Well, you have to agree that to understand how to make money online, you have to know the rules and the terms. So my first step is to understand the terms first. I did some research and find this at cwire. Hopefully it will help Beginner Blogger like me.
CPA (cost per action)
Advertisers pay once an action that has been previously defined occurs. Depending on the action, this can be the riskiest for a publisher and holds the least amount of risk for the advertiser (since it knows exactly what it is paying for and only pays for specific actions). Commission Junction connects advertisers and web publishers together and provide a platform for them to interact on a CPA basis.
CPC (cost per click)
Advertisers only pay when a user clicks on an ad. CPC campaigns shift risk to the publisher, as the publisher only receives payment when a user clicks on an advertisement. A publisher may have to show millions of impressions without receiving payment if users do not click on the advertisement. An example of a good CPC campaign is Google’s Adsense or Bidvertiser or Ad Brite. .
CPL (cost per lead) – See CPA definition.
CPM (cost per thousand)
The most basic way of measuring internet display advertising. Advertisers purchase impressions from publishers and pay on a “per thousand” basis. For example an advertiser may purchase 1,000,000 ad impressions at a $10 CPM, the total ad buy would be for $10,000. CPM campaigns benefit the publisher the most, as they have no risk, all of the risk lies with the advertiser (they are paying regardless of whether or not an action by a user occurs). An example of a network that pays affiliates on a CPM basis is Ad Brite.
Last week I bought a new Wireless Broadband Router after finally fixing my Streamyx connection problem. It cost me around RM 145.Since I always try to hack my neighbor wireless network (which I always failed ) : ) so I think it’s better for me to get my own.
key features :
Up to 54 Mbps Wireless data rate
Up to 3x eXtended Range™ support to boost your Wireless network range to up to 200 meters (indoors) or 800meters (outdoors).
eXtended Range™ feature interoperable with other 3rd party devices
Compatible with IEEE802.11g, IEEE802.11b, IEEE802.3, IEEE802.3u standards
Increased signal sensitivity for better Throughput.
Increased security with WPA/WPA2 and WPA-PSK/WPA2-PSK authentication and TKIP/AES encryption security
Built-in firewall supporting IP address filtering, Domain Name,filtering, and MAC address filtering
Integrated 4-port 10/100 Mbps Auto MDI-MDIX switch and detachable antenna
UPnP, Dynamic DNS, Static Routing, and VPN pass-through support
User-friendly Web browser-based configuration
Installation : easy start guide
Connect your laptop to your Aztech router using Ethernet Cable
Make sure your modem is connected to your router usually blue LAN cable from modem to WAN scoket.
Make sure your laptop/pc detect the Wireless Broadband Router. Please check your computer network. Your network must establish connection now.
Open your internet browser and type 192.168.1.1 to login to Aztech Web Manager (Make sure you secure a connection LAN with your Router)
Select dynamic ip and put your Streamyx log in id (must be [email protected] streamyx only without .com) and password
How to secure your wireless home network ? This is important to protect your wireless network from intruders or hackers.
select wireless menu setup
apply security by selecting WPA-PSK/WPA2-PSK
ENTER a PSK passphrase with a combination of number and letter
The threat of Internet fraud is quite real and we need to be aware of scams such as “phishing” and “pharming” where a virus or malicious program can be downloaded to your computer with the intention of stealing your personal information – from credit card information, user ID and password to online banking accounts.
But don’t panic! Here are 5 tips that will minimise your risk of being a victim and unsuspectingly swallowing the bait set by scamsters to steal your identity.
5 TIPS TO PROTECT YOURSELF ONLINE
Watch out for suspicious e-mail or pop-up links.
NEVER click on a URL link in e-mail or fill out forms in e-mail requesting you to confirm or update personal information, even if it threatens dire consequences if you don’t reply.
Even if the e-mail seems to be from a genuine web site or someone you know, call first to check or type the web URL to log on to the site yourself (not from the e-mail). Also, never send your personal information to anyone by e-mail.
Phishing can happen by phone too. You may receive a call from someone pretending to be from a bank or company asking for your personal information. Or the person may inform you that you have been a victim of a fraud. Always verify the caller’s identity first. Credit card companies do call customers if they notice unusual activity on your card but they will only enquire about specific transactions. They will not ask for your account number or personal information.
Protect your computer with anti-virus, spam filters and firewalls.
Update your Operating System and Internet Browser regularly to ensure that you are protected. Use anti-virus software and, if possible, personal firewalls. Ensure your anti-virus software is up to date with the latest signatures.
Scan your PC for viruses and update your browser regularly.
Take some time to visit any popular anti-virus web site to scan your PC. This will alert you to any virus or malicious programs in your computer. You can often download the latest security and critical patches from these sites too.
Be cautious about clicking on pop-ups and free stuff. Beware of downloading free programs and web content offering to increase the speed of your computer, free gifts, get rich quick schemes, etc.
You may click on these links out of curiosity or simply to read. However, in pharming scams, such content can be programmed to download a virus or malicious program or spyware to your computer while you are browsing. After that, when you type the address of a legitimate website, you are taken to a fake web site. Any personal information you provide at the fake site such as user name, account number, credit card details can be stolen and fraudulently used.
If you share your computer with others, ensure they do not visit such sites and unknowingly download malicious content.
Be selfish about sharing your password.
Online fraud frequently occurs when someone has compromised the security of their password through sharing. Do not share your password with family, relatives, friends or anyone, however harmless and convenient it may seem at the time. Your password is the key that opens the lock to your personal information and should be guarded as safely as your car keys.
Finally, always clear your cache each time you logout after an Internet session. This is especially important if others have access to your computer or you use a computer in public places such as Internet cafes.
Well, it’s easy, isn’t it? Just take these five steps to enhance the way you protect your personal information and ensure your Internet experience is enjoyable.
After verified my PayPal account using CIMB Master card, finally I manage to receive payment in my PayPal account. After doing some research and some explanation from LiewCF . It is easy actually to validate your PayPal account.As we all know we cannot withdraw money form our PayPal account. However this kid,Bitol from University Petronas show me how to do it with three 3 different ways.
Well, I just prefer to save it there so i can purchase online products,pay my hosting and other things.so kat sini ada guide utk validate our PayPal account from Bitol just click here.
If you asked me what are the best tool that Microsoft ever created, I got to admit Window Live Writer is the answer.
You can add plug in so that can you insert video , map, flicker image and website image. The most important of all you write offline and upload when you have the connection. It is easy since you can get the actual view when upload it on your blog website.
If you want to get more tips and tweak on how to use please visit LifeHacker.com.