Wednesday, October 28, 2009
To Sign Up Paypal Account, Click Here.
Step by step video guide to sign up a paypal sandbox account.
Before you implement your online transactions using Paypal in live site, it is better for you to check the integrity of your coding in Paypal Sandbox.
You could make demo transactions in safe mode. Once you codes are free from errors, you could enable Paypal as one of the payment methods for your online store.
Paypal Sandbox is almost the same with live Paypal. It has all the features of Paypal.
You could create test buyer and seller accounts. You could create paypal buy now button, donate button and also integrate your e commerce shopping cart payment with paypal.
It is the best place for you to familiarize yourself with Paypal.
One the benefit of using Paypal is the ease of integration. You have Paypal Sandbox and lot of developers who are well verse in this field.
Plus, there are there a lot e commerce shopping carts that you could integrate with ease with Paypal.
List of popular ecommerce shopping carts that supports Paypal .
1. Oscommerce - one the most popular open source shopping cart.
For the complete list of shopping carts that support Paypal, click here.
All the integration you could test it in Paypal SandBox. Once ready and error free then only make it live.
Click here, to download Paypal SandBox User Guide (PDF)
To Sign Up Paypal SandBox account, click here.
If you are looking for one the best screen capture software for Windows 2000 & Windows XP, I would recommend Windows Media Encoder 9.
It is not pre-installed with Xindow XP or Windows 2000. Therefore you need to download the software, at the following url.
Minimum requirements to run the software on your personal computer depends on the application you want to do.
The hardware requirements are as follows.
- To convert a file, Minimum configuration is a 266 megahertz (MHz) processor and 64 megabytes (MB) of RAM. (It is better if you have 500 MHz processor or higher, Windows XP, and 128 MB of RAM)
- To capture and broadcast audio and video files for 28.8 kilobits per second (Kbps) and 56 Kbps modems (using the Windows Media Audio 9 and Windows Media Video 7 codecs), Minimum configuration is a 300 MHz processor and 64 MB of RAM. For mid-bandwidth (100 Kbps to 500 Kbps) audiences. Better to have 666 MHz processor or higher, Windows XP, and 256 MB of RAM.
- To capture and broadcast audio and video files for 28.8 Kbps and 56 Kbps modems, (using the Windows Media Audio and Video 9 Series codecs). The minimum configuration is a 1.5 gigahertz (GHz) processor and 64 MB of RAM. For mid-bandwidth (100 Kbps to 500 Kbps) audiences, the recommended configuration is a 1 GHz dual processor or higher, Windows XP, and 256 MB of RAM.
- To capture and broadcast an audio and video stream for high-bandwidth (500 Kbps through 2 Mbps) audiences (using the Windows Media Audio and Video 9 Series codecs). The recommended configuration is a 2 GHz dual processor or higher, Windows XP, and 256 MB of RAM.
To install Windows Media Encoder 9 the steps are as follows:
Click the Download link in the page.
Then Save the program to your personal computer.
Once it has fully downloaded the file.
Run the program and restart your personal computer if required to setup the software.
To start capturing your video tutorial, the steps are as follows;
Run Windows Media Encoder 9.
Click File, Click New, Choose Capture Screen.
You could capture specific window, region of screen or the entire screen. Up to you.
Capture the audio from the default audio device.
Then click Next, save the file at specific location and Click Next.
You could use , Low, Medium & High setting. Depends on the quality of video you want to make. Then Click Next.
Enter the Display Information such as Title, Author, Rating & Description.
Then Click Finish, Click Start Encoding to record your computer screen.
Once you have done recording, click Stop .
To play the video, Click Play Output File.
Good Luck !
Monday, October 26, 2009
Ensuring requested opt-in email is delivered to subscriber inboxes is an increasingly difficult battle in the age of spam filtering. Open and click thru response rates can be dramatically affected by as much as 20-30% due to incorrect spam filter classification.
Confirming that the people who ask for your information have actually requested to be on your list is the number one step in the battle for deliverability. You should be using a process called confirmed opt-in or verified opt-in to send a unique link to the attempted subscriber when they request information. Before adding the person to your list they must click that unique link verifying that they are indeed the same person that owns the email address and requested to subscribe.
When requesting website visitors to opt-in ask for their “real” or “primary” email address instead of a free email address like Yahoo or Hotmail. Free emails tend to be throw away accounts and typically have a shorter lifetime than a primary ISP address.
Always promptly remove undeliverable addresses that bounce when sending email to them. An address that bounces with a permanent error 2-3 times in a 30 day period should be removed from the list. ISP’s track what percentage of your newsletters bounce and will block them if you attempt to continually deliver messages to closed subscriber mailboxes.
Usage of HTML messages to allow for text formatting, multiple columns, images, and brand recognition is growing in popularity and is widely supported by most email client software. Most spam is also HTML formatted and thus differentiating between requested email and spam HTML messages can be difficult. A 2004 study by AWeber .com shows that plain text messages are undeliverable 1.15% of the time and HTML only messages were undeliverable 2.3%. If sending HTML it is important to always send a plain text alternative message, also called text/HTML multi-part mime format.
Many ISP’s filter based on the content that appears within the message text.
Website URL: Research potential newsletter advertisers before allowing them to place ads in your newsletter issues. If they have used their website URL to send spam, just having their URL appear in your newsletter could cause the entire message to be filtered.
Words/phrases: Choose your language carefully when crafting messages. Avoid hot button topics often found in spam such as medication, mortgages, making money, and pornography. If you do need to use words that might be filtered, don’t attempt to obfuscate words with extra characters or odd spelling, you’ll just make your messages appear more spam like.
Images: Avoid creating messages that are entirely images. Use images sparingly, if at all. Commonly used open rate tracking technology uses images to calculate opens. You may choose to disable open rate tracking to avoid being filtered based on image content.
Attachments: With viruses running rampant and spreading thru the usage of malicious email attachments many users are wary of attached documents. It’s often better to link to files via a website URL to reduce recipient fear of attachments and reduce the overall message size.
The January 2004 Federal CAN-SPAM law introduced a number of rules regarding the delivery of email. It’s important you have your legal counsel review your practices and ensure you are in compliance. The two most important rules include having a valid postal mail address listed in all commercial messages and a working unsubscribe link that is promptly honored to remove the subscriber from future messages.
Reputation services are often used by large ISP’s as a way to vet email senders regarding their email practices and policies. Businesses listed with these services are then given less stringent filtering or no filtering at all. Several reputation services are:
Relationships & Whitelisting
Contact with major ISP’s and email providers is essential in letting them know about your requested subscriber email. Many large providers such as AOL and Yahoo have specific whitelisting programs and postmaster website areas to ensure your email is delivered as long as you meet their policies and procedures in handling your opt-in list.
Email deliverability is about ensuring requested opt-in email is delivered to the intended recipient. While no single tip will enable you to get 100% of your email delivered each one utilized as a group can go a long way to reaching that goal.
Wednesday, October 14, 2009
One way to check the file for any virus and be certain that the file is not malicious is to use Kaspersky Online Scanner.
Open your browser Mozilla , IE or Google Chrome.
Go to http://support.kaspersky.com/viruses/online
Click Choose File. Select the file you want to check and and the click Submit button.
Once you have click the submit button, the suspected file will be uploaded from your computer to a special server and scanned using Kaspersky Anti-Virus.
It has exceptional virus detection level and it's virus database pattern is updated every three hours.
Wait for few moment. Kaspersky Online Scanner will produce the result whether the file is infected or not.
The only limitation for this facility is that you can check file with file size less than 1 MB at any one time.
If you have few files then create an archive file (in zip, arj or similar format) with file size less than 1 MB and submit the archive file.
Last time I was using one of the best free antivirus, but it failed to protect my computer from Trojan virus and phishing sites.
I was using free antivirus, free anti malware and spyware software.
My personal computer got infected and this virus damaged most of my website and my client website.
If you pc is infected, your pc's cpu usage will always be high even when you not doing anything much or run a lot of program.
In addition, your out going traffic will be higher that normal. It is sending information to the hacker and for my case the trojan was accessing my website and causing iframe injection.
Layman terms, my web pages got corrupted.
Buy a good paid antivirus, you will have some peace of mind and they will provide technical support to detect any virus that might reside in your pc.
I am using Kaspersky Internet Security for my laptop and desktop, please refer to this article for their support in solving my virus problem.
After using Kaspersky and cleaning my pc from any virus.
Thank God, it didn't recur back.
Plus, I don't some other measures to protect my pc and additional precaution when accessing my website using latest ftp software.
I am getting protection cybercriminals and it protects my pc while I am surfing the internet.
Few month back, I was active in Traffic Exchange sites to promote my affiliate marketing, while surfing Kaspersky managed to block my pc from being infected with Trojan and other malwares.
Other protections that you will get are as follows for Kaspersky Internet Security
1. It keeps your money and identity safe. Always clear your cache and cookies after making any financial transaction via Internet.
2. Protects against bank account fraud. It protects your from phishing sites, please click here for more details about phishing.
3. Safeguards against online shopping threats.
4. Cybercriminals won’t hi-jack your PC, you pc will not be hijacked and turn to a zombie machine.
5. Once hijack hackers can easily read your key board key stroke and create a financial havoc for you.
6. Family protection from on-line predators.
7. Your files won’t be ruined by hackers or like me when I make ftp connection it is much more secure now.
8. Keeps your PC running smoothly.
Wednesday, October 7, 2009
Do you think hackers cannot capture your username & password which you use to access your online banking easily?
Think again, once your pc has been infected with trojan or worm with capability to capture your keystrokes then you would be most probably sending your financial data to the crooks.
Five types of keylogger software program that can capture your keystrokes.
- Hypervisor based. It's is malware operating system that work underneath your operating system.
- Kernel based. It resides at the kernel level of the os, very hard to write and combat. It has permission to access to any information typed on the keyboard.
- Hook based. It is triggered by keyboard events which the os notifies it and the keylogger just record the keystrokes.
- Passive methods. This is done by using APIs like GetAsyncKeyState(), GetForegroundWindow(), etc. to poll the state of the keyboard or to subscribe to keyboard events. Slows your pc.
- Form Grabber based. It logs web form submissions by recording the web browsing onSubmit event functions. Data is recorded before submission over the internet and bypasses https encryption.
Money is the Main Reason
The main reason cyber criminals target this information is for money.
Interesting email conversation between two hackers, Farid Essebar (codename : Diabl0 ) and Atilla Ekici (codename : Coder )
"They can't find me," wrote Atilla Ekici, a 23-year-old Turk, in an email to his accomplice, a 19-year-old Moroccan called Farid Essebar. "Ha, ha, ha," replied Mr. Essebar. Source : Cassell Bryan-Low, The Wall Street Journal
Zotob virus / trojan enables other malicious software to be installed. For example, it enables malicious key logging programs to record credit card information.
Police found about 1600 the numbers of stolen credit cards with them.
To protect your information next time when you access your paypal account or bank account is to use virtual keyboard provided by anti-virus software.
I am using Kaspersky Internet Security 2009 and it has this feature to protect us from this kind of malicious program.
Virtual keyboard is a special service embedded into Kaspersky Internet Security 2009 that prevents data interception entered from the keyboard.
To use Kaspersky Virtual keyboard.
- Open your Kaspersky Internet Security Program.
- Click Online Security
- Click Virtual KeyBoard.
Now, you can enter your username and password safely in the login the form of your bank website.
Please remember that virtual keyboard cannot protect your data if you are entering your data to phishing sites or has been hacked.
Please check the authenticity of the website before entering your username and password to the website. For details on checking ssl certificate, please click here.
Prevention is better than Cure !
Saturday, October 3, 2009
As one of the largest blog directories on the Internet, you should join them to make your blogging experience a success.
Meet your fellow bloggers, share link with your friends, join the discussion forum or just search any articles / post easily at BlogCatalog.
I will show you how to add in BlogCatalog Widget easily.
Before that please create an account with BlogCatalog.
Then log in to BlogCatalog.com, go to http://www.blogcatalog.com/manage.php
Enter your email address / username and your password, then click Login
Click DashBoard Tab.
Click Manage Your Blogs.
Click Add A Blog
Enter your Blog Information in the form and Click Submit Blog button.
You will get the following message, please give 24 - 48 hours for your blog to be reviewed.
Your blog has been placed in the queue and will be reviewed by a member of the BlogCatalog Team within the next 24-48 hours. In the meantime, we recommend taking the following steps to make your BlogCatalog membership the best possible.
Next, please verify your blog by adding a BlogCatalog Widget, I will show you how to add in Recent Viewers Widget.
Click BlogCatalog Recent Viewers Widget Link, then choose the blog you want to add in.
Click Update Code and Preview Widget, BlogCatalog will open up a new window.
You can add in the widget in Blogger or Typepad.
I will add in the widget in my blog. To add in click Blogger image. Sign In to your Blogger Account.
Choose the Blog you want to add in, then click Add Widget.
Arrange the widget position your blog layout position. Then Click Save.
View your blog to see the result.
If you want to have a look how I add in to one of my site, please visit Penang Hotels Review.
Screen Snapshot Images below :
Sign Up BlogCatalog Account
Login To BlogCatalog
Click DashBoard Tab
Click Manage Your Blog
Click Add A Blog
Enter your Blog Information & Click Submit Blog
Click Recent Viewers Widget
Customized your BlogCatalog Recent Viewers Widget
Click Blogger Image to add in your Blogger platform blog.
Sign In to your Blogger Account
Choose the Blog you want to add & Click Add Widget
Arrange BlogCatalog Widget Position & Click Save
Friday, October 2, 2009
LinkWithin widget works on Blogger, Wordpress & Typepad platforms.
Just by adding the widget in your blog, the widget will show certain number of relevant posts from your blog archieve.
If you are interested to know how this widget looks like in blogger platfom, then please visit Penang Hotels Review.
You will find LinkWithin widget in action at the bottom of the post showing previous post from the blog archieve.
To install Widget on Blogger, just follow the steps below.
1. Go to LinkWithin website
1. Click Intsall Widget to open Blogger in a new window, and follow the steps below in that window. Please login if necessary.
2. Select a blog if you have more than one, then click on Add Widget.
3. (Optional) For better performance, Drag and Drop the LinkWithin box under the "Blog Posts" box.
4. Click on Save.
And you're done! The widget should now appear on your blog.
Images below :
Enter your details .
Click Install Widget
Click Add Widget & Select your blog
Position below post the widget.
Click Save & Done