Exclusive for Adland Subscribers.
1.) How to get listed on Yahoo
1. Make sure that you have quality site. No tip is going to help you if your site is useless.
2. Register your own domain name like this www.yourname.com
3. Go to yahoo and find category which fits your profile (make sure that this is the right category) If you put your site into regional parts of Yahoo this might help.
4. When you are asked for your email address enter it like this
e.g. email@example.com (yahoo)
this little (yahoo) in the email field will make Yahoo reviewers look at your site as one who know their secret password, which means that you belong to quality discussion group which recommends this to their subscribers.
You might try to skip point 2) but not any other one.
2. My thoughts on Y2k. by Steve Hartung
THE KEY TO "PERMANENT" Y2K COMPLIANCY... FIX ALL 3 CLOCKS!
WE HAVE BEEN MADE AWARE OF THE NEED TO ROLL OUR COMPUTERS CLOCK FORWARD TO THE LAST MINUTE OF THE LAST DAY OF 1999, ALLOW THE DATE TO ROLLOVER TO THE YEAR 2000, SWITCH OFF THE PC, WAIT A MINUTE OR TWO, SWITCH ON THE PC, AND IF THE DATE IS STILL JANURARY, 1, 2000, THEN YOUR PC IS Y2K COMPLIANT, RIGHT? UNFORTUNATELY, WE MAY HAVE BEEN MISINFORMED.
THE VAST MAJORITY OF NON-COMPLIANT PCs WILL INDEED FAIL THIS TEST, BUT A UNKNOWN PERCENTAGE WILL GIVE A "FALSE POSITIVE" RESULT. IF YOUR PC GIVES YOU A FALSE POSITIVE, (and you will not know this happened) THE YEAR DATE WILL REVERT TO A 20 YEAR ERROR AT A RANDOM TIME IN THE FUTURE. THIS IS CAUSED BY THE VAGUE FAILURE MODE OF THE BIOS (basic input output system) . THE Y2K PROBLEM WAS NOT FORSEEN DURING THE DESIGN STAGE OF THE BIOS.
WITH THE SPECTRE OF POSSIBLE LEGAL ACTION LOOMING IN THE YEAR 2000, HOME AND BUSINESS PC OWNERS MUST BE CERTAIN THAT ANY "FIX" WILL STILL BE 100% EFFECTIVE IN THE YEAR 2000 AND BEYOND.
IN ORDER TO OBTAIN "COMPLETE Y2K COMPLIANCE", ALL THE PCs MUST BE FREE OF THE Y2K HARDWARE "BUG", OR IT IS ENTIRELY FEASIBLE THAT THE 20 YEAR ERROR FROM JUST ONE PC CAN BE UNWITTINGLY TRANSMITTED IN THE DATA THROUGHOUT THE DOMAIN OF THE MAINFRAME, MUCH AS A VIRUS IS DESIGNED TO DO.
TO ADDRESS YOUR PCs "INTERNAL RISKS", THE RTC ( real time clock), SOFTWARE CLOCK AND THE OPERATING SYSTEMS CLOCK, MUST BE COMPLIANT FOR A "PERMANENT" Y2K FIX.
A SOFTWARE PATCH OR "FIX" WILL ONLY WORK WITH A VERY FEW SPECIFIC PROBLEM TYPES. THEY CAN FIX THE RTC ( real time clock) LIVE ROLLOVER PROBLEM, AND EVEN THE BIOS LIVE ROLLOVER. THEY CANNOT FIX LEAP YEAR PROBLEMS, NOR HARDWIRED CENTURY BYTES OR UNSUSPECTING INDIVIDUALS NOT KNOWING WHAT THE PATCH SOFTWARE IS, COULD EASILY REMOVE THE PATCH SOFTWARE, PLUS ANY NUMBER OF OTHER SITUATIONS THAT WILL CERTAINLY ARISE.
A SOFTWARE FIX IS PROBABLY NOT THE WAY TO GO. IF YOU CAN FIND ANY OTHER FIX, THEN GO THAT ROUTE. PASS UP ALL SOFTWARE FREEBIES AND GET SERIOUS ABOUT DOING IT RIGHT THE FIRST TIME! OR YOU MIGHT BE MADE AWARE THAT THE LEGAL ISSUES OF NOT BEING "LONGTERM" COMPLIANT ARE OVERWHELMING... THE LEGAL RAMIFICATIONS HAVING THE POTIENTIAL TO BANKRUPT A BUSINESS MUCH QUICKER THAN BEING "HALF ASSED" COMPLIANT.
SO WHY IS 100% EFFECTIVE HARD TO FIND!
IF YOU WANT PROOF, SEARCH FOR A "PERMANENT HARDWARE FIX" THAT COSTS LESS THAN A MOTHERBOARD REPLACEMENT, WITH A BRAND NAME THAT YOU CAN BE SURE WILL BE AROUND IN THE YEAR 2000 AND BEYOND. CHECK TO BE SURE THERE IS A GUARANTEE ETC..THE BOTTOM LINE BEING, A SOLUTION THAT IS 100% LONGTERM EFFECTIVE THAT GIVES 100% PIECE OF MIND. ACCEPT NOTHING LESS!
THERE IS GOOD NEWS!
THERE IS ONLY ONE BIOS HARDWARE FIX ON THE MARKET I HAVE FOUND THAT ADDRESSES ALL 3 CLOCKS. THE HARDWARE EVEN COMES WITH AN ASSURANCE POLICY THAT WILL PAY OUT $5000 PER PC IF YOUR HOME OR BUSINESS PC FAILS WITH THIS BIOS HARDWARE INSTALLED. YOU CERTAINLY WON'T GET THAT FROM ANY SOFTWARE PATCH OR "FIX". ALSO MOST OF THE EARLY PENTIUM MODELS SOLD ARE NOT Y2K HARDWARE COMPLIANT. NOBODY GETS OFF EASY.
THE WEBSITE ADDRESS IS:
Article written by: Steve Hartung
3003 Valmont Rd. #8
Boulder, CO. 80301
3. Robert Olson's doorway page template
<TITLE>place a couple keyword phrases here</TITLE>
<META NAME="description"content=" place your description here made up of short descripive sentences using your keyword phrases">
<META NAME="keywords" content="place your keywords and keyword phrases here separated with comma's ">
<META NAME="resource type" content= "document">
<META NAME="distribution" content="global">
<META NAME="revisit-after" content="7 days">
<META NAME="robots" content="index,follow">
<TABLE BORDER=0 WIDTH=600 CELLPADDING=5>
<H1 align="center"> the headline for your page goes here made up of one or two of your keyword phrases</H1>
<P>If you are looking for any of the following items:
<LI><A HREF="http:// place url here"> place a keyword phrase here</A></LI>
<LI><A HREF="http://place url here"> place another keyword phrase here</A></LI>
<LI><A HREF="http://place url here"> place a descriptive sentence with keyword phrase here</A></LI>
<LI><A HREF="http://place url here"> place another descriptive sentence with keywords here </A></LI>
<LI><A HREF="http://place url here"> place one last descriptive sentence with keyword phrases here</A></LI>
<P>Search no more. You'll find it at <A HREF="http://place url here"> place your webpage name here</A>
<P>place a short descriptive paragraph with a keyword phrase ... should be a benefit someone gets when they visit your site</P>
<P>place another descriptive paragraph here </P>
<P>place another descriptive paragraph here</P>
<P>At <A HREF="http://place url here"> place your webpage name
here</A>, you'll discover an easy to use, information packed web site where you can
get keyword phrase here! <A HREF="http://place url here">Click
Robert Olson has a great training newsletter for internet beginners.
FreeWebPromote - Place free ads to over 3380 High Traffic Websites with one
click. Get Free Software - Remembers passwords/all personal data and fills
out internet forms for you! Plus subscribe to FreeWebPromote a great
4. Melody T Vargas AOL & long messages 4. Melody T Vargas AOL & long messages
In #135, we were asked for tips on downloading larger
messages in AOL.
AOL will truncate all long messages. In answer to Bogdan's
question about optimal size, it's too small. I tested issue 135
and it truncated at the bottom of the Power Tip at the top - it
didn't even make it to the topic list.
Luckily there are two ways to read the whole message, even
though you can't read them in the AOL email program.
AOL creates an attachment that you can download and read
by opening the file. There is a download icon at the bottom of
the email message. This is a little annoying to have to do with
any frequency and this isn't the preferred method.
Here is the easiest way around it:
1. In AOL or in your favorite web browser type in this URL:
(I'd save it to your favorite places or bookmark it)
2. Sign-on with your AOL membername and password
You can do this whether or not you already signed on
to your AOL program.
3. Click on the "click to complete sign-in" box
4. Click the message or if you don't see it on the new
messages page, click on the old message tab, then
click on the message to open.
5. The message will appear truncated but right under the
header (to/from/subject) section you will see an icon and
a link "AdlandDi.txt"
6. Click on the "AdlandDi.txt"
7. It will open the full message.
AOLMail works just like your regular online email, but you
can pick up your email without signing on to your account.
Plus, since it's done on the web, you don't have to deal with
the size limits.
I pick up all of my AOL mail using AOLMail on the web
because it is a lot easier to use.
Melody Treece Vargas, firstname.lastname@example.org
Resources, tips & solutions for home businesses
Melody is now your Retail Industry Guide at About.com
5. Origins of spam email. Educating Rita! This is fairly long, but important if you want to understand the true nature of spam.
Hi Bogdan and readers,
Been following the messages about spam and peoples problems with it. There
are of course two issues here, that people need to actually address at an
international level .
I'd like to offer this [Tutorial on Tracking Smappers to the Source].
There are two 'classes' of people using the popular internet.
a) Those of us trying to make an honest living by promoting a
product/service to the international community. My multilingual-domain
registration site, http://www.inexpensivewebsites.com falls into this, and
probably most of the readers of this newsletter as well. I've been a member
of this list almost from its inception, and rarely have I seen anyone
operating out of pure skullduggery!
b) Those other types who will try any rip-off, get rich quick, blast the
internet with junk, steal your kids, thieving sod, sell a billion email
address for $5 fools that you find anywhere where the rules and regulations
are at best 'murky' and in anycase don't apply across state boundaries, let
alone in Turkmenistan! and who all operate on the gullability of others -
Give us your money, and we assure that you will be rich overnight, if you
can catch us!
It's the type B's that cause the problems, and unfortuantly because of the
traffic volume they generate the operators of major servers have tried to
block them out.
See a few positng of mine some time last year where I did some research on
the traffic generated over a server by repeaded requests to add links to
that Links.cgi/html program thats about (Add your site to 5,842,641.5 search
engines thing.. I forget what its called) Unbelievably, after nearly 12
months of the link not being there - there are STILL requests coming in to
HOWEVER. Major server operators who adopt a 'we'll cut you off if you spam'
policy are actually reacting to the wrong people - in the main.
The Problem lies in these facts.
1. Far too many servers have NO PROTECTION in their mail servers to deny
2. Most SPAM is seen to originate through valid addresses, often places like
hotmail.com because they are easy to remember by the spammers when they type
in their setups. They tend to lend a small degree of spurious validity to
the email. But they are not in fact the true source.
Let me show you an example:
This is is the header of just one of many SPAM mails I received today..
Nothing special, but it servers to use as an example.
See just below it for the explaination of what is happening here.
1 Return-Path: <email@example.com>
2 Received: from wamego.net (216096074012.midusa.net [18.104.22.168])
3 by nanguo.chalmers.com.au (8.11.0/8.11.0) with ESMTP id eAGLXRH25251
4 for <firstname.lastname@example.org>; Fri, 17 Nov 2000 07:33:29 +1000 (EST)
5 Received: from dsl [22.214.171.124] by wamego.net
6 (SMTPD32-6.04) id A1834B5B0074; Thu, 16 Nov 2000 15:28:35 -0600
7 From: Weston Sulsar <email@example.com>
8 To: <firstname.lastname@example.org>
9 Message-Id: <18161.236846.64186794 robinton@GMX.de>
10 Subject: Earn $50,000.00 dollars in 90 days out of your own home. Must
read to believe.
11 Mime-Version: 1.0
12 Content-Type: text/plain; charset="us-ascii"
13 Content-Transfer-Encoding: 7bit
14 Date: Thu, 16 Nov 2000 15:30:08 -0600
15 X-UIDL: 3de4f91ed18d12bbe4e21081a9e2e347
1 The supposed return address. It's false, although it may well be an
actual user on yahoo. Poor him if it is.
2 3 4 The address it is being sent to, and who the email is _supposedly_
***** This next bit is the IMPORTANT bit - who the mail is _Really From - :
5 Where the email actually originated. In this case;
$ nslookup 126.96.36.199
That IP address [188.8.131.52] tells you who the spammer really is. No
matter how they try - it's not possible to truly hide.
The part just after the ip 'by wamego.net' is who actually took the mail,
and relayed it on.!!! More on that baby later...
6 7 8 9 10 11 12 13 14
15 More envelope stuff - irrelevant to what you are looking for.
The first bit of sluting we do is to find the actual source. midusa.net.
So, lets look up that network . midusa.net. and we find it's this company:
RevRon of Salina, Inc (MIDUSA-DOM)
127 N. 7th St.
Salina, KS 67401 US
Domain Name: MIDUSA.NET
Administrative Contact, Technical Contact, Billing Contact:
hostmaster (HOS202-ORG) hostmaster@MIDUSA.NET
NetSpace Internet Services
127 North 7th
Salina, KS 67401
(913) 823-3565 Fax- (913) 825-5873
Record last updated on 01-Nov-2000.
Record expires on 14-Oct-2000.
Record created on 13-Oct-1995.
Database last updated on 16-Nov-2000 16:58:56 EST.
Domain servers in listed order:
This tells me that the HOST (216096044097) is actually alive at the moment.
So it's probably a user-account.
Doesn't that host name look like a local phone number !!!!! (Go look at
www.midusa.net, just to get the picture, and make sure who they are.)
PING 216096044097.midusa.net (184.108.40.206): 56 data bytes
64 bytes from 220.127.116.11: icmp_seq=3 ttl=102 time=3350.561 ms
64 bytes from 18.104.22.168: icmp_seq=5 ttl=102 time=1350.538 ms
64 bytes from 22.214.171.124: icmp_seq=4 ttl=102 time=2370.398 ms
64 bytes from 126.96.36.199: icmp_seq=6 ttl=102 time=1250.386 ms
So the ip/name resolves to a live host. Looks like an account on the
So you finally know who the spammer really is.
Here you have a few choices.
Contact the spammer directly on that HOST.DOMAIN - send them your spam,
phone them, whatever. (email@example.com) would probably
get them, or some variation of that.
Contact Midusa.net and ask them politely to deal with the culprit.
That's the usual course of action. and not a bad one. However, you could
also take one more step. The most important step. Close off another hole.
Do nothing - and delete the message. The easiest course.
The BETTER course of action is to contact THESE people, and inform them that
it looks like the spammers are using their server as an unauthorised mail
$ ./whois wamego.net
Wamego Telecommunications Company, (WAMEGO-NET-DOM)
Wamego, Ks 66547
Domain Name: WAMEGO.NET
Michael Rice (MR43-BR) firstname.lastname@example.org
Wamego, Ks 66547
Internet Planners (IP4-BR) email@example.com
Internet Planners LLC
PO Box 601
Kensington, MD 20895
Record updated on 2000-01-15.
Record created on 2000-01-15.
Record expires on 2002-01-15.
Database last updated on 2000-11-14 03:42:18 EST.
Domain servers in listed order:
And there you have it. From source to receipt.
Now you can see why a lot of companies will simply ban _anyone_ reported to
be spamming. Even when they haven't. It's way easier than actually finding
the TRUE culprit. The sysadmin may not know how to find the culprit. The
sysadmin doesn't care/doesn't get paid enough. But more often, they just
dont have the time to follow up the volume of spammers.
Hope that helps clear up some of the mystery.
Robert, firstname.lastname@example.org &