December 2008

Web 2.0 Codes For Blogs

You hear so much about blogging these days on the internet and in media. Anyone who makes a blog is acknowledging its importance in boosting their site on the web. In creating their blogs, they must put blogging tag codes. But what exactly is a blogging tag code?

Blogging tag codes are keywords which act like a subject or category that you should take advantage to bring traffic to your site or blog. Tag code is used to arrange webpages and objects on the internet. For using tag code, the blogger “tags” a webpage or images for making it their own tag. Images or webpages may have many tags to identify it. Webpages and images with the same tag code are connected together and uses may use the tag code to search for same images and webpages.

Tag codes hit the blogging mainstream lately because Technorati (an Internet search engine) which up to this date indexes over 34 million weblogs started sorting blog posts by using tags. By using tags, it can be used to specify properties of an object that are not closely associated to the object itself. Tags can find things with the same properties to arrange or to organize objects. Tags also help to improve the search engine effectiveness because the content is mainly categorized using common, accessible, and shared vocabulary.

Tags usually are used in social software and Web 2.0 pages and the method that allows opening the category is called to as folksonomy. Folksonomy is a system that enables internet users to categorize the contents such as webpages, online images, and other web links

Web 2.0 sites that use tags:

• a bookmarking site that allows users to bookmark in different sites and tag them with so many descriptive words. Other people can also search by those terms to find webpages that others found to be very useful#.

• Gmail- popular web-mail site that allows categorizing of objects by using tag codes, commonly known as labels on emails.

• Flickr- a service provider that allows users to tag online images with many specific nouns, verbs, and adjective in describing the pictures.

• Basecamp- a project service provider that allows users who are working on projects to tag parts of their work in making it easy to find data.

Tag codes doesn’t mean to define their semantics, however tags are often explained as being connected to the concepts which are commonly accompanied with their concepts for which is the user not the computer, who separates which items is connected.

Making tag codes requires a group of individuals to cooperate in order to organize data which is known as taxonomy. Since tag codes lacks in basic steps to explain how an object must be classified as one tag may link to other unrelated webpages. Furthermore, tag codes are not issued by a sole being then classification by tags must be personalized.

Precisely, things that may fall under a specific tag to a user may not closely relate to another subject with the same tag code by another user. Thus, resulting in the evolution of categorization methods. Categories are made time to time by people.

Finally, in making blogging tag codes there are easy steps and these are:

1. Visit the available improving customer experience sites.
2. Put the keywords you wish to be tagged. You can separate words or phrases with commas. No need to add + sign to your phrases.
3. Last is choose from Technorati,, or Flickr and other furl tags

For you to make blogging tag codes is one easy way in improving your personal site. Blogging for you will never be the same again.


Video Blogging And Visitor Interaction

Want the world to know that you are the top grosser in stock trading at the end of the day? Or you want to announce that your Dalmatian has now eleven cute puppies? Or you just want the world to witness your memorable marriage proposal to your boyfriend or girlfriend? If you want, then video blogging is what you need.

So what is video blogging and why is it one of the hottest activities in the Internet?

Blog Basics

To fully understand what video blogging is, let us first discuss what a blog is. Basically, it is an online journal where you can place your thoughts, ideas, opinions—in other words, anything that people want to know about a particular thing. It comes in different formats, styles, and settings; it depends on your preference.

You can post such blogs on a blogging site. This allows you to post blogs and at the same time customizing it according to your preference. One of the latest additions is video blogging.

What is Video Blogging?

Video blogging, also called vblogging or vlogging is posting of sequential videos to a certain website. For instance, you want to post your weekly mountain climbing adventure with your friends. You can do so using video blogging. In addition, bloggers uses video blogging to create their own mini-programs through RSS feed to deliver new episodes automatically.

You might ask why plenty of people now prefer video blogs rather than the regular blog. One reason is that you can not express all in a regular blog. How will you translate in words your facial expression or the tone of your voice through words? If you want to shout for joy, how can words interpret it? It is a matter of showing everybody the real you in video blog.

In addition, it is an excellent tool in delivering indescribable content. For instance, you watched the dramatic baseball game between two top teams in the league and you want to share it with your viewers. With video blogging, you will be able to catch the action and deliver it to them and not just described it in words.

Video blogging can also serve as a bridge between your loved ones. Just imagine how your parents will be happy to see their first granddaughter or grandson in a video blog. If you are an aspiring broadcast journalist, a video blog may be your perfect opportunity.

Creating your Video Blog

Creating a video blog is much different from a regular blog. In regular blogging, you just have to encode the words in a regular post. But with video blogging, you need to gain access to a computer which can work with movie programs. In addition, you also need a camera that will shoot the video as well as snapping shots.

First thing to do is the creation of your digital video on your camera or digital camcorder. There are indefinite ways of putting your video blog together—you do not need to be a professional to do it. After you have created the video, download it into your computer in preparation for formatting and compressing it.

You can now use the movie program for editing such as video clip changes, creating titles or subtitles, and even add music to your video. Once it is completed, you will now be compressing it for uploading in your video blog. As you compressed the video, make sure that you monitor the predicted file size. Ideal compression size is no more than 5 megabytes. If you can compress it to 1 megabyte, much better. You do not have to worry about video quality; there is no video degradation between these ranges.

Once compression is completed, you are now ready to post it online. You can join a video blogging community where you can post your blog. Just a reminder: make sure that you have read the terms carefully. There are blogging communities that specify what video blogs they are accepting.

Let everybody know what you want to say, what you feel, or who you really are through video blogging.


How to increase myspace views on a shoestring budget.

One web that every musicians has to register when they decide to promote their music online is no doubt Myspace.
MySpace was the most popular social networking site in the United States.
The 100 millionth account was created on August 6, 2006 attracts 230,000 new users per day.

But one thing that many musicians has to live with is if they wanna have lots of visitors coming,they have to pay to be promoted on 1st page.
There are some softwares that can help promoting like friendblaster,…
but using those is against myspace’s policy,you can endup losing your page.

So how can struggling musicians gain enormous exposure,increasing their profile views enormously without getting banned?
Take a look at my profile exciting indie music scoring nearly at50,000.Not bad for an unknown indie musician from Thailand.
And i got only one warning from Tom ( Myspace founder )
( Before banning someone,they will give a warning by deleting your profile picture with an info like,this profile is suspected for violating myspace’s rules against software generated profile views like those i mentioned )

I saw someone asking this kinda question a lot on many boards
so gather round friends.
Here’s the general trick with my own added.

General tricks
1.make lot of requesting artist friends,when they accept you,make comment on their comment blocks.
2.when open any myspace page,you will see ” top artist” in the above column.
Be those famous artists’ friends and make comments like ” fans of ….add me”
Do both tricks everyday by hand,dont use softwares!requesting more than 100 a day can turn your account into jeopardy.
This can give you some more fans too.
3.If you have lots of friends in colleges or locally famous in your area.You can ask some fans to be your street teams and help with promoting stuff.

I guess these tricks are already known to many.

Here come my own tricks.
1.Learn what’s the craziest buzz people in your area so crazy about.
In my country they are so mad about premiere league soccer game.On such a big match night lot of soccerfans will hang out at some soccer boards waiting for the matches,chatting,making topics about this hero soccer,who will win tonight,…
Register at some famous boards ( with lots of members ).
Put your myspace link in your signature.
Be very nice to introduce yourself,help other members by giving tips,answers to troubled members.
Make good topics to attract other members,beware of spamming.
In such boards,hot topics beside soccer are sexy pics,celeb.
Try to make good topics about those or any that make sense.( i used to post hot celeb pics for sometime there then )

I also repeat this process on other hot boards apart from soccerboards,
hot japanese AVstar boards,whatever you have interests in.

On some wild nights,you can attract lot of viewers coming to your myspace from your signature,and i mean LOTS!!!

For America,maybe you can try NFL instead of soccer since american dont play much of it.

2.Expand your interest ( this is like branching out from the 1st one )
I created my own angel page to post on those soccerboards.
I shoot vdoclips and making my own MVs.
I make my own still images,banners…
Be member to forums for each of your ability added,and repeat the 1st trick.
( If you can do good artworks you can do myspace layout and give them for free.)

There are other jiffy,nifty little details involved such as how you write a request to make people accept you,…
I’ll go in more details later:)

The bottom line is Be nice,have an open mind to learn and expand your ability
( I now do shooting short movies,vdo clips,3d animation,blog,gallery,…and man,i never thought i could do lots of things! )
,be willing to do whatever it takes to be known to lots of people.

And OH!Dont forget to write and make good music.


If you like this article feel free to share it anywhere with my name as author and link to my web:)

Top Ten Tricks of the Spammer

The spammer’s most fervent hope is that you are ignorant of the tricks and tactics used to spam your inbox. Learning the spammer’s nefarious ways is your best protection against spam.

Manipulating Text:

This is one of the most commonly used spamming techniques. Spammers will manipulate the text in the email, to foil the anti-spam filters. They may, for example, deliberately misspell some words: “M0rtg4ge” for example. They may add characters or spaces to words in the email header, to make the email seem unique from other email. Like this: X_A_N_A_X Here’s an example, . They may also insert random strings of text within the email.

Chain Letters:

Spammers may send out chain letter instructing you to forward the email to your friends and family. To entice you to do so, it may claim that forwarding it will bring good luck. This spam may carry viruses or a Trojan horse, which is sent along to anyone you forward the email to.

Image-based Spam:

The spammer sends out spam that contains an image in GIF format. This image bears the spammy message. Image-based spam is effective in by-passing spam filters because they are generally text-based.

Dictionary attacks:

This is a technique used by the spammers to find email addresses that they can spam. It involves trying random combinations of common names and words, and using these to making up email addresses, e.g.,, The spammer will then send out junk email to the different variations of these addresses in the hope that some of it will go through,

Spammers tend to direct the dictionary attacks at the large email companies, which have a large number of customers.

Email spoofing:

Email spoofing involves the use of a fake email header that is written to make it look like someone other than the spammer sent the email. Very often, the spammer will make it look like the email came from a credible source such as your bank or yahoo, and try to get you to reply with personal information such as a password, social security number or credit card number. This technique is widely used because it is easy to do, and tends to catch the recipients off guard.


The spammer can use Javascript that will ensure that the spam is only visible when the email is loaded. This type of spam can only be prevented using anti-spam software that decodes or blocks the java script.

Social engineering:

This spammer ploy attempts to fool the recipient into reading the junk email by pretending to be an acquaintance. It involves a junk email that has a “personal” subject line, such as “I’m leaving tomorrow,” “I got your message” or “Let’s meet again”.

Mining message boards and chat rooms:

When you post a message to a message board or chat room and leave your email address, automated programs called spambots will find your address and add it to the spammer’s mailing list. Much like a listed phone number in the telephone directory, leaving your email at these types of websites makes it public information.

Web beacons:

A web beacon, also called an “invisible GIF,” is an image sent out with spam that is invisible to the recipient. When the email is opened, the spammer will be alerted that your email address is “live.”

Open proxy, 3rd-party servers:

An open proxy is a third-party server that enables the spammers to camouflage their real identities as well as their Internet locations, when they send out their junk mail. Many spammers use these open proxy servers to help maintain their anonymity.


Top 5 Techniques to Protect Yourself From Spam

It is virtually impossible to avoid having your email address end up on a spammer’s mailing list. You can, however, take steps to minimize the amount of spam that you receive. Here are to top five:

Address Munging

Never, ever post your permanent email address publicly online. Posting it on a website, on USENET, or in a guest book, for example, virtually guarantees that it will end up on a spammer’s emailing list.

If you absolutely have to supply an address, or regularly participate in online forums but do not want further communication, camouflage your address in some way. You can, for example, disguise your address by writing it in such a way that humans can read it, but the spammers automated programs cannot.

Example: instead of, add a blank space before and after the “@” sign, or use characters e.g. JaneDoe at ISP dot com.

This is reffered to as “address munging”. While address munging does not allow for a regular, clickable email link, anyone who really wants to contact you will figure it out the proper address.

If you have a website, provide a feedback form instead of giving your email address.

Sign up for an Alternative Email Addresses

Do not use your primary email address when placing an online order, getting a free download, or want to sign up for a newsletter or free service Get a secondary email address that you can use in these instances. You can open a free email account for this purpose. Email providers such as GMail and yahoo offer this free email service.

Reserve this email address specifically for this online activity - do not offer it to people from whom you want to receive email, as this will likely be lost in the deluge of junk mail.

Also, be sure to log into this account on a regular basis to delete the junk mail and avoid having the account closed. If you get over-spammed, just close this account and open a new one.

Choose an email address that cannot be easily guessed at. One method used by spammers to get email address is to generate a list of likely email addresses based on a combination of first names, last names and commonly used words. They may, for example build an emailing list that has variations of an address like, etc.
You can foil this spammer’s tactic by using a relatively long email address, for example 8 or more characters long. You should also avoid choosing email addresses that include either of your names. Use your initials instead, in combination with numbers, e.g.

Beware the Phisher Spam

Phishing is a tactic used by spammers to scam you into giving up vital personal and financial information. Its sole purpose is identity theft.

Never divulge any personal or financial information that is requested in an email. Your bank or credit card company would never ask you to confirm or update your personal information via an email or a link in an email. Any such emails should be reported to the bank or credit card company. Never, ever click on any links in this type of spam.

Get a spam filter or spam blocker

Stop the spam dead in its tracks before it ever makes it into your inbox. Well, most of it at least. Though they are not 100% effective, anti-spam software will keep most of it out. Even if you only use the internet a spam filter will help protect you from spam.


Next Page »