Friday, December 28, 2007

Internet Marketing Explained Homebusiness Ideas

Bad uses of time include...

1.Checking your sales stats constantly - check them at the end ofthe day if you must

2.Checking email all day long - I constantly struggle with this. Myphone allows me to check my email and I've gone so far as to checkmy email several times on a date.

3.Reading everyone's emails - start unsubscribing from othermarketers lists. You shouldn't be spending any more money online until you have a hosting account, domain name and autoresponder.

4.Being on instant messenger all day - Only use instant messengerwhen you have to

5.Being on forums and sites like myspace/facebook all day long -set a time limit











Good use of Time on include...

1.Writing sales copy - you need to be able to write sales copy orhave someone else write sales copy for you

2.List building - you need to work on building your list. My listallows me to spend a lot of time doing what I want to do all daylong.

3.Networking (JV's) - start connecting with other marketers andstart going to offline events

4.Product creation - you should have your own products it is easierto sell your own products to your existing customers so keep givingthem what they want

5.Public speaking - be on teleseminars, webinar or start speakingat events because you can create a product while you speak and makemoney selling products at the end.

6.Testing - start testing your sales copy when you boost your salescopy you will build a bigger list and make more money.

7.Write Articles - articles are a wonderful way for you to becomean expert in your prospects eyes and you can use them in yourproducts as bonus special reports

Saturday, December 22, 2007

How to Secure Your Computer, Disks, and Portable Drives

Computer security is hard. Software, computer and network security are
all ongoing battles between attacker and defender. And in many cases the
attacker has an inherent advantage: He only has to find one network
flaw, while the defender has to find and fix every flaw.

Cryptography is an exception. As long as you don't write your own
algorithm, secure encryption is easy. And the defender has an inherent
mathematical advantage: Longer keys increase the amount of work the
defender has to do linearly, while geometrically increasing the amount
of work the attacker has to do.

Unfortunately, cryptography can't solve most computer-security problems.

The one problem cryptography *can* solve is the security of data when
it's not in use. Encrypting files, archives -- even entire disks -- is
easy.

All of this makes it even more amazing that Her Majesty's Revenue &
Customs in the United Kingdom lost two disks with personal data on 25
million British citizens, including dates of birth, addresses,
bank-account information and national insurance numbers. On the one
hand, this is no bigger a deal than any of the thousands of other
exposures of personal data we've read about in recent years -- the U.S.
Veteran's Administration loss of personal data of 26 million American
veterans is an obvious similar event. But this has turned into Britain's
privacy Chernobyl.

Perhaps encryption isn't so easy after all, and some people could use a
little primer. This is how I protect my laptop.

There are several whole-disk encryption products on the market. I use
PGP Disk's Whole Disk Encryption tool for two reasons. It's easy, and I
trust both the company and the developers to write it securely.
(Disclosure: I'm also on PGP Corp.'s Technical Advisory Board.)

Setup only takes a few minutes. After that, the program runs in the
background. Everything works like before, and the performance
degradation is negligible. Just make sure you choose a secure password
-- PGP's encouragement of passphrases makes this much easier -- and
you're secure against leaving your laptop in the airport or having it
stolen out of your hotel room.

The reason you encrypt your entire disk, and not just key files, is so
you don't have to worry about swap files, temp files, hibernation files,
erased files, browser cookies or whatever. You don't need to enforce a
complex policy about which files are important enough to be encrypted.
And you have an easy answer to your boss or to the press if the computer
is stolen: no problem; the laptop is encrypted.

PGP Disk can also encrypt external disks, which means you can also
secure that USB memory device you've been using to transfer data from
computer to computer. When I travel, I use a portable USB drive for
backup. Those devices are getting physically smaller -- but larger in
capacity -- every year, and by encrypting I don't have to worry about
losing them.

I recommend one more complication. Whole-disk encryption means that
anyone at your computer has access to everything: someone at your
unattended computer, a Trojan that infected your computer and so on. To
deal with these and similar threats I recommend a two-tier encryption
strategy. Encrypt anything you don't need access to regularly --
archived documents, old e-mail, whatever -- separately, with a different
password. I like to use PGP Disk's encrypted zip files, because it also
makes secure backup easier (and lets you secure those files before you
burn them on a DVD and mail them across the country), but you can also
use the program's virtual-encrypted- disk feature to create a separately
encrypted volume. Both options are easy to set up and use.

There are still two scenarios you aren't secure against, though. You're
not secure against someone snatching your laptop out of your hands as
you're typing away at the local coffee shop. And you're not secure
against the authorities telling you to decrypt your data for them.

The latter threat is becoming more real. I have long been worried that
someday, at a border crossing, a customs official will open my laptop
and ask me to type in my password. Of course I could refuse, but the
consequences might be severe -- and permanent. And some countries -- the
United Kingdom, Singapore, Malaysia -- have passed laws giving police
the authority to demand that you divulge your passwords and encryption
keys.

To defend against both of these threats, minimize the amount of data on
your laptop. Do you really need 10 years of old e-mails? Does everyone
in the company really need to carry around the entire customer database?

One of the most incredible things about the Revenue & Customs story is
that a low-level government employee mailed a copy of the entire
national child database to the National Audit Office in London. Did he
have to? Doubtful. The best defense against data loss is to not have the
data in the first place.

Failing that, you can try to convince the authorities that you don't
have the encryption key. This works better if it's a zipped archive than
the whole disk. You can argue that you're transporting the files for
your boss, or that you forgot the key long ago. Make sure the time stamp
on the files matches your claim, though.

There are other encryption programs out there. If you're a Windows Vista
user, you might consider BitLocker. This program, embedded in the
operating system, also encrypts the computer's entire drive. But it only
works on the C: drive, so it won't help with external disks or USB
tokens. And it can't be used to make encrypted zip files. But it's easy
to use, and it's free. And many people like the open-source and free
program, TrueCrypt. I know nothing about it.

Monday, December 17, 2007

Keyword Hot Spots HomebusinessIdeas

By placing your top-performing keywords in strategic places on your website, you tell the search engine "spiders" that those keywords describe exactly what your site is all about. And that's what convinces the search engines to include your site in the search results for those keywords.

So... where should you put your keywords on your site?Here are the strategic "hot spots" that are considered most important by the search engine "spiders":Keyword hotspot

#1: Your domain nameThe search engines REALLY like URLs that are saturated with keywords! Sites whose domain names include keywords will likely rank higher in the search engine results for those keywords than sites that don't.Brainstorm a list of URLs containing some of your hottest keywords.Next, check if the domain name is available by entering it into www.DomainTools.com.Did you find a keyword-rich domain that's available? If so, you should definitely consider snapping it up! (Even if you already have another URL, you can set this new domain up to automatically forward visitors to your existing URL.)You want to get that domain working for YOU -- instead of your competitors!Keyword hotspot

#2: A well-written title tagYour title tag is a simple piece of HTML code that's located in the "head," or top, of your Web page.Within the source of your web page, it looks something like this:
(title)Insert keyword-rich site description here (/title) In your title tag, include a descriptive, accurate bit of text that describes your business clearly, letting potential visitors know EXACTLY what they can expect to find on your site.For example, if "discount yoga mats" is your main keyword phrase, then in your title tags you could write something like:
(title)Discount yoga mats - Great selection of discount yoga mats for all yoga levels and all types of yoga(/title)As you can see, your main keyword phrase "Discount yoga mats" is in there twice, and the word "yoga" is used a number of times.Keyword hotspot

#3: Your headline tagsA headline tag (or tag) is like a brightly colored post-it note within your HTML source code that alerts search engine spiders to your headline and subheads — places that contain important information, according to the search engines.HTML (h) tags look like this:
(h1), (h2), (h3)As you can see, they always contain a number, since the search engine spiders view them in order of importance — an (h1) tag is more important to note than an (h2) tag, for example.Framed around a headline, an (h) tag looks like this within your source code:
(h1)Looking for a great selection of discount yoga supplies for all yoga levels and all types of yoga?(/h1)You should use an (h1) only once around your main headline, and (h2) tags around your subhead, like so:
(h1)Looking for a great selection of discount yoga supplies for all yoga levels and all types of yoga?(/h1)(h2)We've got the best quality yoga mats, yoga videos, and yoga gear at the deepest discounts!(/h2)(Notice how we included more "yoga" keywords in the subhead? This is another keyword hotspot opportunity you shouldn't pass up!)Keyword hotspot

#4: Your image tags The only thing search engine spiders can "digest" as they crawl your web page is text. Spiders can't index images so they skip right over them. But by placing keywords within the source code of your images, you can transform them into spider bait!Here's an example of what a regular image looks like in your source code:
(img src="myimage.jpg" height="120" width="476" /)As you can see, this piece of HTML code identifies the location of the image — "myimage.jpg" — to ensure it gets loaded to your web page.But by adding an tag, which is simply a place to insert text within this image HTML code, you can add more of your keywords to your web page, like this:
(img src="myimage.jpg" alt="Blowing Bubbles Bubble Gum Factory - homemade bubble gum - bubble gum kits" height="120" width="476" /)So instead of finding boring old source code attached to your image, the search engine spiders will find more keywords to index!Keyword hotspot

#5: Your description "meta tags(/a)"A description meta tag describes the purpose of your web page and ideally sits just below the title tag in the source code of your web site.Description meta tags look like this:
(meta name="description" content="Blowing Bubbles Bubble Gum Factory: your one-stop homemade bubble gum kit source offering entertainment for the whole family!")The text you include in your description tag usually appears as the blurb that's included in your listing in the search results. This blurb gives searchers an idea of what your site is about before they click through to it.However, not all search engines use your description meta tag to summarize your site — some will generate a random description from your web page content!Even still, it's worthwhile to include the tag in your source code for the ones that do feature it in the listing.Keyword hotspot

#6: Your keyword "meta tags(/a)"A keyword meta tag usually sits right under your description meta tag. At one time the keyword meta tag was essential for letting the search engine spiders know the keywords a web page was optimized for.Keyword meta tags look like this:
(meta name="keyword" content="homemade bubble gum kits, make your own bubble gum, making bubble gum")Here are a few guidelines for writing spider-friendly keyword meta tags:
List the 2-3 keywords you're optimizing that particular page for in order of importance, with your main keywords appearing first.
Separate keywords with a space comma or space, but avoid words like "and," "or," and "but" which take up room and are ignored by the spiders anyway.
Don't overdo it on your keywords. If search engines think you are "keyword spamming," you run the risk of being penalized.And last, but certainly NOT least...Keyword hotspot

#7: Your salescopyIn the search engine's eyes, your web page content is a VERY important element of your web site.... This because search engine spiders "crawl" through your site looking for text that tells them how to categorize your material.The spiders also check how relevant your site is to certain search terms, so you'll want to be sure to pepper your top-performing keywords strategically throughout your salescopy.The optimal spots to put keywords on your web pages are:
At least once in your first paragraph of content (two or three times, if possible)
At least once in your last paragraph of content (again, two or three times would be better)
A few more mentions in the body of your content if you can get away with itIn addition to your main keywords, you should also use slight variations and synonyms of them.For example, if your keyword phrase is "legitimate home business opportunity," be sure to include similar phrases, such as "legitimate home business opportunities," "legitimate business opportunity," and "work-at-home business opportunity." Not only will your content read better, the search engines will love it!...

Finally, I just want to point out that you should only try to optimize each page of your website for 2-3 keywords MAXIMUM. (That includes your main keyword and one or two secondary keywords.) You simply won't be able to do an effective job if you try to optimize your site for too many different keywords at once

Sunday, December 09, 2007

Opt-In Advertising Homebusiness Ideas

That's because the vast majority of online shoppers DON'T make a purchase on their first visit to a web site. Most people need a minimum of 7-8 points of contact with a business before they feel comfortable enough to buy from them.So if you don't reach out to them and give them a compelling reason why they should give you their contact information-- so you can stay in touch with them and overcome their buyer resistance -- you'll never realize your full income potential.

Here are some more reasons why it's essential that you start building an opt-in list as soon as you possibly can...
Your "opt-in" email list is made up of people who want to hear from you.
They've visited your site, or they've come into your shop, and they've decided that they like what they see enough to give you their email address.
They are actually inviting you to sell to them!
You are giving your customers and subscribers something they've ASKED you for.

When someone gives you their email address, they understand that you'll be using it to send them information they actually want to receive — meaning your opt-in list will be highly responsive to any email promotions you run in the future.

You are developing valuable lifetime relationships with your customers and subscribers.

Email allows you to contact the people on your list over and over again, so you can build genuine relationships with them. There's simply NO WAY you could do this offline without spending a fortune on printing and postage!

Every time you send a mailing, the response is 100% measurable.Unlike other forms of marketing and advertising, email allows you to evaluate the success of your campaigns within just a few hours. This will save you thousands in wasted advertising dollars!

Opt-in email marketing is effective... instantaneous... and FREE! This is my favorite thing about email marketing: You can contact your customers and subscribers whenever you want, with whatever offer you want, and it never costs you a single dime!So those are the "whys"... now here are the "hows":
The key to growing your opt-in list is to convince your visitors to give you their contact information by offering an enticing free gift that's so valuable they can't say "no" to it.

What kind of free gift am I talking about?Here are some ideas that have proven to be incredibly successful for us and our clients:
An eBook on a topic that's of interest to your visitors
A free report full of valuable information
A free subscription to an online newsletter that covers topics your visitors want to know more about
A free "how-to" course, delivered as a series of emails
Entry into a contest for a fabulous prize!

Sunday, December 02, 2007

Memory and Effective Presentation

The human memory has the ability to hear a 100 digit number or more once and then repeat it forwards and backwards, it has the ability to memorize a Shakespearean play word for word or memorize the stats of every baseball player for the last 100 years, and the human memory has the capability to meet 100 people in 20 minutes and recall every single name!

Now, the question is, are you doing these things? If not, the reason is simply that you have not been trained to. Two thousand years ago a Greek named Simonedes developed a memory method called 'Loci'. With this method, Simonedes numbered locations in his home. He started in the doorway and then logically proceeded around his home. He reviewed these items so many times mentally that if you asked him what was number 25 then he could instantly tell you what piece of furniture that number corresponded to.

These 25 objects were actually mental files for Simonedes. Then if he had a list of items he wanted to recall he would place them mentally on these objects in his home. Let's say that you are a professional who wants to give a speech without notes. Simply turn the key points into pictures and then file them to your 'house files'. When you are called upon to speak simply mentally walk through the house and give your talk without notes.

For example, recently I gave a one hour keynote in Atlanta at a home builders conference. I wrote my speech out the night before. The first thing I wanted to do was talk about the book, 'How to Win Friends and Influence People.' So I visualized the book on my front door and then mentally walked through my house and gave the one hour talk without notes! That can work for you as well. Anything that you want to recall simply turn it into a picture, place it on your house files and get ready to be amazed! YOU are the greatest computer ever created!