Showing posts with label Website. Show all posts
Showing posts with label Website. Show all posts

Jan 3, 2011

0 comments

Color Wheel for Bloggers

Color Wheel For Choosing Matching Palate Colors

This is a pretty useful tool to achieve matching or cohesive colours for navigation menu, background, hyperlinks, header etc.
Instructions:

  1. Simply paste the six digit colour code in the form below without the hash (#) sign and then hit Update

  2. The matching colour codes will appear inside the four boxes at the right side.

  3. You can then copy the hex values and start using them!


Search Engine Optimization (SEO) Tips for Beginners


Before I start, let me clear few things. First, I am not making in this article any turbo charged rockets or promises which will boost up the search engine rankings within 3 hours or 48 hours. These are only basic tips which will help your website for better indexing and high ranking.
Secondly, this is the main reason why I am writing this article. When I was about to start learning SEO lessons I ask myself why SEO is important? And then this answer came to my mind from nowhere.
Amjad, the Internet provides an avalanche of information, but think about just for a while that what would the sea of knowledge without a point do for seekers? True, isn’t?
Obviously, that was true. At that time I was beginner in SEO field and this was my first lesson that high search engines ranking is one of the best way to drive huge traffic to a website. If you still thinking what I am talking about or what SEO is or how it can help, you should read this article.
You may think in the beginning that learning SEO is confusing and hard to do or only experts can do. But it’s not as hard as you may think. If you still think it’s hard to do then at least you should learn about basic SEO which I will be explaining below.

How to Achieve a Higher Search Engine Ranking

There are so many ways both legal and illegal even in the field of search engines. The use of illegal methods which aka “Black Hat SEO” should be avoided because someday your website will be penalized or banned by the search engines.
The easiest and pure way to achieve higher search engine ranking aka “White Hat SEO” for the website is clean and validated HTML source code and you should be interested in providing unique & pure text. Keep in mind, the “CONTENT IS KING” for search engine optimization.

How to Use Title and HTML Meta Tags

Always use unique title tag with the desired keywords init on every page and content should contain the title tag and desired keywords. Do not use same title tags for each topic page with the desired keywords to make sure the search engine reads it also separately.

Finding the Right Keyword

Proper use of right keywords enhance the chances for higher ranking so set a realistic goal for the keywords for your website. Always pay attention to what could potentially your customers are looking for? For example if you search for “Web design”, currently you will find 368,000,000 results as I checked few minutes ago in Google. You almost have few chances in this pool of competition to get a higher listing. For this reason, in the beginning you should set your goals for the use of right keywords and be realistic, after short time you find yourself in the search result among the first.

JavaScript, Frames, and Flash animation

Search engines do not index Frame pages, Flash pages/animation and JavaScript/Pop-Ups. Sometime Frame pages are periodically analyzed and recorded by bots but If your website is a pure Flash site, you have very few chances to get indexing and high ranking. JavaScript is ignored and kept hidden by the search engines. You should really always think, “Do I need these effects anyway?” Compare with the customer benefits and see if is required or completely unnecessary effects? Also, search engine cannot read the text in graphics. Try to avoid use of images but if at all you have to show the image then use alt="" tag in images.

Get Links to Your Website

As I mentioned “CONTENT IS KING” in the same way the building back links are “QUEEN“. Of course, an optimized and clean site is already half the battle. To boost the ranking you need links related to the desired keyword from other sites. Ask your partners if they are ready for a link exchange with you to make your placement on their sites.

Use os Sitemap for Better Indexing

I read a lot that don’t waste your time to setting up or submitting sitemap to search engines but in my case I will strongly recommend you to create proper sitemap and submit it to top search engines. After all sitemap is the only protocol that directs the search engines to URLs on a website available for crawling. Click here to learn more about Sitemap.

Information Tools for Further Improvements

There are many tools available which help you to improve search engine ranking but I am going to list here my favorite information and SEO tools. I don’t want to have duplicate content by describing about these tools on this page but you can still learn more about these tools by browsing these links.

Conclusion

Always set realistic goals for your website in advance. Keep viewing the huge number of competitors for the optimization. Avoid unnecessary effects; put best efforts and confidence with good implementation.
You have done everything well. Still you find your site much below your expectations. You know why? Because! Everything takes time. You have to be patient and wait for search engine crawling. After all you are going to find a top place among other huge number of competitors.

Search Engine Optimization Tips

Misconceptions about search engine optimization are common. One of the most common is that once a site is built and submitted to the search engines, heavy traffic is on its way. Another is that when making a submission to each engine, a site will be registered immediately and will stay listed with that engine for as long as it is in operation. That's just not how it works… not even close!

What people need to know is that search engine optimization, which is actually the effective utilization of search engines to draw traffic to a Web site, is an art. It is an ongoing, continuously evolving, high maintenance process that includes the customization of a site for better search engine ranking.

Critical steps to take before submitting

After developing a Web site and selecting the best hosting company, don't rush out and submit it to search engines immediately. A Web site manager would be wise to take a little time to:

Fine tune the TITLE tag to increase traffic to the site
Improving the TITLE tag is one technique that applies to just about all the search engines. The appearance of key words within the page title is one of the biggest factors determining a Web site's score in many engines. It's surprising how many Web sites have simple, unimaginative titles like "Bob's Home Page" that don't utilize keywords at all. In fact, it's not unusual to see entire Web sites that use the same title on every page in the site. Changing page titles to include some of the site's key words can greatly increase the chance that a page will appear with a strong ranking in a query for those key words.
 
Create gateway pages that are specific to the focus of each site
Key word selection must be done carefully with great forethought and understanding of the search engine's selection criteria for key words. The larger the number of key words that are used, the more the relevance of any one key word is diluted. One way to get around this is to create gateway pages.
Gateway pages are designed specifically for submission to a search engine. They should be tuned with a specific set of key words, boosting the chance that these key words will be given a heavy weight. To do this, several copies of a page should be made, one for each set of key words. These pages will be used as entry points only, to help people find the site, therefore, they don't need to fit within the normal structure of the site. This provides the page developer with greater flexibility in establishing key words and tags that will encourage a stronger ranking with the search engines. Each gateway page then can be submitted separately to the search engines.
 
Ensuring that site technology won't confuse the search engines
Often the latest technology being built into a site can confuse the search engine spiders. Frames, CGI scripts, image maps and dynamically generated pages are all recently created technology that many spiders don't know how to read. With frames for instance, the syntax of the FRAMESET tag fundamentally changes the structure of an HTML document. This can cause problems for search engines and browsers that don't understand the tag. Some browsers can't find the body of the page and viewing a page through these browsers can create a blank page.
Today only 2% of browsers don't support frames, but many search engine spiders still don't support them. A search engine spider is really just an automated Web browser and like browsers they sometimes lag behind in their support for new HTML tags. This means that many search engines can't spider a site with frames. The spider will index the page, but won't follow the links to the individual frames.
 
Setting up a NOFRAMES section on the page
Every page that uses frames should include a NOFRAMES section on the page. This tag will not affect the way a page looks but it will help a page get listed with the major search engines. The NOFRAMES tag was invented by Netscape for backward compatibility with browsers that didn't support the FRAME and FRAMESET tags.
 
Performing a maintenance check
All Web sites should be thoroughly tested using a site maintenance tool in order to catch errors in operation before customers are brought to the site. HTML errors can hinder a search engine spider's ability to index a site, it can also keep a search engine from reading a page or cause it to be viewed in a manner different from how it was intended. In fact, a recent report by Jupiter Communications suggested 46% of users have left a preferred Web site because of a site-related problem. With NetMechanic's HTML Toolbox or another site maintenance tool, all Webmasters, from the novice to the expert can avoid potential visitor disasters due to site errors.
 
Finding the best submission service
Selecting a search engine submission service requires careful thought and important decisions. Using an auto submission service is a good place to begin. Most search engines like Alta Vista, HotBot and InfoSeek automatically spider a site, index it and hopefully add it to their search database without any human involvement. Some engines, like Yahoo, are done completely with human review and for many reasons are best submitted individually. Chances are good also, that in the first submission a site will be rejected by several of the engines and will need to be individually resubmitted. There are several online resources for auto submissions. The best ones won't submit a site to Yahoo where the customer is better served doing this on his own.
 
Understanding the waiting periods
A variety of waiting periods must be endured with each search engine before there is even a hope of being listed. Knowing and understanding these waiting periods before beginning the process can eliminate or at least minimize frustration and confusion. Typical waiting periods for some of the more popular engines are six months with Yahoo; one to two months with Lycos and 4-6 weeks with Excite or is that 4-6months? What they say and what happens in reality can be very different.

Ongoing promotion tasks:

To improve site rankings and increase understanding of the listing process, there are many tasks that can be done on a regular or semi-regular basis. Optimizing rankings within the search engines is also to help ensure that a site attracts the right traffic.

Some of the monthly and weekly promotion tasks are:
 
Crunching and examining log files
Data contained in log files is an excellent resource for identifying which engines are sending the majority of traffic to a site. It can also show which key words or gateway pages are generating the strongest traffic and what are those visitors doing when they enter the site.
 
Searching the Search Engines
Conduct a search of the search engines to analyze where the highest rankings of the site have materialized and what keywords are generating the best rankings. Different search engines use different rules to rank pages. Individual gateway pages should be created based on the knowledge and interpretation of what each search engine is using to determine top rankings. Several pages can be tested out on one or more engines and the pages that have the most success can be kept, while the unsuccessful pages can be dumped or revised to achieve a higher ranking.

Learning more about how the search engines work
Each search engine uses different rules to determine how well a Web page matches a particular query. As a result, building a single page that gets a good score in all the major engines is just about impossible. Learning how each engine ranks pages is also hard, since the engines often keep this information as a closely guarded secret. However, with a little patience, some experimentation and reverse engineering, the way that many of the search engines work can be discovered.

Resubmitting the site
For engines that reject a site or don't list it high enough, it is strongly recommended that more information is learned about the engine's criteria before resubmitting. This information should then be incorporated into gateway pages or key word revisions in order to have greater success with subsequent submissions. Fine tune the page (or pages) make adjustments to TITLE tags and META tags, then after resubmitting the site, track the results to further learn about the engine's criteria and which adjustments made an impact on the rankings. Don't be afraid to experiment, take some risks and gather data as you proceed.

Checking log files for traffic being directed to erroneous pages on the site
This is good news!! Don't dump these pages or remove them from the search engine as most people will do when they redesign their site. Any page with a high ranking is of value. If a page is bringing traffic to a site, leave that page on the search engine, don't change it but rather redirect the traffic to valid pages in the site.

Getting Noticed

For small to medium-sized Web sites, search engines are the most important source of traffic. Unfortunately, getting noticed in the search engines isn't an easy job. A Web site manager can spend months getting a site listed in an engine, only to find it ranks 50th in their search results. It's hard to give universal tips for improving search engine ranking because each engine has its own set of rules. In general, though, a page will rank well for a particular query if the search terms appear in the TITLE tag, the META tags, and in the body of the page.

Dec 29, 2010

27 comments

10 Ways Malicious Code ReachesYour Private Network



Introduction
As of 2010, there are nearly three million unique forms of known malicious code, and thousands of new ones are discovered daily. The risk of being infected is greater than ever. The damage caused by an infection can range from a minor annoyance to a catastrophic disaster. The old wisdom continues to ring true: an ounce of prevention is worth a pound of cure.
Most computer users are aware of the importance of security to reduce the threats that could potentially harm a computer or network. For example, anti-virus and anti-spyware are essential defenses in the war against malicious code. However, technology cannot compensate for poor and risky behavior. Thus, proper training and understanding, along with behavior changes, are needed to facilitate a reduction of malicious code infections.
The methods, vectors, or paths that malicious code can use to gain access to your system are increasing as new services or types of communications are developed. In fact, every single possible communication method that exists for legitimate data can be used to transmit malicious data as well. Thus, we all need to be vigilant in keeping our protections current as well as avoiding risky activities.
The following are 10 common ways malicious code reach your private network that you need to be aware of.
1. E-Mail Attachments
Attachments to e-mails are a common method of distribution of malicious code. E-mail is inherently insecure due to its use of SMTP, a plain text-forwarding protocol, and its lack of strong authentication of message send­ers. The source of an e-mail address can be easily spoofed or falsified as someone that you trust. Often, this alone is enough to trick a recipient into opening an attachment.
Generally, avoid using attachments as a means to exchange files. Instead, use a third-party file exchange system (such as DropBox, Box.net, Drop.io, MediaFire, Windows Live SkyDrive, Foldershare, RapidShare, MegaUpload, Dropload, YouSendIt, SendThisFile, etc.). Thus, when an attachment does arrive, it is suspicious for being abnor­mal and not the standard method by which common communications take place.
If you receive an attachment and need to determine if it is legitimate, you still need to verify it before opening it. Create a new e-mail (do not reply to the message with the attachment) to the sender and ask for confirma­tion that they sent the file. Maybe even ask the filename, size, and hash value if you are really concerned. Or, call the person and ask if they sent you an attachment on purpose. If the sender does not confirm the attachment, delete it.
2. Portable Media
Portable media includes any device that can store information. This includes optical discs (CD, DVD, HD-DVD, Blu-Ray, etc.), tapes, external hard drives, USB drives, and memory cards. Any storage device can support both benign and malicious content. The less you know about or trust the source of a device, the more you should be cautious about accepting the device and connecting it to your system. Any media from outside the organization should be highly scrutinized, especially if obtained from a questionable or unknown source.
A possible defense is to use a dedicated scanning system. Every new-to-you media can be scanned at this stand­alone system before it is used on any production system. Assuming the stand-alone scanner system is updated regularly, it will greatly reduce the risk of malware distribution via media. Another option would be to limit data exchanges to file sharing services that do not involve portable media.
3.Visiting Malicious Web Sites
The Web browser is the primary tool used to interact with the Internet, which is a dangerous place. Thus, many threats breach our organizations’ defenses through this seemingly innocent client software. Popular and well-known sites are generally not a significant threat; however, any site can be the victim of an attack, which in turn could leave you at risk.
Following hyperlinks sent to you by e-mail or chat could lead to malicious locations. Additionally, some search results might not lead to legitimate locations. Always be cautious about following Web links to domain names you don’t generally recognize.
It is difficult to always be aware of the reputation of a Web site are visiting, but you can reduce the risk by using an updated browser, limiting auto-execute features of mobile code, and running anti-malware scanners.
4. Downloading Files from Web Sites
Even when visiting generally trustworthy Web sites, there may be additional risk if you elect to download con­tent to your local system. Take ever greater caution when choosing to download material from any site. Seek out only those locations that are known to be safe and trustworthy. For example, download.com, managed by CNet, is a safe location to download software, because they test and verify every file available through their service.
When seeking out more esoteric content or unique files, you will likely be visiting non-mainstream download locations. These fringe sites put you at greater risk, because they don’t have a known reputation and may not have any amount of filtering or screening of offered files.

Downloaded Web content includes both generic files, including software, plug-ins, movies, audio files, etc., as well as mobile code, such as ActiveX, Java, JavaScript, Flash, SilverLight, etc. Any code that comes from an out­side source – that is potentially unknown – puts you and your computer system at greater risk.

5. Participation in P2P File Sharing Services
Concern over downloaded, malicious content grows when that code is obtained through a peer file-sharing sys­tem. This is not a condemnation of efficient, distributed transmission solutions, but rather the sources of the files exchanged through them. By not knowing or having control over the source of a file, it is possible that malicious code could be included along with the content being sought.
The risk is lower when the content is downloaded legally, but the risk grows when a P2P sharing system is used to access illegal or infringing content. The risk is greater not because the content becomes malicious when it is exchanged outside of ethical channels, but because the providers of the content often include malicious code in­tentionally. The “poisoning” of the content is a way to further distribute malware, especially remotely controlled tools, through a popular but non-filtered exchange mechanism.
6. Instant Messaging Clients
In many cases, the purveyors of malware look for methods of distribution that will enable them to quickly and broadly transmit their code. The more popular a “thing,” the more attractive it becomes as a vehicle for distribu­tion. Malware can be seen as a form of parasite that attaches itself to any popular communication medium.
One increasingly popular communication medium is that of IM or instant messaging. Through chat systems, especially those using installed software clients instead of Web interfaces, the exchange of files is possible. There have been security breaches that allowed remote hackers to upload and/or download files through holes in IM client software. Even with a patched client, it is possible for a user to accept an offered file from an unknown source or follow an offered hyperlink to a malicious Web site.
7. New Devices and Peripherals
A risk that is often overlooked due to its rarity is malware found on brand new devices, right out of their pack­aging. Mobile phones, digital photo frames, and even media players have been compromised during manufac­turing, resulting in malware that makes its way to a customer’s computer. This has happened with a well-known, commercial, shrink-wrapped, anti-virus product.
Vendors often outsource the actual construction and pre-production of their products to external manufactur­ers and assemblers. When computer parts are the product being constructed, especially those with storage capabilities, malware can make its way onto the new device while it is loaded with its software elements if the manufacturer’s system is infected. One way to reduce this threat is to not be an early adopter of a product nor the first to grab an updated version of an existing product. Give the rest of the market a few days or weeks to discover malware and other concerns before adding the new device or peripheral to your repertoire.

8. Social Networking Sites
Social networking sites offer up several situations that could allow malware to make its way onto your network. First, there are the social engineering attacks that trick users into accepting fraudulent information that, when acted upon, could compromise an account or the security of a computer. Second, with the proliferation of mes­sage posting and exchange services, it is easy to follow hyperlinks to malicious Web sites. Third, some in-site applications, written by malicious entities, attempt to hijack accounts or distribute malicious code.
Many of these threats are discovered by the community or the site moderators within a few hours or days, so these concerns don’t remain static for long. However, new attacks and tricks are crafted by hackers constantly. Be suspicious, don’t accept offered links, especially for file downloads, and don’t be an early adopter of a new application. Give the community a few days to discover the malicious elements and weed them out before you dive in.
9. Social Engineering Attacks
Social engineering is the art of convincing someone to either give up information or perform a task that results in the reduction of security. Large organizations are the most common targets of social engineering attacks; however, mass e-mail-based attacks could show up in anyone’s inbox.
Be aware that attackers are trying to trick you into following hyperlinks, downloading files, performing configu­ration changes, or typing in esoteric commands. Doing so could lead to the direct infection of your system with malware.
Social engineering attacks are often quite subtle. At first glance, or before your second thought, you might not realize that an e-mail or a phone conversation isn’t normal. If the hacker can convince you to act before you think or verify, the social engineering attack is successful. If a hacker can trick you into visiting a malicious Web site, malware could be transmitted to your system through Web-based mobile code.
In other attacks, the hacker may encourage you to download a scanner or utility in order to perform some testing or diagnostic function. The tool you download might do what is claimed, but it also may open a remote control connection granting the hacker partial to full access to your system.
A social engineering attack could even be waged by building auto-launch elements onto USB flash drives and leaving them in various locations, such as the restroom counter, the snack room, or near the smoking area. If someone picks up the drive and plugs it into their computer, they probably won’t even notice the installation of malicious code, which might corrupt the system or grant hackers remote control access.
Be aware; you are a target of social engineering attacks. The question is will you recognize the attack for what it is, or will you be tricked into harming your own environment.

10. Not Following Security Guidelines and Policies
The last and probably most significant cause of how or why malicious code reaches your private network, or even just your personal computer system, is by not following proper security guidelines and policies. Most orga­nizations of moderate size have made the effort to design a secure infrastructure. This includes prescribing user access policies and providing at least some level of security awareness training.
Failing to abide by security guidelines or purposefully violating security policies will lead to compromised security, often the distribution of malicious code. Security policies are written and implemented for a reason – to reduce the likelihood of a security breach. If a worker fails to abide by the company security policy, they put themselves and the entire organization at risk.
Bypassing filters, using storage devices from outside resources, using unauthorized peripherals, blocking soft­ware updates, opening e-mail attachments, participating in unethical file exchanges, and using non-approved software clients are all security policy violations and increase the chance of malicious code infesting the organi­zation.
Every organization and every individual has a vested interest in operating with common sense security guide­lines. This will assist in reducing the risk of malicious code infection and allow the organization to be productive in accomplishing missions, goals, or sales, without having to spend resources on recovery.
Write a security policy. Define the acceptable use policy. Hire competent personnel. Train users on how to per­form their jobs within the confines of security. Use automated tools to detect and defend. Monitor the environ­ment for abuse, misuse, and compromise. Use common sense. Obey the rules.

Nov 22, 2009

0 comments

What is a Worm?

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.

Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.

What's a worm?

A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.

How do they spread?

When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).

If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.

After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them.

Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread.

Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.

What do they do?

Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl.

But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.

The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.

The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.

The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.

How do I get rid of them?

The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.

Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)

Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic.

Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.

As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems.

Oct 16, 2009

0 comments

How to Drive Huge website traffic from linkedin? 50 tips


Linked-in one of my personal favorite networks, A place where professionals meetup. It actually can help getting lot of traffic… Here are some quick 50 tips on linkedin traffic…. This is a do follow blog & Your comments are appreciated….

1.      Check the Expertise Requests option in your profile. 

2.      Complete your profile as thoroughly as possible, and include interests, an avatar, and business information.

3.      Connect with as many business associates as you can, since they will help you to network with like minded individuals and companies.

4.      Learn from others and gain new knowledge, so you can become an expert in other subjects and topics.

5.      Ask questions.

6.      Answer questions. Use your knowledge to your advantage by answering peoples’ questions thoroughly and expertly, and you’ll gain other users’ confidence



7.      Check your home page on LinkedIn fairly often. It contains industry updates, news, and postings from associates.


8.      On company profiles, the top five most popular other profiles are displayed on the home page. This is important since it will show others who you associate with, so be aware of who your top five are.

9.      Choose the top 5 who will link back to you, so there is a reciprocal benefit.

10.  Be sure to explain your work experience in as much detail as possible. Don’t just list employers or experience, but instead expand upon it by showing others’ what you’ve done in detail.

11.  Comment in the discussion forums as much as you can so your profile gets noticed.

12.  Update your status with useful content and information as much as possible.

13.  Feel free to implement keywords in both your profile and your content, so that your information comes up in search engine results.

14.  Do not forget to include your LinkedIn profile link in other places like Twitter, Digg, and other social media websites.

15.  LinkedIn is also a useful employment tool, so if you’re hiring, use it to find good employees.

16.  Customize your buttons. This will make your profile look more professional and give you more control.

17.  Include your skills and specialties and be sure to expand upon your current business.

18.  Obviously, include your company URL somewhere on your profile.

19.  Have a plan in place when you begin to build your network, otherwise you may end up getting some contacts you don’t want, and not enough of the ones you do.

20.  Do not just be friends with people because they ask you to. It looks a little odd for a professional member to be friend with their partying buddies from college. Leave the casual online friendships to Facebook.

21.  Look at network statistics to see what is going on with your account and the progress you’re making.

22.  Keep in mind the number of characters in profile fields are limited, so you may want to do a few practice runs first before publishing everything.

23.  Include past education and past companies/experience, not just your current business or company.

24.  Customize your public profile’s URL so it’s easier to link this to other pages and people will remember it much better.

25.  Utilize the reference check tool to find out how long someone worked for a company and much more.

26.  Ask others within the community for advice. Since this site was designed for networking, people are usually more than willing to answer questions and give help.

27.  Use the site to help get a much clearer picture of your competition.

28.  Compliment others and give them praise when you’re speaking to them, so that they reciprocate. It makes both of your profiles look much better and can increase your exposure and ratings.

29.  Do not only mention what you’ve done, but include what you’ve produced. Be sure to post results from your actions and include facts and figures if possible.

30.  Use numbers, and show people percentages and actual, real numbers that back up the claims of your success.

31.  The top of your summary is what visitors see first so be certain you’re including the most vital information here.

32.  Utilize the answers tool as an opportunity to show off you expertise.

33.  If you’re in need of a graphic designer, web hosting provider, or any other service, LinkedIn has its own services area where you can trade off with others who are among the trusted network.

34.  Use your LinkedIn page link in your blogs, Twitter, Digg, your website, etc.

35.  Try to become a recommended service or company by establishing a good reputation. People will flock more towards ones that have the “recommended” status.

36.  Be sure to enable the “show website” feature in your profile.

37.  Make sure the full view and websites options are also checked so that the information in your profile is public.

38.  LinkedIn is mostly designed for targeted marketing, so be as specific as you can when you choose your industry and expertise.

39.  Use the website as a tool to make connections within your business niche, and then expand upon those connections on other social media sites.

40.  Be willing to work at building your network; it takes time to get a lot of solid connections.

41.  Make use of the option to be indexed so your information appears on Google and other search engines’ results.

42.  Use the Q&A feature to ask others their opinion of your website, product, etc.

43.  Feel free to introduce yourself to other members. Don’t always wait for others to approach you first.

44.  Ask others to recommend you if they have had experience with you.

45.  Think of LinkedIn as your “home base” for all of your other marketing tactics.

46.  Edit your profile often and rearrange things as needed, so you are always up to date and new content is there as well.

47.  Use the groups feature to meet others, post feedback, and get a feel for what other companies are up to.

48.  Start your network base with people you know and trust, and build from there.

49.  Be as professional as possible at all times.

50.  Always be aware of spelling and grammar.