including home security companies and cable service providers. Founded about a decade ago, iControl has spent the last several years signing up customers like ADT, Comcast, Time Warner Cable, Rogers, and others with white-labeled home monitoring products.

The company has raised about $130 million since being founded, from institutional investors such as Charles River Ventures and Kleiner Perkins, as well as strategic investors that include Intel Capital, Comcast Ventures, Cisco, and others.

Blacksumac, meanwhile, is an early upstart in the home monitoring market. The company first came to light with an Indiegogo campaign for its Piper home monitoring…

View original 298 more words

Breaches are inevitable: Cybereason brings Israeli defense expertise to the cyber-security fight

Originally posted on PandoDaily:

cybersecurity

The internet is a dangerous place for anyone holding sensitive information. I know it, you know it, and corporations know it. Historically, however, knowing this has meant little in terms of preventing cyber attacks. Cyber-crime still costs the global economy north of $300 billion per year, and the US economy north of $100 million according to a July 2013 study by The Center for Strategic and International Studies.

The problem, according to most experts, is that there are too many attack vectors to protect against and cyber-criminals are evolving faster and playing by a looser set of rules than those people trying to keep them at bay.

Today, Cybereason, a new cyber-security company founded by ex-Israeli Intelligence Services experts and with operations in Cambridge, Mass. and Tel Aviv, Israel, is launching out of stealth to offer what it claims is an altogether different solution than anything currently on…

View original 1,052 more words

A Few Thoughts On Free Windows

Featured Image -- 3725

Originally posted on TechCrunch:

Hot damn, changes. ZDNet and The Verge reported on a story that, at first blush, sounds downright strange: Microsoft may do away with charging for Windows in the future.

Microsoft selling Windows to OEM partners is even more entrenched than apple pie is to Americanism. No more of that? It’s almost unthinkable.

However, once you get past the oddity of the concept, it can make sense if you approach it properly. Let’s do this in a section-list format for brevity:

1. Microsoft has made billions selling Windows to consumers through its OEM partners. It now also sells Windows to consumers on devices that it builds. This means it has new ways to monetize a New PC To Consumer.

2. The era in which Microsoft made the bulk of its Windows income is not now. Windows OEM revenue is falling. If it weren’t for corporate PC sales, the top line that…

View original 562 more words

10 Myths About Writers and Writing

Originally posted on Pilot Fish:

In order to write creatively, we need to exercise our free-spirited and impulsive right brain.  It might take a while to “liberate” this side of the brain especially if we have worked in fields that are linear, concrete, and require rationale thought.  This is what happened to me many years ago when I switched from a career in teaching and publishing to full-time writing.   As I began my apprenticeship in the creative arts,  I had to dispel several myths about the writing process and writers.

&quot;Incognito: The Hidden Self-Portrait&quot; by Rachel Perry Welty, DeCordova Museum.

“Lost in My Life (Price Tags) ” by Rachel Perry Welty, DeCordova Museum.

1.  Myth: Writers Are Strange.

There is an element of truth to this!  Writers (and other creative people) must be willing to look below the surface of everyday life and explore the world and relationships like a curious outsider.  This perspective sets us apart, but at the same time, it allows us…

View original 587 more words

Be careful out there: Conduit Search spyware is annoying the Internet

Originally posted on Daily Slice:

UPDATE: In early 2014 a more aggressive version of Conduit Search started showing up. If the below instructions are not effective, we would suggest using Malwarebytes to remove the infection. You can download a free version of Malwarebytes here. (During installation, you may want to uncheck the “Enable free trial of Malwarebytes Anti-malware Premium” box if you don’t want a 30 day trial of the premium software to install.) Once installed, simply click “Scan Now” and Conduit Search (as well as any other infections) should be cleared up pretty quickly. Business professionals may want to consider TOAST.net’s Managed Antivirus product instead, which will block and clean infections as well as send you a regular security report to help you manage your network.

_______________________________________________________________________

Original Article:

We’re seeing a lot of reports of something called Conduit Search showing up on customer computers over the last few weeks, causing problems ranging from an…

View original 818 more words

Hacking & ID Theft: Are You Next?

Originally posted on GulfDogs:

At least 110 million consumers were affected by the hack involving Target and Neiman Marcus retailers. Whether or not millions more will have their identities manipulated and finances ruined within the coming months due to more breaches of security at other stores is anyone’s guess, says identity theft recovery expert Scott A. Merritt.

“By necessity, I became an expert on identity theft. My information was stolen in 2006, and in repairing the damage, I learned some not-so-obvious ways we can all protect against identity theft in the first place,” says Merritt, CEO of Merritt & Associates and author of (scottamerritt.com) “Identity Theft Do’s and Don’ts.”http://canadafreepress.com/index.php/article/60588

View original

10 Myths About The NSA Debunked

Originally posted on YouViewed/Editorial:

“If You Have Nothing To Hide, You Have Nothing To Fear,” And So On… It’s Time To Face These Government Slogans And Lies”

 

 

” The debate Edward Snowden envisioned when he revealed the extent of National Security Agency (NSA) spying on Americans has taken a bad turn. Instead of a careful examination of what the NSA does, the legality of its actions, what risks it takes for what gains, and how effective the agency has been in its stated mission of protecting Americans, we increasingly have government officials or retired versions of the same demanding — quite literally — Snowden’s head and engaging in the usual fear-mongering over 9/11. They have been aided by a chorus of punditscolumnists, and present as well as former officials offering bumper-sticker slogans like “If you have nothing to hide, you have nothing to fear,” all the while claiming our…

View original 112 more words

How the NSA Threatens National Security

Originally posted on BLOGGING BAD w/Gunny G ~ "CLINGERS-AMERICA!":

How the NSA Threatens National Security

Schneier on Security ^ | 1/13/2014 | Bruce Schneier

Posted on Monday, January 13, 2014 2:49:48 PM by NewHampshireDuo

[....]

First and foremost, the surveillance state is robust. It is robust politically, legally, and technically. I can name three different NSA programs to collect Gmail user data. These programs are based on three different technical eavesdropping capabilities. They rely on three different legal authorities. They involve collaborations with three different companies. And this is just Gmail. The same is true for cell phone call records, Internet chats, cell-phone location data.

[....]

Our choice isn\’t between a digital world where the NSA can eavesdrop and one where the NSA is prevented from eavesdropping; it\’s between a digital world that is vulnerable to all attackers, and one that is secure for all users.

Fixing this problem is going to be hard. We are long past the…

View original 86 more words

Google Joins Forces With NSA And DARPA As Military Contractor

Originally posted on GulfDogs:

Google has spent the last decade building databases on everything, including each and every computer-using American citizen. Now it intends to join forces with the United States Military to put all that info to good use. The giant “swooshing sound” you are hearing right now is the major leap forward of the Mark of the Beast.

The DC: Google CEO Larry Page has rapidly positioned Google to become an indispensable U.S. military contractor. Google recently purchased Boston Dynamics, a robotics pioneer that produces amazing humanoid robots for the U.S. Defense Department.

This development invites attention to Google’s broader military contracting ambitions — especially since Boston Dynamics is the eighth robotics company that Google has bought in the last six months.

read more here>>> http://www.nowtheendbegins.com/blog/?p=16024

View original

Tales From Your Police State: Former DARPA Head & now-Google Exec Wants to Microchip You

Originally posted on Scott Rhymer:

Regina Dugan has plans for you…the former head of DARPA, and current head of Advanced Technologies at Motorola (owned by Google) wants citizens to submit to an edible microchip to “authenticate your identity.”

“This pill has a small chip inside of it with a switch,” said Dugan. “It also has what amounts to an inside out potato battery. When you swallow it, the acids in your stomach serve as the electrolyte and that powers it up. And the switch goes on and off and creates an 18 bit ECG wide signal in your body and essentially your entire body becomes your authentication token.”

She claims it’s perfectly safe for the user. And, of course, there’s no chance of this being used to nefarious purpose…no! Her even creepier idea is an electronic tattoo on your throat to read subvocalized speech — the kind most people do every day when censoring themselves…

View original 14 more words

The NSA’s Spy Catalog

Originally posted on Engineering Evil:

EEV: As Promised, in no particular order. This information already has been fully compromised internationally, over the past few days.

EngineeringEvilEngineeringEvil

View original

What is SEO? One of the Free SEO Toolbars

Uploaded on Mar 4, 2009

Free at http://tools.seobook.com/seo-toolbar/ … here is a video walkthrough of the SEO Toolbar.

Search engine optimization (SEO) is the process of affecting the visibility of a websiteor a web page in a search engine‘s “natural” or un-paid (“organic“) search results. In general, the earlier (or higher ranked on the search results page), and more frequently a site appears in the search results list, the more visitors it will receive from the search engine’s users. SEO may target different kinds of search, including image searchlocal searchvideo searchacademic search,[1] news search and industry-specific vertical search engines.

As an Internet marketing strategy, SEO considers how search engines work, what people search for, the actual search terms or keywords typed into search engines and which search engines are preferred by their targeted audience. Optimizing a website may involve editing its content, HTML and associated coding to both increase its relevance to specific keywords and to remove barriers to the indexing activities of search engines. Promoting a site to increase the number of backlinks, or inbound links, is another SEO tactic.

The plural of the abbreviation SEO can also refer to “search engine optimizers”, those who provide SEO services.

How to Improve Your Chances of Going Viral

How to Improve Your Chances of Going Viral

Edited by Teresa, Elyne, Lojjik Braughler, Lillian May and 16 others 

Almost everyone who’s savvy with the internet has heard about “going viral”. “Going viral” refers to the fact that your content resonates so enormously that it catches on fire, and ends up being the latest big thing across the internet. It is when your content gets liked, retweeted, republished, commented on, blogged about, talked about on the streets of LA to Viti Levu, and it earns you more views than your wildest dreams could ever have imagined.

It’s a powerful outcome for your web content and for your brand’s reputation (even if that brand is “you”). However, desiring the key to making something go viral is an unrealistic wish; certainly, you should do your best to make your content the most interesting and fascinating online experience possible, but nobody can really put their finger on what causes something to “go viral”. What you can do is improve your chances of achieving a viral outcome while accepting that much of going viral is going to be about luck and good fortune.

Steps

Appreciate the varying degrees of “going viral”. Your website content, photos, or a video you’ve created can “go viral”, your marketing can turn viral (“viral marketing“), and in the case of social media, a blog, a Facebook page or group, or a tweet can turn viral. In fact, any sort of content you create that is shared via phones, iPads, computers, or other electronic means can be viral, be it an app, game, puzzle, or a story, so don’t limit your idea of what can go viral to thinking about dancing baby videos or million pixel websites! The next great viral thing is… unknown!
  • Viral could mean within your interest niche, such as just among photography buffs, cooking fans, Star Wars collectors, or whatever, or it could go beyond your niche into the stratosphere of being enjoyed and shared around by everyone, just because there is something within your content that resonates with a wide group of people, such as a human interest element, a problem solved, a health scare, a video or story of a cute kid or pet, etc.
2
 Understand the limits of going viral. It’s a good idea to get this straight before getting too excited – you cannot make your content go viral. You can hope for it, you can position your content to be at its best and most interesting with the underlying wish that it will catch on, but you cannot make it go viral. At the most, as Ann Handley and C.C. Chapman explain in their book Content Rules, you can “nudge, poke, and pray for it … [but] the truth is that viral is largely a happy accident.” So, don’t try to control the viral nature of your content; instead, concentrate fully on making it compelling, at the top of its niche, interesting, funny, moving, and definitely something able to resonate with a lot of readers or viewers. Accept that it will be your audience who makes the ultimate decision on the content’s “viral worthiness”.
Know what flows. One of the key things behind something going viral is that it touches people in some way. And what is most likely to touch a bunch of people who are tech-savvy, clued in, and ready for new information all of the time? Unsurprisingly, it’s the same as it has always been – things that are uplifting and make us feel good about ourselves and others. What is most likely to “flow” – that is, get sent around the social media networks – is content of the following nature:  Content that inspires awe. Think of “Christian the Lion“. Can you still get over the fact that two guys could even buy a lion cub in a large department store in the middle of one of the world’s biggest cities (Harrods) once upon a time, and that that lion could then frolic in local London gardens before being shipped to Africa and still recognize his original owners years later? That sort of awe-inspiring tale gives us all a sense of how amazing this world is and how we can all play intricate, valuable roles in life.
  • Content that triggers an emotional response.
  • Positive articles, positive, uplifting messages. Articles able to open the mind and broaden knowledge through positive messages are particularly enjoyed.
  • Articles that make us feel good about ourselves and others. One viral event that created a real feel good sense was the video “Validation”, in which people saw the good that comes of validating other people.
  • Articles that that create a sense of admiration and surpassing of mere self interest tend to be the most shared, showing that we do care a great deal about others and we’re moved by stories of others who are actively doing something to show this. 
  • Longer articles over short. Believe it or not, people will spend time reading thoroughly when the content merits it, and when it carries a clear message that they’re yearning to learn more about. Just be sure that longer means “more engaging” and not “long-winded and repetitive”! 
  • Quirky topics, especially the “unexpected”. Things that are out-of-the-ordinary, very unusual, and extremely interesting. 
  • Cute things. Laughing babies, crazy cats, dogs doing tricks, etc. – we’ve all watched or seen such content and loved it.

Have value, perceived or otherwise. Some examples of information that helps others improve their lives, understand things better, or make timely decisions include: 

  • How Tos and instructional content
  • News, especially breaking news 
  • Warnings (like a phishing scam or viruses online) 
  • Freebies and contests.

Have an abundance mentality. Information used to be something carefully protected and meted out to the masses. These days, it’s about sharing information as much as possible, although not just any information but useful, quality, informative, and even detailed information that people really need or want to make their lives better. The person, company, or group most willing to provide quality information to others that shares or solves something and doesn’t involve a secret agenda (such as sales or demands) is most likely to get respected followings, which enhances the chances of turning viral. However, be wary of how you promote this vast amount of productivity; see below for avoiding overdoing the promotion.

 
Make sure people can find your content. Content that’s buried and difficult to access won’t go viral for the simple fact that nobody can find it. Start with your domain or host; if you have your own domain, is it an easy-to-remember name or one that requires the memory of an elephant to get right? If you’re using another site to host your content, be sure to use one that has a good following, such as FlickrYouTubeVimeo, or Facebook, etc. And be sure that your content includes the very thing people would be looking for, such as a turn of phrase, a precise question, specific keywords, etc.
  • Search for your content using a search engine or two. Is it coming back to you easily or are you having to dig through page after page of returns before it shows up?
  • Use social media as another string to your bow. Active Facebook and Twitter accounts are the place to leave information about freshly uploaded content and to encourage the information to be shared around widely.
  • Provide easy search and categorization within your content so that people can find things quickly if they do want to look through more than one piece of content. Moreover, search engines love categories.
  • Tag and keyword everything you can. Search engines can find the content better this way.

Publicize yourself. While it isn’t possible to create a viral outcome, it is possible to encourage the potential for it. Publicizing your content through trusted channels is an important way to get your content seen, noticed, and possible picked up on by many others. In other words, make it very easy for people to notice that your content is there. Put your content on more than one site. Use Twitter, Facebook, YouTube, RSS feeds, microblogging sites, and even links via profile pages you have on various websites and your email signatures. Get onto forums, into IRCs, and anywhere else you usually frequent and casually mention your masterpiece and suggest that people might check it out

  • Use a link. The majority of retweets have links in them. When it comes to viral videos and webpages, the link is a crucial part of it. 
  • Send a link to your content to everyone you know such as friends, family, and co-workers, provided it’s not likely to be a nuisance to them. 
Don’t overdo your content promotion. Be very selective about what you encourage your readers and viewers to check out. You don’t want to convince them that every single piece of content you produce is the next latest greatest thing or they’ll start viewing you as the “boy who cried wolf” and stop even looking at your work. Be astute about what is the very best of your output and only put that forward as worthy of getting shared around. That way, you increase the chances of going viral because it’s both quality content and not about over-pressuring your initial content sharers.
 
From one to many...basically how a viral post works
Create momentum and incite action. Not only should you publicize yourself but you need to also help your viewers and readers do something with your content; it isn’t enough to simply put the content out and sit about hoping something will eventuate. Plant the suggestion for them and allow them to be the arbiter of whether or not they’ll follow through. For example, if you want to be retweeted, just ask. And be sure to try that six letter word, ‘please’. A higher percentage of retweets are found to contain the word “please” than not! Some ways to provide a call to action include (and the more of these you can do, the better):
  • Providing clear social sharing icons, such as Facebook, Twitter, LinkedIn, Google Reader, etc. These icons are fondly known as “social bling” and since they increase the ease with which people can pass around your content, make the most of them.
  • Tell people what you’re hoping to happen with the content by gently steering them with kind and thoughtful requests. Some of the ways to do this include saying such phrases as:Invite people to come and interact with you, your content, or something you’ve created around the content. Perhaps a webinar, or a Skype call, or a Twitter party. Be open to all the possibilities to enlighten people as to the potential for your content.
  1. Check out… (my link, my eBook, my post, my video, my article, etc.)
  2. Please embed my video/interactive quiz… (and make it easy for this to happen)
  3. Follow this person
  4. Download my widget/game/PowerPoint/eNook!
  5. Please vote!
  6. Help me…
  7. Questions, e.g. “What do you think of…?”, and so forth.
10 
Watch your timing. As with most things in life, timing is everything and you need to have a sense of whether or not the time is right for the content you’re hoping to go viral. If it’s not, patience might be a virtue until the right moment appears but if it is, then don’t waste a moment in case someone else gets there ahead of you. Only you will be able to gauge the issue of timing as it will be very attuned to your topic and interests and is something you will need to monitor the pulse of yourself.In terms of timing the posting itself, this is a related but slightly different issue. Be sure to post at what you know is the most active time of being online for your target audience. The more people who are actively reading, viewing, or interacting with your content at the same time when it’s released, the greater are your chances of the content getting sent around amid the buzz of novelty and mutually sustaining sharing.
11 
Leave room for connection. Ultimately it is the ability for conversation to take place that helps many a piece of web content to turn viral. Make sure it’s easy for people to contact you if they want to know more, either through comment boxes, IM, a chat forum, an email, or any other way you’re used to using. And be responsive, not reclusive!
  • Ratings systems can be helpful too, as can numbers of visitors. These do influence readers and viewers who can see what others are thinking about the content and how many other people are getting involved.

Tips

  • No matter how hard you try and how much you analyze existing viral content, some of “going viral” is just down to luck, happy timing, and the current mood of internet audiences. You can’t predict it, and people who insist that they can are practicing magical thinking, for which they’ll be soundly rewarded with less optimal outcomes than what they’re dreaming of.
  • Moderate comments to remove inappropriate, irrelevant, or offensive posts that are linked to your material. However, do not edit any relevant comments or remove relevant ones. This is merely about sweeping out comments likely to detract from the real conversation and buzz around your content, so that all genuine comments are easier for others to read, whether supportive or otherwise of your content.
  • Check that your settings on your blog, website, or other content collation source allow for sharing. You wouldn’t want your sharing held up by not ticking the right boxes!
  • If you want to use a centralized sharing service such as ShareThis.com, this can make placing share buttons on your site a lot easier to do and manage.

Warnings

  • Not everything that you think will go viral will. Accept that and be honest with yourself about the value, quality, and worthiness of the content in the first place.
  • Avoid engaging in magical thinking; this will prevent you from putting in the much-needed effort to make your content worthwhile.

 

Sources and Citations

  1.  Wikipedia, “Viral phenomenon”, http://en.wikipedia.org/wiki/Viral_phenomenon
  2.  Ann Handley and C.C. Chapman, Content Rules, p. 113, (2011), ISBN978-0-470-64828-5
  3.  Ann Handley and C.C. Chapman, Content Rules, pp. 104-106, (2011), ISBN978-0-470-64828-5
  4.  http://en.wikipedia.org/wiki/Christian_the_lion
  5.  http://www.youtube.com/watch?v=Cbk980jV7Ao
  6.  Ann Handley and C.C. Chapman, Content Rules, p. 70, (2011), ISBN978-0-470-64828-5
  7.  http://danzarrella.com/retweet-beta.html – (statistics obtained through the retweet mapper)

How to Optimize Your Website for Search Engine Use

Edited by Ianne, V Rod, Travis Derouin, Seattle SEO firm and 62 others 

Content still reigns as the king in the world of Search Engine Optimization (SEO). Some websites get on top of search engine rankings because of high-powered link building campaigns, but when you talk about visitor loyalty and traffic retention (and yes, public consumption), it will always require that good old optimized content

Steps

Dedicate some time to writing really great content. The saying goes that you should write for people first and search engines second. This basically means you should be creating really quality pieces that are useful and engaging for humans because the search engines will recognize your efforts. Your readers will share your work generating additional backlinks, not to mention extra traffic, and search engines will recognize your quality piece because it will flow naturally with not too many keywords (something which is penalized in the post Penguin Update world). 

  • Write content people want to share on Facebook, Twitter, Pinterest and other social networks. The search engine will read those social signals as a signal of the quality of your domain. You can accelerate the spread of your content on these sites by having an account on these social networks with lots of followers. 
  • Consider submitting your content to sites like Reddit, Delicious, Digg and other content aggregators that might gain you a few readers.  
  • Go back and SEO rewrite some old content. Chances are you know stuff about search engine optimisation that you didn’t know last year (not to mention changes in SEO best practices since last year). Re-visit some old content and re-write it with your search engine optimisation hat on, updating image attributes, changing keyword density, adding links to your home page and other relevant content on your site. Even consider republishing as a fresh article for extra brownie points with the search engines!
Get links to your pages from other trusted websites.
  • Even if you are new to the web, you have natural links you could try to get. All businesses have suppliers whether they be accountants, solicitors or raw material providers. All these suppliers are bound to have a website, contact them to ask for a link back, but do not offer a link in exchange. Link exchanges don’t violate Google’s TOS, but they will now work against you. When building links, always give other site owners a reason to want to link back to you. Perhaps write an article based on a particular client – everyone likes bragging rights and this can gain you additional links without even having to ask. All Google wants to see is links that have an editorial right to be there. 

3  

  • Complete all image attributes. Pictures dress up your pages but search engines don’t really know how to deal with them unless you complete all the nitty-gritty details like title, caption, alternate text, description. Be ethical though, don’t use it as an opportunity to cram an extra few keywords onto the page as this will likely have a negative impact on your search engine ranking. Some people search for what they are looking for via Google image search, if you’re image is highly visible then your potential customers will likely visit your page.

 

Diversify internal anchor text links. There needs to be variations in the text when one creates those blue-highlighted anchor text links. The links on a page are what the search engine spiders follow in determining where they are being led. The text used in the links are used in helping the search engines figure out what the page it leads to is all about.  
Take note of word count. Although it’s been a classic rule that “readers online do not read”, it simply doesn’t mean that one has to deprive the online users of good, meaty content. Stick to at least 250 words a page. SEOs know that writing down for an appropriate length of text means being more able to include more related terms for the target keywords.  
Avoid duplicate content. The content on your website should be unique from other pages on your site, and from external sites as well. Consider using a tool such as Siteliner to look for duplicate content.

 

Page Format Issues

Title Tags

The first is your page title. It’s very important to put keywords in your page title; specifically try to get important keywords first and try to limit the overall length of your page title. Well-constructed title tags contain the main keyword for the page. It should contain less than 65 characters with no stop words such as: a, if, the, then, and, an, to, etc. Your title tag should also be limited to the use of alphanumeric characters, hyphens, and commas.

 
2

Header Tags
Next, it’s important to look at the header tags on your site-h1, h2, h3, h4 and so on. H1 is the most significant. Make sure you have the most important keyword labeled as h1 tag. This will help you with ranking for your site, especially if someone is searching for that particular key word or phrase.

 
3

Page Content
Next up is the content. You definitely want to put your keywords in the contents somewhere, but the object, though, is to make sure the content is very well written for visitors to your website. You want to insert the keywords for that page only where it makes sense. Page content should have between 300 and 700 words of descriptive content that contains the keywords specified in the keywords meta tag for the page. You also want to try to optimize your URLs. Make sure to include important keywords in the URL.

 
4

Meta Tags
Next are the Meta keywords and Meta description. These are pieces of code behind the scene. The code should look something like this: It should be placed directly under the title tag code <title> Your site tittle</tittle> <meta name=”description” content=”your site description” <meta name=”keywords” content=”keyword1, keyword2, keyword3″ Your keywords meta tag should contain between 5-10 keywords or keyword phrases that are also found in page content. Also one more important meta tag is description tag that contains information about the page’s content so you can persuade search engine users to visit your web site. It should have 15-160 characters, remember not to stuffed with keywords.

 
5

Navigation
Next is to have proper navigation. Each page of your site should contain links to every other page so search engine spiders can find every page. This is an important step for the proper indexing and page ranking for your site.

 
6

Site Map
Next is having a proper site map. It’s important to use two site maps for your website–an XML version and a static version. The XML version can be created by sitemap generators tools such as http://www.xml-sitemaps.com. The sitemap should then be submitted to the Google Webmaster Tools account for that site. This will aid in crawling of Google’s Spidebot. The static version should be a HTML page that contains links to every other page.

 

Tips

  • If you have a local business, get listed in the Google Local Business search results. 86% of people looking for something offline will search online using the likes of Google and Bing. Even businesses like hairdressers and butchers can’t afford to miss out on a spot of search engine optimization  Head over to the Google Local Business Centre and add your business to the map, that way your business info and contact details will appear next time a potential customer searches for a service you provide in your local area!
  • Usage of JavaScript, Flash & frames. Search engines are not always can correctly process links on JavaScript, therefore it is desirable to use them as less as possible. The elements of a site executed on Flash, are not indexed by many search systems. If internal links of the project are made in Flash, the majority of search systems will not find these pages. Each time when there is a new page on a site, it becomes to the known search engine only when it will be found by the robot of the search engine. If the page is located in the heart of a site, it can occur very much at a distant day. Sitemap placing frequently solves a problem of indexation and site re-indexation.
  • Dynamic pages are tough to index as it contains too many special characters, some bots takes much longer time to index those pages or sites as well. Try to avoid dynamical writing of site pages.
  • SEO-friendly content is no longer the restrictive, robotical-sounding content it used to be. Search engines, in their aim to continuously refine search are catering more to the online readers, the social aspect of the World Wide Web. Content comes out to be more human-centered, and ready for consumption.

You Can Now Send Photos Privately Using Twitter

Originally posted on thedailyblogreport:

Twitter users can now privately message photos to each other, the company announced today in a blog post.
The feature looks pretty straightforward. Using one of the company’s mobile apps, you can send and view photos using Twitter’s pre-existing direct message feature. On Twitter.com, users wil…
Read more about:
You Can Now Send Photos Privately Using Twitter

View original

BOLD ENOUGH TO BE LED BY THE SPIRIT

Originally posted on Sally's Serenity Spot:

“The wicked flee when no man pursues them, but the [uncompromisingly] righteous are bold as a lion.”~~Proberbs 28:1

Bold Enough to be Led by the Spirit

“If we intend to succeed at being ourselves, we must reach a point where we can be led by the Holy spirit. Only God, through His Spirit, will lead us to succeed and be all we can be. Other people usually won’t, the devil certainly won’t, and we are not able to do it ourselves without God. Being led by the Spirit does not mean that we do not make mistakes or that we are perfect. The Holy Spirit does not make mistakes but we do.

Following the Spirit’s leading is a process which can only be learned by doing. We start by stepping out into things we believe God is putting on our hearts, and we learn by wisdom and experience…

View original 222 more words

Ten Steps You Can Take Right Now Against Internet Surveillance

Information Control

OCTOBER 25, 2013 | BY DANNY O’BRIEN

One of the trends we’ve seen is how, as the word of the NSA‘s spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. But where to start?

The bad news is: if you’re being personally targeted by a powerful intelligence agency like the NSA, it’s very, very difficult to defend yourself. The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.

Here are ten steps you can take to make your own devices secure. This isn’t a complete list, and it won’t make you completely safe from spying. But every step you take will make you a little bit safer than average. And it will make your attackers, whether they’re the NSA or a local criminal, have to work that much harder.

  1. Use end-to-end encryption. We know the NSA has been working to undermine encryption, but experts like Bruce Schneier who have seen the NSA documents feel that encryption is still “your friend”. And your best friends remain open source systems that don’t share your secret key with others, are open to examination by security experts, and encrypt data all the way from one end of a conversation to the other: from your device to the person you’re chatting with. The easiest tool that achieves this end-to-end encryption is off-the-record (OTR) messaging, which gives instant messaging clients end-to-end encryption capabilities (and you can use it over existing services, such as Google Hangout and Facebook chat). Install it on your own computers, and get your friends to install it too. When you’ve done that, look into PGP–it’s tricky to use, but used well it’ll stop your email from being an open book to snoopers. (OTR isn’t the same as Google Chat‘s option to “Go off the record”; you’ll need extra software to get end-to-end encryption. 

  2. Encrypt as much communications as you can. Even if you can’t do end-to-end, you can still encrypt a lot of your Internet traffic. If you use EFF’s HTTPS Everywhere browser add on for Chrome or Firefox, you can maximize the amount of web data you protect by forcing websites to encrypt webpages whenever possible. Use a virtual private network (VPN) when you’re on a network you don’t trust, like a cybercafe.

    http://download.cnet.com/Free-VPN/3000-7240_4-75445860.html

  3. Encrypt your hard drive. The latest version of WindowsMacsiOS and Android all have ways to encrypt your local storage. Turn it on. Without it, anyone with a few minutes physical access to your computer, tablet or smartphone can copy its contents, even if they don’t have your password.

  4. Strong passwords, kept safe. Passwords these days have to be ridiculously long to be safe against crackers. That includes the password to email accounts, and passwords to unlock devices, and passwords to web services. If it’s bad to re-use passwords, and bad to use short passwords, how can you remember them all? Use a password manager. Even write down your passwords and keeping them in your wallet is safer than re-using the same short memorable password — at least you’ll know when your wallet is stolen. You can create a memorable strong master password using a random word system like that described at diceware.com.

  5. Use Tor. “Tor Stinks”, this slide leaked from GCHQ says. That shows much the intelligence services are worried about it. Tor is an the open source program that protects your anonymity online by shuffling your data through a global network of volunteer servers. If you install and use Tor, you can hide your origins from corporate and mass surveillance. You’ll also be showing that Tor is used by everyone, not just the “terrorists” that GCHQ claims.

    http://download.cnet.com/Tor-Browser-Bundle/3000-2356_4-75660251.html

  6. Turn on two-factor (or two-step) authentication. Google and Gmail has it; Twitter has it; Dropbox has it. Two factor authentication, where you type a password and a regularly changed confirmation number, helps protect you from attacks on web and cloud services. When available, turn it on for the services you use. If it’s not available, tell the company you want it.

  7. Don’t click on attachments. The easiest ways to get intrusive malware onto your computer is through your email, or through compromised websites. Browsers are getting better at protecting you from the worst of the web, but files sent by email or downloaded from the Net can still take complete control of your computer. Get your friends to send you information in text; when they send you a file, double-check it’s really from them.

  8. Keep software updated, and use anti-virus software. The NSA may be attempting to compromise Internet companies (and we’re still waiting to see whether anti-virus companies deliberately ignore government malware), but on the balance, it’s still better to have the companies trying to fix your software than have attackers be able to exploit old bugs.

  9. Keep extra secret information extra secure. Think about the data you have, and take extra steps to encrypt and conceal your most private data. You can use TrueCrypt to separately encrypt a USB flash drive. You might even want to keep your most private data on a cheap netbook, kept offline and only used for the purposes of reading or editing documents.

  10. Be an ally. If you understand and care enough to have read this far, we need your help. To really challenge the surveillance state, you need to teach others what you’ve learned, and explain to them why it’s important. Install OTR, Tor and other software for worried colleagues, and teach your friends how to use them. Explain to them the impact of the NSA revelations. Ask them to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node, or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.

Snowden’s legacy: The open web could soon be encrypted by default

Originally posted on Gigaom:

Well here’s one way to stymie the NSA: in a couple of years, much if not most of the open web will be encrypted by default. Following recent discussions between the big browser makers, standards-setters and other industry folks, the World Wide Web Consortium’s (W3C) HTTP Working Group announced on Wednesday that the upcoming second version of the HTTP protocol will only work with secure “https” web addresses.

Those “https” prefixes usually denote what’s known as Transport Layer Security (TLS), or sometimes its predecessor Secure Sockets Layer (SSL). Commonly used on banking or email services today — or really anything that needs protection of some kind — this kind of basic security technique was already on the rise before Edward Snowden revealed mass online surveillance. Now the movement has gained fresh urgency.

Engineering effort

A lot of this effort is taking place under the auspices of the W3C and the…

View original 621 more words

Twitter Book Offers Singular, But Fascinating Narrative Of Invention

Originally posted on TechCrunch:

The distillation of one human life into a few hundred pages is a task herculean enough to trip up even seasoned biographers. Expanding that to include four co-founders and a company with as explosive a history as Twitter’s is begging for disaster.

A new book called Hatching Twitter: A True Story Of Money, Power, Friendship and Betrayal, from New York Times reporter Nick Bilton attempts to do just that. It’s around 300 pages and packs in the nearly seven-year history of Twitter as a company and a bit more.

The introduction rips along, introducing us to the four people most responsible for Twitter: Noah Glass, Evan Williams, Biz Stone and Jack Dorsey.

A quick portrait of each of them is painted, albeit in fairly broad strokes. All talented, all intelligent, all searching for human connections and a way to enhance those connections using the Internet.

Bilton is also careful…

View original 1,079 more words

Spread My Work Ethic

Small Business-work ethics

Amen to that! The lazy liberals have less incentive to work for what they want.

Hell, if they can get things without working for it, why would they choose to work? Then they try to justify taking other people’s hard earned money by saying that it is not hurting anyone.

In truth, it is! It is hurting the hard working taxpayers, that choose to work for what they want, and the small businesses trying to survive.

Instead of “feeding them fish”, we need to teach them “how to fish”!!

Anyone collecting welfare should have to be drug tested, and do some kind of work in exchange for it. We need to teach people that you do not get something for nothing.

If you are NOT an American or sick, elderly, or disabled, then you should not be collecting taxpayers money. 

Give a man a fish, and you feed him for a day; show him how to catch fish, and you feed him for a lifetime.

Meaning

A proverbial saying which suggests that the ability to work is of greater benefit than a one-off handout.

Origin

This proverb has fallen foul of the spurious etymological rule: ‘if you don’t know the origin of an enigmatic proverb, say it is ancient Chinese‘. May you live in interesting times and a picture is worth a thousand words suffer the same fate. There’s no evidence to link ‘Give a man a fish…’ with China. A further confusion over the origin is that the authoritative and generally trustworthy Oxford Dictionary of Quotations says it is of mid-20th century origin.

The expression actually originated in Britain in the mid 19th century.

Give a man a fish

Anne Isabella Ritchie, the daughter of William Makepeace Thackeray, (who, if her photograph is any guide, was a studious young woman) wrote a story titled Mrs. Dymond, sometime in the 1880’s and it includes this line.

“He certainly doesn’t practise his precepts, but I suppose the patron meant that if you give a man a fish he is hungry again in an hour; if you teach him to catch a fish you do him a good turn.”

The book was published in 1890 but the story was put into print a few years earlier. The American magazine Littell’s Living Ageprinted the story in its September 1885 issue and it was taken from an earlier but undated issue of the British Macmillan’s Magazine.

So, the proverb dates from 1885 or shortly before and there’s every reason to suppose that it was coined by Anne Ritchie.

The source of the mid-20th century and Chinese origin theories are various US magazines from the 1960s, for example The Rotarian, June 1964:

…the Chinese axiom “Give a man a fish, and you have fed him once. Teach him how to fish and you have fed him for a lifetime.”

Publications of that sort were what brought the proverb into general use but, as we have seen, weren’t the actual source.

Google puts a large mystery barge in San Francisco Bay.

Originally posted on Mario Murillo Ministries:

google barge

Google takes secrecy to new heights with mystery barge

By Ronnie Cohen and Alexei Oreskovic

SAN FRANCISCO (Reuters) – How badly does Google want to keep under wraps a mysterious project taking shape on a barge in San Francisco Bay? Badly enough to require U.S. government officials to sign confidentiality agreements.

At least one Coast Guard employee has had to sign a non-disclosure agreement with the Internet giant, said Barry Bena, a U.S. Coast Guard spokesman. Another person who would only identify himself as an inspector for a California government agency had to do the same.

Moored in the shadow of the Bay Bridge off of Treasure Island, a former military base, the nondescript barge is stacked several stories high with white shipping containers, and sprouts what appear to be antennas on top. The hulking structure, half shrouded in scaffolding, has stirred intense speculation in the Bay Area since reports…

View original 571 more words

Real US Unemployment Rates Reveal True State of Economy

Originally posted on wchildblog:

The ‘official’ US unemployment rates pushed by number cookers may seem grim, but the real unemployment rates within the US tell a much more realistic and concerning tale.

Source: storyleak.com by Daniel G. J.

Even recent drops in the numbers of unemployed people reported by the U.S. Labor Department were apparently too good to be true. The U.S. Bureau of Labor Statistics has admitted that the improved employment figures it recently reported were the result of a computer error, and that’s just the beginning. We’re looking at the ‘final breath’ of the economy before either collapse or reform that Anthony Gucciardi has detailed.

The Labor Department reported that the number of those applying for unemployment benefits fell by 31,000 during the first week of September. Yet just a week later a Labor Department spokesman admitted the real cause of the drop was that two states he wouldn’t identity changed…

View original 285 more words

Snowden leak: NSA secretly accessed Yahoo, Google data centers to collect information!

Originally posted on :

20131030-165605.jpg

Despite having front-door access to communications transmitted across the biggest Internet companies on Earth, the National Security Agency has been secretly tapping into the two largest online entities in the world, new leaked documents reveal.

Those documents, supplied by former NSA contractor Edward Snowden and obtained by the Washington Post, suggest that the US intelligence agency and its British counterpart have compromised data passed through the computers of Google and Yahoo, the two biggest companies in the world with regards to overall Internet traffic, and in turn allowed those country’s governments and likely their allies access to hundreds of millions of user accounts from individuals around the world.

“From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants,” the Post’s Barton Gellman and Ashkan Soltani reported on Wednesday.

The document providing evidence…

View original 309 more words

Follow

Get every new post delivered to your Inbox.

Join 4,945 other followers

%d bloggers like this: