Wednesday, December 4, 2013

SOME WAYS TO AVOID MISTAKES DURING PROJECT MANAGEMENT

SOME WAYS TO AVOID MISTAKES DURING PROJECT MANAGEMENT

You may have heard the saying ”Be proactive, not reactive.”  This is very appropriate when considering how best to deal with mistakes.  The idea being to prevent mistakes before they occur. But how exactly do you do that?  Here are a few ways in which to prevent mistakes during project development.

  1. Learn from other’s mistakes. Find experienced peers who are willing to share their experiences, and mistakes, and learn from them.

  1. Do your research first.  No matter how much you know, you will encounter new challenges on almost a daily basis. Each challenge usually requires you to learn something new. Before you tackle a problem or task, do your homework!  The trial and error way of learning is way to costly and time consuming. Today, with the resources of the Internet, there is little excuse for not doing proper research in advance.

  1. Have a plan.   You can not know how to get to your destination without a road map.  A project plan is the road map for a development project – you need to know how you are going to get where you are going.  Days or weeks can be lost if you go down the wrong path. When done the right way, a project plan will keep one fron straying off course.

  1. Follow standards and use templates.  There is a good reason why experienced professionals took the time to create and publish industry and company standards. Standards detail best practices and procedures learned over the years from trial and error. Templates such as professional forms can be useful since most of the work has already been done in a standard format.

  1. Communicate and coordinate with others. If you are part of a team it is essential to communicate with other team members in order to avoid redundancies and to coordinate your work with the others. There are any number of methods to facilitate team communication, none of which are perfect and all of which are time consuming. However, communication is a critical part of the development process.

These are but a few ways in which to be proactive with the development of your project. These tips, if applied properly, will definitely help to prevent mistakes that could otherwise occur during your project development.


Good luck with your project!

Monday, November 4, 2013

HAS YOUR EMAIL BEEN HACKED? WHAT TO DO!

More and more these days, we're hearing reports about hacked email accounts -- in which individuals' accounts are hijacked by crooks and used to spam their victims' contacts. An email goes out to your contacts seemingly from you often containing a link that leads either to a sales site or, worse, a malware download. Or they may be one of those spoof distress emails claiming the supposed sender is in trouble and needs money.
So how can you tell if your email account has been hacked and what can you do about it? The Federal Trade Commission (FTC) has recently issued guidance, which has been posted on the government's OnGuardOnline website.


How to Tell If You've Been Hacked

Usually, the first clue you get that someone is using your email address is when you get emails from your contacts about messages they say they've received from you and which you know for sure you didn't send. You might also check your "Sent" folder if you use an online email account and see messages there that you didn't send. Similarly, you may find your Facebook or other social network account has posts that you didn't write. You may not even be able to sign in to your social media or email accounts.
It's also possible, says the FTC, that people may be receiving emails that seem to come from you when your account hasn't been hacked at all. In that case, the crooks are spoofing your email address -- using their tech skills to "overlay" their real address with yours. But even then, you'll still want to take action to put things right.


How Did You Get Hacked?

There are several ways crooks can get hold of your email account info but the simplest way is that you gave it to them. They already know your email address. It'll be on hundreds or thousands of messages you sent out (including those on jokes you circulated or someone sent to you) or on other sites where you have accounts.
In fact, it's not hard to guess your address if, like most people, you use your first and last name followed by the mail service provider -- like JohnDoe@somemailservice.com. Now, all they have to do is guess your password, which, depending on how wary you are, could take just seconds. Or they may get hold of it from company computers where you have an account, which they have previously also hacked. If you use the same password on multiple accounts, you're in big trouble.
Alternatively, you may have inadvertently installed malware on your PC, perhaps from the very same trick that's now being passed on to your contacts -- you clicked on a link you thought was sent to you by someone you know. The malware then goes through your PC, collects your password details, raids your contacts list and begins the whole process again.


What to Do If You've Been Hacked

You should take five key actions if you believe your email account has been hacked:
> First, check for and get rid of any malware on your PC. Update and run your internet security software for this. If nothing is found, visit the software company's website or search the Internet for more malware-scanning tools from reputable companies.

If you haven't found any malware, download the free scanner form Malwarebytes. Although this is NOT a substitute for full-blown Internet security (as the company will tell you), it does have a good reputation for tracking down and removing installed malware that other tools miss.

> Second, change you passwords. Again, check out our earlier reports on how to create strong passwords. And follow the two golden rules: Don't use the same password for different sites, and change all of your passwords regularly. Use a password manager.

> Third, check with your email provider or social networking site for guidance on restoring or resetting your account. You may find, for example, that the crooks have already changed your password and you can't log on to your own account. You'll find links from most of the big providers on StaySafeOnline.org's Hacked Accounts page.

> Next, check your account settings. Says the FTC: "Once you're back in your account, make sure your signature and 'away' message don't contain unfamiliar links, and that messages aren't being forwarded to someone else's address. On your social networking service, look for changes to the account since you last logged in -- say, a new 'friend'."

> Finally, make sure you tell all your contacts about what has happened, as soon as possible. If you email them, use the "bcc" address field so all their details remain hidden to the others.


How to Avoid Being Hacked

It would be better, of course, if you didn't get hacked in the first place.
You can reduce the risks by following our password guidance and keeping your passwords secret; using a difficult to identify address or at least adding numbers to your address name and keeping your security software up to date.

For more information on this FTC guidance, visit OnGuardOnline's Hacked Email page.
Based on article from Scambusters.org 9/13/13.


Saturday, October 5, 2013

TIPS for Keeping Your Information and System Secure

Keep a Clean Machine.
> Keep security software current: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
> Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option..
> Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web‐enabled devices also need protection from viruses and malware.
> Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.

Protect Your Personal Information.
> Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site.
> Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.
> Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.
> Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure place away from your computer.
> Own your online presence: When available, set the privacy and security settings on websites to your comfort level for information sharing. It’s ok to limit how and with whom you share information.

Connect with Care.
> When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.
> Get savvy about WiFi hotspots: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your machine.
> Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure.

Be Web Wise.
> Stay current. Keep pace with new ways to stay safe online. Check trusted websites for the latest information, and share with friends, family, and colleagues and encourage them to be web wise.
> Think before you act: Be wary of communications that implores you to act immediately, offers something that sounds too good to be true, or asks for personal information.
> Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.

Be a Good Online Citizen.
> Safer for me more secure for all: What you do online has the potential to affect everyone – at home, at work and around the world. Practicing good online habits benefits the global digital community.
Post only about others as you have them post about you.
Help the authorities fight cybercrime: Report stolen finances or identities and other cybercrime to
http://www.ic3.gov (Internet Crime Complaint Center), the Federal Trade Commission at
http://www.onguardonline.gov/file‐complaint.


Visit http://www.stopthinkconnect.org for more information.

Tuesday, September 10, 2013

LET US NEVER FORGET 9-11

Let us never forget! 


Twelve years ago the United States was attacked by a band of radical Islamists. Thousands of innocent people died as a result of this viscous attack. To this day, the world has not been the same. Over the past twelve years, these animals have threatened and attacked people in many other countries. People all over the world will continue to live in fear until these radical, so-called religious fanatics are eliminated.

Tuesday, September 3, 2013

LAPTOPS VS TABLETS

Ever since the emergence of the iPad, the question has been asked: laptop or tablet? Is a laptop necessary when tablets can perform so many of the same functions? Are we heading to or living in the post-PC era?  The answer is, it depends. Everyone uses technology a bit differently, and some can likely get by with a tablet alone. But don't assume that the days of the laptop are numbered. While some can make do with a tablet, there are some compromises required for the tablet-only lifestyle that some users can't make. Here are a few of the best features of both to help you figure out which device is right for you.

Laptops, like desktop PCs before them, have a built-in benefit over tablets, and that benefit is power. As a rule, laptops have more powerful processing hardware, allowing for a wider range of uses, faster performance and better multitasking. Laptops can easily handle common tablet uses—like Web browsing and media streaming—and then go much further, with uses ranging from simple data entry to complex tasks like photo and video editing.   Serious PC gaming relyies on faster processors and discrete graphics processing to crank out complex rendered environments at resolutions and frame rates that tablets can't touch.

Joining the processing hardware is storage. Where tablets may boast anywhere from 16 to 128GB of storage space, the average laptop offers 500GB or more. Even the slimmest laptops featuring smaller SSDs—like the Apple MacBook Air 11-inch—offer at least 128GB, starting where tablets top out. Add in features like optical drives for DVD or Blu-ray discs, card slots for full-size SD cards, and USB-connected flash drives and portable drives, and you can have mountains of data at your fingertips.

There's also the question of form factor. Laptops have the benefit of having a keyboard and mouse built-in, allowing you to do all of the typing and mouse-related work you would do on a desktop. Touch screens don't offer the same level of granular control that a mouse and cursor does, while on screen keyboards are really only fit for entering short bursts of text, such as a status update or a tweet. A physical keyboard is a must for entering long blocks of text, and a mouse is far more efficient than a touch-screen for frequent swapping of windows, clicking of links, and general mousing around. This is even more important in the workplace, where those very tasks may make up the bulk of your day.

There's also the question of ports and peripherals. While both laptops and tablets have an ecosystem of accessories and devices around them, laptops—with their broadly compatible USB ports, HDMI outputs, and other features—work with a universe of accessories that don't need to be tailored to a specific device, but will work with most any properly equipped PC. From mice and keyboards to webcams and storage devices, laptops are the easy choice.

Bottom line: If you need to do serious work, need powerful processing or multitasking, or need compatibility with a specific accessory or storage device, there's no good alternative to the laptop. Tablets can fulfill some of these needs some of the time, but when it's time to get things done, the laptop still reigns.

Tablets on the other hand, considering that most laptops start at $500 and go up from there, tablets are, with few exceptions, more affordable. The Apple iPad (4th Generation, Wi-Fi) might start at $500, but there are dozens of competitors like the Google Nexus 7 and the Amazon Kindle Fire HD (7", Wi-Fi) that cut that price in half, making tablets one of the most affordable options around when it comes to media, games and the Web. The exception to this pricing is the Windows tablet, which attempts to merge the PC operating system with the form-factor and touch screen of a tablet. Where tablets running on Android and iOS can be had for less than $300, the latest Windows 8 tablets start at $400 and many sell for over $1,000. Whether or not the tablet market will support laptop pricing is a question that's largely unanswered, but if price is a consideration, you may want to steer clear of Windows tablets.

The design of the modern tablet—all touch screen—is also extremely intuitive, especially when paired with touch-friendly operating systems, be it Windows 8, Android, or iOS. The icon-heavy designs are very easy for tech-newcomers to figure out, and gestures like swiping from one screen to the next are far easier to grasp than tapping Windows keys or navigating a file tree. Many tablets support some level of multitasking, allowing you to run one or more apps in the background while working in another, but the full-screen focus of most tablets is also seen as a distraction-free alternative to the multitasking of Windows.

The small size of tablets also make them more mobile. While laptops maybe be portable, easily packed along in a laptop bag, tablets are truly mobile, tailored for use while in motion instead of sitting stationary. The smaller form factor also makes it more comfortable to use the device casually. A tablet can be used at the library, but also on the subway, in the kitchen, on the couch, in bed, and everywhere in between. The small screens are also well-suited to personal media consumption, whether it's watching shows and movies or reading an ebook or website.
Tablets also offer excellent battery life. This efficiency is the flipside of the processing issue--smaller, less powerful mobile processors are also more battery efficient, sipping at a battery for hours longer than even a long-lived laptop.
Where laptop PCs deal in software, tablets are all about apps, providing a user experience tailored to the use of a touch screen, and blending always-on data connectivity with the unique capabilities of a mobile device, taking advantage of touch input, motion sensors, GPS data, and built-in cameras. Apps are also generally less expensive than PC software, with a large selection available completely free.

While laptops offer all sorts of options for file support and available programs, the process of buying and consuming digital media is often simpler on a tablet than anywhere else. Broadcasters and movie studios are bending over backwards with apps and services that put their content into the hands of iOS and Android users, and digital distribution through iTunes, Amazon, and Google Play have supplanted many of the traditional outlets as the go to source for media.  If your daily computer use revolves around the internet and social media, streaming services like Spotify and Netflix, and only light productivity, then you may be able to make do with a tablet alone.

Hybrids are being looked by some manufacturers as the best of both worlds. Intel has spent a lot of money promoting an array of two-in-one devices, with small laptops with detachable tablets, like the HP Envy X2 (11-g012nr) around $740 or the Lenovo ThinkPad Helix around $1,560, and convertible designs that flip and fold between the two, like the Lenovo IdeaPad Yoga 11S $999 or the Dell XPS 12 $1,100. These laptop/tablet hybrids are made to close the gap between laptop capabilities and tablet convenience, and the new hybrid category will only get better over time as technologies improve and designs are refined. 

And yes, maybe we All Just Get Along! Though there are clear reasons to favor one device over the other for certain specific uses, the laptop versus tablet debate is a false one. In today's connected world, there isn't really an either-or decision to be made—laptops and tablets may be best used together, as companion devices.

The ideal setup will vary from one person to the next, but many shoppers who make the decision to forgo a laptop or skip the whole tablet thing find themselves butting up against the simple reality that there is no one device that is best for everything. Tablets and laptops are really designed to be companion devices, sharing files via cloud storage and allowing you to take your Web-connected life everywhere.

Adapted from Brian Westover’s PC-Mag article, 8/22/13

Monday, August 12, 2013

Scam Words Crooks Use to Trick You

One of the biggest challenges cyber crooks face -- not that we have any sympathy for them! -- is coming up with words that'll most likely convince you to click on their troublesome links or attachments. But there's a catch. Security software that most of us have on our PCs is set up to look for suspicious words, so the crooks need to use words that will evade this first line of defense.

One of the main tricks they use is to create fake shipping notifications, especially if they're targeting businesses.  Experience suggests we're more likely to click on these than anything else.  More than a quarter of all words featured in malicious emails monitored by one security firm, FireEye, concerned shipments or postage.  FireEye actually compiled a table of those words;  they include the names of all the big shippers and mail organizations because, when we see those names, we're inclined to trust them. FireEye's Top 10 shipping scam words is as follows:

1. dhl
2. notification
3. delivery
4. express
5. (the date year)
6. label
7. shipment
8. ups
9. international
10. parcel

Also in the full charts are words like "alert," "urgent," "confirmation" and "usps."  Many of these shipping-related messages are used for spear phishing -- emails targeted at specific individuals.
When the messages have attachments, the most common form -- shown in the letters after the dot in the attachment name -- is ".zip," a compressed file that is difficult to inspect without opening it.  This accounts for three quarters of attachments in what FireEye calls "advanced malicious attacks." In second place is ".pdf" -- commonly used for documents readable on most PCs with the right software.

"Cybercriminals continue to evolve and refine their attack tactics to evade detection and use techniques that work. Spear phishing emails are on the rise because they work," says Ashar Aziz, founder and CEO, FireEye.

After shipping terms, the next most common word category used by cyber criminals is finance.  They often use the name of a bank, refer to transactions and have official-looking forms attached. Tax-related words are also popular, especially when they include "refund"!

Attachments named for things like airline tickets or invoices are another common feature of spear phishing.  The Internet Crime Complaint Center (IC3) says spear phishing emails are particularly effective because cybercriminals use information from social networking sites to personalize emails and make them look more authentic.  However, there are lots of other giveaways in scammers' choice of words that you can be on the lookout for.

As frequently reported, bogus messages from Nigeria or other countries where English is not the first language often give themselves away just by the use of wrong words and grammar.
Sometimes, they use quaint words and phrases no longer in use, seem over-polite or tell you they're "temporarily out of the country," or similar wording.  On dating sites, crooks also over-use abbreviations, some of them seemingly obscure even to seasoned surfers, and other just repeated too often -- like "cos."


More Scam Words Categories

Here are six word categories that suggest you could be on the receiving end of a scam attempt: Unlikely words: For example, an email with "business proposal" or another opportunity-related term as an attachment or subject heading would almost certainly be a scam.  After all, who initiates a business idea with you in this way?


Out of character: An email purports to come from someone you know but the words it uses just don't sound like they'd come from that person.  Claims of secrecy: Messages that claim to be "confidential," "for your eyes only" or based on "inside information," especially from someone you don't know, should arouse your suspicions.

If it's from someone you don't know, it's a scam. Who in their right mind would send a genuinely confidential item this way?  If it's from someone you do know, be really wary. Contact them first, if you can, to check that they sent it.

Promises of wealth: As in the aforementioned Nigerian scams. But let's not forget lottery wins (e.g., "claim," "prize," "awards office") and investment emails that use words like "guaranteed," "opportunity," "risk-free" and "fortune."

If it's not a scam, it's at least likely to be spam.

Sensation: Words like "shock," "sensation" and personalized phrases like "you gotta see this" or even "is this you?" are designed to make you want to click a link or an attachment.
Never do that without checking the source.  It's easy: Be cautious of words that suggest something you had imagined would be quite tough, is easy.

For job hunters, "no experience necessary" should be a red flag. So should things like "I earned $xxx in just xx hours" -- you fill in the amount and time -- but we guarantee they'll be amazing.
Similarly, money plans that offer "instant loans" may turn out to be too good to be true.
So now that you have "inside information" on the scammers' dictionary, you should have a better idea of what to be on the lookout for.

Few of us might claim to be true students of language, but paying attention to scam words could at least give you a degree of security.

 Source: scambusters.com #551, 7/1/13

Wednesday, July 3, 2013

How to Beat Ransomware Crooks

For no identifiable reason, other than it's an easy and effective way of making money, 2013 has seen a huge surge in ransomware -- the malicious programs that seize control of your computer and then demand payment to unfreeze it. Its simplicity and the alarming implications of not being able to get at the valuable data in your computer triggers a panic reaction that still works extremely well for the crooks.

Although there are no overall official figures, in one instance alone, 700,000 machines in Spain were hijacked, so it's likely that tens of millions have been targeted worldwide. And in another incident, one gang was estimated to have netted $5 million from a single extortion racket.


How Ransomware Works

You're happily working away or surfing when a warning pops up on your machine. The most common current one claims to be from the FBI, the Department of Justice or other law enforcement agency, saying your machine has been locked because of illegal activity. Usually, it suggests you've been downloading "adult" images and, in recent instances, it even flashes up supposed examples of what it claims you've been viewing.

Or it may suggest you've violated copyright laws by downloading pirated videos or music. The ransomware may even activate your webcam, showing your image and implying that you're being watched. The warning says you've been fined -- usually $200 -- and tells you to send a money-wire for the charges to be dropped and for a password to unlock your machine.

In other cases, the warning simply says you have a virus on your machine and that, for safety's sake, it has been locked.  In this case, paying a "fee" is supposed to enable a piece of software to clean up your PC and then get it going again.

But there are many other variations. The bottom line is that if the machine freezes and you're asked to pay to unlock it, you've been hijacked. No legitimate software or law enforcement agency works this way.


How to Avoid or Deal with Ransomware

The most obvious way of beating the ransomware crooks is by avoiding getting the malware on your PC in the first place. Here's our 10-point defense formula.

1. Using reputable anti-virus software and keeping it up to date will stop it dead in its tracks in most cases.

2. Don't click on links and attachments that come from people you don't know.

3. Even if you do know the sender, be wary about clicking.

Is the wording of the message unusual, vague or impersonal? Is the subject line or message text dramatic or does it claim to be a bill or receipt of some sort?  These are red flags.

4. Don't visit dubious websites, including "adult" sites or any flagged up by your Internet security software as being questionable. That's where the malware most often lurks.

5. Keep your data (documents, photos etc.) on a separate disc or partition from your operating system (e.g. Windows), so that if your system is hijacked your data will remain intact no matter what you have to do next to get back in business.

6. Back up both your system and your data regularly -- at least daily for your data and weekly for your operating system.

7. Create an emergency boot disk or USB drive that will allow you to restart your PC if the machine has been hijacked.

How you do that depends on your operating system and is beyond the scope of this article, but most operating systems and backup software will enable you to do that. You'll need to check your software documentation or search on-line for information on how to do it.


If You're Hijacked...

If you get a ransomware message, switch off your machine. If your computer won't let you, hold down the power button until it goes off.

8. If you know how to do it, restart your machine and go to "safe" mode, and then try to use system restore or system refresh to turn back your machine to an earlier date.

From safe mode, you might also be able to download a ransomware removal tool (search online for it) and use that. But be very careful it's not more malware! Or use someone else's machine to search for and download a ransomware removal program onto a flash drive that you can boot from. Check your computer documentation on how to start your machine from an external device.

9. If these options are not available, use your emergency boot disk (Point #7) to restart your machine (again, you'll need to check your documentation on how to do this), and reinstate your system backup.

10. If that doesn't work, you may need to reinstall your operating system and rebuild your setup. But if you've followed our earlier advice, all your data will be unaffected and intact.

If all of this is too tough for you, get professional help. Above all, don't pay the ransom or provide any personal information! There's no guarantee the crook or the software will provide the password to unlock it. Even if it does, it won't remove the ransomware from your PC; it could easily spring to life again.

Based on an article from scambusters.com



Wednesday, June 5, 2013

7 Tips to Help Reduce or Stop Spam

Many of us get thousands of spam messages a day. So, it's not surprising that people need relief -- they want to do whatever they can to stop spam. Unfortunately, many of us now spend so much time filtering and deleting spam that our biggest concern has become that we not lose messages we really want. 

Many double opt-in email newsletters are being incorrectly filtered, so recipients who sign up never know they've been sent. And even personal communication and one-on-one email is now regularly being filtered at the server level.

In fact, according to an article in Time Magazine, between 40% to 70% of all email is currently getting blocked by
spam filters! That means recipients never have a chance to read it.

So, the cure has become as bad as the disease. This is especially true of some filtering solutions with over-zealous criteria. Nevertheless, here are 7 good tips that will help you dramatically reduce the amount of spam you receive. Using these tips and resources, have in some cases to reduced the amount of spam by over 55%.

1. Use a separate email address when you post messages to any public forum, such as newsgroups and mailing lists. Never use your personal email address for this purpose -- or you'll be flooded with spam. Then, you can quickly go through the email in this account to see what's spam and what isn't. And your main personal email address won't be as clogged with spam.

For example,
AOL users can set up a special user name for free, and use that for their postings. Then, they can just discontinue that account if they start to get too much spam.

2. Consider acquiring
multiple email addresses for different purposes. This helps you to identify different sources and senders, and lets you filter more effectively.

For instance, you may have one for personal use only by friends, family or colleagues that is never used to request information or to subscribe to newsletters, discussion lists, etc.

Another might be used just for sales inquiries or orders, or for making online purchases. This can be arranged through
your ISP, web host or through any number of online email service providers.

Even free
mail services like Yahoo! Mail and GMail can be used for this purpose.

3. You can subscribe to services online that provide you with disposable addresses that can be deleted if they begin to attract spam messages.

You can create a unique address for each email newsletter or forum you subscribe to. Then, when an email address begins getting spam, you 'throw it away' and start using another email address.

This works because the disposable email addresses actually forward to a real email address of yours. The software lets you track which addresses are getting spam, and you can just resubscribe using a new, spam-free address.

For information on what you need to know about disposable addresses, visit:
http://email.about.com/library/weekly/aa072002a.htm

Our favorite company that offers disposable
email accounts is Sneakemail. It even has a free version:
http://sneakemail.com

4. Remove your email address from your website. If you list or link to your email address, you can expect to be spammed.

Address-harvesting robots will spider your site and extract them. So remove them wherever possible and use web-based forms instead. This will drastically cut down the amount of spam you receive if you have a website.

5. NEVER buy anything from a company that spams. Don't visit their sites or ask for more information. (If you respond to their spams, you're encouraging them to continue spamming -- they only need a tiny fraction of responses to be profitable.)

There's another reason not to buy anything from a company that spams: over 95% of spam offers are scams! In fact, not responding to spam is the single most effective way to not get scammed on the Internet.

6. Filter your email. Using filters is key to managing your email effectively. It may take a short time to figure out how to do this, but it's definitely worthwhile.

For more anti
-spam filtering information, visit: http://email.about.com/cs/spamfiltering/

7. Consider subscribing to a spam prevention service. We're not enthusiastic about these services, but many people find them invaluable. They range from the good to the bad to the downright ugly, and from free to fee-based.

Many of these services are "challenge response" services. This means they require that people who send you email to respond by clicking, visiting a website, and/or typing in a code that only a human (not a spam bot) could do correctly.

Unfortunately, many people -- and most newsletter publishers -- simply refuse to participate. That's because it requires people who are sending you legitimate email to take THEIR time to ensure YOU
get email.

In fact, many of us consider it rude for you to even ask.

Imagine a newsletter publisher like ScamBusters with 100,000+ subscribers. If even 20% installed this kind of system, that would mean the publisher would have 20,000 challenge/response requests. If each took only half a minute, that would be 167 hours -- or more than four weeks to reply!

Tip: Make sure that any software or system you select gives YOU control of which email you get (and doesn't automatically erase messages).

On a related note, safeguard your newsletter and discussion list subscriptions. If you, your
ISP or web host use spam filters or white lists, be sure to let them know that you want to receive messages from any newsletters or discussion lists that you subscribe to.

Do it as soon as you sign up... otherwise, it's very easy not to notice that you're not receiving them.

While these 7 tips may not actually stop spam, they will certainly help you drastically reduce the amount of spam you get.
From ScamBusters.com



Thursday, May 2, 2013

Inspiring Quotes From Zig Ziglar


Zig Ziglar, one of the world's most famous salesmen, who inspired millions with his message of positivity and personal achievement, passed away in late November, 2012 at the age of 86.
He was known around the world as a performance trainer for major corporations, motivational speaker, and author of best-selling books such as See You at the Top and Secrets of Closing the Sale. In his autobiography Zig, published 10 years ago, he wrote, "If my life has had a theme, I suppose it has been a typical American theme in that, for most of it, I have been looking for happiness and success." But his life was remarkable in his dedication to helping others find the same.

The following are a dozen of Ziglar's most inspirational quotes for achieving personal and professional success.

  1. If you can dream it, you can achieve it. You will get all you want in life if you help enough other people get what they want.
  2. Building a better you is the first step to building a better America.
  3. People often say that motivation doesn’t last. Well, neither does bathing – that’s why we recommend it daily.
  4. An optimist is someone who goes after Moby Dick in a row boat and takes the tartar sauce with him.
  5. Remember that failure is an event, not a person.
  6. For every sale you miss because you are too enthusiastic, you will miss a hundred because you’re not enthusiastic enough.
  7. Success is dependent on the glands – sweat glands.
  8. Honesty and integrity are absolutely essential to be successful in life – all areas of life.  The really good news is that anyone can develop honesty and integrity.
  9. Timid salesmen have skinny kids.
  10. The most important persuasion tool you have in your entire arsenal is integrity.
  11. Money isn’t the most important thing in life, but it’s reasonably close to oxygen on the ‘gotta have it’ scale.
  12. Stop selling. Start helping.

Source: entrepreneur.com, Nov.,2012

Monday, April 8, 2013

SOME THOUGHTS TO LIVE BY


For a change of pace, some thoughts to live by :~)


1 - Accept the fact that some days you're the pigeon, and some    days you're the statue!
2 - Always keep your words soft and sweet, just in case you have to eat them.
3 - Always read stuff that will make you look good if you die in the middle of it.
4 - Drive carefully ... It's not only cars that can be recalled by their Maker.
5 - If you can't be kind, at least have the decency to be vague.
6 - If you lend someone $20 and never see that person again, it was probably worth it.
7 - It may be that your sole purpose in life is simply to serve as a warning to others.
8 - Never buy a car you can't push.
9 - Never put both-feet in your mouth at-the-same-time;-because then-you won't have a leg to stand on.
10 - Nobody cares if you can't dance well. Just get up and dance.
11 - Since it's the early worm that gets eaten by the bird
, sleep late.
12 - The second mouse gets the cheese.
13 - When everything's coming your way, you're in the wrong lane.
14 - Birthdays are good for you. The more you have, the longer you live.
16
- Some mistakes are too much fun to make only once.
17 - We could learn a lot from crayons. Some are sharp, some are pretty and some are dull. Some have weird names and all are different colors, but they all have to live in the same box.
18 - A truly happy person is one who can enjoy the scenery on a detour.
19 - Have an awesome day and know that someone has thought about you today.

AND MOST IMPORTANTLY

20 - Save the earth ..... It's the only planet with chocolate! 

Tuesday, March 5, 2013

Webmail war: Gmail vs. Outlook.com vs. Yahoo Mail


This was the subject of a recent (March 1, 2013) Computerworld article by Serdar Yegulalp.  Here is my summary of this interesting article.

Google, Microsoft and Yahoo have all rolled out major changes to their free webmail services. Which now offers the best organization, message handling, mobile options and advanced features?

There's little question that Web-based email has captured a major portion of the user base. The conveniences of webmail -- all your messages in one place, few or no practical limits on storage, access from almost any client device -- make it all the more appealing to generations of users for whom client apps like Outlook are clunky relics.

In his roundup, he looks at what's changed for each email service during the past year -- both cosmetically and functionally -- and the ways each implements commonly used features: mail organization and searching, POP/IMAP access, handling of attachments and the mobile experience (including apps). His article includes a discussion on how to switch email accounts including moving email and moving contacts.

The article includes a “Bottom Line” comment for each of the three major free webmail services:

Gmail, from Google, continues as a fine choice for an email service, rich with meta-organizational features and external connectivity options.  However, gmail’s highly useful sync features for Outlook are now only available for paying customers.

Outlook.com, formerly Hotmail.com, is clean looking and works well, but the lack of IMAP support and the uncertain state of its mobile apps and mobile site is inconvenient.
NB: I’ll have a discussion on the phase out of Hotmail in an upcoming post.

Yahoo mail is easy to work with and approachable,  but all the features that would make it even more useful are either behind a paywall or absent entirely.

The article concludes by saying that Outlook.com is a welcome surprise, even if there's no support for IMAP and its mobile experience could still use some work. It's going to be one to watch, especially with Microsoft's growing push toward being a services outfit for end-users instead of just all-Windows, all the time. Meanwhile, Yahoo Mail is a decent entry-level product for undemanding users, but it's easy to see people outgrowing it quickly.
Folks who are uncomfortable with the way Gmail offers up ads based on the content of email might want one of the other services. Another big gripe with Gmail is how a key piece of its functionality -- client sync -- has been shunted out of the free product and into the for-pay tier. I hope this isn't a trend.
But in the end, it's hard to go wrong with Gmail. It's been broadly adopted, has a solid feature set and supports most of the popular mail protocols.

You can view the entire article at: 

-=#=-