Tuesday, August 31, 2010

Top EC Droppers (AUGUST 2010)

Read full history - Top EC Droppers (AUGUST 2010)

Friday, August 27, 2010

Bloggers! How to GET MORE COMMENTS on every single post!

Whether it’s a comment, a Tweet, or clicking an affiliate link, learning how to promote engagement is the first step in the sales cycle and is vital to your online success. Comments create social proof – they foster community, and they help drive traffic. So how do we go about getting more?
Read full history - Bloggers! How to GET MORE COMMENTS on every single post!

Wednesday, August 18, 2010

"Pay Per Post" Certificate Expired - Removal Instructions

Get rid of this now!
Read full history - "Pay Per Post" Certificate Expired - Removal Instructions

Tuesday, August 17, 2010

Blog Building Blocks » Back Links

If you think PageRank is everything, you're WRONG! "If you link to interesting articles on other blogs, they will link back to interesting articles that you have. Bloggers usually check their site stats every 30 seconds, they’ll see that you have linked to them. (It’s an addiction!) Many people don’t want to link out because it spreads their pagerank thin. Would you rather have pagerank or money? I, personally would rather have money. Pagerank will come. It won’t do you any good to have high pagerank if you don’t have any traffic, and most people don’t realize that the two aren’t as tied together as it seems." ~ The Ad Master
Read full history - Blog Building Blocks » Back Links

Monday, August 16, 2010


YOU HAVE BEEN WARNED ABOUT CERTAIN EC BLOGS HARBORING VIRUSES! MAKE SURE YOU HAVE YOUR AV PROGRAM "ON" AND "ACTIVE" WHEN DROPPING EC'S (ESPECIALLY ON MALAYSIAN AND GERMAN BLOGS!) While we cannot name the bloggers involved, know that they are bloggers who have been "controversial" in the past!

Cornyman hits CMF Ads

Blog investigator extraordinaire CORNYMAN holds CMF's feet to the fire!
Read full history - Cornyman hits CMF Ads

Sunday, August 15, 2010


There's a BUZZ in the blogosphere! John Chow was a big entrecard draw back in the day. Now, Chow's blog is once again broadcasting the benefits of EC. Could this mean Chow may be thinking of re-instating the EC widget? Stay tooned!


Here's one blogger who had enough! FED UP WITH ENTRECARD!!!

Here's an older siteful of reviews - Bloggers give EC a "report card"
Read full history - ENTRECARD - LOVE IT OR LEAVE IT!

Saturday, August 7, 2010

Beware of Certain Entrecard & Adgitize Badge-Bearing Blogs

There are some blogs in the Entrecard and Adgitize programs that harbor dangerous virus and trojans. You may have seen the warning that Google sometimes places with a selection that the website may not be safe? Well, that warning does NOT appear on these renegade blogs, when you Google them.

I ran across one written by a well-known "troublemaker" in both Adg & EC. Once you're on his blog a program secretly downloads onto your computer and installs an "Anti Virus" program. A small icon may or may not appear on your toolbar. It will sit quietly, until you activate it by going to one of his other blogs! Here's what to do: hit ctrl+alt+delete and on your task manager simply kill firefox.exe or explorer or whatever your browser is. Don't go back to that blog! Other blogs leave a cookie on your PC so that if you re-visit them, a trojan silently loads on your computer! BE CAREFUL! These are trusted blogs that have been around for awhile. Sorry, can't name names, but if you're smart you'll figure it out!.

How to Implement Layered Security for Your Computer

Layer 1 is a personal firewall. A personal firewall is a software program installed on your computer that controls access to everything that enters or attempts to leave your computer. Think of it as having your own personal security guard at your house and he asks you for permission to let anyone enter the house or leave the house. You can purchase a firewall for under $50 but you can get some excellent firewalls free. I personally like the Comodo Personal Firewall or the Zone Alarm firewall.

Layer 2 is antivirus software. Antivirus software is another program installed on your computer that inspects the data on your computer for viruses, trojans and keyloggers. It does this by comparing the files on your computer with a known list of bad software aka signatures. The antivirus program also inspects data entering and leaving your computer, checks for virus signatures or uses an algorithm to detect suspicious data packets. You can purchase antivirus software, but again you can also get some very good antivirus programs for free. I like Avira Antivirus and Avast Antivirus. Don't use AVG Free, the free version does not offer "rootkit" protection which is a very common area of exploitation.

Layer 3 is protection from Spyware, Malware and Adware. These programs inspect data entering and leaving your computer and checks for known bad software signatures. If you are using Windows XP or Vista, then you are already running Windows Defender and are covered. If you would like additional protection you can download free programs such Adaware, Spybot Search & Destroy and Malwarebytes Anti-Malware.

Layer 4 is to make sure you are running Windows update on a weekly basis to ensure you have the latest security patches for your operating system. You must also check for weekly updates on each of the products you installed in the previous three layers. Most programs have a scheduling option so you can set it and forget it.

Layer 5 is scanning. You must ensure each of the products installed in the first three layers run a scan weekly. Again, most programs have a scheduling option so you can set it and forget it.

Layer 6 is passwords. All security threats don't necessarily come from the internet. Make sure the password you use to log on to your computer is not an easy one to figure out. Make sure the password contains a mix of upper and lower case letters, at least one number and a special character such as !, #, &,_ or *. Do not use your computer password for any online programs such as email, Facebook, bank accounts, etc... And if you use your computer in public places like a library or coffee shop, you will need to change it often. You would be surprised how many passwords and pin numbers get intercepted by bad guys looking over your shoulder.
(Bukisa ID #104889)

Content Source: How to Implement Layered Security for Your Computer - Bukisa.com

Read full history - Beware of Certain Entrecard & Adgitize Badge-Bearing Blogs

The 15 Commandments of Blogging

Ask yourself: WHAT SETS MY BLOG APART FROM MILLIONS OF OTHERS? Hold that thought. Come up with anything good? CLICK HERE! THIS IS HOW YOU DO IT!

Popular Posts