The New Money ...
Courtesy of RealEstateTechOnline.com your real
|
Thursday, October 11, 2007
Wednesday, September 19, 2007
Mastering Vista
Cool Things That You Can Do With Microsoft Vista
|
Thursday, August 30, 2007
The bots store the email in databases. They will be catagorized whenever possible. For instance, if your email address is on a web page containing words like: REALTOR®, Real Estate, New Homes, MLS, etc ... then guess what, your email will be "profiled". Then the mailing list companies then charge a premium to send spam to all real estate emails, or medical, or lawyers or people that like sailing, or whatever. They only charge a few hundred bucks per hundred thousand emails, so there is no shortage of companies willing to use the mailing list's services ... As a real estate professional, your email address is considered prime. Thousands of companies what to sell you something, hence the massive amounts of spam you receive every day.
This is of course in addition to the companies that will send billions of emails to everybody. Oh, yes, you get included in those too. Viagra, All-natural Breast Enhancements, Nigerian 419's, Stock Tips, Phishing Scams, all of it. Phooey.
Why am I telling you this? Perhaps, it's because I like you. No? Ok, maybe because I receive somewhere in the neighborhood of 1,500 emails A DAY! Perhaps I just dislike the spammers. All of the above, I suppose.
If I had a dollar (used to be a nickel, but have you seen gas prices lately?) for every person that asked me what they could do about spam, I could buy that small country I've always wanted.
Well, there are a few things:
- Don't enter contests (just go ahead and fill out that card with your email addy and drop it in that shiny new car that you can win in the middle of your local mall, I dare you. How do you suppose they pay for those?)
- Be careful what companies you give your email address to, especially online, if you are buying something or for some reason you need to, have a spare address (check out hotmail.com) and use that.
- Use MS Outlook 2003. It has excellent filters.
I have had "issues" with products from Norton, McAfee and other so called "spam filters" and do not recommend them, however, that's my opinion, you are free to do as you wish.
I have however found a pretty cool utility. When somebody sends you an email, it replies and asks for verification. If verified, the email is forwarded. I am not totally sold on it, but you may want to give it a try. It is called, SpamArrest and you can find it here.
If you do, please let me know what you think of it. Good luck and I wish you a spam-free day.
Tuesday, August 28, 2007
A few words on link popularity
Now, for those of you that do not know what I am talking about; Link Popularity is the term used to describe the technique search engines use to determine website rankings. It is a count of how many websites link TO a particular website. The logic here is simple. If a lot of websites link to whatever.com, then whatever.com must be an important website, and therefore, should be ranked accordingly.
One of the respondants remarked that Link Popularity was the magic bullet and was the best, and fastest way to increase site ranking.
No truer words have been spoken. HOWEVER, there are some things you should be aware of:
1.) Google considers the ranking of the site linking to you. If CNN.com links to you it carries more weight then if someobscurerealtylinksite.com links to you.
2.) If the number of links (in comparison to other content) is too high Google tags the site as a "Link Farm". Having a link to your site on a "Link Farm" will actually DECREASE your ranking.
3.) Multiple links from one site may be considered as one link. It is possible, if the content is original enough between pages that it may be more. I am not 100% on this and it seems to change.
4.) Self links don't seem to count.
5.) Links from other domains that you own are devalued. For instance, if you have more then one domain and you link one domain to the other, it doesn't get as much credit.
6.) No matter what is said, it may change next week at Google's discretion.
7.) Your best bet is to make the site as unique and informative as you can.
Link Popularity is a huge factor in determining link popularity, but the word from Google itself is, just make a good site. That is the quickest way to the top.
You can see how many sites link to your website by visiting this link RealEstateTechOnline.com Link Popularity
Good luck!
Tuesday, August 21, 2007
Choosing a Web Designer
You website will be an extension of your image online. Therefore, it is imperative to find the right developer.
First, there are a few things that you should consider.
1.) Your budget. Know what it is before you begin to negotiate.
2.) What you want. make sure you have a concrete idea regarding what you are looking for. With that said, if you want the moon and the stars, be willing to pay for them. Building a website is a time consuming venture and a good designer will want to be paid a fair price.
3.) Content. What do you want your site to say. The more the better. It is up to you to write this. Do not make your designer do it. While they may be articulate and be able to write good copy, they are not you. After all, isn't it your online personna?
4.) If you have a shoestring budget, then consider a template. Template Monster is a good place to start. Their templates are priced fair and more importanly, they are retired after 10 downloads. This way you can be assured your site is relatively original. The have hundreds of real estate sites to choose from.
If you do go with a template, I still recommend having a professional customize it. With that said, the bar isn't so high and a good pro-am (professional/amatuer) designer should be able to pull it off.
*I should say I am an Monster Template affiliate.
5.) Time. The more time you can devote to upkeep and new content the better. You will only get as much out of your site as you are willing to put into it.
6.) Marketing. I have written a couple of articles re: real estate marketing. You can see them here; Marketing Part One, Marketing Part Two
Well folks, that is all I have time for today. Good luck choosing your designer.
Tuesday, October 24, 2006
Keepin' it safe...
So to revisit my last post, there are three basic threats that you should be concerned with...
- Viruses (Self replicating malicious programs)
- Spyware/Adware (Software that has been surrupticiously installed on your machine that will do a number of things including: moniter your surfing habits, record keystrokes, initate multiple pop-up ads, etc...)
- Hackers (The folks that spend most of their waking hours trying to get into your machine.)
Remember the motivation for most of these threats has become financial gain. It used to be notoriety or even pranksters, but now it is a multi-billion dollar business. Spammers need machines to send out their garbage and are willing to pay .15-.18 cents a month per machine... This means YOU. Ever wonder why all of a sudden your machine is running like molasses? Well its probably because you are sending thousands of emails an hour unknowingly.
ANYWAY...
You need three essential things to protect yourself...
- A good anti-spyware program. Microsoft Windows Defender is what I use. It is also free... Typically, I do not recommend beta versions to end users, BUT I have used this for quite some time and have found it to be both comprehensive and bugfree...
- A Router. Erroneously called a hardware firewall, it uses a technology known as network address translation. I will spare you the techie details and tell you simply this, it makes your computer much harder to hack. Better still is an actual hardware firewall. I recommend the Zyxel P1
Well, that won't make you bulletproof, but it is a good start...
Keepin' it safe...
So to revisit my last post, there are three basic threats that you should be concerned with...
- Viruses (Self replicating malicious programs)
- Spyware/Adware (Software that has been surrupticiously installed on your machine that will do a number of things including: moniter your surfing habits, record keystrokes, initate multiple pop-up ads, etc...)
- Hackers (The folks that spend most of their waking hours trying to get into your machine.)
Remember the motivation for most of these threats has become financial gain. It used to be notoriety or even pranksters, but now it is a multi-billion dollar business. Spammers need machines to send out their garbage and are willing to pay .15-.18 cents a month per machine... This means YOU. Ever wonder why all of a sudden your machine is running like molasses? Well its probably because you are sending thousands of emails an hour unknowingly.
ANYWAY...
You need three essential things to protect yourself...
- A good anti-spyware program. Microsoft Windows Defender is what I use. It is also free... Typically, I do not recommend beta versions to end users, BUT I have used this for quite some time and have found it to be both comprehensive and bugfree...
- A Router. Erroneously called a hardware firewall, it uses a technology known as network address translation. I will spare you the techie details and tell you simply this, it makes your computer much harder to hack. Better still is an actual hardware firewall. I recommend the Zyxel P1
Well, that won't make you bulletproof, but it is a good start...
Monday, October 23, 2006
- Viruses -is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user (as defined by Wikipedia). Many people mistake other kinds of threats as viruses, however, spyware and other malware, may act very differently. Click this link for a complete definition http://en.wikipedia.org/wiki/Computer_virus
- SpyWare -Wikipedia states:" a broad category of malicious software designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user. While the term taken literally suggests software that surreptitiously monitors the user, it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party." Often spyware is installed via virus, but it is not limited to that mode of installation.
- Root Kits -This particularly nasty form of Malware actually alters the root of the operating system to render the unwanted user invisible. In laymans terms, it makes the hacker and his tools invisible to Windows. Therefore you (and your antivirus protection) can't see them at all. More on this later
- Hackers -These guys are the guys that "hack". There are good guys known as White Hat Hackers and Bad Guy Hackers, known as Black Hat Hackers. This bears some further explanation.White Hats also known as "Ethical Hackers" are generally the folks that secure networks. The will also attempt to break into networks to expose security flaws for the perpose of evaluation and remediation. Black Hats These are the guys that most people think of when they hear of "hackers". They spend their time trying to maliciously break into networks and computer systems.
- Adware -Adware allows the unwanted software to serve ads. Usually in the form of popup ads. In some cases you don't even need to be on the internet. Other types of Adware adds a tool bar, or a search bar to your browser. In some cases, these can be extremely maliciaious, they can add additional spyware/malware, redirect your searches to their pages...
So what do you do?? How can you keep your computer in working order? What about email? What happens if you have already been infected? What about online banking and ecommerce??? What's the airspeed velocity of an unladen swallow???All that and more in upcoming installments!! So Stay Tuned.