Thursday, January 24, 2013

Automotive Dealership SEO - Search Engine Optimization and Video Search ...




Tuesday, January 15, 2013

Social Media Networking




You heard social media networking was the key to an effective marketing campaign in today’s digital world and jumped on the bandwagon. So, where are all those new customers and outstanding sales figures? Social networking, like everything else, has to be done correctly in order to be effective. Here are the most common mistakes companies make in social media, and how to take your suck to good luck.

Do Your Posts Sound Too Promotional?

Carter
Image via Flickr by Loozrboy
Are your posts and tweets blatant promotional content or something the readers see asvaluable? For example, “Check out our new products!” is only going to attract the few readers who are already hooked on your stuff. Instead, try something like, “5 Things You Can’t Do Without This Season.” This statement builds interest and excitement without being in-your-face advertisement. After all, one of the reasons social media is more effective than traditional advertising is because it offers something of value not just a shameless promotion, which is quite easy for consumers to ignore.

Are You Automating Streams of Content?

Carter 2
Image via Flickr by Barmala
Do you set your Facebook page, Twitter feed and other social networking accounts to spit out automated content all day every day? If so, you can fully expect readers to completely ignore your stuff and quickly opt out of receiving your spammy messages. That’s one of the 10 ways to suck on Twitter. Readers want substance, not fluff. They don’t care to hear drone messages, but they are interested in receiving up-to-date, meaningful information. For example, if you’re selling widgets, give them great information about widgets. What are the safest widgets on the market? What size widget is best for your wing ding? When is the best time to buy a widget? Articles like these give the customer information they want and need, which builds goodwill between your company and your customers.

Are You Engaging in One-Way Conversations?

Carter 3
Image via Flickr by cooper.gary
Some companies just spit out information at consumers with no input and commentary from the people who matter most. Effective social media networking doesn’t leave out the “networking” part – it’s a two-way conversation. When people use social media, they want to communicate back. This means having staff members who respond and reply to comments, answer messages and let consumers know there really are humans behind that logo. Furthermore, the most successful companies in social marketing encourage comments and questions. Opinion polls, open-ended questions and other ways to illicit input from customers helps build relationships, not just advertisements.
Once you build something of value to readers and open the portal to two-way communications, you’ll see an entirely different side of social media networking for marketing. Are all the comments from consumers going to be positive? Absolutely not. However, smart companies can weed out comments from the haters and get a lot of insight from the average consumer. Are people constantly complaining about a particular part of your product? Is price the biggest problem or quality? Even negative comments can trigger necessary changes in your company to offer a product consumers want to buy – and give them a message they want to spread to others.
See? You really don’t have to suck at social media networking. It just takes some planning and practice to get social media networking right. What are your thoughts?


Timothy Carter
Timothy Carter is the search & social media mind at Smash Hit DisplaysTrade Show Displays . When Tim isn't telling the world about the great work his company does, he's helping others with their social media marketing. In his free time he's teaching his wife and kids how to rock at disc golf and ping pong.

ProxyChains + Tor Backtrack 5 R3 Tutorial

To remain anonymous is one of the
important aspect of Information Security, if you want to conduct
penetration testing on a remote computer then active connection is
required which surely reveal your identity, sometimes you need to
hide your identity while doing vulnerability assessment because of
your anonymity and security. Proxy Chaning is a concept which is very
helpful to hide an identity on the Internet.





What is Proxy Chaining?







Your Computer →
Proxy Server → Target Computer

Proxy Concept


The concept mentioned
above is the concept of simple proxy, when a user uses one proxy
server to hide his/her identity.

Your Computer →
Proxy Server 1 +.......+ Proxy Server N → Target Computer



Proxy Chains


Now the usage of
multiple proxies at a time is called Proxy Chaining, it is reliable
in-terms to hide the identity. In simple words

Proxy Chaning is the
process to use multiple proxies in chain.”

What is Proxy Chains?


The
basic concept of proxy chaining is discussed now in this section we
will discuss the practical aspect of Proxy Chaining, Proxy Chains
(ProxyChains) is an open source program which allows you to make TCP
and DNS connection by using proxy for example TOR.

TOR
is not necessary for proxychains, you may use any SOCKS 4, SOCKS 5
and HTTPS proxy. There are so many advantages of Proxy Chains for
example:



    • Hide identity
    • It can bypass
      Firewall (If you are behind a firewall or local proxy server)
    • And many more

      Proxy Chains Tutorial


      Proxy
      Chaining can be achieved on Windows OS too but in this section I will
      discuss Linux Backtrack, you may use any Linux distribution including
      Ubuntu.

      In
      Backtrack 5 R3 proxychains is already configured but if you are using
      any other version of Linux you may download it from official website.
      Follow the command mentioned below to get proxychains via terminal.

      root@bt:~#
      apt-get install proxychains

      Now the second step is to configure proxychains, there
      are two options that can be used whether use nano to edit config file
      on terminal and the other option is to use your favorite editor, both
      commands are mentioned below.

      root@bt:~# nano /etc/proxychains.conf
      --OR--
      root@bt:~# sudo gedit /etc/proxychains.conf

      The second option has been used to discuss this
      tutorial, you may see that there are three options along with there
      definitions and usage.




      • Dynamic
        Chain
      • Strict
        Chain
      • Random
        Chain
      ProxyChains Configuration


      Delete
      # from the front of technique that you want to use, its time to get
      some proxies. Private and highly anonymous proxies work best (if you
      can afford) otherwise use the publicly available proxies.

      Do
      not delete the last line, add your proxy list after this line.


      Proxy Chains Configuration


      Dynamic
      chain is very good if you are using publicly available proxies.

      Proxy Chains usage is very simple (proxychains <prog> [args])

      root@bt:~# proxychains nmap ehacking.net

      root@bt:~# proxychains firefox

      root@bt:~# proxychains msfconsole

      root@bt:~# proxychains telnet 192.168.1.1


      Example:

      Proxy Chaining
       This tutorial completely demonstrate the basic concept and usage of Proxy Chaining and Proxy Chains, if you have any question then feel free to ask on the comment box. 








      Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.


      *

      *

      Wiredwizrd

      Morgan Todd Lewistown, PA

      Experienced Information Technology Manager with a strong knowledge of technical guidance, IT best practices, security protocols, team leadership, and analyzing business requirements.
      Google