Tuesday, July 12, 2011

How to Make Money Selling Your Photos Online.

If you have a knack for photography, you can turn your passion into profits. There are many businesses, organization, and resources online who want to buy quality photos. Let’s take a look at how you can make money selling your photos online.
Research Your Niche
Most photographers have a niche. There is a specific type of subject or photograph you like to take. For example, Ansell Adams was a nature photographer. He took many popular photographs of America’s National Parks, including several notable ones at Yosemite. Other photographers specialize in portraits, cars, animals…the list goes on and on.
If you have a specialty, spend some time researching people, organizations, websites, businesses and publications that may need your specialty photos. For example, travel websites and publications are often looking for travel photographs.
Sell to Stock Photo Sites or Create Your Own
Stock photo sites are always an easy way to make money. You simply create a profile, upload your photo and you get paid every time someone downloads your photo. Some stock photo sites pay more than others. Do your research so you know what to expect.
You can also create your own stock photo site that caters to your niche. Generally when you sell photos on a stock photo website you sell limited rights to publish the image. This means that the customer can buy the photo at a reduced rate. However, you can also sell the photo an unlimited number of times. It’s not unheard of for a stock photo to have been purchased several thousand times.
Market to Website Designers and Graphic Designers
Partnerships or relationships with designers in your niche can be a great way to make extra money. For example, a website designer that caters to the health and wellness industry may be in regular need for photos and images for their client’s websites. Likewise a graphic designer tends to work with stock images when creating headers and simple graphics. Your photographs can help them develop original designs.
Create an Etsy Storefront
Etsy.com is a website that enables artists and vintage retailers to sell their wares. You’ll find many handmade items on the website. You’ll also find artwork. You can create a storefront at Etsy and sell your photos through the store.
Wallpapers
You can also sell your photographs as wallpapers for people’s computer monitors, mobile devices and tablets. Everyone wants to customize their electronics and your original photos may be exactly what they’re looking for.
There are many ways to sell your photos online. Begin by defining your niche and looking for opportunities within that niche. Don’t forget to market your photographs. A great way to do this is to participate in social networking and photo sharing websites. To your success!

Improving Your AdSense Earnings.

If you’re making a bit of money from AdSense but know you could be getting even higher CPMs, then read this article carefully. You’re about to learn a handful of powerful, proven tips and tactics for improving your AdSense CPMs.
Try Saying Sponsored Links
AdSense doesn’t allow you to tell users to click on advertising or to disguise advertising as non-advertising. However, AdSense does specifically allow you to place the text “Advertising” or “Sponsored Links” above an AdSense box.
As counter-intuitive as it may seem, a normal-sized sentence, bolded that says “Our Sponsors:” can often increase conversions. Test it out in your market.
Match or Contrast
There are two ways main ways to get high conversions in AdSense.
The first and most common is to make your AdSense format match as closely to your website as possible. The text color, font, font size, link color and AdSense borders should all match the layout of your site.
When you do this, it’s much more likely that someone will think the ads are part of your site or endorsed by your site and click on a link.
On the other hand, one less used but also successful tactic is to do just the opposite. Use contrasting colors or designs to deliberately make the ads stand out. Design the ad boxes in such a way that they literally pop out of the screen, drawing attention and possibly clicks.
Experiment with both methods to see how they work for you.
Always Split Test
Learn to use channels. Channels are at first a bit confusing, but once you get the hang of them they’re actually extremely powerful tracking tools. When combined with Google Website Optimizer, you can test a wide range of variables at the same time to figure out the best way to make the most money from your traffic.
Test everything you can think of. Colors, placements, ad sizes, number of ad units – everything. You never know what’ll work until you try.
Placement Tips
In general, you’ll get a higher click-through rate by having your ads above the fold than below the fold. A classical location is the large square ad in the upper left corner of a post.
Navigation bar ads are also another popular and successful option. Be sure to customize the settings so the navigation bar units look as similar to your actual navigation as possible.
Finally, placement near images or other eye-catching elements on your website tends to work very well. Make sure not to misrepresent the ad as being related to the image, or you’ll violate the terms of service.
These are a handful of proven strategies, distilled from the experience of many marketers. You’ll rarely have a very high CPM when you’re just getting started. Over time however, with consistent testing, you’ll find your CPMs rising higher and higher.

How Windows Product Activation (WPA) Works?

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings. In this post you will find answers to some of the most frequently asked questions about Windows Product Activation. Why activation? Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine. What does “Genuine Windows” means? The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy. Exactly what information is transmitted during the activation? When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process. What information does the Installation ID contain? This Installation ID is a 50-digit number which is derived from the following two data. 1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows. 2. Hardware ID – This value is derived based on the hardware configuration of your computer. The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID: ■Display Adapter ■SCSI Adapter ■IDE Adapter (effectively the motherboard) ■Network Adapter (NIC) and its MAC Address ■RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.) ■Processor Type ■Processor Serial Number ■Hard Drive Device ■Hard Drive Volume Serial Number (VSN) ■CD-ROM / CD-RW / DVD-ROM Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process. How is the Installation ID validated? The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process. The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process. However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers. What if a computer running a pirated copy of Windows attempts to activate? The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows: During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail. Thus for a successful activation, either of the following two cases must be satisfied: 1.The product key must have been used for the first time. ie: The product key should not have been used for earlier activations on any other computer. 2.If the product key is said to have been used earlier, then the Hardware ID should match. This happens only if the same computer for which the license was genuinely purchased is attempting for subsequent activation. What about formatting the hard disk? Each time the hard disk is reformatted and Windows is re-installed, it needs to be re-activated. However the activation process will be completed smoothly since the same computer is attempting for subsequent activation. In this case both the product key and the Hardware ID will match and hence the activation becomes successful. What if I upgrade or make changes to my hardware? In the above mentioned 10 categories of hardware, at least 7 should be the same. Thus you are allowed to make changes to not more than 3 categories of hardware. If you make too many changes then your activation will fail. In this case, it is necessary to contact the customer service representative via phone and explain about your problem. If he is convinced he may re-issue a new product key for your computer using which you can re-activate your Windows. Some things WPA does not do ■WPA does not send any personal information at all about you to Microsoft. There is still an option to register the product with Microsoft, but that is separate and entirely voluntary. ■If you prefer to activate via phone, you are not required to give any personal information to Microsoft. ■WPA does not provide a means for Microsoft to turn off your machine or damage your data/hardware. (Nor do they even have access to your data). This is a common myth that many people have about Microsoft products. ■WPA is not a “lease” system requiring more payments after two years or any other period. You may use the product as licensed in perpetuity.

Tuesday, July 5, 2011

How to Hack Windows Administrator Password

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below
Offline NT Password & Reg Editor Download
It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.

Another simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name badboy, then do as follows
4. Type net user badboy * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for badboy without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

 

Ways to Identify Safe Websites on the Internet.

Safe Websites
On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to identify safe websites on the Web.
 

1. WOT or Web Of Trust (http://www.mywot.com/):

WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists. Each domain name is evaluated based on this data and ratings are applied to them accordingly.
Trustworthiness signifies the overall safety of the website. A poor rating may indicate that the site is associated with threats like Internet scams, phishing, identity theft risks and malware. For more information on phishing, you may refer my other post on how to identify and avoid phishing scams.
 
Vendor reliability tells you whether a given site is safe for carrying out buy and sell transactions with it. An excellent rating indicates superior customer satisfaction while a poor rating indicates possible scam or bad shopping experience.
 
Privacy indicates about “to what extent the site respects the privacy of it’s users and protects their personal identity and data”.
 
Child Safety indicates whether the content of a given site is appropriate for children. Site contents like sexual material, nudity and vulgarity will have a poor Child Safety rating.
 
In most cases, the WOT ratings are found to be highly accurate. To check the reputation of any given website, just visit http://www.mywot.com/ type-in the address of your favorite website and click on “Check now”. This tool alone can tell you a lot about the reputation and safety level of a website. However, in addition to this, I am giving you another 3 handy tools to identify safe websites on the Web.
 

2. McCafee SiteAdvisor:

McCafee SiteAdvisor is a free tool that is available as a browser add-on. It adds safety ratings to your browser and search engine results. You can download it from http://www.siteadvisor.com/.
 

3. StopBadware:

Using this tool, you can check whether a given site is said to have involved in malware activity in the past. To check this, go to http://www.stopbadware.org/home/reportsearch and enter the URL or domain name of a website and click on “Search Clearinghouse ”. If the search does not return any result, that means the site was never involved in any of the malware activity in the past.
 

4. Google Pagerank:

Google PageRank is another great tool to check the reputation and popularity of a website. The PageRank tool rates every webpage on a scale of 1 to 10 which indicates Google’s view of importance of the page. If a given website has a PageRank of less than 3, then it is said to be less popular among the other sites on the Internet.
 
However, PageRank will only tell you how much popular a given website is and has nothing to do with the safety level of a website. So, this tool alone cannot be used to evaluate a website’s safety and other factors.
 
PageRank feature is available as a part of Google Toolbar. You can install Google Toolbar from http://www.google.com/intl/en_uk/toolbar/ie/index.html.
 
I hope you like this article. Waiting for your comments…

How to Repair Registry of Windows PC

Registry Repair Tips

 
Repair Windows RegistryThis article explains how to inspect and repair registry errors in your Windows PC, so as to improve it’s overall performance. If you are a Windows user, then you will most probably be aware of the fact that the Windows registry gets corrupted over time resulting in an overall decreased performance of your computer.
At times, registry errors can also make your PC to freeze down and hang up every now and then causing a serious annoyance to the user. At this point, the registry needs a serious repair to bring your PC back to it’s life. Well, before I tell you how to repair the registry, lets see what causes the registry to get corrupted.
Registry errors may occur due to installing too many applications/softwares from time to time without verifying the publishers. This may create invalid entries in the registry hive leading to errors. With the Internet boom and the era of freeware with free downloads, people often install programs from untrusted sources which results in a serious damage to the registry. Since the registry is a crucial component of the Windows operating system, damage to this registry can cause the system performance to drop down significantly.
 

How to Repair the Registry?

 
The best and the easiest way to repair your registry is by using a Registry Repair Tool (Registry Cleaner). A Registry Cleaner will automatically scan the registry of your PC to find invalid entries and will repair them by removing the errors with in no time. A registry cleaner is the simple and safest solution to repair registry and bring your PC back to it’s life without the need to re-install the Windows.
 

Which Registry Cleaner is the Best?

 
Well, today there exists hundreds of Registry repair tools on the market and as a result, people often get confused at which one to go far. Hence, when it comes to the choice of Registry repair tool, we must be very selective since not all of them are the same.
On the Internet, there exists many such tools which are simply useless and doesn’t apply any significant fixes to the Windows registry. After trying many such useless products on my PC, I finally found one good product which actually made a magic to my PC performance. It is:
 

PC Health Advisor is one of the best and award winning registry cleaner tool that repairs registry to avoid PC errors such as unwanted shutdown, freezing, crashing and more. PC Health Advisor will
  • Repair registry and increases your PC performance by upto 70%
  • Repair registry to fix DLL errors and invalid shortcuts
  • Free up virtual memory to avoid error messages
  • Performs Defragmentation and Compression of the registry
  • Repair registry to fix blue screen errors, system crashes, startup errors and more…
PC Health Advisor is not just a Registry cleaner, rather it is a complete Optimization Toolkit for your PC. Visit PC Health Advisor Homepage for more information on this program.
 

Can I Manually Repair the Registry?

 
Windows registry has a very complex structure with hundreds of thousands of entries embedded in it. A corrupt registry may contain thousands of invalid entries and errors in it and hence it is impractical and almost impossible to manually inspect, find and repair those errors. Also manual registry repair involves serious risk and can lead to a total system breakdown if done improperly. Except you are a highly experienced Windows user or a Windows expert, users are not encouraged to tamper with the registry.
Hence, using a registry repair tool is the safest and easiest way to repair the registry and improve the overall performance of your PC. Registry repair tools will not only repair the registry but also maintains it’s health in a good condition so as to avoid any future damage to it. It is recommended that you periodically (daily or weekly) perform registry scans using these tools to repair the errors as and when they come up so that, you can keep your PC’s health at it’s best. Just repairing the Windows registry can make your PC blazing fast like never before!

How to recover deleted files!!!!

Recover Deleted Files from Windows and MacHave you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well, you need not panic!
It is possible to recover the deleted files back from the hard disk  (even after you have Shift+Deleted)  provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software.
In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.

How Does the File Recovery Process Works?

When you delete a file from your computer, (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk even if you have deleted them from the recycle bin.
Let’s take up a small example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise, when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition, the file becomes invisible and hence appears to have been deleted.
Recovering the deleted files 100% back in the original condition is very much dependent on the efficiency of the Data Recovery software you use. So, it is necessary to make a right choice when it comes to the selection of file recovery software.  
Today, there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality, most of these softwares are neither effective nor capable of recovering your files back. So, when it comes to Data Recovery, I recommend the following software as the best:
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)
Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.

What are the Chances of Recovering my Files Back?

Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately.
So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have been recovered even after years of it’s deletion. However, for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your deleted files.

Recovering the Deleted Files

In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this recovery software, it is possible to
  • Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
  • Recover deleted emails
  • Recover deleted documents
  • Recover deleted photos
  • Recover deleted music
  • Formatted Hard-Drive recovery
  • Recover files from USB Drives, CDs, DVDs and memory cards
  • Recover almost all the camera format files