Saturday, April 19, 2008

Transparently Bridge two Networks

Remote networks can be easily bridged using WDS feature of MikroTik RouterOS™. We will show it for the case when the networks are connected through Atheros wireless interface. Using EoIP, this can be extended to any other type of interfaces, like PPTP and CISCO/Aironet. WDS works only on Prism and Atheros based cards.

Let us assume the following network setup:


Follow the steps below to create transparent bridge using WDS:

1. Create a bridge interface on AP and add ether1 interface to the bridge in WinBox

or in console

[admin@AP]> interface bridge add name=wds-bridge
[admin@AP]> interface bridge port add interface=ether1 bridge=wds-bridge


Do the same on the Station, and add ether1, wlan1 interfaces to the bridge in Winbox


or in console

[admin@Station]> interface bridge add name=wds-bridge
[admin@Station]> interface bridge port add interface=ether1 bridge=wds-bridge
[admin@Station]> interface bridge port add interface=wlan1 bridge=wds-bridge

2. Make sure you have communication between MikroTik routers, i.e., one router is configured as server (AP), the other one as client (station). Configure wireless interface wlan1 on AP in WinBox



or in conslole

[admin@AP]> interface wireless set wlan1 ssid=MikroTik frequency=5805 mode=bridge disabled=no

Do the same configuration on Client wireless interface (wlan1) in Winbox


or in console

[admin@Station] interface wireless set wlan1 mode=station-wds ssid=MikroTik disabled=no

3. Create wds interface on AP and add the interface to the bridge in WinBox


or in console

[admin@AP] interface wireless set wlan1 wds-mode=dynamic wds-default-bridge=wds-bridge

4. Check whether the WDS link is established in WinBox



or in console

[admin@AP] interface wireless wds> print
Flags: X - disabled, R - running, D - dynamic
0 RD name="wds1" mtu=1500 mac-address=00:0B:6B:30:B4:A4 arp=enabled
disable-running-check=yes master-interface=wlan1
wds-address=00:0B:6B:35:E5:5C


4. Add IP address on AP in WinBox



or in console

[admin@AP]> ip address add address=10.1.0.215/24 interface=wds-bridge

And on Station:

[admin@Station]> ip address add address=10.1.0.216/24 interface=wds-bridge

5. Test the bridge by pinging from 10.0.0.215 to 10.0.0.216. Note, that the bridge needs 10...30s to learn addresses and start passing through traffic.

NOTE: If not using NAT/MANGLE nor anything doing with conntrack, remember to turn of it at both link ends.

In the console:

[admin@xx]> ip firewall connection tracking set enabled=no

This will help you get the full bandwidth the wireless link can achive freeing the CPU load.

How WMM works

WMM works by dividing traffic into 4 access categories: background, best effort, video, voice. QoS policy (different handling of access categories) is applied on transmitted packets, therefore it is transmitting device is treating different packets differently - that is - e.g. AP does not have control over how clients are transmitting packets, and clients do not have control over how AP transmits packets.

Mikrotik AP and client classifies packets based on priority assigned to them, according to table (as per WMM spec): 1,2 - background 0,3 - best effort 4,5 - video 6,7 - voice

To be able to use multiple WMM access categories, not just best effort where all packets with default priority 0 go, priority must be set for those packets. By default all packets (incoming and locally generated) inside router have priority 0.

"Better" access category for packet does not necessarily mean that it will be sent over the air before all other packets with "worse" access category. WMM works by executing DCF method for medium access with different settings for each access category (EDCF), which basically means that "better" access category has higher probability of getting access to medium - WMM enabled station can be considered to be 4 stations, one per access category, and the ones with "better" access category use settings that make them more likely to get chance to transmit (by using shorter backoff timeouts) when all are contending for medium. Details can be studied in 802.11e and WMM specification


How to set priority

Priority of packets can be set using "set priority" action of ip firewall mangle rules and/or bridge firewall filter rules. Priority can be set to specific value or to "ingress priority". Ingress priority is priority value that was detected on incoming packet, if available. Currently there are 2 sources of ingress priority - priority in VLAN header and priority from WMM packets received over wireless interface. For all other packets ingress priority is 0.

Note that ingress priority value is not automatically copied to priority value, correct rule needs to be set up to do this!

So there are basically 2 ways to control/set priority (remember, that both require setting up correct rule(s)!): - assign priority with rules with particular matchers (protocol, addresses, etc), - set it from ingress priority.

This essentialy means that if it is not possible or wanted to classify packets by rules, configuration of network must be such that router can extract ingress priority from incoming frames. Remember there are currently 2 sources for this - VLAN tag in packets and received WMM packets.

Do not mix priority of queues with priority assigned to packets. Priorities of queues work separately and specify "importance" of queue and has meaning only within particular queue setup. Think of packet priority as of some kind of mark, that gets attached to packet by rules. Also take into account that this mark currently is only used for outgoing packets when going over WMM enabled link, and in case VLAN tagged packet is sent out (no matter if that packet is tagged locally or bridged).
Example

For example, in setup

PPPoE server -> WMM AP -> client,

if AP is just forwarding PPPoE traffic (therefore inspecting encapsulated IP packets to match e.g. by protocol is not possible, as packets can be encrypted and compressed), priority must come to AP from PPPoE server in VLAN tag, so you have to use VLAN (between PPPoE server and AP) for this, just to communicate priority information.

Note that you do not have to forward VLAN encapsulated traffic to client - VLAN can be terminated at AP, VLAN tag is needed only when entering AP.

In case AP is PPPoE server itself, there is no need to use VLAN - priority can be set by rules before it is encapsulated in PPPoE.


Priority from DSCP

Another way of setting priority is by using DSCP field in IP header, this can only be done by firewall mange rule "set priority" action. Note that DSCP in IP header can have values 0-63, but priority only 0-7. Effective priority after set from DSCP value will be 3 low bits of DSCP value which is the same as reminder of division by 8. So for example, priority from DSCP values 0,8,16,etc will be 0, from DSCP values 7,15,...,63 - 7.

Remember that DSCP can only be accessed on IP packets!

Note, that to use this feature, DSCP value in IP header should be set somewhere.

It is best to set DSCP value in IP header of packets on some border router (e.g. main router used for connection to internet), based on traffic type. E.g. set DSCP value for packets coming from internet belonging to sip connections to 7, and 0 for the rest. This way packets must be marked only at one place. Then all APs in network set packet priority from DSCP value with just one rule.

In setup:

- border router - - WMM AP - client

border router sets DSCP value for sip traffic, and WMM AP sets priority from DSCP value. Note that in this setup DSCP is set only for traffic _to_ client. Sometimes it can be useful to set also DSCP on traffic coming _from_ client (e.g. if 2 clients connected to different APs are talking between themselves) - this can be done on APs.


Combining priority setting and handling solutions

Complex networks and different situations can be handled by combining different approaches of carrying priority information to ensure QoS and optimize use of resources, based on "building blocks" described above. Several suggestions:

- the less number of filter rules in whole network, the better (faster) - try to classify packets only when necessary, prefer to do that on fast routers as most probably connection tracking will be required.

- use DSCP to carry priority information in IP packets forwarded in your network, this way you can use it when needed.

- use VLANs where necessary, as they also carry priority information, make sure ethernet bridges and switches in the way, if any, are not clearing priority information in VLAN tag. In MT bridges you have to setup bridge firewall rule to set priority from ingress priority for this!

- remember that QoS does not improve throughput of links, it just treats different packets differently, and also that WMM traffic over wireless link will discriminate regular traffic in the air.

Monday, April 7, 2008

IPSec VPN with Dynamic Routing / Mikrotik and Cisco

This example shows how to setup an IPSec VPN using dynamic routing protocol (RIP), it can be use also another protocol. In this exaple you can find setup between Mikrotik and Cisco routers, but it can be done also just between Mikrotik routers, but to be more colorfull I decided to use Mikrotik and Cisco. Below are the steps to complete the configuration of IPSec VPN with Dynamic Routing.


[edit] Mikrotik RouterOS

If you are using ROS v3.0 or above, be sure to check the end of this list to see a list of necessary mod.

First should configure a Tunnel Interface:

/ interface ipip
add name="Tunnel1" mtu=1480 local-address=10.10.1.100 remote-address=10.10.1.200 comment="" disabled=no

After that all interfaces are configured, than should asign IP addresses for interfaces:

/ ip address
add address=10.10.1.100/24 network=10.10.1.0 broadcast=10.10.1.255 interface=WAN comment="" disabled=no
add address=192.168.1.1/24 network=192.168.1.0 broadcast=192.168.1.255 interface=LAN comment="" disabled=no
add address=172.16.0.1/30 network=172.16.0.0 broadcast=192.168.0.3 interface=Tunnel1 comment="" disabled=no

Enable Routing in Mikrotik Router, in this case RIP:

/ routing rip
set redistribute-static=no redistribute-connected=no redistribute-ospf=no redistribute-bgp=no metric-static=1 \
metric-connected=1 metric-ospf=1 metric-bgp=1 update-timer=30s timeout-timer=3m garbage-timer=2m
/ routing rip interface
add interface=Tunnel1 receive=v2 send=v2 authentication=none authentication-key="" prefix-list-in="" prefix-list-out=""
/ routing rip neighbor
add address=172.16.0.2
/ routing rip network
add address=192.168.1.0/24
add address=172.16.0.0/30

IPSec setup, here should be defined the ipsec policy, peer and proposal. Make sure that policy should not have enabled option tunnel, in this case tunel should be set to NO, because it will be used the transport mode of IPSec not the tunnel mode:

/ ip ipsec proposal
add name="IPSec" auth-algorithms=md5 enc-algorithms=3des lifetime=30m lifebytes=0 pfs-group=modp1024 disabled=no
/ ip ipsec peer
add address=10.10.1.200 secret="ipsec" generate-policy=no exchange-mode=main send-initial-contact=yes \
proposal-check=obey hash-algorithm=md5 enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=0 disabled=no
/ ip ipsec policy
add src-address=10.10.1.100/32:any dst-address=10.10.1.200/32:any protocol=all action=encrypt level=require \
ipsec-protocols=esp tunnel=no sa-src-address=10.10.1.100 sa-dst-address=10.10.1.200 \
proposal=IPSec manual-sa=none dont-fragment=clear disabled=no

In V3.0 the bolded line will change on:

/ routing rip interface
add interface=Tunnel1 receive=v2 send=v2 authentication=none authentication-key="" in-prefix-list="" out-prefix-list=""
/ ip ipsec proposal
add name="IPSec" auth-algorithms=md5 enc-algorithms=3des lifetime=30m pfs-group=modp1024 disabled=no
/ ip ipsec peer
add address=10.10.1.200/32:500 secret="ipsec" generate-policy=no exchange-mode=main send-initial-contact=yes \
proposal-check=obey hash-algorithm=md5 enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=0 disabled=no


[edit] Cisco IOS

Cisco Interfaces and addresses:

FastEthernet 0/0
description *** WAN ***
ip address 10.10.1.200 255.255.255.0
crypto map vpn

FastEthernet 0/1
description *** LAN ***
ip address 192.168.2.1 255.255.255.0

Cisco Tunnel Interface:

interface Tunnel1
description **Cisco Peer**
ip address 172.16.0.2 255.255.255.252
no ip redirects
no ip unreachables
no ip proxy-arp
ip mtu 1480
ip rip v2-broadcast
ip tcp adjust-mss 1400
load-interval 30
tunnel source 10.10.1.200
tunnel destination 10.10.1.100
tunnel mode ipip
hold-queue 1024 in
hold-queue 1024 out

Routing in Cisco:

router rip
version 2
timers basic 30 60 90 90
redistribute connected metric 1 route-map connected-to-rip
redistribute static metric 5 route-map static-to-rip
network 172.16.0.2
network 192.168.2.0
distribute-list prefix LAN out
no auto-summary

Setup the prefix-list to match the Local subnet:

ip prefix-list LAN seq 10 permit 192.168.2.0/24

Setup route-maps to match interfaces to be advertised by RIP:

route-map connected-to-rip permit 10
match interface FastEthernet0/0
!
route-map static-to-rip permit 10
match ip address prefix-list LAN

IPSec and Crypto setup in Cisco, also here trasnport mode of IPSec should be setup:

!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp key ipsec address 0.0.0.0 0.0.0.0
!
crypto ipsec security-association idle-time 600
!
crypto ipsec transform-set vpn esp-3des esp-md5-hmac
mode transport
!
crypto map vpn 1 ipsec-isakmp
description **To Mikrotik Peer**
set peer 10.10.1.100
set transform-set vpn
set pfs group2
match address mikrotik_peer
!

Setup access-list to match the IPSec peer:

ip access-list extended mikrotik_peer
permit ipinip host 10.10.1.200 host 10.10.1.100

Type this in "enable" mode to view your routing table (after succesfull RIP update):

sh ip route

or

sh ip rip database

This example can be implemented also with another routing protocol like OSPF, and also very simply we can setup here a failover connection. Regarding the failover, the setup is very easy, all that we need is to create another set of tunnels via another ISP or gateway, but again the remote peer is the same router. Instead of the routing protocol for the second set of tunnels, it needs static routes to be configured, only that the static routes should have higher distance than the dynamic protocol. The idea is that, when the primary link will go down (dynamic routing distance=120) than the backup link becomes active (static routes distance=200), as soon as the primary link will come up, it will put the failover link in inactive mode.Titolo del collegamento

PPTPClient

PPtp Client / VPN

Now lets configure the remote client to connect to the above VPN

/interface pptp-client
add name="vpn-to-server" connect-to: 192.168.x.x user="user-1" password="********" allow=mschap1,mschap2

>print
Flags: X - disabled, R - running
0 X name="vpn-to-server" max-mtu=1460 max-mru=1460 connect-to=192.168.x.x
user="user-1" password="*******" profile=default-encryption
add-default-route=no allow=mschap1,mschap2
>enable 0

PPTPServer

A minimalistic HowTo for using a MT Router OS as PPTP-Server, based on 2.9.x. Use it on your own risk.

I prefer bridge-groups as they are always up and one can add physical interfaces later. The arp=proxy-arp is important.

N.B. 8 Oct 2007: "set gre disabled=no" is not active on RouterOS 3.0rc5

/ interface ethernet
set ether1 name="ether1"

/ interface bridge
add name="lan" arp=proxy-arp

/ interface bridge port
add interface=ether1 bridge=lan

/ ip address
add address=192.168.0.1/24 interface=lan

/ ip dns
allow-remote-requests=yes

/ ip firewall service-port
set gre disabled=no
set pptp disabled=no

/ ip pool
add name="pptp" ranges=192.168.0.200-192.168.0.229

/ ppp profile
add name="pptp-in" local-address=192.168.0.1 remote-address=pptp use-encryption=required only-one=yes change-tcp-mss=yes dns-server=192.168.0.1

/ interface pptp-server server
set enabled=yes max-mtu=1460 max-mru=1460 authentication=chap,mschap1,mschap2 default-profile=pptp-in

/ ppp secret
add name="user-1" service=pptp password="******" profile=pptp-in
add name="user-2" service=pptp password="******" profile=pptp-in

Tuesday, February 26, 2008

Securing your router

Set up packet filtering
All packets with destination to the router are processed against the ip firewall filter's input chain. Note, that the input chain does not affect packets which are being transferred through the router!

You can add following rules to the input chain under /ip firewall filter (just 'copy and paste' to the router using Terminal Console or configure the relevant arguments in WinBox):

/ ip firewall filter
add chain=input connection-state=established comment="Accept established connections"
add chain=input connection-state=related comment="Accept related connections"
add chain=input connection-state=invalid action=drop comment="Drop invalid connections"
add chain=input protocol=udp action=accept comment="UDP" disabled=no
add chain=input protocol=icmp limit=50/5s,2 comment="Allow limited pings"
add chain=input protocol=icmp action=drop comment="Drop excess pings"
add chain=input protocol=tcp dst-port=22 comment="SSH for secure shell"
add chain=input protocol=tcp dst-port=8291 comment="winbox"
# Edit these rules to reflect your actual IP addresses! #
add chain=input src-address=159.148.172.192/28 comment="From Mikrotikls network"
add chain=input src-address=10.0.0.0/8 comment="From our private LAN"
# End of Edit #
add chain=input action=log log-prefix="DROP INPUT" comment="Log everything else"
add chain=input action=drop comment="Drop everything else"

Use /ip firewall filter print input stats command to see how many packets have been processed against these rules. Use reset-counters-all command to reset the counters. Examine the system log file /log print to see the packets which have been dropped.

You may need to include additional rules to allow access from certain hosts, etc. Remember that firewall rules are processed in the order they appear on the list! After a rule matches the packet, no more rules are processed for it. After adding new rules, move them up using the move command.

Note, if you mis-configured the firewall and have locked yourselves out from the router, you may use MAC telnet from another router or workstation on the same LAN to connect to your router and correct the problem.

Saturday, January 26, 2008

14 Step Configuration of mikrotik using ADSL speedy internet

This articel i explain how to configuration mikrotik using pc for router.

1. Configuration position of ADSL connection
modem —Mikrotik—-Switch —– Client
|
Client

a. Modem IP –>> 192.168.1.1

b. Mikrotik Using 2 Interface - Ether1 —->> 192.168.1.2

- Ether2 —->> 192.168.0.254

c. Switch — Client ip 192.168.0.1-253

2. Configuration step router pc mikrotik

a. add ip address to interface 1

/ip address add interface=ether1 address = 192.168.1.1 netmask= 255.255.255.0

b. add ip address to interface2

/ip address add interface=ether2 address = 192.168.0.1 netmask= 255.255.255.0

c. to see input of interface

/interface print

d. Set Value name off interface

/inteface set 0 name=”Public” –>> For Modem
/inteface set 1 name=”Lan” –>> For Lan

e. set routing for net ( modem )

/ip route add gateway=192.168.0.1

f. set dns server ISP

/ip dns set primary-dns=203.130.193.74 secondary-dns=202.134.0.155

/ip dns set allow-remote-requests=yes

g. set of nat the router pc to sharing bw to lan

/ip firewall nat add chain=srcnat out-inteface=Public action=masquerade

Is Click Fraud Really a Problem?

Click fraud is currently a major topic in online advertising. Many argue that it presents a threat to the stability and viability of pay-per-click (PPC) advertising, the key revenue generator for both Google and Overture. In actuality, click fraud is not a significant issue at all.

Click fraud occurs when ads are clicked for reasons other than a genuine interest in learning more about the product or service advertised. Click fraud occurs in two forms. In one instance, fraud arises from competitors trying to sabotage each other. One competitor clicks on the ads of another just to drain the budget of that company. The other instance occurs when webmasters (or people associated with the webmaster) repeatedly click Google AdSense ads (which are syndications of others’ ads) on their own web pages in order to generate more revenue. While both Overture and Google have developed sophisticated technologies to detect click fraud, their systems are, and may never be, foolproof.

The real question is how much does click fraud actually damage the PPC industry? Gross fraud, i.e., when one person or technology consistently and repeatedly clicks on an ad, aside, which Overture and Google can easily detect, we believe that click fraud has no real impact on the industry. The following explains why.

Efficient market theory says that it is impossible to “beat a market” because prices already incorporate and reflect all relevant information. As the PPC industry has matured, efficiency has begun to take root. That is, the price of each keyword has been driven up to the point where it reflects the highest price an advertiser is willing to pay for a click.

For instance, a book retailer may pay $1.00 per click based on internal metrics. These metrics dictate, for example, that on average 30% of clickers purchase a book and the average profit per sale is $4.00. So, for every 100 clicks ($100 cost), they make 30 sales ($120 revenue) and generate a $20.00 (20%) profit. Note that years ago, the same retailer may have been able to pay only $0.50 per click, but as the market matured and more retailers began advertising, competitive bidding forced the price up to $1.00 where the highest return the most advertisers can make is 20%.

The key point is that click fraud is already taken into effect when advertisers select the highest amount they will bid. For instance, there is no difference whether an advertiser pays $0.83/click for 121 clicks with 21 being fraudulent, or $1.00/click for 100 clicks when there is absolutely no fraud. In either case, the advertiser pays $100 and generates a profit of $20, and Overture and/or Google make $100. What changes is the advertiser’s yield (e.g., the percent of clickers who purchased the book) which in turn effects their highest bid price. That is, with fraud, 30 out of 121 clickers (24.8%) purchased the book, and without fraud 30 out of 100 clickers (30%) purchased it. Without fraud, the bid price in an efficient market will rise from $0.83 to $1.00.

In summary, online advertisers must focus on analyzing and improving their internal metrics (e.g., conversions) and not worry about click fraud as it is already incorporated into keyword bid prices. Hopefully, the frivolous lawsuits and refund requests spawned by apparent click fraud will end as those in the industry recognize this undeniable fact.

Sunday, January 20, 2008

MikroTik RouterOS™

MikroTik RouterOS™ turns a standard PC computer into a powerful network router. Just add standard network PC interfaces to expand the router capabilities.

  • Remote control with easy real-time Windows application (WinBox)
  • Telnet/SSH/console/serial console control with RADIUS authentication
  • Advanced bandwidth control
  • Network firewall with packet-filtering, masquerading, network address translation, logging and connection monitoring
  • DHCP support
  • HotSpot gateway with RADIUS authentication
  • Ethernet 10/100/1000Mb/s
  • Wireless client and Access Point 2.4GHz 11Mb/s (IEEE802.11b), 5GHz 54Mb/s (IEEE802.11a) and 2.4GHz 54Mb/s (IEEE802.11g) with RADIUS authentication for AP
  • V.35 synchronous 8.448Mb/s with Sync-PPP, HDLC or Frame Relay
  • X.21 synchronous 8.448Mb/s with Sync-PPP, HDLC or Frame Relay
  • Async PPP (up to 128 ports) with RADIUS authetication for modem pools
  • E1/T1 support
  • IP Telephony Gateway
  • Built-in Web-proxy
  • And much more
  • Mikrotik Web Proxy Setting for Transparant proxy

    setting transparant web proxy server

    1. first se t web proxy
    / ip web-proxy
    set enabled=yes –>> to make ip web proxy enable
    set src-address=0.0.0.0 –>> to make source address to access web proxy will allow
    set port=8080 –>> to make port for web proxy
    set hostname=”proxy.war.net.id” –>> setting for visble hostname web proxy
    set transparent-proxy=yes –>> make transparant proxy enable
    set parent-proxy=0.0.0.0:0–>> if we used parent proxy x
    set cache-administrator=”support@somethink.org” –>> make set administrator info support
    set max-object-size=4096KiB –>> maximal object can cacth with the proxy server
    set cache-drive=system –>> where drive position that cache wil be saved
    set max-cache-size=unlimited –>> maximal harddrive we used for cache
    set max-ram-cache-size=unlimited –>> maximal ram we used for cache

    2. add nat for redirect port for squid to make transparant

    /ip firewall nat add chain=dstnat protocol=tcp dst-port=80 action=redirect to-ports=8080 –>> setting can redirect port 80 to 8080 for proxy server
    /ip firewall nat add chain=dstnat protocol=tcp dst-port=3128 action=redirect to-ports=8080 –>> setting can redirect port 3128 to 8080 for proxy server
    /ip firewall nat add chain=dstnat protocol=tcp dst-port=8080 action=redirect to-ports=8080 –>> setting can redirect port 8080 to 8080 for proxy server

    MikroTik Wireless Configuration

    Setup uses Safe Mode. It means that all changes that are made during setup
    are reverted in case of error, or if Ctrl-C is used to abort setup. To keep
    changes exit setup using the ‘x’ key.
    [Safe Mode taken]

    Choose options by pressing one of the letters in the left column, before
    dash. Pressing ‘x’ will exit current menu, pressing Enter key will select the
    entry that is marked by an ‘*’. You can abort setup at any time by pressing
    Ctrl-C.

    Entries marked by ‘+’ are already configured.
    Entries marked by ‘-’ cannot be used yet.
    Entries marked by ‘X’ cannot be used without installing additional packages.
    r - reset all router configuration
    + l - load interface driver
    + a - configure ip address and gateway
    d - setup dhcp client
    + s - setup dhcp server
    p - setup pppoe client
    t - setup pptp client
    * x - exit menu
    your choice:
    OR
    [admin@MikroTik] > ip address
    [admin@MikroTik] ip address> add address=192.168.1.1/24 interface=ether1
    [admin@MikroTik] ip address> pr
    # ADDRESS NETWORK BROADCAST INTERFACE
    0 192.168.1.1/24 192.168.1.0 192.168.1.255 ether1
    admin@MikroTik] ip address> /
    [admin@MikroTik] >
    [admin@MikroTik] >interface
    [admin@MikroTik] interface> pr
    Flags: X - disabled, D - dynamic, R - running
    # NAME TYPE RX-RATE TX-RATE MTU
    0 X ether1 ether 0 0 1500
    1 X wlan1 wlan 0 0 1500
    [admin@MikroTik] interface> enable 0
    [admin@MikroTik] interface> enable 1

    [admin@MikroTik] interface> pr
    Flags: X - disabled, D - dynamic, R - running
    # NAME TYPE RX-RATE TX-RATE MTU
    0 R ether1 ether 0 0 1500
    1 X wlan1 wlan 0 0 1500
    [admin@MikroTik] ip address>add address=172.1.2.1/30 interface=wlan1
    [admin@MikroTik] interface eoip>
    [admin@MikroTik] interface eoip>add name=eoip-tunnel1 remote-address=172.1.2.2 tunnel-id=1 disabled=no arp=enabled
    [admin@MikroTik] interface eoip>pr
    Flags: X - disabled, R - running
    0 R name=”eoip-tunnel1″ mtu=1500 mac-address=FE:FD:00:00:00:00 arp=enabled remote-address=172.1.2.2 tunnel-id=1
    [admin@MikroTik] interface eoip>..
    [admin@MikroTik] interface>
    [admin@MikroTik] interface> bridge
    [admin@MikroTik] interface bridge> add name=bridge1
    [admin@MikroTik] interface bridge>pr
    Flags: X - disabled, R - running
    0 R name=”bridge1″ mtu=1500 arp=enabled mac-address=00:00:00:00:00:0 forward-protocols=ip,arp,appletalk,ipx,ipv6,other stp=no priority=32768 ageing-time=5m forward-delay=15s garbage-collection-interval=4s hello-time=2s max-message-age=20s
    [admin@MikroTik] interface bridge>port
    [admin@MikroTik] interface bridge port>pr
    # INTERFACE BRIDGE PRIORITY PATH-COST
    0 ether1 none 128 10
    1 eoip-tunnel1 none 128 10
    2 wlan1 none 128 10
    [admin@MikroTik] interface bridge port>set eoip-tunnel1 bridge=bridge1
    [admin@MikroTik] interface bridge port>set ether1 bridge=bridge1
    [admin@MikroTik] interface bridge port>pr
    # INTERFACE BRIDGE PRIORITY PATH-COST
    0 ether1 bridge1 128 10
    1 eoip-tunnel1 bridge1 128 10
    3 wlan1 none 128 10
    [admin@MikroTik] interface bridge port>.. ..
    [admin@MikroTik] interface>wireless
    [admin@MikroTik] interface wireless>set wlan1 mode=bridge disable-running-check=no band=5ghz frequency=5180 ssid=test1
    Configurration For Mikrotik Station / Client
    [admin@MikroTik] interface eoip>add name=eoip-tunnel1 remote-address=172.1.2.1 tunnel-id=1 disabled=no arp=enabled
    [admin@MikroTik] interface wireless>set wlan1 mode=station disable-running-check=no band=5ghz frequency=5180 ssid=test1
    [admin@MikroTik] interface>pr
    Flags: X - disabled, D - dynamic, R - running
    # NAME TYPE RX-RATE TX-RATE MTU
    0 R ether1 ether 0 0 1500
    1 R bridge1 bridge 0 0 1500
    2 R eoip-tunnel1 eoip-tunnel 0 0 1500
    3 R wlan1 wlan 0 0 1500

    Can You Really Make Money From Blogging

    One of the questions I see frequently asked on online discussion forums is, "Can You Really Make Money From Blogging?" People want to know if there's some way to profit from the time they spend maintaining their weblogs or personal online journals.

    My answer is an emphatic "YES," because I do it... everyday!

    Today I'll share with you how I do it.

    Let me begin by saying that I don't make thousands per month from MOST of my blogs. However, I do have many making hundreds. Since I don't put in a lot of time maintaining them, and I enjoy blogging, I consider the money a bonus. I blog while sitting in my yard with my laptop (on a wireless connection)... watching the clouds roll by.

    Another bonus I get from blogging is that it helps my regular websites that are set up as my "money machines."

    The search engines visit my blogs more often than they visit my regular sites, and they follow the links from my blogs pointing to other sites. Some of these links point to my sites, and some point to sites of partners. This does help the search engine rankings of these sites MASSIVELY.

    How Do I Monetize My Blogs?

    I monetize my blogs by creating blogs on topics people are searching for... and that they are spending money on. I know which niches are hot to an extent based upon what my research proves pay-per-click advertisers are willing to spend their advertising dollars on.

    I run Google AdSense ads on my blogs. I simply insert these ads in my menu bar and other strategic places on the webpage. I also experiment with other paid advertising on my blogs.

    I sell affiliate products from my blogs. I simply find affiliate products at places like PayDotCom.com and Commission Junction. I incorporate these into my blogs. I do things like product reviews, how-to articles, etc. You can also locate suitable affiliate products by typing your target keywords + "affiliate program" at any major search engine. This should point out numerous websites with suitable affiliate programs to you.

    How Do I Setup/Host My Blogs?

    I have blog hosted on some of my own domains using Moveable Type. This is just one of many great pieces of blogging software. You have other choices... my programmer recommended this one to me.

    I also have blogs hosted for free on Blogger.com. I have them on Blogger.com because they are incredibly easy to set up and maintain. A secondary reason I have them on Blogger.com is that Google OWNS Blogger.com and they index webpages hosted on their servers OFTEN and FAST!

    The secret to getting Google and Yahoo! to visit your blogs often is a technique called "blogging and pinging." It's a method of notifying all of the major search engines, and blog directories, each time that you update your blog. The search engines come to take a look and they follow links from your blog to spider other blogs/sites. It's very powerful.

    I won't go into too much details on blogging and pinging here. If you want more information on that topic I invite you to drop by my free, Internet marketing discussion board and ask any and all questions! It's at:
    http://WillieCrawford.com/cgi-bin/index.cgi

    Examples Of Profitable Blogs?

    I know, you want to see examples of profitable blogs :-)

    To show you how simple it can be I'll show you just ONE. It’s less than 2 months old :-)

    The problem is that as soon as I show a site to anyone as an example, it's instantly ripped off. So, I'm going to "sacrifice" one making me about $60 per day from affiliate product sales and about $20 per day in AdSense revenue. That site is at:
    http://cure-nail-fungus.blogspot.com

    The above site currently ranks Number 6 on Yahoo for the term "cure nail fungus." It's a small niche but one that makes me $2400 per month... just from that one blog.

    If you searched on the same term at Google, this site is not very highly ranked. However, THIS page is Num ber4:
    http://www.chitterlings.com/no-more-nail-fungus.html

    That happens to be one of my pages too :-) I won't tell you what ALL I'm up to on that page... that's another article. The technique involves using your own domains to promote affiliate products rather than advertising someone else's domain... so it improves your link popularity.

    I'm not going to show more of my blogs because that just invites competition. Instead, I'm going to answer another question you have to be wondering...

    "How do I find time to maintain all of these blogs, even if they are profitable?"

    Well, first of all, I don't really need a lot like the "sacrificial lamb" that I showed you above to keep me satisfied.

    I do have a number of secret weapons though. One is called AutoBlogger. You can check it out at:
    http://WillieCrawford.com/auto-blogger.html

    What AutoBlogger does is allow me to queue up a number of posts for my various blogs in advance. It lets you queue up "articles" which can really be anything you want. Then you tell the software at what frequency to make a post.

    My AutoBlogger account allows me to automatically post to an UNLIMITED number of blogs.

    WARNING: A program like AutoBlogger can get you in trouble if you misuse it! If you use it to spam or abuse the search engines, it's just going to get you banned. If you use it to abuse the blog hosts, they're just going to delete your blogs.

    Here's how I use AutoBlogger:

    I have sites where I discuss Internet marketing... as just one example. On these sites I share many of my articles and tidbits. I simply queue up these articles/tidbits to post at a given frequency. This frequency can be a set number of hours, days, weeks, or months. So theoretically, I can set up a blog, pre-schedule 50 posts, and not touch it in months, while it is automatically posted to for the next 50 intervals.

    AutoBlogger even lets you set it to start rotating through the posts again when they run out, if you want to. I personally wouldn't do this since you'd just be posting duplicate content.

    AutoBlogger allows you to insert RSS feeds right into your blog posts. So in addition to posting articles you can also auto-update by adding new RSS feeds at a set interval. Since I HATE sending my traffic to other sites (without reciprocation), these RSS feeds generally pull from MY sites. That way, my traffic is only sent to my other sites.

    If you don't even feel like queuing up a lot of posts, you can go to a site like Elance.com and hire someone else to do it for you... or just hired your kids to do it for you. It can be as easy as you want to make it.

    OK, I've just proven to you that you can make money off of blogs. In-fact, you can make more money than many people make off of their REGULAR websites. It just takes a little thinking outside the box!

    It also takes not being too greedy. What I just showed you works for me because I'm not doing anything that's likely to get me banned from the search engines, Google AdSense, Blogger.com, or any affiliate program. It's only when you get carried away, and do things that harm the search engines that you "shoot yourself in the foot."

    Set up blogs providing useful content. Make regular posts to these blogs but not in a manner that seems unnatural. By that, I mean don't auto-post twenty times in an hour, or post every hour for a month! No human can possible post to a blog at these rates for long, so the search engines detect something is "wrong." They don't generally prohibit you from using tools to make your job easier... just don't get carried away!

    There are actually, thousands of people earning a living doing things similar to what I just shared... but with little twists. I'm meeting up with many of them in New Orleans in September. You're invited to join us. We'll basically be sharing how we make a fortune off of niche websites and programs such as Google AdSense.

    A Website Model That Makes Money

    I would like to share with you one simple stratergy in creating income with your own website. This is just one method out of simply millions that you could create for yourself. Remember the internet provides no limits. This is one example that does work for me, and may give you an insight into exactly a website model, that you may like to put into action for yourself. Affiliate marketing and/or sales of any kind on the internet, requires a real commitment, as I am sure you do already realize. The internet is really one of the greatest training grounds in the world for sales. You can try and fail many times, until you find that system and approach that will work for you. But the commitment that you show in meeting this challenge, will be a lesson that you will always remember. Success is always achieved in no matter what you do, through simple hard work. There is no easy path to success, but when you achieve the success you are after, there is no greater feeling. So lets begin. In this example my website, which for the purposes of this article i will call '????'. I will give you the exact profit breakdowns.

    With this website I treat all my affiliate products as purely residual income, much like adsense. Adsense itself generates for me, on this website, on average around $2 per day. I also use various other companies affiliate products, which generate around $200 per month. Also within the website, I sell e-book informational products, which I own the full resale rights for, which generate around $700 per month. And here lies the answer to making money online, no matter what you sell. The products, that generate the most income, are the ones that you will own yourself. Certainly I should be making more from the affiliate info products that I sell. But I lose commissions through simple affiliate url tampering. Commissions that are stolen or lost are a real pain. You can try every method in the book to protect your affiliate codes. But after all the hard work is done, you still lose that valuable income. The people who sell the original affiliate product know this, which is mostly why a high percentage of the sales price is offered to an affiliate to begin with. Because they realize that a very high ratio of sales made on their products will give them the total profit back. The reasons why people change affiliate product codes etc, could run into pages. Lets just say it is inevitable. This is the reason why I treat all my affiliate based products as purely residual income.

    But as you can see in this example clearly where the highest return on investment lies. And that is in the products that you actually own. You can purchase resale rights for info products easily, and it involves not much money at all, most products are available for under $50. Or if you have the time and patience to search the internet. You can find amazing e-books that have free resell rights and the information they contain is really valuable. You will find these types of treasures occasionally, and the lights will start flashing in your eyes when you do. The information that you have just discovered is of value and that is a real key to success. This is why I, at this point, strongly emphasize the importance of this one principle. Only sell products that you feel strongly about and you know that will be of great value to the person who may purchase it. That includes products you have bought the resale rights for, or a free product, you have discovered with resale rights.

    If you sell strong products with real informational value consistently you will always succeed. Your customers will return, quite simply because they know where the value of the information they seek is the greatest. And that is at your website. Always remember to put yourself into your visitors shoes. Ask yourself the question? Would you buy the products you are selling? Answer this question with a Yes. And you will be really on the start too online success.

    An Introduction To Selling on eBay for Profit

    t doesn't take a genius to make money on eBay, nor does it require you to have any specialized computer knowledge. You don't even need to be a skilled entrepreneur, because eBay does most of the work for you. With over 1.5 billion page views per month and more than 1000 categories, they bring customers TO YOU and save you enormous advertising costs.

    Your job, therefore, is to make a successful sales pitch to the customers who see your auctions, and doing that isn't as easy as you might think. You will be competing with more than two million other eBay sellers, many of whom are veterans at online marketing and highly knowledgeable in the niche markets found on Ebay. So how do you compete with them? The answer is simple: INFORMATION!

    This guide provides the information needed to get ahead on eBay and gives you an instant edge over your competitors. I will provide you with insider secrets on Ebay trading that I have learned from years of online auction sales. If you read this guide carefully, you will be armed with the knowledge necessary for an extremely lucrative home-based business selling virtually anything on eBay.

    ====eBay First Steps====

    This link forwards you directy to eBay's new user sign-up page: http://ebay-register.auctionresourcenetwork.net

    Step one: Enter all the information that is requested on that form then click submit. You will then be forwarded to a page where you get to pick your eBay user ID.

    Step Two: You will need a unique name when asked for a user ID. You might as well advertise your company name for your user ID. For example, Instead of "BobSellsoneBay99" it's best to use your company name, like, "Bobs-Metro-Camera" or something to that effect. I think you get the point. If you don't have a company name, just make one up!

    Step Three: Once that is done, you simply have to confirm your new eBay account by checking your email. Simply click on the "Confirmation" link within the confirmation email to confirm your new account. This step confirms your request to sign up to buy and sell on eBay.

    The next major step is to get set-up to send and receive payments. Becoming e-commerce enabled if you will. The good news is this is very easy with an eBay owned company called "PayPal." PayPal makes things very easy to send and/or receive money with a credit card, checking account, or your PayPal account balance. Sign-up is fast, free and easy. Just click the link below to be forwarded to PayPal's website: http://paypal.auctionresourcenetwork.net

    Congrats! You are now ready to begin buying and selling on eBay!

    Now lets start selling. First you will need to set up your eBay sellers account. Please take the time to read all the tutorials and "how to" links eBay provides: http://pages.ebay.com/help/basics/n-selling.html

    Once you have these initial steps completed, you are on your way to becoming a very successful eBay Power Seller!

    Aggressive Marketing

    If you get an email with a title like 'Don't Ever Trust Me Again!' and continues along the lines of '... then you don't have to take my advice ever again!'

    My advice is - Don't *


    Perhaps it's because I'm skeptical of the number of "miracle" products, "great deals", 'limited time offers' or 'incredible packages' that are advertised online every day. Perhaps it's because I have bought more products than I can possibly use for now. Perhaps it's because there are probably more people trying to sell this particular package than the number of packages that are available. Or, perhaps it's because I received an email with almost identical content from too many different sources. Whatever the reason, don't make the same mistakes as I have in the past.

    * It may be a good deal. It may be exactly what you are looking for. But if you receive emails with exactly the same content from different sources, think carefully before you buy. There are some good internet marketers that I have every respect for. However, there are an increasing number of 'marketers' that show little thought or consideration for others. They will take from you but offer nothing in return. You may disagree with the last statement. If you buy a product from them and you are happy with that product and they are happy with the money earned from selling you that product it's a win-win situation.

    That's all well and good until you look more closely at the process. To do this, other factors must be taken into account. These include cost, value, convenience, time, and most importantly trust. You've probably heard of the phrase. "The money is in the list". I wouldn't disagree with that and it's easy to see why many of the "big list" hitters are successful in the percentage game. But unless they offer you something more than somebody else's 'sales pitch' ignore them. Many of these people come and go. Make sure they don't go with your money.

    With regard to the email in question, here is a quote from a 'trusted' ezine that I subscribe to "This is only of interest to you, Bryan, if you really need some brand new products to sell. If not, don't bother." At least, this is honest and straight to the point. I know who I'd buy from. On occasion, time may be more important than trust. If this is the case, then make sure you have a use for the product before you buy it. We are all guilty of impulse buying. It can be all too easy to buy something that will seldom, if ever, be used.

    If you subscribe to an ezine or newsletter, it's often useful to keep tabs on the sender. By doing this you will learn to recognize if the content is original or simply a copy of someone else's work. You'll also quickly discover if the sender is only interested in using you as a means of earning a 'fast buck'. This is obvious if there is little or no content, excessive affiliate URLs, or emails that are repetitive or delivered more often than necessary.

    If you like the newsletter or email subscription, that's great. If you don't, you can usually 'unsubscribe'. If this fails, then try 'whitelist' filtering to weed it out. If you think the email is from a spammer, then be careful. Don't click on any URL or 'unsubscribe' option, and unless you are absolutely sure of the originator, never open an attachment.

    If you use eBay or PayPal, you will no doubt be aware of the fake or spoof emails that are periodically blasted out. Well, the spin cycle has begun again. A good tutorial on spoof emails and how to recognize them can be found at http://pages.ebay.com/education/spooftutorial/index.html

    Tip - If you have your own website, don't use your default address for your PayPal or eBay account. Use a different address and you will quickly spot the spoof email in the 'To' line of the email.

    Wednesday, January 16, 2008

    Make Money Quick With Google Adsense

    Do you want to make money quick? In this article we are going to
    talk about one of the quickest ways you can make money. Making
    money quick is not only possible there are people doing
    it everyday with Google Adsense.

    Google AdSense delivers text and image ads that match the
    content on your website. These are very targeted ads that you
    can choose the size and color of and they come across to your
    customer as helpful more than an ad itself.

    Google Ads require virtually no maintenance and they help you
    put advertising on your website without actually having to deal
    with advertisers yourself. If you can copy and paste a small
    code you can have targeted advertising on your website in
    minutes.

    Adsense is simple to join and it is free to join. Whether you
    are an internet newbie or a veteran you can profit quickly by
    placing Google Adsense ads on your web pages.

    Since Google does all of the work by finding the most profitable
    ads for your pages you can do what you do best....provide good
    content and lots of it. The more web pages you create the
    quicker you will be making money. You can learn more here:

    https://www.google.com/adsense/

    Once you have joined Google Adsense you will want to combine
    Google search with AdSense to monetize more of your web pages.
    You can do this by placing a Google search box on your pages.
    Google AdSense combines Google's search technology with
    thousands of keyword advertisers to deliver targeted text-based
    ads to search result pages. People find these ads useful and
    click on them, and when they do, Google pays you.

    You can see an example of how this works right here on this web
    page. In fact we combine Google search and Google Adsense on
    almost every website and web pages we create. We have found it a
    very easy way to make money quick and to make money over and
    over. It's great.

    The internet offers many ways to make money quick. The nice
    thing about Google Adsense is you have the largest search engine
    in the world doing your advertising for you. This truely allows
    you to make money quickly and you can do it over and over with
    as many products as you want.

    10 Great things NOT to do with Google AdSense

    There is no question that you can make some good money with Google AdSense, but you’re setting yourself up for disaster if you make any of these Top 10 mistakes!

    1. Do not use fake information when opening your Google AdSense account.

    Google says that’s a no-no and they will cut your account off and keep all the money you may have earned. Besides, trying to hide your true identity can cause serious problems with the I.R.S. or whoever your tax authority is.

    2. Do not hack or modify Google AdSense code other than to change the parameters that Google authorizes you to change.

    Any attempt to bypass Google’s built-in algorithms not only poses a danger to the integrity of the network, but it threatens the financial modle that Google operates under. You’re not dealing with some Mom-and-Pop company here, and Google has the legal muscle and deep enough pockets to drag you through every court in the land if you damage their business with your hacking antics.

    3. Keep AdSense ads off of your registration, confirmation, and all "thank you" pages.

    Don’t ask me why you can’t put your ads there. It makes sense to me that those would be wonderful locations. Google thinks otherwise, however, and doing so is a hanging offense according to their Terms of Service.

    4. Do not display AdSense ads and a competitor's ads (like Overture's) on the same page at the same time.

    That just makes plain good sense. Google doesn’t demand 100% SITE loyalty from you, but they do insist that their own ads not be cluttered up by offerings from their competitors.

    5. Don't "beg for clicks" or provide any incentive for clicking on your Google AdSense ads.

    This is a biggie and you see this rule violated all the time. Any of the “get paid to do stuff” sites that put Google ads in the member’s control panels are walking the plank and they don’t even realize it. Even those sites with the polite little messages asking you to “help keep my site running by clicking on our sponsor’s ads” are asking to be cut off if those happen to be Google ads.

    6. Never click on the ads running on your own site, even if you are genuinely interested in the product or service and are thinking of buying it!

    Nothing screams FRAUD louder than a webmaster running up his or her own click counts by happily clicking on ads fromtheir own site. The Google Gods can track this activity and it won’t be long until you find yourself getting a goodbye note from their fraud team.

    7. No misleading labeling

    Google is very specific about what text can be placed around their ads. Their Terms of Service state: “Publishers may not label the ads with text other than ‘sponsored links’ or ‘advertisements.’ This includes any text directly above our ads that could be confused with, or attempt to be associated with Google ads.”

    This is to keep visitors from becoming confused and barking up Google’s tree when they clicked on an ad that led to a porn site instead of the recipe site they were expecting to visit.

    8. Avoid keyword spamming and other divisive tricks

    You may be tempted to buy one of those “generates thousands of key-word rich pages in seconds” programs that are so popular these days but I’ll tell you this: Their days are numbered. Google is wise to such shenanigans and they will be hot on your trail. Other prohibited gimmicks include:

    • ”Sneaky” page redirects that send a visitor off to a different site then they were expecting to visit.

    • Multiple sites, domains, pages, etc. which have substantially duplicate content.

    • Hidden text or links of any type.

    • Excessive outbound links on any page. Google recommends no more than 100. I’d keep it way below that.

    • And here is a nugget of wisdom straight from Google’s mouth: “Do not participate in link schemes designed to increase your site's ranking or PageRank. In particular, avoid links to web spammers or "bad neighborhoods" on the web as your website may be affected adversely by those links.

    9. Don’t advertise anything on Google’s prohibited items list.

    It’s a lot shorter lists than PayPal’s or eBay’s, but it includes a lot of the same stuff like hacking/cracking content, porn, illegal drugs, gambling sites, beer or hard alcohol (I guess wine is OK), weapons, and the other usual stuff.

    10. And the 10th dumbest thing NOT to do with Google AdSense is to let the other nine things stop you from running an honest site that’s designed to make the most out of this very profitable opportunity that Google offers!

    6 Easy Ways to Increase your Adsense Revenue

    How much revenue do you generate from Google Adsense?

    Recently there has been a lot of discussion about people who earn over $10,000 a month just from Adsense. Furthermore, there are rumors of a few individuals who earn over $1 million a year just from using the power of Google advertisements.

    So what is Google Adsense and how can you use this program to earn a six-figure income?

    About two years ago, Google created this program to help websites to monetize their web-traffic.

    Here's how it works:

    Webmasters obtain a special code from Google which then displays targeted ads on their website. Whenever a visitor clicks on one of these ads, the webmaster earns a commission. Unlike other online businesses, there is no selling involved. All you need to do is get people to click on the ads.

    Although this is an excellent way to generate an income, many websites are not effectively maximizing their Adsense potential. As a result, they are leaving a lot of cash on the table.

    The question is how can you increase your Adsense revenue without increasing the number of web visitors?

    The key to earning an income with Google Adsense is to have your ads match the rest of the site, making them look like part of your content. Your focus is to avoid having the Adsense blocks look like blatant advertisements.

    The following are six ways that you can do this and increase your revenue at the same time:


    1) Find the right place- Most website visitors read content that is in the middle of a webpage. As a result, the best place to put your Adsense block is in the top part of the page, at the beginning of your web content. You want to weave the Google Ads into your web content to give the appearance that they are extra links which expand on the information of the page.

    2) Use the Large Rectangle-With Google Adsense, you have the option of picking different ad formats. Most of the time people opt to use the Leaderboard (728x90) or Wide Skyscraper (160x600) style ads. Unfortunately, this is the wrong choice, because both look like blatant advertisements. Instead smart webmasters have found that using the Large Rectangle (336x280) yields the best amount of click-thrus.

    3) Ditch the border- Many people experience a sharp increase in Adsense revenue when they changing their border. What they change is very simple…they get rid of the border on their Adsense blocks. This is another way to make the advertisements look like useful web content.

    4) Adapt the font- Whenever you write content, it should be the same font size and style as your Google Adsense block. This will help make it appear that the advertisements are a natural part of your website.

    5) Match the colors- In addition to changing the fonts, you also should match the colors of your website. For instance, if your content is written in black, and your hyperlinks are blue, then the Adsense blocks should also be the same color. Again, this helps the advertisements appear to be normal web content.

    6) Don't have too many distractions- On a webpage, it is important to give web visitor a limited number of options. By having too many links and graphics, the web visitor might go to a section that doesn't help increase your profits. While it is important to inform and entertain your web visitor, it is also vital that you monetize your site. So if the main focus of your site is to earn an income through Google Adsense, then get rid of all non-essential links and graphics.

    By taking the time to implement these six simple steps, you'll see a dramatic increase in the click-thru ratio of your ads. If added to all of the content of your site, your Adsense income will skyrocket!

    Google to Compete with PayPal?

    PayPal is secure in its domination over the electronic payment industry, at least for now.

    Following reports that Google planned to launch a new Internet payment service (nicknamed Google Wallet), Eric Schmidt, CEO of Google, denied that Google would be directly competing with PayPal. He did, however, acknowledge that Google has plans for some type of electronic payment service.

    Without revealing any details, Schmidt emphasized that the Google payment service will not offer the same sort of “person to person, store-valued payments system” as PayPal provides.

    The Internet commerce industry was rampant with rumours of the new Google service following an e-commerce conference hosted by securities firm Piper Jaffray. Speculation that Google Wallet would encroach on PayPal territory was reinforced by the appearance of a June 20th article in the Wall Street Journal which stated that Google was planning an online payment service to compete with PayPal.

    PayPal is a unit of eBay and generates almost 25% of total eBay revenue. It is used by consumers for making a wide variety of Internet purchases. It allows purchasers to use their credit cards without divulging their credit card numbers to merchants. PayPal takes a percentage of each transaction and had revenues of $233.1 million in the first quarter of this year.

    Most of Google’s revenue comes from online advertising and this expansion into online payments was seen by many in the industry as yet another example of the rivalry between the two companies.

    Google is a giant in Internet commerce with revenues of $3.2 billion last year. A payment service that competed directly with PayPal would be a serious blow to both PayPal and eBay.

    Google maintained silence about the rumours until Schmidt’s comments last Tuesday. Without elaborating, he stated that Google’s payment service would be an extension of its existing advertising programs.

    Google's own AdSense Tips

    Google is at least as interested as you are in having your ads perform well on your site. And they've gone to some work to provide the information you need to optimize your AdSense.

    What's fascinating to me is that apparently not everyone bothers to read their tips. And even some that do, fail to apply it.

    That said, you need to be aware that simply using their tips doesn't guarantee successful ads and decent CTR (Click Through Rate). How many times have you heard this? You have to test. You have to try alternatives and see what really works best for you, on your pages, with your content and your visitors. Test, test, test some more. Track your results, analyze them, try variations. Too many of us don't test. We hear the mantra, but we don't do the work.

    First, let's see if we can get an idea about location. (The graphic is included in the article on my site or you can take a look at it at the Google link included below) Generally, above the fold, at the top center of your content, below top navigation is the hottest location. Not immediately below which is good but not quite as hot. In a left sidebar, to the immediate left of primary content or below the primary content are also good. Most other locations are generally cooler.

    Again, you need to test and you need to consider your users behavior - and their behavior may vary on different pages with different kinds of content. Google suggests that in some cases, such as articles, the best location can be at the end of the article. To quote Google, "It's almost as if users finish reading and ask themselves, What can I do next?" Well targeted relevant ads right there can provide the answer.

    Don't blindly assume that sticking a nice big rectangle in the center above the fold will do it. It may, but depending on your content, it may annoy or inconvenience your users.

    Users tend to focus on content, navigation and to a lesser extent graphics. Positioning your ads near these elements will often work well -- if those ads are targeted to your visitors needs.

    The top three performers among the Google ad formats are the 336X280 large rectangle, the 300X250 inline rectangle and the 160X600 wide skyscraper. Google reports that the wider formats tend to do better than the taller ones. One reason may be that these are, perhaps, easier to read since they have fewer line breaks and require less eye movement. But, you need to use formats that fit your pages well. Once again, you need to test, but redoing your pages to suit a particular ad format may not be a reasonable alternative and you may discover that a different format actually gets better results.

    Now we come to color. Conventional wisdom says that colors which tend to blend into your content do better. Some go so far as to suggest that colors which make the ads look like part of the content are best. Personally, I think anybody really believes those ads are anything but ads, but who knows. Google suggests that you may find that colors that standout from your content do better - or maybe the opposite. This is absolutely an area where you need to test alternative color schemes. Going with the conventional wisdom usually works fairly well, but without testing you could be leaving a lot of money on the table.

    Google allows you to have up to three ad units and one link unit on your pages. If you have long pages with lots of text, can only use small ad units or are in a niche with a large ad inventory, multiple units can pay off. Keep in mind that the way ad serving works is that the higher value ads are delivered to the first ad unit block encountered in your code. Always make sure that this first ad unit is displayed in the best location (yeah - test). You want the higher paying ads to be in the prime hot location on your page. Weaker locations can get the lower priced ads. And if none are available, then nothing will display unless you've included an alternate ad URL in your Google code. To maximize monetization you should be including alternate ad URLs, especially if you are putting multiple units on a page. The use of an alternate ad URL also eliminates the possibility of being served PSAs (Public Service Announcements). It's your real estate, maximize your returns.

    Nothing here is secret. Except for using the alternate ad URL, all of this information is available from Google's Optimization Tips page - http://www.google.com/support/adsense/bin/static.py?page=tips.html . You can buy books and courses, visit a dozen forums and, in the end it comes down to what your visitors do on your site. The best you can get is general guidance. This means averaged outcomes over many sites, many types of content. If you are serious about doing whatever you can to really optimize your AdSense returns, there is only one thing to do - test. Whether it's AdSense, opt-ins, copy, headlines - anything with a measurable outcome that you can track - then the way to improve is to test and keep on testing.

    Blogging for Dollars

    Blogging for dollars might sound like the latest game show or some new drinking game, but it's the latest craze to hit the Internet. Bloggers began blogging for a number of reasons, but as the blog movement has increased in popularity, they have found ways to monetize their blogs and are seeing their commitment pay off.

    Whether a blogger's focus is to communicate with customers or just to have fun, they have begun looking at ways to earn revenue from their blogs. The most popular ways for bloggers to earn some added cash for their pet projects are:

    1. ) Google Adsense in Blogs
    Google AdSense allows webmasters to dynamically serve content-relevant advertisements in blogs. If the visitor clicks one of the AdSense ads served to the blog, the website owner is credited for the referral. Webmasters need only to insert a Google-generated java script into the blog or blog template. Google's spider parses the AdServing blog and serves ads that relate to the blog's content. Google uses a combination of keyword matching and context analysis to determine what ads should be served.

    2. ) Affiliate Programs (Product Endorsements)
    Affiliate Programs work when an affiliate web site receives income for generating sales, leads, or traffic to a merchant website. Generally, bloggers will mention or endorse specific products and if site visitors purchase the product, bloggers will receive a portion of the sale.

    3. ) Product Promotion
    Businesses use blogs to detail how specific features or product add-ons can increase functionality and save time. Content-rich product promotion will help with search engine placement.

    4.) Banner Ads
    While less popular than in the past, websites with high traffic levels can still earn decent revenue by selling banner space.

    As the Internet evolves bloggers will continue to seek out ways to monetize their opinions and thoughts. Daily journals and online blogs have become more than just a communication means to many.

    Affiliate Marketing vs. Google Adsense: Let the Battle Begin…

    Lately there has been a lot of discussion on how to make tons of money with Google Adsense. In fact, many people are making the claim that Adsense sites can earn a higher revenue then an affiliate-marketing site.

    So that brings us to an important question: Which is a better online business - Affiliate-Marketing sites or Google Adsense sites?

    Let's explore each one and then find out which online business is better option:


    Google Adsense

    How do you like the idea of earning m*ney without dealing with customers or answering emails. This is possible when you run a Google Adsense site. With Adsense sites, you can have a virtual passive-income that requires little maintaining. But is this the best option for an online business?

    Here are the positives of Google Adsense sites:

    · They are perfect for people who run information sites that have no related affiliate product

    · You can set it and leave it. With Google Adsense, you can create a content page, and there is little need to update the content.


    · Adsense sites are easy to scale. Since they require little upkeep, you can easily create multiple websites that each make a nice income.

    Here are the negatives of Google Adsense sites:

    · They are not a great long term solution. Instead of getting your visitors to subscribe to a mailing list, you are focusing on getting people to click on ads. Real online businesses concentrate on building assets that can use for long-term growth.

    · These sites are dependent on search engines. Most Google Adsense sites make the mistake of depending on search engines for the majority of their traffic. If the SE algorithms change then your income might drop significantly.



    Affiliate Marketing

    Being an affiliate marketer is great for those who want build a theme site. With this type of business, you can easily create web pages around a topic and get people to buy products through your products. If done correctly, you can easily build a loyal following that will help you make money for years to come.

    But can affiliate marketing make you more money then Google Adsense?

    Here are the positives of affiliate marketing:

    · A great advantage of affiliate-marketing is that you can build a long term business that will bring in a revenue stream for years.

    · With affiliate-marketers you need to focus on building an email list. This list is a major asset of your business. Every time you have an offer, you can go to your list and increase your profits..

    · Unlike Google Adsense sites, which only concentrates on high paying keywords, an affiliate marketing site can be centered on a topic that you have an interest in.


    Here are the negatives of affiliate marketing:

    · You have to learn how to write persuasively and get people to purchase the product that you are recommending. For many people this is a difficult skill to learn.

    · Each affiliate marketing site requires a lot of effort. You must spend a lot of time writing product reviews, building your email list and creating web content.


    So which is better: Affiliate marketing or Google Adsense?

    The answer is that both are great solutions for an online business. Instead of choosing one over the other, you should create websites that can take advantage of both.

    Here is how you can do this:


    1) Create a content site on a topic that you are interest in, while paying a good amount per Adsense click.

    2) Integrate your Adsense into the menu bars and the top of your web content.

    3) Add web pages for affiliate-products and your opt-in email list. But, make sure that you leave out the Adsense blocks on these pages. This way you are ensuring that you are building your long-term assets.

    4) Create optimized web page articles that focus on a specific keyword phrase. Place your Google Adsense in these blocks.

    5) Provide your email list with good content and product recommendations. Once in awhile, email your list and provide a link to some of your web articles. That way, you can earn a little bit of m*ney from your subscribers while giving them good content.

    By focusing on both affiliate products and Google Adsense, you will be building both short-term and long-term profits.

    Saturday, January 12, 2008

    How to get broadband

    Broadband Internet services have become more the norm today, unlike the dial-up days of the late 1990s. With greater amounts of information needing to travel at faster and faster speeds over the Internet and the greater number of telecommuters every year, the need for broadband Internet has stretched beyond the board room and into the home office. So it is clearly more important than ever for everyone to know how to get broadband.

    Getting broadband service, like, for example, DSL, is not difficult. There are many providers, and even many phone companies are getting into the game today as well. But finding a service provider, while not being very difficult, also requires a self-evaluation first. One must ask themselves before seeking out a broadband service provider, just what they’ll be needing broadband service for.

    For most people who work from home, they may only need reliable and speedy Internet access. They may need to transport documents, maybe some graphics to and from clients and employers. But they will likely not need to transmit video or graphics. But if they do need to transmit the latter, they may need to seek out higher bandwidth. But, again, if they are only sending documents that are not graphic intensive, a smaller bandwidth at a lower cost may be all they need, and then they can spend their savings on other aspects of their business or work.

    After doing this necessary self assessment when looking at how to get broadband, it is important to check pricing on at least three broadband providers. Also, ask users of these providers about their experience. All of these broadband providers may boast the same thing, but the people who use their services are the true indicator of how they really perform.

    After you match your needs with the best price and testimonial, the decision is yours whether you want to spring for a broadband provider. But chances are pretty good that even if you only spend a few dollars more a month for broadband, after awhile, you will wonder how you ever existed with dial-up service.

    Another thing some people must consider when looking into how to get broadband is whether you have providers in your area. In some rare instances, certain providers do not have the infrastructure in place to give you their service yet. So while you may be hearing the raves from a friend across town about a particular provider, you may still have to wait and see if their service is present in your area. This has been the case, particularly, for cable companies getting into broadband Internet services. As they expand their infrastructure, some sections of major metropolitan areas have had to wait longer to get their broadband.

    What is broadband?

    There are many different takes on how to actually define the word: broadband. The first and most obvious way to define it is a transmission medium that allows for multiple pathways and types of data, far exceeding simple voice communication devices. Simply, put it is the ability to access a variety of data through one connection at a reasonable speed.

    Where a phone line severely limits the amount of information it can transmit, a broadband line, which has bandwidth greater than 2 mbps, unlike a standard dial-up connection which will only have 56kbps, can allow for a variety of different frequencies and channels to travel down its wide pathway. This makes it optimal for those who play video games on the Internet or are involved in heavy graphics work that they need to import, send and receive along the information superhighway.

    The minimum width of a broadband line has become a matter of debate. While initially, the broadband definition was a line that was greater than 2 mbps in width, other experts began asserting that it should be at least 3 mbps wide. Still others complain that at least 20 would be appropriate. But now, broadband services start as low as 1 mbps, for those who are trying out broadband for the first time. So who really knows what the minimum level of bandwidth is needed in order for it to be called broadband? One thing is certain though. DSL service which an range from 256 kbps capacity on the downstream and upstream side up to 1.5mbps, or even higher, is considered a broadband service as well. So are cable television modems, which have similar speeds. So, in reality anything with greater capacity than a narrow line, like a telephone line, which can only hold up to 64 kbps, is technically considered a broadband service.

    Broadband services have become all the craze in the past few years. When the Internet started to become more mainstream in the 1990s people were content with simple dial-up Internet services, which used only narrow lines. But as the need for speed became important, especially as files and Web pages became more elaborate, requiring more computer storage space and memory, the need for larger bulks of information being able to be sent and received at a quicker pace became essential. Hence, we have the broadband revolution. Today, hardly anyone uses narrow band service, or dial-up. Broadband Internet access is the name of the game. And if you work in an office it is absolutely essential, as larger chunks of information are frequently sent to and from businesses on a regular basis. Simply put, if you don’t have broadband today, you are probably a person who does not need the Internet for a living. With the number of telecommuting jobs available today, the need for broadband services is only likely to expand greatly

    Working With Your People By Long Distance

    As you build a team for your network marketing opportunity, you will learn how big this world really is. Soon you will find out that working with people from far off lands can get expensive. At normal international long distance rates, a one hour telephone call can cost as much as $200 US. Today you will learn how to save up to 93% of your normal long distance phone bill.

    You can get better rates from your long distance provider when you enroll in an international calling plan of some sort. But the potential savings are nothing compared to the most efficient way to communicate personally over long distances.

    Please let me introduce you to the future of long distance communications, 'VoIP'. Voice over IP allows your voice to reach other countries using the internet. The result is clear, reliable connections with people in other countries around the world at a rate that is literally pennies per minute. Using VoIP can help you to keep costs down when you are just starting out. You will be able to work with your people by long distance often, without going broke.

    To illustrate the real savings you can expect by using VoIP services for your international business phone calls, here are the details of a call I recently made to Germany from the US:

    From: West Palm Beach, Florida USA
    To : near Berlin, Germany
    Call Length: 90 minutes
    Quality : Excellent
    Cost : $7US

    Using the international calling plan on my long distance service, this prime time (1pm local time) would have cost $120US. Using a VoIP service, the same call actually cost only $7US, a savings of 93%! This savings would be reflected on all long distance charges for every month of the year. This is a substantial savings for someone just starting out.

    There are many options for VoIP service and you will see more as time goes on. The popular instant messaging service ICQ has an option built in to make VoIP phone calls using a third party company, Net2Phone. Without using ICQ, the website Skype.com allows you to use VoIP at very low rates. As a Skype.com user, you can talk to other skype users at no charge using a PC to PC connection. This is a great tool for keeping in contact with your people, that will fit into a tight budget.

    For VoIP to work with high quality and reliability, it is best used with a broadband internet connection. With a DSL or cable/satellite connection you can expect phone company quality at only 7% of the cost.

    Frequent phone contact with your people will help keep turnover down and production up. Work with your people and teach them how to work with their people. It sure helps when you don't have to worry about how much the next international call will cost you, right? You bet.

    High Speed Internet Providers - How Do You Choose?

    If you work at home using the internet or are frequently on the internet checking out websites, then you will want to look into service from a high speed internet provider. There are several ways to connect to the internet in order that you receive this quicker service. You can look into DSL which is at least 5 times faster than dial up and runs through the phone line. Cable and satellite internet access are the other choices. After you choose which connection you are interested in, then you need to find the high speed internet provider that offers that particular service.

    DSL is a great option for people who live close to the central office where the DSL comes from. DSL is distance sensitive, which means that you need to be within three miles of the office of your high speed internet provider to receive the best connection. The best way to find out about DSL is to ask neighbors if they use it and if the do, ask if they are satisfied with it. DSL is always on, so you do not have to wait for it to connect to the internet. With better speed than the dial up method, this may be the right choice for you.

    Cable internet runs through your cable line and has amazing speed. Downloading is quick and easy and it is always on for your convenience. The only drawback to cable internet may be the high cost that these high speed internet providers charge. There may be package deals with your cable TV service or a reduced priced if you accept a slower access speed, so ask if there are any discounts that are available. Cable internet is a wonderful option for those users who are on the internet several times a day.

    Satellite internet may be the only option for consumers in rural and out of the way areas. Satellite internet uses satellites in outer space for internet connection. This is a faster option than dial up, but may be dependent upon the weather, although most consumers only have problems during major storms. Ask neighbors about their internet service and if they use satellite internet service. This is the best way to find out which high speed internet provider will work for you.

    High speed internet providers fill a vital need for internet users. The important thing to do is to research the provider group of your choice until you find a high speed internet provider that offers what you need for you and your family. Once you do this, then you sure to find the high speed internet service that is right for you!

    Building Cheap Computers in 3 Easy Steps

    Just a decade ago, the only people who put computers together were those individuals who possessed an extensive technical background. Advancements in technology have eliminated some of the complexities in how computers work. This change has resulted in average people who have a basic understanding of computers being able to build a system themselves. Whether you are interested in building computers to establish a new hobby or to start a business, you can so in only a few easy steps and on a shoestring budget.

    The first step in building cheap computers is to determine the route you want to use to build systems. You basically have three choices when considering building cheap computers: build a system from scratch, expand on a bare bones computer, or upgrade an existing system. Building a system from scratch can be a rewarding experience. However, it is not for everyone. If you are impatient or are intimidated by mechanical tools, you are better to choose one of the other two options.

    Regardless of the method you choose, you will follow three basic steps:

    1. Plan
    2. Assemble
    3. Test

    The planning phase of your project involves determining the specifications for the computer you want to build. Once you know this information you can start shopping for parts that meet those specifications. Your main considerations should be
    hard-disk, memory, and CPU (central processing unit). The harddrive is important because it determines how much information you are able to store on the computer. While you could build a computer with a harddrive smaller than 2 GB (gigabytes), it is not recommended.

    The harddrive and memory work together. The amount of memory you place in your computer will directly affect how the system is able to complete the different processes that you request when using the system. If you have no idea what size hard-drive and the amount of memory you need, you should consider the type of operating system you intend to load on the system. You can consult the manufacturer of your hard-drive or review the information on Cheap-Computer-Guy.com, which features a list of minimum harddrive and memory requirements for various operating systems, and use this information as a guide.

    The equipment presented in this article includes the basics of a computer system. Of course, nowadays people want far more than the basics and you undoubtedly feel the same way. There are optional components available that you may want to add to your systems, which include CD or DVD drives, a modem or other communication component for Internet connectivity, or a video graphics card.

    Once you have decided on the specifications of the computer you want to build, you are ready to assemble the system. In addition to detailed information about the parts you will need to build your computer, cheap-computer-guy.com includes step-by-step instructions for assembling a cheap do-it-yourself computer.

    When you have finished assembling the computer, you will then need to test to make sure that the system boots and that all components are functioning properly. Once you have completed all these tests you will have built your own cheap computer.

    Access Your PC From The Road

    Have you ever sat in front of your computer and wished you could show someone else what appeared on your screen?

    Maybe you were experiencing a problem, or couldn't figure out how to make something work, but you knew if someone else could see what was happening on your screen, they could help you fix the problem immediately.

    Ever had a phone conversation with someone about a particular business topic, but you just couldn't "connect" with your ideas because it was too hard to explain over the phone?

    Now, visualize jumping on the phone with that same person and literally sharing your computer's desktop to collaborate, discuss, and create virtually anything together, even if you are separated by thousands of miles.

    Though this may sound like an episode of Star Trek, remote computer sharing is actually a daily business reality.

    Imagine you need to take a trip and you either don't want to or can't take your computer.

    The thought of emails piling up for days makes you crazy and you also need to monitor some things on your pc.

    Instead of trying to lug your laptop (or fit your desktop into your suitcase), you can use "remote desktop" software that allows you to access your computer through the Internet from any other computer in the world.

    One of the most common remote desktop services is GoToMyPC.com, which provides a safe and secure way for you to go down to the local internet café, log on, and access your office or home computer just like sitting at your own desk.

    Now, before you panic and think anyone can access your computer, let me explain security.

    First, you log in to the GoToMyPC.com website with a username and password.

    Once logged in, you then click a link to log onto your PC, which will then ask you for another password.

    GoToMyPC.com has even thought of a solution for those of you worried about people looking over your shoulder as you enter your passwords on a pub-2403258503801684lic computer or if the computer you use might carry a keystroke logger.

    Before leaving home, you can program in a series of up to 99 passwords that only work one time.

    This means even if someone watches you log into your computer or records your keystrokes, the password you used won't work again.

    If a would-be thief tries to access your computer too many times, GoToMyPC.com will shut down all access attempts to your PC.

    The benefits of remotely accessing your PC from the road are numerous, but the bottom line is that it enables you to use your computer from the road like you never left home.

    For example: while traveling to a conference this weekend, my wife (and business partner) accessed our office computer from my laptop and, instead of the usual pile of 4,000 emails that would normally await after 5 days away, we just picked up this morning like we'd never been gone.

    The same company that offers GoToMyPC.com also offers a service called GoToMeeting.com which allows you to remotely host a meeting where multiple users can share and collaborate on a single computer desktop.

    This service makes it super simple to provide online training, do software demos, and even make complete sales presentations.

    I personally use both of these services and find them easy, reliable and well worth the price.

    Thursday, January 10, 2008

    Traditional Antivirus Programs Useless Against New Unidentified Viruses!

    Most traditional antivirus programs rely on their database. Potentially hazardous files are matched against the database to see whether they are to be considered safe or not. Since a new virus can spread world wide within a few hours it can cause severe damage to your computer long before the manufacturer of the antivirus program identifies the virus and updates the database. You also need to go online to import the manufacturers' database to you antivirus program, which means that your computer will be online totally unprotected. The new Panda Titanium Active Scan Anti Virus 2005 however, contains TruPrevent Technologies: a new system designed to protect your computer against unknown viruses and intruders. Every now and then you can read about a new virus and the damage it causes. The millions of viruses cost companies each time they strike. It is however not only companies that are suffering from the damages caused by viruses. A virus can be just as damaging if not more for a private Internet user by destroying important documents, family pictures and everything else you keep on your computer. Therefore should no home computer be without a good virus protection software. This way you can protect your computer and yourself from losing data, corrupted hard drives and a number of other problems. There are several anti virus programs available of which some are free and some are not. You should however always remember that you might get what you paying for, meaning that the service and the updates might be better for the paid alternatives and thereby protect your computer better. When using a virus program you should try to find one that is fast, reliable and able to discover as many viruses as possible. Whether it is fast or not might seem unimportant if you don't use your computer that much, but you will find that an anti virus program that scans your computer faster will be used more frequently and thereby giving you a better protection. If an anti virus program should be effective when protecting your computer it needs to be able to recognise all viruses, and since new viruses are constantly created this means that the database for the program has to be constantly updated. You should therefore consider how often the different anti virus programs update their databases when choosing which antivirus program to get. You should always make sure to keep your virus program up-to-date. One of the best anti virus programs on the market today is Panda Active Scan Anti Virus Software Online which has an unrivalled capacity for detecting viruses and other threats online which is the most common path for viruses to reach our computer. Almost all viruses today are spread through the Internet. Panda Titanium Active Scan Anti Virus 2005 is easy to install and once it is installed it finds and remove viruses automatically. Panda Titanium Active Scan Anti Virus 2005 also automatically updates itself if you want it to. In other words: Panda Anti Virus is an anti virus program that manages itself and makes sure that it is up to date and able to keep your computer safe from viruses. Panda Titanium Active Scan Anti Virus 2005 scans your entire computer, including the program itself, to make sure that a virus can't infect any part of the computer. Panda Titanium Active Scan Anti Virus 2005 doesn't just search for virus, it also search your computer for a number of other security risks like spy wares and Trojans. Panda Titanium Active Scan Anti Virus 2005 contains TruPrevent Technologies. TruPrevent Technologies is a system designed to help Panda Anti Virus protect your computer against unknown viruses and intruders. The user can choose whether they want to use TruPrevent Technologies or not. The technology has been implemented to allow Panda Anti Virus to protect your computer against new virus since a new virus can spread world wide within a few hours. The TruPrevent Technologies allows Panda Anti Virus to detect and block viruses even if they are not yet included in the virus database. This allows Panda Titanium Active Scan Anti Virus 2005 to keep your computer safe against all viruses and not only the ones that are already identified, since you might encounter a new virus despite the fact that Panda updates their database at least once a day. Old anti virus programs - and most of the modern anti virus programs as well - can only protect you against already identified viruses. The ability to protect against unknown viruses is what Panda Titanium Active Scan Anti Virus 2005 a superior choice for an anti virus program. Panda Titanium Active Scan Anti Virus 2005 does not only offer superior security and very user friendly functionality. It also comes with tech support where experts answer any questions that might arise. All personal computers should have virus protection since you otherwise risk losing important document, family pictures etcetera and if you are looking for user friendliness and a superior security Panda Titanium Active Scan Anti Virus 2005 is your best choice. You can get panda antivirus at support cave.

    Three Basic Types Of Computer Mouse

    Mechanical: This type of computer mouse has a rubber or metal ball on its underside and it can roll in every direction. Sensors within the mouse, which are mechanical, detect the direction in which the ball is moving and moves the pointer on the screen in the same direction. A mouse pad should be used under the mouse to run on. Optomechanical: This type is the same as the mechanical mouse except that it uses optical sensors to the motion of the ball. A mouse pad should be used under the mouse to run on. Optical: This type uses a laser for detecting the mouse's movement. You don't need a mouse pad but you can use one made for optical mice. Optical mice do not have any mechanical moving parts. This type responds more quickly and precisely than the mechanical and optomechanical mice and now that they have been around awhile the price is pretty comparable. How does a computer mouse hook up to the computer? Serial mouse: these ones connect directly to an RS-232C serial port or a PS/2port. This is the simplest type of connection. PS/2 mouse: connects to a PS/2 port. USB mice Cordless mouse: These are not physically connected to the computer. They rely on infrared or radio waves to communicate with the computer. Cordless are more expensive than both the serial and bus mouse. The nice thing is that there is no cord to constrain or get in your way.

    Why Use Anonymous Proxy Servers?

    With expansion of internet, many websites promote themselves by sending you spam junk mails, advertisings and even spy wares. These things not only pub-2403258503801684licize your personal information, but also enable hackers and crackers to infiltrate your system. Anonymous proxy servers act as a wall between your data and internet, thereby providing security to your system and data. Before we move on to the deeper concept of anonymous proxy servers, let us understand the concept of a proxy server. A proxy server acts as a buffer between your system and the internet resources you are trying to access. The proxy servers gather and store files which are commonly requested by internet users in a unique database known as cache. These proxy servers increase the speed of your browsing by providing you immediate information from their cache. The overall performance of internet becomes very high. However these proxy servers do not hide your Internet Protocol (I.P) address. The anonymous proxy servers are the proxy servers which hide your I.P address thereby securing you from the susceptibilities attached to it. By hiding your I.P address these anonymous proxy servers secure you from any unauthorized or illegitimate access to your computer. These servers completely hide the details of your activities on the internet. Besides that, they even hide the fact that you are using a proxy server. These servers can be used for almost all web related purposes like, chatting, file transfer, emails and much more. With exorbitant expansion of internet, its risks have also evolved. One of the major risks which you face while surfing the net is viruses. Another major risk you face during the browsing is lack of privacy. As you access different web resources, these resources gather your personal information through your unique Internet Protocol Address. These resources spy upon your browsing habits and can even inhibit you from accessing information from the net. You even become an easy target for various advertising agencies and marketers. These gather information about your I.P address, your email and your surfing interests on the net. Then they send their junk emails and spam on to your system and your email addresses. Without an anonymous proxy server a website can even utilize security loops in your system with the help of hacking programs. These programs can make your system hang, make it perform in a bizarre manner and can even access and modify the content on your hard disk. They just need to gain your I.P address and it’s all done. Anonymous proxy servers help you in a great way by hiding your I.P address and protecting you from all these threats. Anonymous proxy servers hinder every chance of leak and misuse of your I.P address. After you have discovered the benefits of having an anonymous proxy server, you would probably like to buy it. You can download or buy it from the internet. There are numerous sites, which provide you with the best variety of anonymous proxy servers available on internet. You can view the detailed features of various servers and even compare prices. Next you can place your order, and it would be delivered to you. Enjoy the experience of complete risk free surfing through anonymous proxy servers.