Marketing Tips 5

Written by Chuck and Sue DeFiore

Typical methods of advertising-newspapers, radio and television are effective if used properly, but there are other, less expensive ways to get your company's name out.

Local or cable television is an inexpensive alternative torepparttar traditional forms of advertising. Even if you have no experience advertising in this medium, there are companies who specialize in lending a helping hand. Even if finances are a concern (as they are for most of us), you'll be surprised to discover a 30 second spot television ad can cost as little as a few hundred dollars.

Many areas have public auctions on local stations that will advertise your product, if you donate up to a certain dollar amount. The number of advertising spots will depend on how much you donate.

Remember also to send press releases to your local television and radio stations. Many times they will come out and do a story on you, if it is of interest torepparttar 117673 public.

We volunteered to do resumes for people out of work and sent releases to allrepparttar 117674 radio and television stations. One ofrepparttar 117675 three major networks in our area, sent someone out to interview us, and we were onrepparttar 117676 6 and 11 o'clock news.

Help! There's an Intruder in my Computer

Written by June Campbell

Do you have passwords, love letters, naughty pictures or sensitive business information stored on your computer's hard drive? If you have a continuous Internet connection such as cable, xDSL, ISDN or other, you should know that it's almost embarrassingly easy for a hacker to break into a networked computer.

Once in, they can use your private information any way they see fit. As well as getting your personal documents,repparttar hacker can damage your system files or install software on your disk that allows your computer to be used in Denial of Service attacks and other destructive activities.

Similarly,repparttar 117672 hacker can activate your interior microphone or interior video recorder without your knowledge. This lets them record and distribute sound and video files ofrepparttar 117673 conversations and activities taking place in your work area.

How Hackers Do It Every Internet-connected computer has a unique set of identifying numbers called an IP address. Using special software applications, hackers send out probes overrepparttar 117674 Internet looking for live IP addresses. If they locate your computer, they look for "holes" or vulnerabilities that leave your system insecure.

For example, a computer is likely to have multiple applications (email, web browser, etc.) running onrepparttar 117675 same IP address. Each application is assigned a number called a "port" that uniquely identifies that service on a computer. Ports that allow an application to send or receive information fromrepparttar 117676 Net must be "open". In some unprotected systems, even ports that are not in use have been left open -- practically inviting attack! When hackers discover an unprotected, open port, they can use that opening to gain access to your system.

An unprotected broadband connection is easiest to hack because bothrepparttar 117677 connection andrepparttar 117678 IP address remain constant. If a hacker or a "script kiddie" finds your computer once, they can readily find it again. (Script kiddie is a derogatory name used by professional hackers to describe simple scripts used by young and inexperienced hackers).

The threat is less severe for persons connecting torepparttar 117679 Internet via dial-up modems. Dial-ups usually connect with a different IP address each log-on. Therefore, if hackers have found a system once,repparttar 117680 changing IP address will make it difficult (not impossible) to find it again.

However, if a trojan horse or back door program has been installed on a system,repparttar 117681 trojan horse could "phone home" withrepparttar 117682 IP address each time an Internet connection is made.

Back door programs allow remote users to control a system withoutrepparttar 117683 owner's knowledge. They are installed on computers by hackers, or sometimes come secretly bundled with software applications thatrepparttar 117684 user installs. Well-known back door programs for Windows computers include BackOriface, NetBus and SubSeven.

Firewalls: Your First Level of Security Firewalls are software applications or hardware devises that you install on your system. They are designed to prevent unauthorized access to or from a private network that is connected torepparttar 117685 Internet. When a firewall is installed, all incoming or outgoing messages pass throughrepparttar 117686 firewall. Those that do not meetrepparttar 117687 specified security criteria are blocked.

Most home firewalls are software applications.

How Firewalls Work There are various types of firewalls, and they work through different processes. However,repparttar 117688 following is true for most ofrepparttar 117689 home or personal firewall software that is used today.

Cont'd on page 2 ==> © 2005
Terms of Use