Grab Those Emails! – 11 Key Ways to Get Your Visitors to Hand Over Their Email AddressesWritten by Leah West
If you are trying to get an opt-in email list going for you website, you might be wondering where to start. The most important rule to understand is that you must persuade your website visitors to let you have their, oftentimes guarded and protected, email addresses.Remember, a lot of people surfing web these days are pretty internet savvy. They are aware of spam, hate spam and do not want spam in their inbox… ever. If they do not feel they are getting something out of joining your email list then they will leave your site without leaving you their info. Don’t let this happen to you! Follow these 11 steps and emails will start rolling in. 1. Have your visitors sign up to receive your free newsletter. Offer articles, tips and advice on chosen topic. 2. Have them sign-up to get access to download a free ebook. The subject of ebook should be relevant to your target audience. Write an ebook or find one at an online ebook directory that you can give away. 3. You can give your visitors a free membership inside your member's only website. Give them their username and password via email. 4. Hold a free contest or sweepstakes. All they have to do is sign up to be entered. 5. Offer your visitors free consulting services or price quotes. Provide a form where they can ask you questions and submit their information.
| | Sending anonymous emailWritten by eblivion
Whatever you do with following information is solely your responsibility. #telnet ip:25 That title looks like random letters and symbols, but it is actually command used to connect to an SMTP server via telnet. The # represents shell, “telnet” is program used to start a connection via telnet, “ip” is ip address of mail/smtp server (an SMTP server comes with XP PRO and is easy to set up), and 25 is port SMTP daemons run on. First of all, newer Windows command shells are not truly DOS, and telnet command is a little different. Namely, you will replace colon between ip and port with a space. I don’t know why this was changed but there is nothing to be done about it so you just have to live with it. The colon is used, however, in almost all other operating systems, such as BSD, Linux, and probably Mac (I don’t own a Mac). When you connect, you will know right away what daemon server is running. A daemon is a program that deals with all incoming connections and data on a specific port. The most common SMTP daemon is Sendmail (for Linux and maybe cygwin). Don’t expect to find this on too many big websites (ie Yahoo, Microsoft.com, etc), I would think they would know better. But on many websites this daemon is still being used. This tutorial will cover just fake mail sending. You will not learn how to take down any mail servers, because it is generally irresponsible to take down mail servers, and only practical application is testing security of your own server (if you really want to know how, use Google). That being said, you could potentially cause havoc with fake mail as well, but playing field is more even considering everyone is equally at risk (not just those with outdated software on their servers), and unless you are smarter than average kill-random-computers-with-winnuke person then most harm you can do is anonymously insult people.
|