Wednesday, December 9, 2009

Meat and Potatoes for Your Affiliate Diet

Think of banner ads as the spice in your affiliate diet. Sprinkle them around, but for a heartier helping of sales, you’ll need something more solid! Learn to give your visitors longer, more descriptive pre-sales text. Revamp your affiliate advertising using these simple steps:

To convince your audience that your text is worth reading, make your first sentence or two very interesting. Make a bold statement, say something seemingly ridiculous, or appeal to your prospect’s emotional side. Then, tie this grabber in with the rest of your copy.

What is the product you’re advertising? What does it do? Directly after your grabber, give a compact explanation of your product. Keep this explanation short, while still being very clear. This should still be a very short section of your text.

What will it do for me?

By writing your own copy, you can directly target your unique audience. Make the most of this opportunity! Clearly explain how your readers will benefit from this product.

No one knows your audience like you do. Suggest a variety of product uses just for them, and give examples. This is the time for details – make this section long and rich.

Email Marketing $19/Month!

You’ve come so far – you’ve laid out exactly what the product is and how it will help your unique audience. Now, seal the deal – tell your readers to purchase the product! Include your affiliate link in this section.

This step may sound strange, but it’s necessary. Often, people hear about a product and are genuinely interested, but fail to actually make a purchase. A clear call to a simple action cuts down on buyer ambivalence. Don’t be pushy – just change your verb tenses to the imperative. Instead of:

“If you think that you fit this profile, you might want to think about buying this product.”

Say: “Click here to order an account today.”

Drive Sales – Use Long Copy

If you don’t feel ready to write long copy yourself, ask your affiliate program manager for help! Many companies release well-written articles by respected authors that you can reprint free of charge.

The novelty of the Web is wearing off. People online now are busy. Surfers won’t make a purchase unless you make a great case for what they’ll get out of it. And you’re not going to do that with just a banner ad.

Spam, Where it Came From, and How to Escape It

In 1936, long before the rise of the personal computer, Hormel Foods created SPAM. In 2002, the company will produce it’s six billionth can of the processed food product. But that mark was passed long ago in the world of Internet spam.

The modern meaning of the word “spam” has nothing to do with spiced ham. In the early 1990’s, a skit by British comedy group Monty Python led to the word’s common usage. “The SPAM Skit” follows a couple struggling to order dinner from a menu consisting entirely of Hormel’s canned ham.

Repetition is key to the skit’s hilarity. The actors cram the word “SPAM” into the 2.5 minute skit more than 104 times! This flood prompted Usenet readers to call unwanted newsgroup postings “spam.” The name stuck.

Spammers soon focused on e-mail, and the terminology moved with them. Today, the word has come out of technical obscurity. Now, “spam” is the common term for “Unsolicited Commercial E-Mail”, or “UCE.”

Chances are, you’ve been spammed before. Somehow, your e-mail address has found it’s way into the hands of a spammer, and your inbox is suffering the consequences. How does this happen? There are several possibilities.

Email Marketing $19/Month!

Businesses often keep lists of their customers’ e-mail addresses. This is a completely legitimate practice and, usually, nothing bad comes of it. Sometimes though, the temptation to make a quick buck is too great, and these lists are sold or rented to outside advertisers. The result? A lot of unsolicited e-mail, and a serious breach of trust.

Random Address Generation

Computer programs called random address generators simply “guess” e-mail addresses. Over 100 million hotmail addresses exist – howhard could it be to guess some of them? Unfortunately for many unsuspecting netizens – not too hard. Many spammers also guess at

“standard” addresses, like “”,

“”, and “”

Web Spiders

Today’s most insidious list-gathering tools are web spiders. All of the major search engines spider the web, saving information about each page. Spammers use tools that also spider the web, but save any e-mail address they come across. Your personal web page lists your e-mail address? Prepare for an onslaught!

Chat Room Harvesting

ISP’s offer vastly popular chat rooms where users are known only by their screen names. Of course, spammers know that your screen name is the first part of your e-mail address. Why waste time guessing e-mail addresses when a few hours of lurking in a chat room can net a list of actively-used addresses?

The Poor Man’s Bad Marketing Idea

It didn’t work for the phone companies, and it won’t work for e-mail marketers. But, some spammers still keep their own friends-and-family-style e-mail lists. Compiled from the addresses of other known spammers, and people or businesses that the owner has come across in the past, these lists are still illegitimate. Why? Only you can give someone permission to send you e-mail. A friend-of-a-friend’s permission won’t cut it.

Already drowning in spam? Try using your e-mail client’s filters – many provide a way to block specific e-mail addresses. Each time you’re spammed, block the sender’s address. Spammers skip from address to address, and you may be on many lists, but this method will at least slow the flow.

Also, use more than one e-mail address, and keep one “clean.” Many netizens find that this technique turns the spam flood into a trickle. Use one address for only spam-safe activities like e-mailing your friends, or signing on with trustworthy businesses. Never use your clean address on the web! Get a free address to use on the web and in chat rooms.

If nothing else helps, consider changing screen names, or opening an entirely new e-mail account. When you do, you’ll start with a clean, spam-free slate. This time, protect your e-mail address!

Want to surf the web without getting sucked into the spam-flood? Prevention is your best policy. Don’t use an easy-to-guess e-mail address. Keep your address clean by not using it for spam-centric activities. Don’t post it on any web pages, and don’t use it in chat rooms or newsgroups.

Before giving your clean e-mail address to a business, check the company out. Are sections of its user agreement dedicated to anti-spam rules? Does a privacy policy explain exactly what will be done with your address? The most considerate companies also post an anti-spam policy written in plain English, so you can be absolutely sure of what you’re getting into.

Many a first-time marketer has inadvertently spammed his audience. The first several hundred complaints and some nasty phone messages usually stop him in his tracks. But by then, the spammer may be faced with cleanup bills from his ISP, and a bad reputation that it’s not easy to overcome.

The best way to avoid this situation is to have a clear understanding of what spam is: If anyone who receives your mass e-mails did not specifically ask to hear from you, then you are spamming them.

Stick with your gut. Don’t buy a million addresses for $10, no matter how much the seller swears by them! If something sounds fishy, just say no. You’ll save yourself a lot in the end.

The online world is turning the tide on spam. In the end, people will stop sending spam because it stops working. Do your part: never buy from a spammer. When your business seeks out technology companies with which to work, only choose those with a staunch anti-spam stance.

Spam has a long history in both the food and e-mail sectors. This year, Hormel Foods opened a real-world museum dedicated to SPAM. While the museum does feature the Monty Python SPAM Skit, there’s no word yet on an unsolicited commercial e-mail exhibit. But, if all upstanding netizens work together, Hormel’s ham in a can will far outlive the Internet plague that is UCE.

Always send an initial, informative letter as soon as it is requested, and send the first follow up 24 hours afterwards. You want your hot prospects to have information quickly, so that they can make informed buying decisions!

Send the next 2-3 follow up messages between 1 and 3 days apart. Your prospect is still hot, and is probably still shopping around! Tell him about the benefits of your products and services, as opposed to your competitors’. You will make the sale!

Send the final follow up messages later on. You certainly don’t want to annoy your prospect! Make sure that these last letters are at least 4 days apart.

Following up effectively seems complicated, but it doesn’t have to be! So many potential customers are lost because of poor follow up – don’t you want to be one of the few to get it right?

Do Your Potential Customers Forget About You?

Your web business probably gets product inquiries from potential customers around the globe. Inquiries come via e-mail and your web site, and you try to send information to each hot prospect as quickly as you can.

You know that you can drastically increase the likelihood of making a sale by satisfying each person’s need for information quickly!

But, after you’ve delivered that first bit of information to your prospect, do you send him any further information?

If you are like most Internet marketers, you don’t.

When you don’t follow that initial message with additional information later on, you let a valuable prospect slip from your grasp!

This is a potential customer who may have been very interested in your products, but who lost your contact information, or was too busy to make a purchase when your first message reached him.

Often, a prospect will purposely put off making a purchase, to see if you find him important enough to follow up with later. When he doesn’t receive a follow up message from you, he will take his business elsewhere.

Following up with leads is more than just a process – it’s an art. In order to be effective, you need to design a follow up system, and stick to it, EVERY DAY! If you don’t follow up with your prospects consistently, INDIVIDUALLY, and in a timely fashion, then you might as well forget the whole follow up process.

When I first started marketing and following up with prospects, I used a follow up method that I now call the “List Technique.” I had a large database containing the names and e-mail addresses of people who had specifically requested information about my products and services. These prospects had already received my first letter by the time they requested more information, so I used the company’s latest news as a follow up piece.

I would write follow up newsletters every now and then, and send them, in one mass mailing, to everyone who had previously requested information from me. While this probably did help me win a few additional orders, it wasn’t a very good follow up method. Why isn’t the “List Technique” very effective?

  1. The List Technique isn’t consistent. Proponents of the List Technique tend to only send out follow up messages when their companies have “big news”.
  2. List Technique messages don’t give the potential customer any additional information about the product or service in question. He can’t make a more informed buying decision after receiving a newsletter! If someone is wondering whether your company sells the best knick-knacks, what does he care that you’ve just moved your headquarters?
  3. List Technique messages convey a “big list” mentality to your potential customers. When I used to write follow up messages using the List Technique, I was writing news bulletins to everyone I knew! I should have been sending a personal message to each individual who wanted to know more about my products.

Following up with each lead individually, multiple times, but at set intervals, and with pre-written messages, will dramatically increase sales! Others who use this same technique confirm that they have all at least doubled the sales of various products! In order to set this system up, though, you need to do some planning.

First, you’ll need to develop your follow up messages. If you’ve been marketing on the Internet for any length of time, then you should already have a first informative letter. Your second letter marks the beginning of the follow up process, and should go into more detail than the first letter. Fill this letter with details that you didn’t have the space to add to the first letter. Stress the BENEFITS of your products or services!

Your next 2-3 follow up messages should be rather short. Include lists of the benefits and potential uses of your products and services. Write each letter so that your prospects can skim the contents, and still see the full force of your message.

The next couple of follow up messages should create a sense of urgency in your prospect’s mind. Make a special offer, giving him a reason to order NOW instead of waiting any longer. After reading these follow up messages, your prospect should want to order immediately!

Phrase each of your final 1 or 2 follow up messages in the form of a question. Ask your prospect why he hasn’t yet placed an order? Try to get him to actually respond. Ask if the price is to high, the product isn’t the right color or doesn’t have the right features, or if he is looking for something else entirely. (By this time, it’s unlikely that this person will order from you. However, his feedback can help you modify your follow up letters or products, so that other prospects will order from you.)

The timing of your follow up letters is just as important as their content. You don’t want one prospect to receive a follow up the day after he gets your initial informative letter, while another prospect waits weeks for a follow up!

Always send an initial, informative letter as soon as it is requested, and send the first follow up 24 hours afterwards. You want your hot prospects to have information quickly, so that they can make informed buying decisions!

Send the next 2-3 follow up messages between 1 and 3 days apart. Your prospect is still hot, and is probably still shopping around! Tell him about the benefits of your products and services, as opposed to your competitors’. You will make the sale!

Send the final follow up messages later on. You certainly don’t want to annoy your prospect! Make sure that these last letters are at least 4 days apart.

Following up effectively seems complicated, but it doesn’t have to be! So many potential customers are lost because of poor follow up – don’t you want to be one of the few to get it right?

Email Marketing $19/Month!

Wednesday, November 25, 2009

Create A Better Bundle to make your customers coming back.

Bundling Strategy

Create A Better Bundle to make your customers coming back.

Bundling is to combined your products and service into a total package. By bundling you give added value to your customers and they will coming back to you.

The best example of bundling products is done by Microsoft which sells different applications in a bundle. You can buy home office suite that includes word processing, spreadsheet and presentation software or for more advance application, you could go for Microsoft Office Profesional. They have bundle their Internet Explorer & Windows operating system to have better advantage against their competitor and this got them in trouble with the regulators.

So, Bundle carefully .

If you have credit card service, hotels and an airline, then you could sell your products and services as a bundle. This has been done by AirAsia and it's subsidiaries.

Online giant started with selling books, then music store, followed with video store and now they have varied type products at and their sisters sites.

In telecommunication business, most of the companies bundle their product into different type of packages. You can buy different type of packages for your home or business needs. In Malaysia, you could have telephone service and Internet service from the same supplier.

For tour operators, they bundle their products and services into one nice package for their valued customers . They will charge you for your accommodation, transportation, food and additional charges into one complete package.

The act of bundling is not limited to the same category of products, if you are creative enough you could have endless possibility of bundling your products and services.

Start Bundling To Grow Your Business !

What is ?

I was getting Kaspersky Security Alert as stated below everytime I browse website's with Google Adsense Content Advertisement in it.

"Application Google Chrome contains link to web page used to steal password, credit card number or other confidential data. Denied"

So, got bit worried whether this virus threat was a real threat or a false alert , so just browse the Net to find out more about

Found out that there is nothing to worry about, as Google bought DoubleClick in 2007 they have some integration things to sort out and there is no harm.

To confirm the status, I sent an email to Kaspersky Virus Lab as stated below and the Virus analyst confirmed it was a false alarm.

newvirus[at]kaspersky[dot]com Mon, Nov 23, 2009 at 2:50 AM

To: Me

Sorry, it was a false detection. It will be fixed in the next update.
Thank you for your help.

> LANG: en
> email: Me
> product: Kaspersky Internet Security
> viruses_date: Today
> description:
> I am getting Kaspersky Security Alert everytime i browse a website with google adsense code it. It is giving the following alert. How do I solve this problem? I have attached the screen shot of the alert.
> 11/23/2009 1:47:58 AM?\Program Files\MOZILLA FIREFOX\?FIREFOX.EXE?532?"C:\Program Files\Mozilla Firefox\firefox.exe" ?Detected:*?Databases
> uploaded files:
> kaspersky-security-alert.jpg
Virus analyst, Kaspersky Lab.

Thursday, November 19, 2009

Make money advertising Amazon product in your blogger

Amazon Associates Code in Blogger

If you have blogger or any other websites, additional source to make money is to advertise amazon products in your blogger.

To do it is very easy. You can either add in the Amazon widget in the module section or in your articles.

However, today I will show you how to add in the code in your article.

First of all you need to sign up with Amazon Associates, please go to

Once you have sign up, then access into Amazon Associates website.

Go to widget.

There a few types of widgets you can choose, but normally I will use Recommended Product Links. I sell products which relates to my article.

Then you need to select the product line and enter the keywords to find the right products. For example, for my KD Sri Inderapura article I select book as my Product Line and “aircraft carrier” as my keywords.

Then you need select the size of your display. Click Select This Size.

The bigger the better. I am using 468 x 336 size.

Then highlight the code and copy it.

Access Blogger and edit the article using Edit Html editor in Blogger.

Paste the code at the position that you want and save the article. That's all.

Now , you can start making money advertising Amazon product in your Blogger.

Friday, November 13, 2009

BlogCatalog - How to increase website traffic using BlogCatalog.

If you refer to the image above, for my BlogCatalog generates 6.73 % (15 visits)of my traffic for last month.

I just add in the BlogCatalog Recent Viewers Widget just recently only.

To generate this traffic, first you need to sign up with BlogCatalag and add in the Recent Viewers Widget your blog.

To do it, please click here.

Once you have sign up and add in the widget.

Now, you need to visit your friends Blog in order to have your icon/image/link shows up at your friends recent viewers widget.

I will show you one, then up to you how many friends you want to visit.

The more frequently you visit your friends the better. More potential traffic you will get.

Steps to generate traffic using

Login to You will access the main page.

Then click Directory. Now you have list of blogs categorize accordingly.

Since, my blog is about travel. I want to find a blog about travel also. So I click Travel Directory. You can visit any blog you want not necessarily the same blog category.

Now, I want to find a blog with recent viewers widget. This one is tricky because some of our friends in BlogCatalog have not install the widget. If you found they didn't install the widget, then just leave a constructive comment in their blog with your website address stated.

After searching few blogs, finally I found a Blog with Recent Widget Viewers.

Once I visit my friend blog(Learn Sweden), my icon/image/link will be there in my friends Recent Viewers Widget.

Recent Viewers Widget has my recent viewers details in the widget(Learn Sweden). My link at Learn Sweden will be there as long as 5 other blogcatalog friends don't visit the site.

Therefore, anyone who visit Learn Sweden might click my link in the Recent Viewers Widget and directly visit my blog.

In order to drive traffic to your blog using BlogCatalog. You need to replicate the steps frequently.

Please remember to access your BlogCatalog site first before visiting your friends website, if not your link will not be there.

Hope this helps you ! Please refer to the images below for the details.

Login to BlogCatalog.

Click Directory.

Click Travel Directory

Find a Blog with Recent Viewers Widget.

Once you visit, you link or image will be there. If anyone click your link they will be directed
to your profile at

Visitors will see my profile & list of Blogs own by me.

If visitor click one of my Blog, they will directed to my Blog Below.

How to issue refund using Paypal

Sign up for PayPal and start accepting credit card payments instantly.

To Sign Up Paypal Account, Click Here

I will show how to issue refund back to client in Paypal Sandbox. It is the same process as live paypal site.

Before you can issue refund back.

You need to go through the following articles so that you have records of customer purchases that you could use to refund back.

How to create Paypal Buy Now Button Part 1

How to create Paypal Buy Now Button Part 2

Once you have few samples of customer purchases, then if you want to refund just follow the steps below.

Please login to Paypal SandBox using your username and password.

Then click Test Accounts to access your Seller Account, which customers have bought items from the seller. Click Enter SandBox Test Site.

Enter your username and password to access the seller account and Click Log In.

If your customers purchase record is there , then Click Details to access the record. If it not there, then you need to search.

You will have the transaction details of the purchase. Please scroll below.

Please note you can issue refund for up to 60 days after the original payment was sent. PayPal refunds the payment and fees, including partial fees for partial refunds.

To Issue Refund, Click Issue Refund link below the page.

Enter the amount you want refund, enter a note to the buyer (optional) and Click Continue.

Review the amount and the details. If confirm then Click Issue Refund.

Refund Complete and your refund has been sent. An email with refund details has also been sent to the recipient.

Then you could View the refund, View the original transaction Or Go to My Account.

That is all on how to refund back your buyer.

Email Notification Sent to The Buyer

Your buyer will get an email about the refund. Sample of the email as stated below.

Date: Oct. 28, 2009 21:19:47 PDT
Subject: Payment refund from PRO BYTE's Test Store

Oct 28, 2009 21:19:47 PDT | Transaction ID: 9YJ27338EG470090R

Hello Test User,

You received a full or partial refund of $20.00 USD from PRO BYTE's Test Store.
The refund will go to your PayPal account.

To see all the transaction details, please log into your PayPal account. It may take a few moments for this transaction to appear in your account.


Merchant information:
PRO BYTE's Test Store

Note from merchant:
None provided

Original transaction details
Payment details

Description: Buy Now Button Testing,
Unit price: $50.00 USD
Quantity: 1
Amount: $50.00 USD

Tax: $2.50 USD
Shipping: $5.00 USD
Insurance: N/A

Total: $57.50 USD

Questions? Visit the Help Center at:

Thanks for using PayPal – the safer, easier way to pay and get paid online.

Please do not reply to this email. This mailbox is not monitored and you will not receive a response.

PayPal Email ID PP1465

How is my fee refund calculated?

If you issue a full refund, PayPal will refund all the fees. If you issue a partial payment refund, the fee refund will be calculated at the same percentage as the payment refund.

For example:

Your customer buys $100.00 USD of merchandise from you. The fees for this transaction total $3.25 USD ($2.90 USD of this is variable, $0.35 USD is the fixed transaction fee, which is not refunded for partial payment refunds).

You issue a partial refund on the transaction for $40.00 USD (40% of the original amount).

PayPal issues a refund of 40% of the total fees, which in this case would be $1.16 USD (40% of the variable portion of the fee).

For details, please refer to the video below !

Wednesday, October 28, 2009

Paypal SandBox Account Signup Guide

Sign up for PayPal and start accepting credit card payments instantly.

To Sign Up Paypal Account, Click Here.

Step by step video guide to sign up a paypal sandbox account.

Before you implement your online transactions using Paypal in live site, it is better for you to check the integrity of your coding in Paypal Sandbox.

You could make demo transactions in safe mode. Once you codes are free from errors, you could enable Paypal as one of the payment methods for your online store.

Paypal Sandbox is almost the same with live Paypal. It has all the features of Paypal.

You could create test buyer and seller accounts. You could create paypal buy now button, donate button and also integrate your e commerce shopping cart payment with paypal.

It is the best place for you to familiarize yourself with Paypal.

One the benefit of using Paypal is the ease of integration. You have Paypal Sandbox and lot of developers who are well verse in this field.

Plus, there are there a lot e commerce shopping carts that you could integrate with ease with Paypal.

List of popular ecommerce shopping carts that supports Paypal .

1. Oscommerce - one the most popular open source shopping cart.
2. Zen-Cart
3. Magento
4. CubeCart

For the complete list of shopping carts that support Paypal, click here.

All the integration you could test it in Paypal SandBox. Once ready and error free then only make it live.

Click here, to download Paypal SandBox User Guide (PDF)

To Sign Up Paypal SandBox account, click here.

Windows Media Encoder 9 - Best Screen Capture Software

If you are looking for one the best screen capture software for Windows 2000 & Windows XP, I would recommend Windows Media Encoder 9.

It is not pre-installed with Xindow XP or Windows 2000. Therefore you need to download the software, at the following url.

Minimum requirements to run the software on your personal computer depends on the application you want to do.

The hardware requirements are as follows.

  1. To convert a file, Minimum configuration is a 266 megahertz (MHz) processor and 64 megabytes (MB) of RAM. (It is better if you have 500 MHz processor or higher, Windows XP, and 128 MB of RAM)
  2. To capture and broadcast audio and video files for 28.8 kilobits per second (Kbps) and 56 Kbps modems (using the Windows Media Audio 9 and Windows Media Video 7 codecs), Minimum configuration is a 300 MHz processor and 64 MB of RAM. For mid-bandwidth (100 Kbps to 500 Kbps) audiences. Better to have 666 MHz processor or higher, Windows XP, and 256 MB of RAM.
  3. To capture and broadcast audio and video files for 28.8 Kbps and 56 Kbps modems, (using the Windows Media Audio and Video 9 Series codecs). The minimum configuration is a 1.5 gigahertz (GHz) processor and 64 MB of RAM. For mid-bandwidth (100 Kbps to 500 Kbps) audiences, the recommended configuration is a 1 GHz dual processor or higher, Windows XP, and 256 MB of RAM.
  4. To capture and broadcast an audio and video stream for high-bandwidth (500 Kbps through 2 Mbps) audiences (using the Windows Media Audio and Video 9 Series codecs). The recommended configuration is a 2 GHz dual processor or higher, Windows XP, and 256 MB of RAM.

To install Windows Media Encoder 9 the steps are as follows:

Click the Download link in the page.

Then Save the program to your personal computer.

Once it has fully downloaded the file.

Run the program and restart your personal computer if required to setup the software.

To start capturing your video tutorial, the steps are as follows;

Run Windows Media Encoder 9.

Click File, Click New, Choose Capture Screen.

You could capture specific window, region of screen or the entire screen. Up to you.

Capture the audio from the default audio device.

Then click Next, save the file at specific location and Click Next.

You could use , Low, Medium & High setting. Depends on the quality of video you want to make. Then Click Next.

Enter the Display Information such as Title, Author, Rating & Description.

Then Click Finish, Click Start Encoding to record your computer screen.

Once you have done recording, click Stop .

To play the video, Click Play Output File.

Good Luck !

Monday, October 26, 2009

Email Deliverability Tips

Email Marketing $19/Month!

Source (AWeber)

Ensuring requested opt-in email is delivered to subscriber inboxes is an increasingly difficult battle in the age of spam filtering. Open and click thru response rates can be dramatically affected by as much as 20-30% due to incorrect spam filter classification.


Confirming that the people who ask for your information have actually requested to be on your list is the number one step in the battle for deliverability. You should be using a process called confirmed opt-in or verified opt-in to send a unique link to the attempted subscriber when they request information. Before adding the person to your list they must click that unique link verifying that they are indeed the same person that owns the email address and requested to subscribe.

Subscriber Addresses

When requesting website visitors to opt-in ask for their “real” or “primary” email address instead of a free email address like Yahoo or Hotmail. Free emails tend to be throw away accounts and typically have a shorter lifetime than a primary ISP address.

List Maintenance

Always promptly remove undeliverable addresses that bounce when sending email to them. An address that bounces with a permanent error 2-3 times in a 30 day period should be removed from the list. ISP’s track what percentage of your newsletters bounce and will block them if you attempt to continually deliver messages to closed subscriber mailboxes.

Message Format

Usage of HTML messages to allow for text formatting, multiple columns, images, and brand recognition is growing in popularity and is widely supported by most email client software. Most spam is also HTML formatted and thus differentiating between requested email and spam HTML messages can be difficult. A 2004 study by AWeber .com shows that plain text messages are undeliverable 1.15% of the time and HTML only messages were undeliverable 2.3%. If sending HTML it is important to always send a plain text alternative message, also called text/HTML multi-part mime format.


Many ISP’s filter based on the content that appears within the message text.

Website URL: Research potential newsletter advertisers before allowing them to place ads in your newsletter issues. If they have used their website URL to send spam, just having their URL appear in your newsletter could cause the entire message to be filtered.

Words/phrases: Choose your language carefully when crafting messages. Avoid hot button topics often found in spam such as medication, mortgages, making money, and pornography. If you do need to use words that might be filtered, don’t attempt to obfuscate words with extra characters or odd spelling, you’ll just make your messages appear more spam like.

Images: Avoid creating messages that are entirely images. Use images sparingly, if at all. Commonly used open rate tracking technology uses images to calculate opens. You may choose to disable open rate tracking to avoid being filtered based on image content.

Attachments: With viruses running rampant and spreading thru the usage of malicious email attachments many users are wary of attached documents. It’s often better to link to files via a website URL to reduce recipient fear of attachments and reduce the overall message size.

CAN-SPAM Compliance

The January 2004 Federal CAN-SPAM law introduced a number of rules regarding the delivery of email. It’s important you have your legal counsel review your practices and ensure you are in compliance. The two most important rules include having a valid postal mail address listed in all commercial messages and a working unsubscribe link that is promptly honored to remove the subscriber from future messages.


Reputation services are often used by large ISP’s as a way to vet email senders regarding their email practices and policies. Businesses listed with these services are then given less stringent filtering or no filtering at all. Several reputation services are:

Relationships & Whitelisting

Contact with major ISP’s and email providers is essential in letting them know about your requested subscriber email. Many large providers such as AOL and Yahoo have specific whitelisting programs and postmaster website areas to ensure your email is delivered as long as you meet their policies and procedures in handling your opt-in list.

Email deliverability is about ensuring requested opt-in email is delivered to the intended recipient. While no single tip will enable you to get 100% of your email delivered each one utilized as a group can go a long way to reaching that goal.

Wednesday, October 14, 2009

How to scan a file for virus without an anti virus software.

You just downloaded a file from the Internet but don't have a paid anti virus software to check the file for any virus.

One way to check the file for any virus and be certain that the file is not malicious is to use Kaspersky Online Scanner.

Open your browser Mozilla , IE or Google Chrome.

Go to

Click Choose File. Select the file you want to check and and the click Submit button.

Once you have click the submit button, the suspected file will be uploaded from your computer to a special server and scanned using Kaspersky Anti-Virus.

It has exceptional virus detection level and it's virus database pattern is updated every three hours.

Wait for few moment. Kaspersky Online Scanner will produce the result whether the file is infected or not.

The only limitation for this facility is that you can check file with file size less than 1 MB at any one time.

If you have few files then create an archive file (in zip, arj or similar format) with file size less than 1 MB and submit the archive file.

Buy A Paid Antivirus Software to protect your information.

Last time I was using one of the best free antivirus, but it failed to protect my computer from Trojan virus and phishing sites.

I was using free antivirus, free anti malware and spyware software.

My personal computer got infected and this virus damaged most of my website and my client website.

If you pc is infected, your pc's cpu usage will always be high even when you not doing anything much or run a lot of program.

In addition, your out going traffic will be higher that normal. It is sending information to the hacker and for my case the trojan was accessing my website and causing iframe injection.

Layman terms, my web pages got corrupted.

Buy a good paid antivirus, you will have some peace of mind and they will provide technical support to detect any virus that might reside in your pc.

I am using Kaspersky Internet Security for my laptop and desktop, please refer to this article for their support in solving my virus problem.

After using Kaspersky and cleaning my pc from any virus.

Thank God, it didn't recur back.

Plus, I don't some other measures to protect my pc and additional precaution when accessing my website using latest ftp software.

I am getting protection cybercriminals and it protects my pc while I am surfing the internet.

Few month back, I was active in Traffic Exchange sites to promote my affiliate marketing, while surfing Kaspersky managed to block my pc from being infected with Trojan and other malwares.

Other protections that you will get are as follows for Kaspersky Internet Security

1. It keeps your money and identity safe. Always clear your cache and cookies after making any financial transaction via Internet.

2. Protects against bank account fraud. It protects your from phishing sites, please click here for more details about phishing.

3. Safeguards against online shopping threats.

4. Cybercriminals won’t hi-jack your PC, you pc will not be hijacked and turn to a zombie machine.

5. Once hijack hackers can easily read your key board key stroke and create a financial havoc for you.

6. Family protection from on-line predators.

7. Your files won’t be ruined by hackers or like me when I make ftp connection it is much more secure now.

8. Keeps your PC running smoothly.

Wednesday, October 7, 2009

Virtual keyboard to secure your online transaction

Do you think hackers cannot capture your username & password which you use to access your online banking easily?

Think again, once your pc has been infected with trojan or worm with capability to capture your keystrokes then you would be most probably sending your financial data to the crooks.

Five types of keylogger software program that can capture your keystrokes.

  1. Hypervisor based. It's is malware operating system that work underneath your operating system.
  2. Kernel based. It resides at the kernel level of the os, very hard to write and combat. It has permission to access to any information typed on the keyboard.
  3. Hook based. It is triggered by keyboard events which the os notifies it and the keylogger just record the keystrokes.
  4. Passive methods. This is done by using APIs like GetAsyncKeyState(), GetForegroundWindow(), etc. to poll the state of the keyboard or to subscribe to keyboard events. Slows your pc.
  5. Form Grabber based. It logs web form submissions by recording the web browsing onSubmit event functions. Data is recorded before submission over the internet and bypasses https encryption.

Money is the Main Reason

The main reason cyber criminals target this information is for money.

Interesting email conversation between two hackers, Farid Essebar (codename : Diabl0 ) and Atilla Ekici (codename : Coder )

"They can't find me," wrote Atilla Ekici, a 23-year-old Turk, in an email to his accomplice, a 19-year-old Moroccan called Farid Essebar. "Ha, ha, ha," replied Mr. Essebar. Source : Cassell Bryan-Low, The Wall Street Journal

Zotob virus / trojan enables other malicious software to be installed. For example, it enables malicious key logging programs to record credit card information.

Police found about 1600 the numbers of stolen credit cards with them.

Virtual KeyBoard

To protect your information next time when you access your paypal account or bank account is to use virtual keyboard provided by anti-virus software.

I am using Kaspersky Internet Security 2009 and it has this feature to protect us from this kind of malicious program.

Virtual keyboard is a special service embedded into Kaspersky Internet Security 2009 that prevents data interception entered from the keyboard.

To use Kaspersky Virtual keyboard.

  1. Open your Kaspersky Internet Security Program.
  2. Click Online Security
  3. Click Virtual KeyBoard.

Now, you can enter your username and password safely in the login the form of your bank website.

Please remember that virtual keyboard cannot protect your data if you are entering your data to phishing sites or has been hacked.

Please check the authenticity of the website before entering your username and password to the website. For details on checking ssl certificate, please click here.

Prevention is better than Cure !

Saturday, October 3, 2009

Increase website traffic with BlogCatalog Widget

Love blogging, then you should join BlogCatalog to network with your blogger friends and increase your website traffic.

As one of the largest blog directories on the Internet, you should join them to make your blogging experience a success.

Meet your fellow bloggers, share link with your friends, join the discussion forum or just search any articles / post easily at BlogCatalog.

I will show you how to add in BlogCatalog Widget easily.

Before that please create an account with BlogCatalog.

Then log in to, go to

Enter your email address / username and your password, then click Login

Click DashBoard Tab.

Click Manage Your Blogs.

Click Add A Blog

Enter your Blog Information in the form and Click Submit Blog button.

You will get the following message, please give 24 - 48 hours for your blog to be reviewed.

Your blog has been placed in the queue and will be reviewed by a member of the BlogCatalog Team within the next 24-48 hours. In the meantime, we recommend taking the following steps to make your BlogCatalog membership the best possible.

Next, please verify your blog by adding a BlogCatalog Widget, I will show you how to add in Recent Viewers Widget.

Click BlogCatalog Recent Viewers Widget Link, then choose the blog you want to add in.

Click Update Code and Preview Widget, BlogCatalog will open up a new window.

You can add in the widget in Blogger or Typepad.

I will add in the widget in my blog. To add in click Blogger image. Sign In to your Blogger Account.

Choose the Blog you want to add in, then click Add Widget.

Arrange the widget position your blog layout position. Then Click Save.

View your blog to see the result.

If you want to have a look how I add in to one of my site, please visit Penang Hotels Review.

Good Luck.

Screen Snapshot Images below :

Sign Up BlogCatalog Account

Login To BlogCatalog

Click DashBoard Tab

Click Manage Your Blog

Click Add A Blog

Enter your Blog Information & Click Submit Blog

Click Recent Viewers Widget

Customized your BlogCatalog Recent Viewers Widget

Click Blogger Image to add in your Blogger platform blog.

Sign In to your Blogger Account

Choose the Blog you want to add & Click Add Widget

Arrange BlogCatalog Widget Position & Click Save


Related Posts Plugin for WordPress, Blogger...