How to Build Credibility OnlineWritten by Craig Lock
Continued from page 1
N.B: Publish your customers' names and email addresses at end, so that they can be contacted as a referral ("if need be"). (Don't forget to obtain their permission first to have their name "up there" on www; however we do find that most people are very happy to oblige). Because personal endorsements from "real people" are way more trustworthy and they prove that you have fulfilled your promise to other customers - that your product or service actually "does job " claimed. Building credibility (trust) comes from using your individual area ofexpertise (and/or interests) to help others through sharing your unique knowledge and experiences. That is best part of an online business, I believe - "meeting people and building relationships based on trust" in magical journey that is life. Craig Lock Creative Writing Course http://www.nzenterprise.com/writer/creative.html For various books and a practical interactive course on internet marketing, click on http://www.novelty-gift.com/ and http://www.bridgeniche.com/CLOCK/zaniestbooks.htm

Craig Lock has been successfully marketing products online for the past five years. Craig is a writer, who believes in sharing information, as well as encouraging and helping others to find their talents and gifts, to strive for and accomplish their dreams in life - whatever they may be.
| | Who's Peering Into Your Computer?Written by June Campbell
Continued from page 1
Interested in knowing just how much information a skilled hacker could get from your machine? Check out this web site called Beyond Enemy Lines: http://belps.freewebsites.com The webmaster, Man in Wilderness (MITW), claims to be an Internet security expert. MITW is apparently a "white hat" hacker who uses his skills to protect his customers from attack. As story goes, head of a professional spamming operation repeatedly forged MITW's domain for spamming purposes. (Professional spammers typically hide their identities by using forged domains.) Finally, in retaliation, MITW hacked spammer's computer and published his findings on this web site. The details make fascinating reading. After breaking into this woman's system, our white-hat hacker obtained and published screen captures of spam software while it was using his forged domain name to send thousands of emails. MITW also obtained copies of email messages discussing various spam operations, ICQ message logs and much more. Similarly, he found and published semi-nude pictures of woman and her colleagues and samples of erotic writing found on computer. Some might say that this woman deserved what happened to her. Perhaps she did. If content on site is true, she was involved in some particularly nasty activities. However, real message is just how vulnerable our computers can be to hackers if we aren't more than a little careful. This woman and her cohorts were running a professional spamming operation. You might think they, of all people, would have protected themselves against hackers. But they did not. Perhaps, like me, they thought they were protected. Remember that my computer was vulnerable in Finjan testing, despite running up-to-the minute virus software and a firewall that is rated as one of best. How about you? Could you stand up to a hacker attack? Protecting a computer is now a three- pronged fork. We need anti-virus software, firewalls and malicious code blocking software.

June Campbell Writing Services by Nightcats Multimedia Productions -- FREE eBook, "Beginner's Guide to Ecommerce" -- Newsletter, business articles, email marketing course -- How-to guides for business proposals, business plans, -- JV contracts, brochure designs http://www.nightcats.com
|