Balancing SEO and Branding to Avoid Being Covered in Mud

Adding copy to your website can become a tug-o-war between the Branding and SEO teams. One side is representing the voice and tone of the brand. At the other end of the rope, the SEO team is focused on increasing keyword rankings. This can lead to everyone walking away covered in mud. Avoid that unclean [...]
http://feedproxy.google.com/~r/conversationmarketing/MRJI/~3/aES6wSeOhY4/balancing-seo-and-branding.htm



[By Rss to Blog (Computer Tech)
Click Here
http://sbwasim.co.cc
Contact Me :wasimakhtar@sbwasim.co.cc]
[if you want to earn by Home just call Toll free No.02653090621 and give my userid DS630156 just try it its totaly free.]
[Recharge Mobile Online http://paytm.com/refer/sbwasim]
[Recharge Mobile Online http://paytm.com/refer/sbsamiksha]
[Want to earn by sending sms then go to http://ultoo.in/login.php?refererCode=12403E&flag=hide]
[If you want to advertise here contact me at wasim.akh2@gmail.com]

How to write universe-conquering proposals

AKA: 'Because I said so' doesn't work This is a really long post. But before you TL;DR it, give it a quick skim. The first half is hand-waving stuff about answering 'Why?' The second half is specific tips on doing proposals that build imputed value. Writing a great proposal is hard. The question you're trying [...]
http://feedproxy.google.com/~r/conversationmarketing/MRJI/~3/fZ4_0NjQ6Z4/great-proposals.htm



[By Rss to Blog (Computer Tech)
Click Here
http://sbwasim.co.cc
Contact Me :wasimakhtar@sbwasim.co.cc]
[if you want to earn by Home just call Toll free No.02653090621 and give my userid DS630156 just try it its totaly free.]
[Recharge Mobile Online http://paytm.com/refer/sbwasim]
[Recharge Mobile Online http://paytm.com/refer/sbsamiksha]
[Want to earn by sending sms then go to http://ultoo.in/login.php?refererCode=12403E&flag=hide]
[If you want to advertise here contact me at wasim.akh2@gmail.com]

The social candidacy: The elections Facebook influenced

Or, if you're a Republican: "What the hell just happened?!" The election was supposed to be close. Regardless of your party affiliation, you heard that for months: Maybe an electoral tie. Certainly with one candidate winning the electoral college and the other the popular vote. We wouldn't know for days after November 6th… Oops. The [...]
http://feedproxy.google.com/~r/conversationmarketing/MRJI/~3/N_kVMiCxgcw/the-social-candidacy.htm



[By Rss to Blog (Computer Tech)
Click Here
http://sbwasim.co.cc
Contact Me :wasimakhtar@sbwasim.co.cc]
[if you want to earn by Home just call Toll free No.02653090621 and give my userid DS630156 just try it its totaly free.]
[Recharge Mobile Online http://paytm.com/refer/sbwasim]
[Recharge Mobile Online http://paytm.com/refer/sbsamiksha]
[Want to earn by sending sms then go to http://ultoo.in/login.php?refererCode=12403E&flag=hide]
[If you want to advertise here contact me at wasim.akh2@gmail.com]

7 Cringe-Worthy SEO Phrases You Never Want to Hear in a Marketing Meeting

We've all been there. You're in the marketing meeting and someone brings up SEO. I don't know how they're bringing it up, but they've done it one way or another. Maybe they used some of the phrases below. If they did, you need to know why you wish you hadn't heard what they've just said. [...]
http://feedproxy.google.com/~r/conversationmarketing/MRJI/~3/l2Ep_5CrvvI/cringe-worthy-seo-phrases.htm



[By Rss to Blog (Computer Tech)
Click Here
http://sbwasim.co.cc
Contact Me :wasimakhtar@sbwasim.co.cc]
[if you want to earn by Home just call Toll free No.02653090621 and give my userid DS630156 just try it its totaly free.]
[Recharge Mobile Online http://paytm.com/refer/sbwasim]
[Recharge Mobile Online http://paytm.com/refer/sbsamiksha]
[Want to earn by sending sms then go to http://ultoo.in/login.php?refererCode=12403E&flag=hide]
[If you want to advertise here contact me at wasim.akh2@gmail.com]

Editing for Creativity: How to Enhance the Writer’s Voice

In a world of endless content, innovative copywriting is a great way to catch and keep the attention of the customer. While a creative approach will often draw a bigger audience than simply following best practices, it can be tempting for an editor to change the writer's style to fit an assumption about what sells. [...]
http://feedproxy.google.com/~r/conversationmarketing/MRJI/~3/XrGXMXbPl_w/how-to-be-a-good-editor.htm



[By Rss to Blog (Computer Tech)
Click Here
http://sbwasim.co.cc
Contact Me :wasimakhtar@sbwasim.co.cc]
[if you want to earn by Home just call Toll free No.02653090621 and give my userid DS630156 just try it its totaly free.]
[Recharge Mobile Online http://paytm.com/refer/sbwasim]
[Recharge Mobile Online http://paytm.com/refer/sbsamiksha]
[Want to earn by sending sms then go to http://ultoo.in/login.php?refererCode=12403E&flag=hide]
[If you want to advertise here contact me at wasim.akh2@gmail.com]

Computer Crime, Then and Now

Ive already documented my brief, youthful dalliance with the illegal side of computing as it existed in the late 1980s. But was it crime? Was I truly a criminal? I dont think so. To be perfectly blunt, I wasnt talented enough to be any kind of threat. Im still not. There are two classic books describing hackers active in the 1980s who did have incredible talent. Talents that made them dangerous enough to be considered criminal threats. The Cuckoos Egg: Tracking a Spy Through the Maze of Computer Espionage Ghost in the Wires: My Adventures as the Worlds Most Wanted Hacker Cuckoo is arguably the first case of hacking that was a clearly malicious crime circa 1986, and certainly the first known case of computer hacking as international espionage. I read this when it was originally published in 1989, and its still a gripping investigative story. Cliff Stoll is a visionary writer who saw how trust in computers and the emerging Internet could be vulnerable to real, actual, honest-to-God criminals. Im not sure Kevin Mitnick did anything all that illegal, but theres no denying that he was the worlds first high profile computer criminal. By 1994 he made the FBIs 10 Most Wanted list, and there were front page New York Times articles about his pursuit. If there was ever a moment that computer crime and "hacking" entered the public consciousness as an ongoing concern, this was it. The whole story is told in minute detail by Kevin himself in Ghost in the Wires. There was a sanitized version of Kevins story presented in Wizzywig comix but this is the original directly from the source, and its well worth reading. I could barely put it down. Kevin has been fully reformed for many years now; he wrote several books documenting his techniques and now consults with companies to help improve their computer security. These two books cover the genesis of all computer crime as we know it. Of course its a much bigger problem now than it was in 1985, if for no other reason than there are far more computers far more interconnected with each other today than anyone could have possibly imagined in those early days. But whats really surprising is how little has changed in the techniques of computer crime since 1985. The best primer of modern – and by that I mean year 2000 and later – computer crime is Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. Modern computer crime is more like the classic sort of crime youve seen in black and white movies: its mostly about stealing large sums of money. But instead of busting it out of bank vaults Bonnie and Clyde style, its now done electronically, mostly through ATM and credit card exploits. Written by Kevin Poulson, another famous reformed hacker, Kingpin is also a compelling read. Ive read it twice now. The passage I found most revealing is this one, written after the protagonists release from prison in 2002: One of Max's former clients in Silicon Valley tried to help by giving Max a $5,000 contract to perform a penetration test on the company's network. The company liked Max and didn't really care if he produced a report, but the hacker took the gig seriously. He bashed at the company's firewalls for months, expecting one of the easy victories to which he'd grown accustomed as a white hat. But he was in for a surprise. The state of corporate security had improved while he was in the joint. He couldn't make a dent in the network of his only client. His 100 percent success record was cracking. Max pushed harder, only becoming more frustrated over his powerlessness. Finally, he tried something new. Instead of looking for vulnerabilities in the company's hardened servers, he targeted some of the employees individually. These "client side" attacks are what most people experience of hackers—a spam e-mail arrives in your in-box, with a link to what purports to be an electronic greeting card or a funny picture. The download is actually an executable program, and if you ignore the warning message All true; no hacker today would bother with frontal assaults. The chance of success is miniscule. Instead, they target the soft, creamy underbelly of all companies: the users inside. Max, the hacker described in Kingpin, bragged "Ive been confident of my 100 percent [success] rate ever since." This is the new face of hacking. Or is it? One of the most striking things about Ghost In The Wires is not how skilled a computer hacker Kevin Mitnick is (although he is undeniably great), but how devastatingly effective he is at tricking people into revealing critical information in casual conversations. Over and over again, in hundreds of subtle and clever ways. Whether its 1985 or 2005, the amount of military-grade security you have on your computer systems matters not at all when someone using those computers clicks on the dancing bunny. Social engineering is the most reliable and evergreen hacking technique ever devised. It will outlive us all. For a 2012 era example, consider the story of Mat Honan. It is not unique. At 4:50 PM, someone got into my iCloud account, reset the password and sent the confirmation message about the reset to the trash. My password was a 7 digit alphanumeric that I didn't use elsewhere. When I set it up, years and years ago, that seemed pretty secure at the time. But it's not. Especially given that I've been using it for, well, years and years. My guess is they used brute force to get the password and then reset it to do the damage to my devices. I heard about this on Twitter when the story was originally developing, and my initial reaction was skepticism that anyone had bothered to brute force anything at all, since brute forcing is for dummies. Guess what it turned out to be. Go ahead, guess! Did you by any chance guess social engineering … of the account recovery process? Bingo. After coming across my [Twitter] account, the hackers did some background research. My Twitter account linked to my personal website, where they found my Gmail address. Guessing that this was also the e-mail address I used for Twitter, Phobia went to Google's account recovery page. He didn't even have to actually attempt a recovery. This was just a recon mission. Because I didn't have Google's two-factor authentication turned on, when Phobia entered my Gmail address, he could view the alternate e-mail I had set up for account recovery. Google partially obscures that information, starring out many characters, but there were enough characters available, m••••n@me.com. Jackpot. Since he already had the e-mail, all he needed was my billing address and the last four digits of my credit card number to have Apple's tech support issue him the keys to my account. So how did he get this vital information? He began with the easy one. He got the billing address by doing a whois search on my personal web domain. If someone doesn't have a domain, you can also look up his or her information on Spokeo, WhitePages, and PeopleSmart. Getting a credit card number is tricker, but it also relies on taking advantage of a company's back-end systems. … First you call Amazon and tell them you are the account holder, and want to add a credit card number to the account. All you need is the name on the account, an associated e-mail address, and the billing address. Amazon then allows you to input a new credit card. (Wired used a bogus credit card number from a website that generates fake card numbers that conform with the industry's published self-check algorithm.) Then you hang up. Next you call back, and tell Amazon that you've lost access to your account. Upon providing a name, billing address, and the new credit card number you gave the company on the prior call, Amazon will allow you to add a new e-mail address to the account. From here, you go to the Amazon website, and send a password reset to the new e-mail account. This allows you to see all the credit cards on file for the account — not the complete numbers, just the last four digits. But, as we know, Apple only needs those last four digits. Phobia, the hacker Mat Honan documents, was a minor who did this for laughs. One of his friends is a 15 year old hacker who goes by the name of Cosmo; hes the one who discovered the Amazon credit card technique described above. And what are teenage hackers up to these days? Xbox gamers know each other by their gamertags. And among young gamers it's a lot cooler to have a simple gamertag like "Fred" than, say, "Fred1988Ohio." Before Microsoft beefed up its security, getting a password-reset form on Windows Live (and thus hijacking a gamer tag) required only the name on the account and the last four digits and expiration date of the credit card on file. Derek discovered that the person who owned the "Cosmo" gamer tag also had a Netflix account. And that's how he became Cosmo. "I called Netflix and it was so easy," he chuckles. "They said, 'What's your name?' and I said, 'Todd [Redacted],' gave them his e-mail, and they said, 'Alright your password is 12345,' and I was signed in. I saw the last four digits of his credit card. That's when I filled out the Windows Live password-reset form, which just required the first name and last name of the credit card holder, the last four digits, and the expiration date." This method still works. When Wired called Netflix, all we had to provide was the name and e-mail address on the account, and we were given the same password reset. The techniques are eerily similar. The only difference between Cosmo and Kevin Mitnick is that they were born in different decades. Computer crime is a whole new world now, but the techniques used today are almost identical to those used in the 1980s. If you want to engage in computer crime, dont waste your time developing ninja level hacking skills, because computers are not the weak point. People are. [advertisement] How are you showing off your awesome? Create a Stack Overflow Careers profile and show off all of your hard work from Stack Overflow, Github, and virtually every other coding site. Who knows, you might even get recruited for a great new position!
http://www.codinghorror.com/blog/2012/09/computer-crime-then-and-now.html



[By Rss to Blog (Computer Tech)
Click Here
http://sbwasim.co.cc
Contact Me :wasimakhtar@sbwasim.co.cc]
[if you want to earn by Home just call Toll free No.02653090621 and give my userid DS630156 just try it its totaly free.]
[Recharge Mobile Online http://paytm.com/refer/sbwasim]
[Recharge Mobile Online http://paytm.com/refer/sbsamiksha]
[Want to earn by sending sms then go to http://ultoo.in/login.php?refererCode=12403E&flag=hide]
[If you want to advertise here contact me at wasim.akh2@gmail.com]

The Last PC Laptop

Ive been chasing the perfect PC laptop for over a decade now. Though Ive tolerated lugging around five to seven pound machines because I had to, laptops were always about portability first and most of all to me. I quickly gravitated to so-called ultraportable laptops as soon as they became available. The first one was the 2003 Dell Inspiron 300M. It was the first laptop I found that delivered a decent 3-ish pound package without too many compromises. How I loved this little thing. But there was a downside to that 2003-era ultraportability – the default battery in the system provided about 2 hours of runtime. Switching to the larger battery extended that to a much more respectable 5.5 hours, but it also added a pound to the system and protruded from the rear a bit. Ive pursued the same dream of reasonable power with extreme portability ever since, with varying degrees of success. The PC industry isnt exactly known for its design leadership, and it can be downright schizophrenic at times. So if you were a fan of laptops that were actually thin and light and portable, its been rough going for a long time. 2007s Dell XPS M1330 was a brief bright spot, but honestly, its only in the last few months Ive found an ultraportable that lived up to my expectations, one that I feel confident in recommending. That laptop is the Asus Zenbook Prime UX31A. Having lived with this laptop for about two months now, I can safely say it is without question the best PC laptop Ive ever owned. Consider the Tech Report review and the Engadget review, both rave. Heres what you need to know: Retina-esque 1920x1080 resolution in an amazingly high quality 13.3" IPS display Intels latest 17 watt Ivy Bridge processor with (finally!) decent integrated graphics 128 GB SSD with fast 6Gbps interface Just under 3 pounds Decent 6 hour runtime Classy brushed metal case and cover All of this for about $1,050 at the time of writing. If youre suffering through a sub-par TN display on your current laptop, the awesome IPS display is almost worth an upgrade on its own. After switching to bargain Korean IPS displays on the desktop, Im desperately hoping my poor eyeballs never have to endure another awful TN LCD display for the rest of my life. This is a machine that pleasantly surprised me at every turn. The keyboard is solid feeling with a dimmable backlight, and the achilles heel of all PC laptops, the trackpad, is about as good as it ever gets on PCs. Which is to say still not great. Even the power adapter is classy, although highly derivative of Apple. While this is substantially closer to the ideal ultraportable hardware Ive had in my brain since 2003, it still exhibits some of the same problems I experienced with that Inspiron 300M almost 10 years ago: An operating system pre-loaded with useless craplets and pointless bloatware, all in the name of hypothetical value add by the vendor and/or marketing subsidies. Several branding stickers I had to peel off the machine after I opened the box. (Note that the press photos for a machine never include these ugly stickers. Go figure.) A trackpad that works kinda-sorta OK, but never quite inspires enough confidence that I can stop carrying an external mouse around in my laptop bag with me. The first thing I did when I got the laptop was wipe it and install the Windows 8 preview, and soon after updated it to the final Windows 8 release. Despite all the grousing about the tablet-centric nature of Windows 8 – some of which is warranted, but can easily be ignored entirely – I am an unabashed fan of the operating system. It is a big improvement over Windows 7 in my day to day use. The more I use Windows 8 the more I believe its the biggest step forward in Windows since Windows 95. So what Ive put together here is probably the best, most platonic ideal form of Wintel laptop hardware you can buy in mid-2012. (In the interests of full disclosure, I actually own two of these. One for my wife and one for me. Because I am an inveterate hotrodder, I had to have more memory and a larger, faster SSD. So I bought the UX32VD model which has a discrete Nvidia 620M GPU and, most importantly, can be upgraded internally. So I dropped in a Samsung 830 512 GB SSD and 8 GB DIMM. This led to a slightly oddball final configuration of 10 GB RAM and an internal embedded 32 GB SSD plus the 512 GB SSD. It hurts battery life by at least an hour, too. You should also know that the teeny-tiny Torx screws on the back of this laptop are not to be trifled with. Bring your jewelers loupe. In case it wasnt already abundantly clear, let me spell it out for you: going this route is not recommended unless you are as crazy as I am. The base model is really nice! Trust me!) If pressed, I might admit the combination of ASUS Zenbook Prime hardware and modern Windows 8 amenities lives up to the whole Intel "Ultrabook" marketing schtick. But Im not sure thats enough any more. Every time I leave the house – heck, every time I leave the room – I have to decide what kind of computer Im going to take with me, if any. Besides the ultraportable laptops, I now own an iPhone 5, several retina iPads, and a Nexus 7. Im sure there are many more of these devices on the way. In the calculus of deciding what kind of computing device I want with me, even the most awesome ultraportable laptop I can find is no longer enough. Consider: Want 10 hours of real world battery life? Even when doing actual work that would ramp the CPU up? Many tablets and phones can achieve that magical 10 hour battery life figure, but it will be a long, long time before you reliably get that out of any ultraportable laptop. Personally, I blame x86. Want to start doing stuff immediately? Even Windows 8, which has radically improved wake times, is laughably slow to start up compared to tablets and phones which are practically instant-on by design. Want the smallest most portable device you can get away with? Its unlikely that will be a laptop, even an ultraportable, because of the implied keyboard and connectivity ports, plus the big screen and hinge. There is no form factor more compact than the touchscreen tablet. And youve got to take your phone along in any case, because thats how your family and loved ones will contact you, right? Have you seen the iPhone 5 benchmarks? Its faster than most tablets! Want to be always connected to the Internet? Sure you do; how else can you get to Stack Overflow and Stack Exchange for all of lifes essential questions? Then you probably need some kind of cellular support, for 3G or 4G or LTE or whatever the telephone companies are calling high speed Internet access these days. That is quite rare on traditional laptops, but obviously common on phones and much easier to find on tablets. Want easy access? Just try opening a laptop on a crowded subway train or bus. Or with, say, 3 toddlers running around your house. I dare you. But phones and 7" tablets offer easy one handed operation; you can whip them out and fill whatever time you have available, whereas cracking open a laptop feels like a sizable commitment in time and space to doing something. My laptop is increasingly a device I only take when I know Ill need to do a lot of typing, and/or Ill need a lot of screen space to work. But even a phone could do that if it had decent support for bluetooth keyboards and external displays, couldnt it? And even a few programmers, the audience who would most need all the power and flexibility of laptops, are switching to tablets. Ive waited 12 years for the PC industry to get its collective act together and, if nothing else, successfully copy Apples laptop hardware designs. Now that they (mostly) have, I wonder: is it too late? Has the PC industry irrevocably shifted underneath them while they were so busy pumping out endless refinements to generic x86 boxes? I love this new laptop, and in many ways it is the perfect ultraportable hardware I dreamed of having in 2003. But every time I power it up and use it, I feel a little sad. I cant shake the feeling that this might end up being the last PC laptop I ever own. [advertisement] Stack Overflow Careers matches the best developers (you!) with the best employers. You can search our job listings or create a profile and even let employers find you.
http://www.codinghorror.com/blog/2012/09/the-last-pc-laptop.html



[By Rss to Blog (Computer Tech)
Click Here
http://sbwasim.co.cc
Contact Me :wasimakhtar@sbwasim.co.cc]
[if you want to earn by Home just call Toll free No.02653090621 and give my userid DS630156 just try it its totaly free.]
[Recharge Mobile Online http://paytm.com/refer/sbwasim]
[Recharge Mobile Online http://paytm.com/refer/sbsamiksha]
[Want to earn by sending sms then go to http://ultoo.in/login.php?refererCode=12403E&flag=hide]
[If you want to advertise here contact me at wasim.akh2@gmail.com]

Firefox Featuregate: Hidden Secret Key to Turn On/Off New Features

Mozilla Firefox is one of the most popular and widely used web browsers for computers. The developer team behind Firefox works hard and keep...