Main Page Beginners Design Tips Get Traffic Earn Money Picks Codes

Are you a Successful Blogger?

Successful Blogging

  • Beginners can learn the basics about Blogging
  • Advanced Bloggers can learn how to take their blog up a notch.
  • Anyone can learn HOW TO GET MORE TRAFFIC
  • And more- Templates, Codes, and Tips etc.

What do you want to read about? Scroll down or check out our sidebar for topics.

We post at least daily so check back or subscribe to our newsletter.


Microsoft:Protect yourself from the Conficker computer worm

Published: March 27, 2009
Protect yourself from the Conficker computer worm

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction.

If you are an IT professional, please visit Conficker Worm: Help Protect Windows from Conficker.

On This Page
Am I at risk of having the Conficker worm?Am I at risk of having the Conficker worm?
What does the Conficker worm do?What does the Conficker worm do?
How does the Conficker worm work?How does the Conficker worm work?
How do I remove the Conficker worm? How do I remove the Conficker worm?
Where can I find more technical information about the Conficker worm and how can I stay up to date on the Conficker worm?Where can I find more technical information about the Conficker worm and how can I stay up to date on the Conficker worm?

Am I at risk of having the Conficker worm?

Most antivirus software could detect and block the Conficker worm, so if you have updated antivirus software on your computer, you are at a much lower risk of being infected by the Conficker worm.

If you or your network administrator have not installed the latest security updates from Microsoft and your antivirus provider, and if you have file-sharing turned on, the Conficker worm could allow remote code execution. Remote code execution allows an attacker to take control of your computer and use it for malicious purposes.

What does the Conficker worm do?

To date, security researchers have discovered two variants of the worm in the wild.

Win32/Conficker.A was reported to Microsoft on November 21, 2008.

Win32/Conficker.B was reported to Microsoft on December 29, 2008.

Win32/Conficker.C was reported to Microsoft on February 20, 2009.

Win32/Conficker.D was reported to Microsoft on March 4, 2009.

Win32/Conficker.B might spread through file sharing and via removable drives, such as USB drives (also known as thumb drives). The worm adds a file to the removable drive so that when the drive is used, the AutoPlay dialog will show one additional option.

The Conficker worm can also disable important services on your computer.

In the screenshot of the Autoplay dialog box below, the option Open folder to view files — Publisher not specified was added by the worm. The highlighted option — Open folder to view files — using Windows Explorer is the option that Windows provides and the option you should use.

If you select the first option, the worm executes and can begin to spread itself to other computers.

 The option Open folder to view files — Publisher not specified was added by the worm.

The option Open folder to view files — Publisher not specified was added by the worm.

How does the Conficker worm work?

Here’s an illustration of how the Conficker worm works.

 Here's a visual explanation of how the Conficker worm works.

How do I remove the Conficker worm?

If your computer is infected with the Conficker worm, you may be unable to download certain security products, such as the Microsoft Malicious Software Removal Tool or accessing certain Web sites, such as Microsoft Update. If you can't access those tools, try using the Windows Live OneCare Safety Scanner.

Where can I find more technical information about the Conficker worm and how can I stay up to date on the Conficker worm?

For additional information, see Centralized Information About the Conficker Worm.

For more technical information about the Conficker worm, see the Microsoft Malware Protection Center Virus Encyclopedia

Bookmark the Microsoft Malware Protection Center portal and the Microsoft Malware Protection Center blog for updated information.

For symptoms and detailed information about how to remove the Conficker worm, see Help and Support: Virus alert about the Conficker Worm.

To continue to get updated information on security, sign up for the Microsoft Security for Home Computer Users newsletter.

For more information, see How to prevent computer worms and How to remove computer worms.

Get MLB Tickets at StubHub!

Bookmark and Share

Keeping your kids safe. What Can You Do?

Keeping your kids safe. What Can You Do?

Your kids’ personal information and privacy are valuable — to you, to them, and to marketers. Here’s how to help protect your kids’ personal information when they’re online.

Check out sites your kids visit. If a site requires users to register, see what kind of information it asks for and whether you’re comfortable with what they tell you. If the site allows kids to post information about themselves, talk to your child about the risks and benefits of disclosing certain information in a public forum. You also can see whether the site appears to be following the most basic COPPA requirements, like clearly posting its privacy policy for parents and asking for parental consent before kids can participate.

Take a look at the privacy policy. Just because a site has a privacy policy doesn’t mean it keeps personal information private. The policy should tell you what the site does with the information it collects; then, you can decide how you feel about it. Remember, if the policy says there are no limits to what it collects or who gets to see it, there are no limits.

Ask questions. If you’re not clear on a site’s practices or policies, ask about them. If the site falls under COPPA, the privacy policy has to include contact information for the site manager.

Be selective with your permission. In many cases, websites need your okay before they’re allowed to collect personal information from your kids. They may ask for your permission in a number of ways, including by email or postal mail. Or, you may give your consent by allowing them to charge your credit card. In addition to considering when to give your permission, consider how much consent you want to give — in many cases, it’s not all or none. You might be able to give the company permission to collect some personal information from your child, but say no to having that information passed along to another marketer.

Know your rights. As a parent, you have the right to have a site delete any personal information it has about your child. Some sites will let you see the information they’ve collected. But first, they’ll need to make sure you really are the parent, either by requiring a signed form or an email with a digital signature, for example, or by verifying a charge made to your credit card. You also have a right to take back your consent and have any information collected from your child deleted.

Report a website. If you think a site has collected or disclosed information from your kids or marketed to them in a way that violates the law, report it to the FTC at or 1-877-FTC-HELP (382-4357).
More Tips For Parents

Talk, and talk often. Make sure your kids know what information should be private, and what information might be appropriate for sharing. When they give out their personal information, they give up control of who can reach them, whether it’s with a marketing message or something more personal. On the other hand, sharing some personal information may allow them to participate in certain activities or to get emails about promotions and events they’re interested in.

Depending on what they do online, also remind your kids that once they post information online, they can’t take it back. Even if they delete the information from a site, older versions may exist on other people's computers and be circulated online.

Know what sites your kids go to. Talk with your kids about the sites they like to visit. Do some exploring on your own to get to know how the sites work and what privacy settings and controls they offer.

Make agreements. Be sure your kids know what your family has decided is okay — and not okay — to divulge online. Consider writing down a list of the rules your family has agreed on, and posting them where everyone can see them.

Let your kids know you’ll keep an eye on the sites they visit. One option is to check your browser history and temporary files, though keep in mind that older kids may know how to delete these files or keep them from getting recorded. If you’d like more controls, check to see what privacy settings your browser offers or consider software that offers a range of controls. Visit the GetNetWise website to learn more.

Know how your kids get online. Kids may get online using your family computer or someone else’s, as well as through cell phones and game consoles. Know what limits you can place on your child's cell phone — some companies have plans that limit downloads, Internet access, and texting on cell phones; other plans allow kids to use those features at certain times of day. Check out what parental controls are available on the gaming consoles your kids use, as well.

Subscribe to USA TODAY - 8 weeks for $20

Bookmark and Share

Conficker Worm

There has been a lot of talk about the fast-moving Conficker computer worm. The worm is said to have infected at least 3 million and as many as 9 million PCs and is set to spring to life in a new way on April Fools' Day.

Once a machine is infected, the worm can download and install additional malware from attacker-controlled Web sites. a Conflicker-infected PC is essentially under the complete control of the attackers.

Conficker can spread in three ways.

  1. First, it attacks a vulnerability in the Microsoft Server service. Computers without the October patch can be remotely attacked and taken over.
  2. Second, Conficker can attempt to guess or 'brute force' Administrator passwords used by local networks and spread through network shares.
  3. And third, the worm infects removable devices and network shares with an autorun file that executes as soon as a USB drive or other infected device is connected to a victim PC.

The army of Conficker-infected machines, known as a "botnet," could be one of the greatest cybercrime tools ever assembled. On April 1, many Conficker-infected machines will generate a list of 50,000 new domains a day that they could try. Of that group, the botnet will randomly select 500 for the machines to actually query.

From technet.mictosoft:

Conficker Worm: Help Protect Windows from Conficker

This page is designed to provide IT Pro customers the information they need to help protect their systems from the Conficker Worm, or to recover systems that have been infected.

If you are a consumer, please visit Protect Yourself from the Conficker Computer Worm.

About Conficker

On October 23, 2008, Microsoft released a critical security update, MS08-067, to resolve a vulnerability in the Server service of Windows that, at the time of release, was facing targeted, limited attack. The vulnerability could allow an anonymous attacker to successfully take full control of a vulnerable system through a network-based attack, the sort of vectors typically associated with network "worms." Since the release of MS08-067, the Microsoft Malware Protection Center (MMPC) has identified the following variants of Win32/Conficker:

*Also known as Conficker B++
**Also known as Conficker.C and Downadup.C

What Happens on April 1, 2009?

Systems infected with the latest version of Conficker will begin to use a new algorithm to determine what domains to contact. Microsoft has not identified any other actions scheduled to take place on April 1, 2009. It is possible that systems with the latest version of Conficker may be updated with a newer version of Conficker on April 1 by contacting domains on the new domain list. However, these systems could be updated on any date before or after April 1 as well using the "peer-to-peer" updating channel in the latest version of Conficker.

Protecting PCs from Conficker

  1. Apply the security update associated with MS08-067. View the security bulletin for more information about the vulnerability, affected software, detection and deployment tools and guidance, and security update deployment information.
  2. Make sure you are running up-to-date antivirus software from a trusted vendor, such as Microsoft's Forefront Client Security or Windows Live OneCare. Antivirus software may also be obtained from trusted third parties such as the members of the Virus Information Alliance.
  3. Check for updated protections for security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. The Microsoft Active Protection Program (MAPP) provides partners with early access to Microsoft vulnerability information. For a list of partners and links to their active protections, please visit the MAPP Partners page.
  4. Isolate legacy systems using the methods outlined in the Microsoft Windows NT 4.0 and Windows 98 Threat Mitigation Guide.
  5. Implement strong passwords as outlined in the Creating a Strong Password Policy whitepaper.
  6. Disable the AutoPlay feature through the registry or using Group Policies as discussed in Microsoft Knowledge Base Article 967715. Microsoft released Security Advisory 967940 to notify users that the updates to allow users to disable AutoPlay/AutoRun capabilities have been deployed via automatic updating channels.
    NOTE: Windows 2000, Windows XP, and Windows Server 2003 customers must deploy the update associated with Microsoft Knowledge Base Article 967715 to be able to successfully disable the AutoRun feature. Windows Vista and Windows Server 2008 customers must deploy the security update associated with Microsoft Security Bulletin MS08-038 to be able to successfully disable the AutoRun feature.

Cleaning Systems of Conficker

Manually download the Windows Malicious Software Removal Tool (MSRT) onto uninfected PCs and deploy to infected PCs to clean infected systems.

Conficker Timeline

  • On November 21, 2008, the MMPC identified Worm:Win32/Conficker.A. This worm seeks to propagate itself by exploiting the vulnerability addressed in MS08-067 through network-based attacks. The MMPC added signatures and detection to Microsoft Forefront, Microsoft OneCare, and the Windows Live OneCare Safety Scanner on the same day.
  • On November 25, 2008, the MMPC communicated information about Worm:Win32/Conficker.A through their weblog.
  • On December 29, 2008, the MMPC identified the second variant, Worm:Win32/Conficker.B, and added signatures and detection to Microsoft Forefront, Microsoft OneCare, and the Windows Live OneCare Safety Scanner on the same day.
    NOTE: Worm:Win32/Conficker.B can be successful against systems that have applied the security update associated with MS08-067.
  • On December 31, 2008, the MMPC communicated information about Worm:Win32/Conficker.B through their weblog.
  • On January 13, 2009, the MMPC included the ability to remove both Worm:Win32/Conficker.A and Worm:Win32/Conficker.B in the January 2009 release of the Windows Malicious Software Removal Tool and communicated information about this through their weblog.
  • On January 22, 2009, the MMPC provided consolidated technical information about Worm:Win32/Conficker.B on their weblog.
  • On February 12, 2009, the Microsoft Security Response Center (MSRC) released information about domains that Conficker-infected systems try to connect to. Microsoft also announced information on a partnership with technology industry and academic leaders designed to disable domains targeted by Conficker.
  • On February 12, 2009, Microsoft announced a U.S. $250,000 reward for information that results in the arrest and conviction of those responsible for illegally launching the Conficker malicious code on the Internet. Microsoft's reward offer stems from the company's recognition that the Conficker worm is a criminal attack. Microsoft wants to help the authorities catch the criminals responsible for it. Residents of any country are eligible for the reward, in accordance with the laws of that country, because Internet viruses affect the Internet community worldwide.
  • On February 20, 2009, the MMPC provided technical information about Worm:Win32/Conficker.C on their weblog.
  • On March 27, 2009, the MMPC provided more details about the new P2P functionality in Worm:Win32/Conficker.D on their weblog.

    Individuals with information about the Conficker worm are encouraged to contact their international law enforcement agencies. Additionally, Microsoft has implemented an Antivirus Reward Hotline, +1-425-706-1111, and an Antivirus Reward Mailbox,, where tips can be shared.

Keeping kids safe online

Your kids’ personal information and privacy are valuable — to you, to them, and to marketers. Fortunately, there are ways you can safeguard that privacy when your kids are online.

* Check out sites your kids visit, and see what kind of information the sites ask for or allow kids to post.
* Talk to your child about the risks and benefits of disclosing certain information, especially in a public forum.
* Take a look at the privacy policy, which should say what the site does with the information it collects. Then you can decide how you feel about it.
* Ask questions. If you’re not clear on a site’s practices or policies, ask about them.
* Be selective with your permission. In many cases, websites need your okay before they’re allowed to collect personal information from your kids.
* Know your rights. For example, as a parent, you have the right to have a site delete any personal information it has about your child.
* Report a website. If you think a site has collected or disclosed information from your kids or marketed to them in a way that violates the law, report it to the FTC.

Whether to study or socialize, play games or learn something new, it’s likely your kids are spending time online. And as a parent, chances are that you’re spending time thinking about ways to make sure they make smart and safe choices when they do. Among the many choices they’re faced with online is how to deal with their personal information.

The Children’s Online Privacy Protection Act – COPPA – gives parents control over what information websites can collect from their kids. Any website for kids under 13, or any general site that collects personal information from kids it knows are under 13, is required to comply with COPPA. The Federal Trade Commission, the nation’s consumer protection agency, enforces this law.

Thanks to COPPA, sites have to get a parent’s permission if they want to collect or share your kids’ personal information, with only a few exceptions. That goes for information sites ask for up-front, and information your kids choose to post about themselves. Personal information includes your child’s full name, address, email address, or cell phone number.

Under COPPA, sites also have to post privacy policies that give details about what kind of information they collect from kids — and what they might do with it (say, to send a weekly newsletter, direct advertising to them, or give the information to other companies). If a site plans to share the child’s information with another company, the privacy policy must say what that company will do with it. Links to the policies should be in places where they’re easy to spot.

Buy or Sell your home with ZipRealty, and save $$$

Bookmark and Share

Stay safe online

The FTC provides tips to help secure your computer, guard against Internet fraud, and protect your personal information. Visit for more information. To keep up to date with the latest computer threats, signup for alerts from the Department of Homeland Security at

Here are some other sources on protecting yourself and your family while using the Internet.

  • GetNetWise (www.getnetwise.or) is a public service sponsored by Internet industry corporations and public interest organizations to help ensure that Internet users have safe, constructive, and educational or entertaining online experiences.
  • Internet Keep Safe Coalition (, the home of Faux Paw the Techno Cat, a coalition of 49 governors/first spouses, law enforcement, the American Medical Association, the American Academy of Pediatrics, and other associations dedicated to helping parents, educators, and caregivers by providing tools and guidelines to teach children the safe and healthy use of technology.
  • National Cyber Security Alliance ( is a nonprofit organization that provides tools and resources to empower home users, small businesses, and schools, colleges, and universities to stay safe online.
  • staysafe ( is an educational site intended to help consumers understand both the positive aspects of the Internet as well as how to manage a variety of safety and security issues that exist online.
  • Wired Safety ( is an Internet safety and help group comprised of unpaid volunteers around the world that provides education, assistance, and awareness on all aspects of cybercrime and abuse, privacy, security, and responsible technology use. Wired Safety is the parent group of, FBI-trained teens and preteens who promote Internet safety.

Bookmark and Share

How to choose an ISP

To connect your computer to the Internet, you'll need an Internet Service Provider (ISP). Some ISPs are large and well known, such as AOL, MSN, Time Warner Cable and Earthlink, while others are literally one-person operations. Some companies strictly limit their service to providing Internet access. Others, like your telephone and cable company, may offer Internet access as part of a much larger package of services.

If you have limited Internet expertise, you may want to start with one of the well-known ISPs. They usually offer user-friendly startup software. This software often includes features such as a browser, instant messaging, parental controls, and pop-up blockers. Many also offer 24 hour tech support. Of course, all of this convenience results in higher monthly user fees. Once you are comfortable with how the Internet works, you may discover you don't need all the 'extras' and switch to a lower-cost ISP.

Whatever your present level of expertise, you will want to consider these factors when selecting a provider.

  • Speed. If all you want to do is check e-mail and read web pages, a dial-up connection may be enough. But most people also want to download music, television shows, or watch videos. For these, you will need a faster connection with "broadband" access, such as a digital subscriber line (DSL), a cable model, or satellite
  • Availability. For dial-up service, is there a local phone number or toll-free number for access?
  • Wireless access. Can you get a wireless connection for other computers in your home?
  • Email. How many e-mail accounts come with the service? What will be the storage limit on your mailbox? How many days does the ISP keep your mail before deleting it?
  • Website Space. Do you want to create a personal website? If so, find out whether your provider offers web space and software to create your page.
  • Software. Is there any software required to activate the service? How do you get it? How large is the software? Can you use whatever browser or e-mail program you'd like?
  • Support. What kinds of support are available-phone, e-mail, chat, etc.? What are the hours of support? Are there any additional charges for support?
  • Special Features. What services are provided in terms of spam blocking, virus protection, instant messaging, and chat rooms?
  • Terms of Service. Is there a limit to the number of hours per month you can use the service?
  • Cost. What is the monthly fee for the service? Are there any additional equipment or setup fees? What is the fee for extra e-mail accounts?

Go Daddy $7.49 .com domains 468x60

Bookmark and Share

GOOGLE: New in Labs: Undo Send

Finally. The folks at Gmail have an 'undo-send' idea in the works.

According to the Gmail blog;

Sometimes I regret sending a message the morning after. Other times I send a message and then immediately notice a mistake. I forget to attach a file or email the birthday girl that I can't make her surprise party. I can rush to close my browser or unplug the Internet — but Gmail almost always wins that race.

An email to the wrong Larry pushed me over the edge. I could undo just about any other action in Gmail — why couldn’t I undo send? Many people agreed, including Yuzo Fujishima, an engineer in the Tokyo office. My theory (which others shared) was that even just five seconds would be enough time to catch most of those regrettable emails.

And now you can do just that. Turn on Undo Send in Gmail Labs under Settings, and you’ll see a new “Undo” link on every sent mail confirmation. Click “Undo,” and we’ll grab the message before it’s sent and take you right back to compose.

This feature can't pull back an email that's already gone; it just holds your message for five seconds so you have a chance to hit the panic button. And don't worry – if you close Gmail or your browser crashes in those few seconds, we'll still send your message.

I've had Undo Send turned on for a while and it's saved me several times. Let us know if it saves you too.

$10,000 Scholarship Contest

Bookmark and Share

Google offers $50 to Advertise! Analytics is FREE.

Google AdWords

Begin advertising today
with a $50 coupon

Right-click here to download pictures. To help protect your privacy, Outlook prevented automatic download of this picture from the Internet.
Right-click here to download pictures. To help protect your privacy, Outlook prevented automatic download of this picture from the Internet.

Dear Google Analytics User,

You already know that Google Analytics helps you gain rich insights from your website. When you combine Analytics with Google AdWords, you can get even more from your website: more traffic, more conversions, more business. And with this $50 coupon, you can try AdWords risk-free.

Connect with your customers: Google's advertising network reaches 82%1 of all Internet users. Using AdWords, you can target the audience that matters to you, whether that's prospects and customers across the country or right in your neighborhood. AdWords shows your ads at the precise moment customers are looking for your products or services.

Do more with less: AdWords offers free tools that help you build cost-effective, efficient advertising campaigns and make the most of your investment. Set up a campaign in minutes, decide how much you're willing to pay, and once your ad is set up with CPC pricing, you only pay when someone clicks on your ad.

Stay in the know: Link your AdWords account to your existing Analytics account to measure your ads' performance and understand how to improve your campaigns. Analytics lets you track the ROI, revenue per click, and profit margin of your campaigns so that you can optimize more effectively.

To redeem your AdWords coupon and link your accounts:

Visit and follow the instructions to set-up your account and redeem your coupon. To receive your $50 AdWords credit, you'll need the following coupon code: 5B3F-N7D3-GLLA-8KC6-D7A.

Once your account has been credited with $50 in free advertising, come back to for instructions on how to link your new account with your Analytics account. You'll also find a list of resources where you can find tips on optimizing your campaign as well as links to contact one of our Google Analytics Authorized Consultants for personalized help.

If you have any questions, just reply directly to this email.


The Google Analytics Team

Promotional credit must be applied to a new AdWords account within 14 days of creating the account and is valid only for new Google AdWords customers with self-managed signup accounts. Advertisers will be charged for advertising that exceeds the promotional credit. Advertisers will need to suspend their ads if they do not wish to receive additional charges beyond the free credit amount. Subject to ad approval, valid registration and acceptance of the Google AdWords Program standard terms and conditions. The promotional credit is non-transferable and may not be sold or bartered. Offer may be revoked at any time for any reason by Google Inc. One promotional credit per customer. Advertisers with self-managed signup accounts are subject to a $5 activation fee that will be deducted from the promotional credit. Expires 4/15/09.

Bookmark and Share

EntreCard Backs Down

Over the weekend, EntreCard sent out an email to users informing them of changes in the near future. The changes included taking in outside advertising.

Despite the fact that the email was sent over the weekend and could have been easily ignored, it wasn't. EntreCard responded to it's users with the following blog posts.

No credit fee to reject paid ads

Written on March 16th, 2009 by User ImageGraham

Guys n gals of Entrecard, there has been much controversy over the last few days regarding some proposed changes. Despite what has happened, I am very proud of each and every one of you. For you all to strongly share your feelings in some way, whether via blog posts, forum posts, comments here or via twitter, it humbles me that so many of you care. I appreciate all of your feedback.

As a direct result, and with the intention of moving forward as a team with the respect of our members, we wish to directly address your biggest concern with the new changes: having to pay a fee to reject paid ads.

We’ve listened to you loud and clear about the massive ad platform we’re launching, and over and over one piece of feedback kept popping up: “I don’t want a credit fee to reject ads!”

We were initially planning on charging a small fee to decline paid ads running through the network. The intent of this was to make sure that most ads run, while allowing you to reject ones you really don’t like.

But now it has become quite clear that as a community, you don’t agree with having to pay a fee, even if it’s just in the form of our virtual credits, to decline ads.

So, we have officially removed the planned credit-fee to reject. Rejecting any paid ad you wish will now be completely free when our new platform launches. As we move forward though, please understand that running these paid ads on your blog not only supports Entrecard, but also supports the entire virtual economy of Entrecard by providing the money needed to convert credits into dollars via our credit exchange that we are simultaneously rolling out.

I hope this has addressed all of your biggest concerns with the platform. I’d like to assure each and every member that we are here to work with you, not against you, and we listen at all times across all mediums.


The one page-down rule will apply to screen resolutions of 1920×1200. This is the maximum screen resolution out of all Entrecard members, so there will be no one in the system who cannot place the widget within one page-down of their own personal screen and still be in violation.

Again, what this means is that no matter what your screen resolution is, you can place the widget within one page-down of your computer screen and be in compliance.

Greetings Entrecarders!

While a lot of the dust is still settling around our recent announcements, an important change has already been made.

The “Above the Fold” rule that we notified you we were implementing in a week’s time has now officially been changed to a “1 Page-down Rule.” What it means is that your widget should be placed withing one stroke of the page-down key.

It was immediately clear after our announcement that a strict “above the fold” mandate was not something that many members wanted to, or could, comply with. So, as a clear signal to you, our members, that we listen to all your feedback and incorporate as much of it as we can, we’ve gone ahead and decided on the change.

Top Ringtones for your Mobile!

Bookmark and Share

Infected Computer?

Computer sluggish this morning?
It may be infected.

Here are some symptoms that may indicate that your computer has caught something.

• You experience new, prolonged slowdowns. This can be a sign that a malicious program is running in the background.

• You continually get pop-up ads that you can't make go away. This is a sure sign you have "adware," and possibly more, on your machine.

• You're being directed to sites you didn't intend to visit, or your search results are coming back funky. This is another sign that hackers have gotten to your machine.

So what do you do?

• Having anti-virus software here is hugely helpful. For one, it can identify known malicious programs and disable them. If the virus that has infected your machine isn't detected, many anti-virus vendors offer a service in which they can remotely take over your computer and delete the malware for a fee.

• You may have to reinstall your operating system if your computer is still experiencing problems. It's a good idea even if you believe you've cleaned up the mess because malware can still be hidden on your machine. You will need to back up your files before you do this.

Bookmark and Share

Google In Quotes

GOOGLE Labs is testing a new idea call 'In Quotes'.
It has been developed for those of us who want to read quotes made by newsmakers.

According to Google;

What is 'In Quotes'?
The "In Quotes" feature allows you to find quotes from stories linked to from Google News. These quotations are a valuable resource for understanding where people in the news stand on various issues. Much of the published reporting about people is based on the interpretation of a journalist. Direct quotes, on the other hand, are concrete units of information that describe how newsmakers represent themselves. Google News compiles these quotations from online news stories and sorts them into browsable groups based on who is being quoted.
Similar to article selection and placement on Google News, quotes and their speakers are determined automatically by a computer program and we don't guarantee the completeness or accuracy of the information you may see. The dates you see represent when the article in which the quote appears was added to Google News. The views expressed in the quotes do not necessarily reflect the views of Google Inc. or its employees.

What is this feature used for?
Compare Quotes allows you to compare quotes from different people in the News about a particular topic. The feature currently allows you to choose and compare quotes from political candidates and other political figures.

How do I choose a different set of people to compare their quotes?
To choose a new person or set of people to compare quotes with, you will need to choose from the pulldown menu displayed next to "Quotes by" on each side of your page.

What does the Spin button do?
When you click the Spin button, the quotes will rotate and the system will display two new quotes for you to compare. This way you will be able to compare multiple quotes about a specific topic from the two speakers you've chosen.

How do I search for quotes by speakers in other countries?
To change the country edition you're working with, please select a different edition from the upper right pull down menu.

What do the arrows next to each quote do?
These arrows enable you to view different quotes from the speaker you've selected.

How can I choose a new topic?
There are two ways to add a new topic of comparison on your page. You can either type in the topic of your choice into the search box, or click on any of the topics displayed at the top middle section of your page.

How were the people selected for each edition?
The people shown are those with the most quotes in the 'Nation' section of Google News for the country edition you've chosen.

How were the suggested queries selected for each edition?
The suggested queries were automatically selected as topics that the selected speakers frequently talk about.

How do I report an incorrect quote, date or picture source?
Please fill out the Google News Feedback form.

Bookmark and Share

How to Use Trackback when Blogging

from wikiHow - The How to Manual That You Can Edit

A trackback is a way for bloggers to communicate between their weblogs. If another blogger wishes to share information on the article via their own weblog, trackback will ping the original entry to notify the author of the response.


  1. At your own blog, type up the information you wish to share with your readers.
  2. In the trackback field on your blog's entry page, enter in the URL of the article you are referencing.
  3. The original blog will be notified, and an excerpt of your own entry will be created in the original article's comments along with your entry's URL.


  • In MoveableType, trackback is also called "URLs to ping"
  • In WordPress, trackback is found under the Advanced Editing (older versions) or Trackbacks (version 8.x+)
  • One of the major advantages of using trackback is they can be used as a discussion board, between different Websites communicating on similar interests and resources. The only problem of using trackbacks is that they are extremely vulnerable to spam.
  • For applying trackback it is not necessary for the both sites to be physically linked with each other.
  • Your own blog entries already have trackbacks enabled for other readers to comment remotely. When someone trackbacks to your blog their details will be listed under your own blog comments. A small title and the URL will be displayed that allows your readers to click to read more.
  • Trackback is not yet available on LiveJournal[1] (at May 2008).

Related wikiHows

Sources and Citations

Article provided by wikiHow, a wiki how-to manual. Please edit this article and find author credits at the original wikiHow article on How to Use Trackback when Blogging. All content on wikiHow can be shared under a Creative Commons license.

Sales in a Click

Bookmark and Share

Autosave, Timestamping, and Integrated friends

Autosave is a feature that will automatically save your draft posts when you pause in your typing.

With automatic date and time, your posts will now be timestamped with the date and time that they’re published, not the date and time when you first opened the post editor (as has been the case). You can of course still explicitly set the date and time by opening Post Options and switching to Scheduled at instead. Once a post is published, it will keep its date by default, even if you go back even if you go back to edit the post and re-publish.

They’re making it easy to use your existing Gmail contacts in Blogger. Google has added a “Choose from contacts” link below some of your blog’s settings fields, such as Comment > Comment Notification Email and Email > BlogSend Address. Click the link to bring up a window with your Gmail contacts list.

Currently they don’t have the picker built in to the Permissions settings, but Google says they are working on it.

Web's Best Brain Games

Bookmark and Share

YouTube Videos blocked in the UK!

After negotiations with Britain's music royalty-collecting body broke down, Google Inc. says it will block U.K. users from watching music videos on YouTube .

The PRS for Music, the body which collects money on behalf of writers and publishers worldwide, is asking for royalties. If paid, Google would lose money every time a video was played on YouTube.

"Our previous license from PRS for Music has expired, and we've been unable so far to come to an agreement to renew it on terms that are economically sustainable for us," Google said in a statement. Until a solution is found, it added, "we will be blocking premium music videos in the UK that have been supplied or claimed by record labels."

PRS for Music, said it was outraged by Google's move.

"Google has told us they are taking this step because they wish to pay significantly less than at present to the writers of the music on which their service relies, despite the massive increase in YouTube viewing," the group said in a statement.

Real Networks

Bookmark and Share

Facebook Introduces us to 'Publisher'

There has been some news lately about Facebook updating the home page with the goals of providing immediate news about your friends and giving you more control over the information you receive.

With the new design, Facebook says that they hope that the home page will contain stories that are most relevant to you. They also want to simplify the site and make it easier for you to share content with the people you care about.


The real-time stream on your home page will allow you to see what your friends are doing right now. You will be able to choose what types of stories appear by using the Filters in the left sidebar to sort your stream by Friend Lists or applications. The highlights section in the right sidebar will contain information that Facebook thinks you’ll find most interesting. We’ve also made it easier to share content by adding the publisher to your home page and friends’ profiles, as well as your own profile.

As always, your privacy settings will remain in effect to ensure that stories about you are only visible to the people whom you wish to see them.

The Publisher lets you share content on Facebook. It is located at the top of both your home page and your Profile page. Both locations offer the same functionalities.

Typing in the Publisher text box and clicking "Share" updates your status. Clicking inside the text box displays additional types of content that you can share:

* Link (add a web address to external content)
* Photos (upload a photo, create an album, or take a webcam photo)
* Video (upload a video or record a webcam video)
* Note (add from Facebook’s Notes application)
* Import (add external blogs or RSS feeds)
* Gifts (add from Facebook’s Gift Shop)

Once you have added content, you will still need to click "Share" in order to publish a story. To exit the submenu for a specific type of content, simply click the "X" in the upper-right corner of the Publisher box.

If you type in the Publisher box and then add content (e.g., a link or a video), the text will appear as a comment above the content you have shared. It will not appear as a new status update or replace your current status.

While viewing another person’s profile, you can use the Publisher to add content directly to their profile. Typing text alone in the Publisher box will create a Wall post.

When you share any content (e.g., a Wall post, video, or photo), a story will appear on your friend’s profile with a headline indicating that you have shared the information with them. The same story can also appear in the streams of other people who can view your friend’s profile.

If a person’s privacy settings prevent you from sharing a certain type of content on their profile, an error message will appear.

To share information privately with one person, click "Send a Message" below the person’s name on their profile.

Designer Wedding Dresses ship FREE - 0% sales tax!

Bookmark and Share

Windows 7...Turn off IE!

Microsoft says that it will only take a single check box in the next version of Windows is giving users the ability to "turn off" Microsoft's own Internet Explorer browser.

All this effort is to make European antitrust regulators happy.
Microsoft lost a long-running battle with EU antitrust regulators in 2007 over the way it bundled media player software into the Windows operating system.
Opera Software claimed the practice of bundling software gives Microsoft's browser an unfair advantage.

Windows 7 isn't expected to reach consumers until next year.
More than a million people are already testing early versions. – Quality Printing at Low Prices

Bookmark and Share

Twitter in the Courtroom?

A judge is allowing a reporter to use the microblogging service Twitter to provide constant updates from a racketeering gang trial this week.

Online streaming has been allowed in courtrooms before.
Other recent instant updates allowed by the federal system:

• A federal judge in Massachusetts granted a request in January for online streaming of a hearing in a recording industry lawsuit against a Boston University student accused of illegally downloading music.

• A federal judge in Sioux City, Iowa, allowed a Cedar Rapids Gazette reporter to offer live blog updates in a January tax fraud trial from a laptop computer.

• The 2nd U.S. Circuit Court of Appeals in New York allowed live television coverage in December of arguments in the case of a Canadian engineer who wants to sue the United States for mistaking him for a terrorist and sending him to Syria.

• In perhaps the highest-profile appearance of new media in the federal courts, bloggers covering the 2007 CIA leak trial for former Vice President Dick Cheney's chief of staff, I. Lewis "Scooter" Libby, were given the same credentials as traditional journalists. - View Photos of Singles Free

Bookmark and Share

Facebook's Newest Updates

Facebook tells us that they have a redesigned user home page along with new public profiles for celebrities and organizations. Many critics say that the changes are in an effort to resemble Twitter.

In a blog post, Facebook CEO Mark Zuckerberg explained that the changes were necessary because as Facebook has become a conduit for more and more information, the need to find relevant and recent information has grown. It's all about the need for up-to-the-minute information, like Twitter offers

Good news to those of us updating our status. We will no longer have to start the message with our name. Facebook now asks, "What's on your mind?"

From the Official Facebook Blog

Over the past five years, Facebook has evolved to make sharing information more efficient and to give people more control. This year, we are going to continue making the flow of information even faster and more customized to those you want to connect and communicate with, no matter how broadly or privately. To give you a framework for how we're thinking about these upcoming changes, it's important to understand how Facebook has developed and where we're heading.

The Social Graph and The Stream

When we started Facebook in 2004, it was just a basic directory with some names, interests, contact information and a profile picture. If you wanted to find out about a friend's updates, you had to check your friend list for updated profiles and visit each friend's profile to see what had changed. This worked because people didn't change their profiles too often. Over time we added photos, videos, groups and events, and people started sharing more and more information. So in 2006, we launched News Feed, which highlighted for you the most interesting updates from your friends on your home page. It helped you understand everything that was going on.

As more and more information flows through Facebook, the need for people to easily discover the most recent and relevant content has grown. That's why when we redesigned the profile last year, we focused on the Wall—the stream of information telling you what is going on with a person—rather than the previous profile style of boxes containing unchanging information. This was a big step in our evolution because it moved Facebook in the direction of helping people share immediate experiences with one another: a thought, a status, a photo, a note, a feeling.

In 2007, we popularized the term Social Graph to describe how Facebook maps out people's connections. The idea is that these connections—whether friendships, affiliations or interests—exist already in the real world, and all we're trying to do is map them out. We believe that connecting people to their friends is just the beginning, and we're working hard on making Facebook a place for people to connect with and keep track of all the interests in their lives.

We think that as it becomes easier to connect and share across the social graph, people—as well as companies, governments and other organizations—will share more information about what is happening with them. As this happens, the world will become more open and people will have a better understanding of everything that is going on around them.

One way to think about this is as a timeline—or a stream. As people share more, the timeline gets filled in more and more with what is happening with everything you're connected to. The pace of updates accelerates. This creates a continuous stream of information that delivers a deeper understanding for everyone participating in it. As this happens, people will no longer come to Facebook to consume a particular piece or type of content, but to consume and participate in the stream itself.

In order to make this a reality, we must build Facebook to give everyone the power to share anything they want and connect with anyone they want. The way we're doing that is to first extend people's ability to connect with everything that interests them, and to give people a way to get updates from all of these connections. Then, we're going to increase the pace of the stream, so you can immediately see what is going on around you.

What's New Today

Starting today, we are announcing new profiles for public figures and organizations. Once called Pages, these new profiles will now begin looking and functioning just like user profiles. Just as you connect with friends on Facebook, you can now connect and communicate with celebrities, musicians, politicians and organizations. These folks will now be able to share status updates, videos, photos or anything else they want, in the same way your friends can already. You'll be able to keep up with all of their activity in your News Feed. This means that you can find out that Oprah is reading a book backstage before a show, CNN posted a breaking story or U2 is working on a new song, just as you would see that your friend uploaded new photos from her trip to Europe.

We're also going to make some changes to the home page. The new home page will let you see everything that's shared by your friends and connections as it happens. It will also provide you more control by letting you choose exactly who you see among the people and things you are connected to. You can decide you no longer want to get updates from your old friend from high school who you rarely talk to, or you can filter the stream to only see updates about your family members. And now, if you want, you can read what President Obama is saying on the same page as your best friend. You can find out what it is your mother, your high school classmate or President Obama are doing, thinking and sharing right now just by logging into Facebook.

We'll begin rolling out the new home page next week, so please check out our home page tour to see the new design and let us know what you think about it. This is an exciting move for us and we have more coming, so keep an eye on the blog for more updates about upcoming products.

$10,000 Scholarship Contest

Bookmark and Share

Social Networking to promote your blog

Social Networking can help you move up the 'blogging ladder'. If you think that you have hit the brick wall and need some new ideas for networking, consider these.
    1. Limit the number of networks that you belong to.
    2. Choose to belong to the most popular networking sites rather than the smaller ones.
    3. Connect people and build relationships, not limiting yourself to one location .
    4. Start out slowly and learn how to function within the networking society that you belong to.
    5. Observe how the more successful networkers function and learn from them
    6. Observe how the lesser successful networkers function and learn from them.
    7. Use an image of yourself in your profile as you would like the world to perceive you.
    8. Join groups related to your purpose.
    9. Be polite, politically correct, and in good taste.
    10. Update often.
    11. Respond to messages and requests.
    12. When you post in your blog, be sure to let your networking friends know about it.
    13. Don't be too obvious when you are promoting something that involves money.
    14. Build trust with your community.
    15. Get ideas from your networking friends about what groups to join.
Social networking is a great way to promote almost anything. Your blog should be no exception.

Save 25% off your Wedding Tracker subscription!

Bookmark and Share