web marketing

Search site

Web Marketing Resources Home

Web Marketing Articles

Search Engine Optimization

Free Training

Marketing Jokes

Current Issue

Back Issues

John's Articles

Free Search Engine Marketing & Optimization Tools:

Keyword Suggest
Keyword Density
Keyword Typos
PageRank Search
Future PageRank
Link Popularity

Chamber of Commerce - on the Web logo

                      WEB MARKETING EZINE
                The Human Face of Web Marketing
May 1st., 2002             Issue #188              ISSN 1444-2027


1. Sponsor's Message
2. First Word
3. Tips, Tools, News and Views

- Free eBook: 'eBooks: A Complete Guide To Publishing'
- A Superior Free Web Host
- A Cool Tip on Link Popularity
- What Are The Laws on Spam?
- More PayPal Problems 
- Free Training Course of The Week: SE Optimization
- E-Commerce Term Of The Week: Firewall

4. A Touch of Humor: Getting To The Bottom of AOL's Marketing
5. Classified Ads
6. Free Training Courses
7. Feature Article: Help! There's an Intruder in my Computer 
8. Our Companion Ezine 
9. Administrivia

Visit our companion website at http://www.WebMarketingEzine.com

Want to read this online? For your convenience, the Current Issue 
of WME is posted each week at the WME website. Just visit 

1. Sponsor's Message

Professional Web Design Secrets the Pros Don't Want You to Know

If you're marketing a product or service on the Internet, a 
professional looking website is an absolute essential part of 
your success.

Although learning HTML is the first step, you'll find that most 
HTML tutorials only provide you with very basic information. 

You're then forced to spend countless hours trying to achieve a
certain design and locate special effect codes. 

Until Now...

Web Design Mastery is a complete Internet Marketers Reference 
Guide. Not only will you learn how to design a professional 
website, but you'll also learn in the easiest possible fashion --
with hundreds of copy & paste codes... For More Information

2. First Word

Hi All!

I received a lovely note from Shelley Lowery, webmistress of
web-source.net "Your new site looks great! You've done a 
wonderful job and I wish you the best of success." I really
value Shelley's opinion, as she's been writing on good web site
design for years. Shelley wrote one of the classic articles on
the subject, and used to review websites for an Award program 
she ran. Now she's released a valuable new eBook on the subject,
"Web Design Mastery". I believe it's selling strongly, and I'm 
not surprised! You can find out more details in the Sponsor's 
Message (above).

Till next week, have a good one!


Thought For the Week:

"When a finger points at the moon, the imbecile looks at the 
- Confucius 
3. Tips, Tools, News and Views

Free eBook: 'eBooks: A Complete Guide To Publishing'

If you'd like to learn how to produce your very own eBooks and
infoproducts, then Shelley Lowery's FREE eBook is for you. Topics
covered include;

- Researching 
- Brain Storming 
- Designing Your Ebook 
- Compiling Your Ebook 
- Uploading Your Ebook 
- Designing Your Ebook's Website 
- Writing Effective Sales Copy 
- Creating a Download Link 
- Promoting Your Ebook 
- Accepting Payment 
- Setting Up an Affiliate Program 
- Increasing Your Ebook Sales 
- and Much, Much More!

To get your FREE download, just click on the link... 
(Disclosure: I am an affiliate for Shelley's 'eBook Starter')

A Superior Free Web Host

Think of using a free web host for business, and you immediately
run into problems. Most free hosts;

- don't allow you to use your own domain name
- carry banner or pop-up advertising
- don't allow you to FTP your files
- don't provide you with a cgi-bin
- give you a small amount of space

I'f you choose to use a free web host, but don't want these
restrictions, check ou Portland Communications. They provide a
very handy package, with 15MB of space, at 

A Cool Tip on Link Popularity

I'm currently enjoying Dennis Gaskill's excellent Search Engine 
Optimization Course. To learn more about the Course, visit

As we've been talking about linking and link popularity in WME
recently, I just had to bring you this great Tip from the Course;

"Here's a neat little way to find good sites to trade links with,
sites that you know get a decent amount of traffic. This is 
especially useful if your site is new, because without having an 
established presence with decent traffic, you'll be somewhat 
limited in the sites you'll find willing to exchange links with 

The free page tracking service called Extreme Tracking makes 
their stats available to the public. The trouble is, they don't 
list them anywhere for you to conveniently click and view. Alta 
Vista to the rescue! If you go to Alta Vista and type in:

link:extreme-dm.com/AND your_keyword

...make sure to include the word AND in there, a space, and
then your keyword; and then click the search button. Alta Vista 
will return a list of sites that link to Extreme Tracking and 
also contain your keyword, so odds are many of them will have 
relevant content.

Most of these will be found by Alta Vista through the code they 
use to track their hits. Click to go to a site, find the Extreme
Tracking icon and click it, and you'll go to their stats pages. 
The Extreme Tracking icon is a little black square with a blue 
globe, with white glowing edges and a Jupiter type ring circling
the globe. The ring has a jagged place in the front of it like 
it's electrified.

Sometimes webmasters hide the icon by reducing it to 1x1 pixels
in size, or by other means, so you may have to look at the 
source code to find it. If it's not in the source code they may 
have removed it from the page and the search engine is returning
results from a page it hasn't updated recently. Find the busy 
sites and request a link trade. Good little trick!"

Good one, Dennis, good advice as always. To receive Dennis' free
email course, visit http://www.boogiejack.com/seos.html

Discover "The Invisible Path to Success"!

FREE five lesson class shows you a refreshingly original and 
shorter path to improving your finances, relationships, spiritual
life, career, enjoyment of life and more. To enroll (free) visit:


What Are The Laws on Spam?

The laws on spam differ from country to country, and from state 
to state. David E. Sorkin is Associate Professor at The John 
Marshall Law School's Center for Information Technology and 
Privacy Law. He maintains a listing of laws covering spam at
http://www.spamlaws.com/ For readers who want to go deeper into
the subject, there is an extensive list of articles on spam, 
and legal case studies. 

More PayPal Problems

Inspired by my rant about PayPal's so-called Consumer Protection
last week, WME reader Mika Gruber sent us this note... 


I know exactly how you feel. I went through almost the exact same
thing with another merchant whose claims led me to believe I was
purchasing "almost new" and "in 9-1/2 out of 10 condition" 

However, upon arrival it was damaged, and very dirty & even 
rusty. I even paid for USPS Priority Mail, and Insurance. It was
sent without insurance, and at bulk package class rates.

Not only did the same thing happen with PayPal, it went the same
with eBay, too. They did send some email back and forth, being 
the middle-man, but in the end I lost $57 plus the shipping of 

Thanks for the mention of this alarming fact in your e-zine. I 
too WAS a (happy) PayPal merchant.



WME readers interested in this subject will enjoy a very
thorough and balanced article on PayPal published by one of our
Friends, Dr Ralph Wilson. It's called "Assessing Criticism of 
PayPal", and you'll find it at 

Do you Publish a Newsletter or Buy Ad Space in Them?

If so you need EzineAdAuction.com. Only Ezine Ad Auction brings 
publishers and advertisers together to buy and sell ad space at 
great prices in an auction setting. If you're not advertising in
newsletters you really should be....It's a great way to increase 
your website traffic. Free to register- 
BONUS products valued at over $300.00 just for signing up.
Go now to http://www.EzineAdAuction.com

Free Training Course of The Week: Search Engine Optimization

Search Engine Optimization Strategies is a free seven week course
in legal search engine optimization, written by our old (or is 
that middle-aged?) friend, Dennis Gaskill. His Boogiejack.com 
website is an excellent example of a highly-useful, content-rich
site. The course covers all the important topics, and NO spam 
techniques or illegal methods are taught that can result in your
site being banned from the search engines. A valuable read.

To learn more about this, and many other free training courses, 
visit out Free Training Courses page at 

E-Commerce Term Of The Week: Firewall

A system designed to prevent unauthorized access to or from a 
private network. Firewalls can be implemented in both hardware 
and software, or a combination of both. Firewalls are frequently
used to prevent unauthorized Internet users from accessing 
private networks connected to the Internet, especially intranets.
All messages entering or leaving the intranet pass through the 
firewall, which examines each message and blocks those that do 
not meet the specified security criteria. 

There are several types of firewall techniques: 

Packet filter: Looks at each packet entering or leaving the 
network and accepts or rejects it based on user-defined rules. 
Packet filtering is fairly effective and transparent to users, 
but it is difficult to configure. In addition, it is susceptible 
to IP spoofing. 

Application gateway: Applies security mechanisms to specific 
applications, such as FTP and Telnet servers. This is very 
effective, but can impose a performance degradation.

Circuit-level gateway: Applies security mechanisms when a TCP or
UDP connection is established. Once the connection has been 
made, packets can flow between the hosts without further 

Proxy server: Intercepts all messages entering and leaving the 
network. The proxy server effectively hides the true network 

In practice, many firewalls use two or more of these techniques 
in concert. 

A firewall is considered a first line of defense in protecting 
private information. For greater security, data can be encrypted. 

-Source: http://www.webopedia.com/TERM/f/firewall.html 

4. A Touch of Humor

Getting To The Bottom of AOL's Marketing 

A COMPUTER magazine that Patrick Flynn bought recently came with
a free CD. Inside the envelope containing the CD was a card from
AOL which gave him a registration number and password and invited
him to use them in a free trial. The password was "GECKO-CLOACA".
He was rather surprised to be invited to use the words for a 
lizard's anus as his Internet password.

-Source: New Scientist

5. Classified Ads
Ezine Advertising WORKS! Showcase your ad. in "The Human Face of
Web Marketing", at just $20 for four insertions. Just go to

How Much Is One Good Sales Letter Worth To Your Business?
Make Your Site Sell- The Most Important Free Download You'll Make 
FREE five lesson class shows you how to improve the your results 
email to mailto:[email protected] 
Read about your business's future at: 
Improve Your Search Positions-Get your FREE WebPosition Software
Earn Advertising Income From Your Website Or Mailing List! 
Article Announce - The Free Writer & Publisher Connection 
Subscribe: mailto:[email protected]
Your own infoproduct? Take the FREE InfoProduct Masters course!
Just send a blank e-mail to mailto:[email protected]
Serious about writing that book? Look at this site!
Become a high-earning Affiliate-take The Affiliate Masters course
Send a blank e-mail to mailto:[email protected]
6. Free Training Courses

Increase your knowledge; hone your skills; improve your results!
Take advantage of some of the finest FREE training courses on the
Web by visiting our Free Training Course listing at;

7. Feature Article

Help! There's an Intruder in my Computer
by June Campbell 

Do you have passwords, love letters, naughty pictures or 
sensitive business information stored on your computer's hard 
drive? If you have a continuous Internet connection such as 
cable, xDSL, ISDN or other, you should know that it's almost 
embarrassingly easy for a hacker to break into a networked 
computer. Once in, they can use your private information any way
they see fit. As well as getting your personal documents, the 
hacker can damage your system files or install software on your 
disk that allows your computer to be used in Denial of Service 
attacks and other destructive activities. 

Similarly, the hacker can activate your interior microphone or 
interior video recorder without your knowledge. This lets them 
record and distribute sound and video files of the conversations
and activities taking place in your work area. 

How Hackers Do It 

Every Internet-connected computer has a unique set of identifying
numbers called an IP address. Using special software 
applications, hackers send out probes over the Internet looking 
for live IP addresses. If they locate your computer, they look 
for "holes" or vulnerabilities that leave your system insecure. 

For example, a computer is likely to have multiple applications 
(email, web browser, etc.) running on the same IP address. Each 
application is assigned a number called a "port" that uniquely 
identifies that service on a computer. 

Ports that allow an application to send or receive information 
from the Net must be "open". In some unprotected systems, even 
ports that are not in use have been left open -- practically 
inviting attack! When hackers discover an unprotected, open port,
they can use that opening to gain access to your system. 

An unprotected broadband connection is easiest to hack because 
both the connection and the IP address remain constant. If a 
hacker or a "script kiddie" finds your computer once, they can 
readily find it again. (Script kiddie is a derogatory name used 
by professional hackers to describe simple scripts used by young 
and inexperienced hackers). 

The threat is less severe for persons connecting to the Internet
via dial-up modems. Dial-ups usually connect with a different IP
address each log-on. Therefore, if hackers have found a system 
once, the changing IP address will make it difficult (not 
impossible) to find it again. 

However, if a trojan horse or back door program has been installed
on a system, the trojan horse could "phone home" with the IP 
address each time an Internet connection is made. 

Back door programs allow remote users to control a system without 
the owner's knowledge. They are installed on computers by hackers, 
or sometimes come secretly bundled with software applications that 
the user installs. Well-known back door programs for Windows 
computers include Back Oriface, NetBus and SubSeven. 

Firewalls: Your First Level of Security 

Firewalls are software applications or hardware devices that you
install on your system. They are designed to prevent unauthorized
access to or from a private network that is connected to the 
Internet. When a firewall is installed, all incoming or outgoing 
messages pass through the firewall. Those that do not meet the 
specified security criteria are blocked. 

Most home firewalls are software applications. 

How Firewalls Work 

There are various types of firewalls, and they work through 
different processes. However, the following is true for most of 
the home or personal firewall software that is used today. 

Information over the Internet is sent in "packets" of data. These
packets travel from a source machine to a destination machine --
which could be two feet away or two continents away. Each packet 
of data contains the IP address and port number of the 
originating machine. 

The firewall software inspects every packet of data that arrives 
at the computer -- BEFORE that data is allowed entry into the 
system and before it connects with an "open" port. The beauty of 
a firewall lies in its ability to be selective about what it 
accepts and what it blocks. The firewall has the ability to 
refuse any suspect data. If the incoming data is ignored and not 
allowed in, that port will effectively disappear on the Internet 
and hackers cannot find it or connect through it. In other words,
instead of receiving a signal that a port is open, the hackers 
receive nothing back and have no way of connecting. 

Several firewall applications are available to the small 
business operator or the home computer user. Before changing
firewalls or installing one for the first time, it's wise to
check out the comparative testing that has been done on 
these applications. 

Persons already running a firewall could test it's effectiveness
by trying the Shields and Ports test available at Gibson's 
Research Corporation (GRC) web site, or by downloading and 
running the LeakTest software available on the site . 

GRC's Steve Gibson has some surprising test results posted in 
conjunction with LeakTest's personal firewall scoreboard . 

The best-rated one is free. Not only did Zone Lab's Zone Alarm 
score best in Gibson's testing, but the firewall has been 
recognized for excellence by CNET, PC World, PC Magazine and Home
Office Computing . 

Other well-known firewalls include McAfee firewall, Sygate 
Personal FW, Symantec/Norton and Tiny Personal FW. 

Now, the bad news. A firewall protects you from open ports, but
it does not protect you from data coming and going through ports
that you allow. Malicious code can invade your system from email
attachments or by visiting a hostile web site. And remember -- 
even well trusted web sites can suddenly be hostile if hackers 
have added malicious code without the site administrator's 

Test your security against malicious code at Finjan Software's 
web site. Many of you will be dismayed to find that your 
supposedly secure system is vulnerable. 

Malicious code blocking software such as Finjan's Surf n' Guard 
analyzes incoming data and decides whether the code could be 
harmful. ZDNet recommends that code-blocking software be used in 
addition to firewall and your antivirus software. 

Too Late? 

What if you think you've been hacked? Call your computer guru to
help, or check out the information at sites like HackFix. 

About The Author:
How to Write Business Plans, Business Proposals, JV Contracts, 
Human Resource Package, and More! No-cost ebook "Beginners 
Guide to Ecommerce". Business Writing by Nightcats Multimedia 
Productions http://www.nightcats.com/

8. Our Companion Ezine: A Better Life:ItsYourFuture!

======================= ITS YOUR FUTURE! ========================
Enjoy Humor, Inspiration, Romance, Fitness, Nutrition & Personal
Finance- all aimed at helping YOU to take control of YOUR future!
Subscribe FREE by sending a blank email to:
mailto:[email protected]
=========== BE HAPPY BE HEALTHY LIVE LONG & PROSPER ===========

9. Administrivia


Contact Information:
to subscribe: mailto:[email protected]
to unsubscribe: mailto:[email protected]
Note: This is an Ezine. So sorry, NO postings are accepted
contact John Payne: [email protected] NO SPAM PLEASE

Advertising Information:
Please go to: http://www.webmarketingezine.com/advertise.shtml 

This publication was designed to provide accurate and 
authoritative information with regard to the subject matter.
Subscribers are sent this free weekly e-zine with the 
understanding that the publisher is not engaged in rendering
legal, or other professional advice. If legal advice or other
professional assistance is required, we advise seeking the 
services of a competent professional.

John Payne does not accept any responsibility for any 
liabilities resulting from any claims in articles or
advertisements published in WME, or the actions of the parties 

This publication is for informational purposes only.

Copyright 2000-2002 John Payne All rights reserved.
Web Marketing Ezine may only be redistributed in its unedited
form. You are welcome to forward it to as many people as you 
like, with our thanks. Written permission must be obtained to
reprint or quote original material published in Web Marketing
     This e-zine is a member of Ezine PUBLISHERS ASSOCIATION
           Join Free At: http://www.EzinePublisher.org

         Web Marketing Ezine is published by John Payne 

©WebMarketingEzine.com 2000-2015
Postal Address: 13 Finnerty Pl. Kambah Canberra ACT 2902 Australia
+61 2 6282 6266