SOLUTION TO ANTI-SPAM LAWS ANNOUNCED

(PRWEB) October 23, 2003

EDMONTON, Canada (PRWEB) October 22, 2003 – ToolButton Inc. today released version 1.5 of ToolButton that incorporates a message delivery system allowing marketers to communicate with users in a manner similar to that of email.

California has recently signed into law an Anti-Spam bill that severely limits the ability for marketers to use email to communicate with end users – regardless of the permissions that may exist. California’s SB 186 goes into effect January 1, 2004 and will effectively curtail a large portion of commercial email advertisements sent to or from the state. The intent of the law is to prevent spam but the unintended result is harmful to reputable webmasters, list managers and brokers.

ToolButton resolves the legislative conundrum by providing a delivery channel that is like email – but not email. Text, HTML and rich media formatted messages can be sent to users who have installed the ToolButton toolbar. However, because the message is not transmitted by SMTP email, the California law does not apply.

The advantage to users is control. Users cannot be sent unsolicited messages and can remove the ability of the sender to communicate if the messages are not appropriate.

ToolButton is an Internet Explorer browser enhancement that includes a search bar for 50+ search engines. It provides users with a delivery channel to obtain content from their favorite websites by adding “ToolButtons”. These are pipelines to dynamic and static content from websites of the user’s choice. A ToolButton can include news content, dynamic feeds, blogs, RSS content and menus of important URLs – all available at the click of a button.

“The impending California legislation clearly has good intentions but is directed at the wrong parties. The new law will not stop off shore spammers but will scare legitimate marketers from dealing with users who have clearly indicated they want newsletters, bulletins and other commercial messages”, said Dale Janssen, Chief Idea Creator and President of ToolButton Inc. “The advantage of messaging with ToolButton is that both users and marketers win”.

ToolButton is free for users.

Availability

Users and Web Masters wishing to install the ToolButton software may freely download the software at http://www.toolbutton.com. The software includes the ToolButton toolbar and a series of default ToolButtons to demonstrate the flexibility of the software. Users can install ToolButton on computers at home and the office and maintain their same configuration at both locations.

About ToolButton Inc.

ToolButton Inc. (formerly DotComVest Ltd – http://www.dotcomvest.com) is the publisher and holding company of Information Technology orientated web sites including:

•

Titan Key Software Creates the First Technology that Stops Spam before it’s Sent!

(PRWEB) October 24, 2003

Titan Key Software Creates the First Technology that Stops Spam before it’s Sent

Honolulu, HI (PRWEB) October 24 2003-– Titan Key Software announces the Titan KeyMail™ address, the world’s first lockable e-mail technology that eliminates spam (or unwanted e-mail) before it is ever transmitted by the sender.

The Titan KeyMail address allows users to take control of their e-mail privacy for the first time by empowering them to create the policies for how their e-mail address can and cannot be used; if any sender attempts to violate those policies, the Titan KeyMail Server™ will prevent their e-mail from ever being sent.

“All of today’s efforts to control spam are reactive in that they begin to work after the spam has been received,” says Peter Kay, CEO of Titan Key Software. “That’s why the Titan Key solution is truly a paradigm shift for managing Internet e-mail. Users no longer have to review and delete unwanted e-mail

– Titan Key stops spam before it’s sent.”

Titan KeyMail Server acts as shield to internet service provider (ISP) servers, and to its users who opt for Titan KeyMail protection, because when the KeyMail server does not recognize a sender for a given KeyMail address, it responds to the sender’s e-mail server with a “no such user” error message.

This indicates to the sender’s e-mail server that the address is not valid, so the connection is severed, and no e-mail is ever transmitted.

To senders, a KeyMail address is indistinguishable in appearance from a normal e-mail address. Yet unlike typical Internet e-mail, KeyMail addresses are not a tradable commodity; they can be defined by the user to work for a legitimate sender and no one else. During KeyMail address set-up, users can easily add contacts, sent items and any other e-mail folders from their e-mail programs to build or update their KeyMail buddy lists. Titan KeyMail Server also takes every e-mail the user sends and copies the destination e-mail address into their buddy list; therefore, very little maintenance is required.

Several internet service providers (ISPs), including SNiP Internet and Telecommunications, are currently beta testing Titan KeyMail Server, which is slated for broad availability in late September 2003.

“Titan KeyMail Server is the first system I have ever seen that incorporates a complete, holistic approach to user-managed e-mail,” said J.D. Thomas of SNiP. “We’ve been looking for a cutting edge solution that goes a step beyond the challenge-response system, and the Titan KeyMail address lets users subscribe to newsletters and the like without compromising privacy.”

For ISPs, whose customers are demanding aggressive anti-spam solutions without sacrificing legitimate e-mail, the proliferation of spam is a growing concern to their business models. With Titan KeyMail Server, ISPs benefit from:

•

GFI’s Email Security Testing Zone launches new free email tests based on exploits

(PRWEB) October 26, 2003

GFI’s Email Security Testing Zone, http://www.gfi.com/emailsecuritytest/, has launched a set of new email tests. The tests enable administrators to find out free of charge if their network is protected against emails that use different exploits to try to break into and infect a system, including an email with a long subject, an attachment with no filename, an attachment with a long filename, the Popup Object Exploit and an attachment with a double file extension.

“GFI’s Email Security Testing Zone gives administrators the opportunity to test whether their networks are protected against the latest email threats,” said Sandro Gauci, security researcher at GFI. “Our new tests check if an email client is vulnerable to emails that use exploits like the Popup Object Exploit or take advantage of certain simple tricks – such as a long subject or an attachment with no filename, a long filename, or a double file extension. Emails that use such exploits are dangerous as they can circumvent client level anti-virus and/or content filtering protection, granting a malicious user unauthorized access to that machine and through it, to the network.”

“Email viruses that use email exploits to disseminate are becoming more frequent, as the recent BugBear.B and Fortnight JavaScript worm show. The traditional methods of email security are no longer enough: administrators must use sharp, multi-layered products against the latest email threats,” added Nick Galea, GFI CEO. “Products restricted to a single anti-virus engine combined with content filtering no longer suffice; an email exploit detection engine like the one included with GFI MailSecurity, is a must to combat such email attacks.”

The security tests added to GFI’s free zone are the following:

•

GFI issues case study about manufacturer’s use of DownloadSecurity

(PRWEB) November 1, 2003

THERMO-KOOL/Mid-South Industries, Inc. protects its network against viruses, Trojans and malicious content in downloaded files through GFI DownloadSecurity for ISA Server, a content security product that controls what files enter the network via FTP and HTTP and ensures they are virus-free and not malicious. This deployment is detailed in a new case study issued by GFI.

“A multiple-layer defense against virus attacks and malicious content”

In the case study, Chris Moss, Accounting & IT Manager at THERMO-KOOL, explains that he began seeking a downloads security solution when he came across GFI’s security testing zone (http://www.gfi.com/emailsecuritytest/) and ran the site’s free security tests to check how well-protected his network really was against viruses, worms and other malicious content.

Mr. Moss identified the need for a product that provides content checking and anti-virus protection for downloads. This product had to integrate with Microsoft ISA Server. “Microsoft ISA Server gave us the ability to integrate with Active Directory. This enables us to limit Internet access by groups,” Mr. Moss explained. “Also ISA is much more extensible. We can add additional ‘plug-ins’ to provide content checking, and other features.”

THERMO-KOOL’s choice fell upon GFI DownloadSecurity, which was built from the ground up to work with ISA Server. “We were impressed by GFI DownloadSecurity and preferred its features over those of other products. The inclusion of multiple virus engines, content rules and scanning before items were saved on the network were huge plus points,” Mr. Moss pointed out. “Also, the fact that the files were checked during downloads was crucial to us.”

Describing the product’s key benefits, Mr. Moss said: “GFI DownloadSecurity is cost-effective as it enables us to license by authorized Internet user, rather than by the entire Active Directory user list. Also, GFI DownloadSecurity provides us with a front-line defense against threats at the firewall. It provides us with a multiple-layer, three virus engine defense against virus attacks and malicious content.”

The full case study can be viewed at http://www.gfi.com/dsec/thermokool_cs.htm.

About GFI DownloadSecurity for ISA Server

GFI DownloadSecurity for ISA Server enables administrators to assert control over what files users download from HTTP and FTP sites, and content checks all downloads for malicious content and viruses. GFI DownloadSecurity includes multi anti-virus engines, to guarantee higher detection rate and faster response to new viruses; the ability to quarantine downloads based on file type and user; a Trojan & Executable Scanner, to detect malicious executables; network-wide blocking of Java applets and ActiveX controls; seamless integration with Microsoft ISA Server; and more.

Users do not notice GFI DownloadSecurity until they download a file: Then GFI DownloadSecurity displays a download progress dialog box and the download proceeds. Once the download is complete, GFI DownloadSecurity scans the file for viruses. If the file has no viruses and does not trigger a rule set by the security administrator, the user receives it immediately. If the file triggers a rule, it is put into quarantine for administrator approval. Once approved, the file is sent to the user as an email attachment or link. If the file is rejected, the user is notified. More product information and the freeware version can be found at http://www.gfi.com/dsec/.

About THERMO-KOOL/Mid-South Industries, Inc

THERMO-KOOL/Mid-South Industries, Inc. is a leading US manufacturer of custom walk-in refrigeration and freezers based in Laurel, MS, with over 100 employees.

About GFI

GFI is a leading provider of Windows-based network security, content security and messaging software. Key products include the GFI FAXmaker fax connector for Exchange and fax server for networks; GFI MailSecurity email content/exploit checking and anti-virus software; GFI MailEssentials server-based anti-spam software; GFI LANguard Network Security Scanner (N.S.S.) security scanning and patch management software; and GFI LANguard Security Event Log Monitor (S.E.L.M.) that performs event log based intrusion detection and network-wide event log management. Clients include Microsoft, Telstra, Time Warner Cable, Shell Oil Lubricants, NASA, DHL, Caterpillar, BMW, the US IRS, and the USAF. GFI has offices in the US, the UK, Germany, Cyprus, Romania, Australia and Malta, and operates though a worldwide network of distributors. GFI is a Microsoft Gold Certified Partner and has won the Microsoft Fusion (GEM) Packaged Application Partner of the Year award.

All product and company names herein may be trademarks of their respective owners.

###

For more information:

Please email Angelica Micallef Trigona on angelica@gfi.com

GFI Software Ltd – Malta: Tel: +356 21382418; Fax: +356 21382419.







Methods of Internet adverting. How to advertise websites. Which are the best?

(PRWEB) November 14, 2003

General guide

Latest information http://www.solutions.ukdots.com/advertising_methods.html

All information on these pages are for guidance only.

Notes: (28 Sept 2003) Google state that they have 3,307,998,701 web pages and receives more than 200 million search queries a day, more than half of which come from outside the United States. Peak traffic hours to Google.com are between 6 a.m. and noon PST, when more than 2,000 search queries are answered a second. So you could estimate the odds of any site being found. These odds depend on your site content and the Keywords/Phrases people searching on at any particular time. Other search engines have different numbers of websites and people using that search engine. Some Search Engines feed their results into other Search Engines.

Notes: On most Search Engines Paid for listings distort these odds and the chances of sites being found. Therefore; a good listing of any website does not indicate a link to a good website.

Notes: Search engines sometimes change the rules about which websites they list and how they are listed. Different search engines may use different methodologies for listing websites, one method may work well with one engine but not so well with another. Even Paid listing rules have been known to change with very little warning.

Think about your audience; that is who you need to view your website. Some search engine may make a charge to list your site in other countries, this may sound good but is your site in that countries language, are you able to accept payment from there and can you deliver, (if so are there extra charges or laws to consider). Ask yourself why pay for traffic from abroad when you don’t plan to make any sales there. Who is your target audience? Younger age group or more mature? Male or Female, Lower economic status or higher. Are you targeting a particular profession?

Ask yourself who you think is going to be more likely to subscribe to your e-zine, download your trial software, purchase your product…? Someone who has read a short description of your site and decides to click to your site out of their own curiosity and interest? OR someone who is forced to view your site automatically? The answer must surely be someone who has read a short description of your site and decides to click to your site out of their own curiosity and interest? This is one of the main reasons that some of the advertising methods below are not recommended.

Advice: Don’t expect instant results. Possibly offer discounts for people who have used the website so that you are able to gauge the success of any campaign. Internet users are hoping for some form of saving and a discount would help encourage them in making a purchase. Use the Internet to advertise. Your competition is using the internet to improve their Brand Image so you need to do likewise. Do some Market Research before paying for larger amounts of advertising. Check your Traffic log files to find out if the method you chose is providing the levels of unique visitors and returning customers you expect to obtain. Give a method time to generate Traffic.

————————————————-

Traffic & Targeted Traffic

Traffic; this is the term given to the number of times your website is accessed.

Targeted Traffic; When a person searches on a Keyword they find your site listing if your site relates to that Keyword. For example using Excite to search on Compare Bargains (http://msxml.excite.com/_1_2HO8TRH043EBTZ7__info.xcite/dog/results?otmpl=dog/webresults.htm&qcat=web&qkw=compare%20bargains&qk=20&method=&top=1&start=&ver=10764) will list our site relating to compare bargains. Site relating to totally different products should not be displayed. This has a number of advantages:-

The user finds the item they are looking for quicker and easier.

The user is more likely to click on that link because they have found a related product to there search.

Targeted Traffic may also apply to e-zines or emails. The e-zines or email, (generally not recommended), is only sent to opt-in users who are known to have an interest in the e-zines or emails product or service. Also Pop-ups, banners and other methods listed could be Targeted, only displayed when the user is searching a site for that type of product or service.

Some Traffic measurement methods may state the number of Hits you may expect. Hits may mean the number of times the server accesses an each individual item on your page. Example, say a website page has 10 separate graphics on it, each visitor to that page will account for 10 hits. So if you were you are lead to believe that you are getting 1,000 Hits per day this actually equates to just 100 visitors. You need to know the number of unique visitors and returning customers.

Traffic is not Sales. Visitors may view your site, (a visit you may have to pay for), but may not make a purchase. They may wish to visit your site a number of times before buying. This is something you may need to consider before advertising.

Advise: Do some Market Research before paying for larger amounts of advertising. Check your Traffic log files to find out if the method you chose is providing the levels of unique visitors and returning customers you expect to obtain. Give a method time to generate Traffic.

————————————————-

Keyword & Keyword Phrases

Words and/or phrases that relate to your product or service that people are likely to search for.

Advise: Do some Market Research. There could be a lot of competition for popular Keywords. To use such popular Keywords could therefore be expensive. Depending on the level of the budget you are able to spend and the levels of Traffic you wish to obtain consider similar but less expensive Keywords. Consider Exchanging Links with sites which use the Keywords you would like to use.

————————————————-

Spam is the term given to junk email.

If you have used a use a separate email account to try to reduce the receipt of spam emails but you still get them. This is because spammers are able to guest your email from your website name, or use harvesting to get your email. This could be a sign that your website is being found.

Spammers are willing to sell your email to other spammers and so the level of spam you receive may increase.

All you can do is try to filter out such spam. Do not request to opt-out as this may be used to show spammers that your email is working.

You may see an option to remove your email address from a spam email list. We recommend that you do NOT use this option. Some spammers use this method to demonstrate that the email address used works and is worth posting even more spam, junk mail, to. They may, probably will, sell your email address on to other spammers who will also sent spam to your email. This increases the spam even more.

You may use software, some free, to help filler out spam emails. View links to Freeware, Shareware. Perl, CGI, Java, web masters tools, etc. Small and quick shareware to download. http://www.downloads.ukprofessionals.com

If is also possible to Spam Search Engines by submitting web pages too often, different search engines may have different policies. The average level is about once a month, anymore than this should be avoided.

Advise: Don’t use this method to try to promote your website.

————————————————-

Harvesting

There are computer programs which are able to search the internet for websites with email addresses and then send spam emails to these addresses. As with any spam these methods may get you banded by your host.

Advise: Don’t use this method to try to promote your website.

————————————————-

Opt-In E-Mail or Safe Lists and other Bulk E-Mail methods (Spam)

The email address used to post to have given their permission, opt-in or so called Safe Lists, to receive e-mails. This often occurs when people, or more usually software, submit websites to FFA, free for all, sites to be listed. Most people who give emails either use a dummy e-mail address or when the emails are received they’re automatically filtered to the trash bin and therefore never read. These email addresses may also use a system which replies back to you with junk mail, more spam, about their own websites.

Some people have to pay, at least on-line telephone time, to receive these emails. So there has been some discussion to make these methods illegal.

Software programs and other methods set up by many ISPs are able to block Safe List, opt-in emails. This may be done with out informing the emailer so that the emailer is paying for emails that never get delivered. More people are campaigning against spam techniques and more people are willing to report such tactics.

Email Marketing is claimed to be one of the most effective and inexpensive ways to promote your products and services. For the numbers posted too this could be true. The problem is that most emails will probably never be read and will just be deleted. This is just like binning your money.

People change there minds and their interests so even a good quality opt-in list may prove problematic if posted to too often or is if not kept upto date.

Advise: Don’t use this method to try to promote your website. New anti-Spam legalisation is being introduced and you may find your self facing legal action. A lot of Hosting or ISP companies will remove websites that use these methods.

————————————————-

Ezines

The term Ezines comes from Electronic magazine. Like magazines they should be about a particular subject with good content which is of interest to the user.

There are some quite good ezines which do provide useful information to users.

The problem is that there are also a lot of poor quality ones which are very similar to spam emails and mainly just list a number of websites without any meaningful content. Some systems post these ezines out far too often and as with Opt-In E-Mail, Safe Lists and other Bulk E-Mail methods (Spam) they may never be read because they are automatically deleted.

Ezines tend to email HTML pages which appear like a website in a users email inbox. These ezines can be quite large and users may not like this method if they are paying for telephone time to receive them. Also some email accounts are able to block emails that are over a certain size.

Advice: May be worthwhile if a good quality ezine that provides meaningful contents to the reader, which is not too large and which is not sent too often will probably be more effective than other email methods. Note Opt-In E-Mail or Safe Lists and other Bulk E-Mail methods (Spam) above.

————————————————-

Banner Advertisements

These have some potential however they usually won’t generate high levels of traffic and they take a while design and implement. Banners may be more important in the way they may subliminally suggested the message to viewers. The more people see a product the safer they feel about buying that product at a later date.

Banners may cause pages to load slower and this may prevent some people viewing the site displaying the banner.

Advice: This could be worthwhile. May not produce be immediate results, or website results, (could encourage off-line sale more).

————————————————-

Text link exchange

Some site are willing to add a text link to you in return for a text link back to them. This should be more effective that banners. This increases the number of places a link to your website may be found by both search engines and people and should help improve your search engine ranking and traffic.

The website you have exchanged links with will probably be trying to generate traffic to their page. This increases the places and chances of your link being found.

Text, may sometimes, be modified to fit your site content better.

Our Reciprocal Links, Banner exchange, Link exchange information http://www.comparebargains.com/exchange_links.html. Yes we will swap links for a good link back.

See what Google’s website say about links http://www.google.com/technology/

Advice: This is worthwhile if you are willing to add good links back on your site. Exchanging links can improve your rating with some search engines and improve traffic to your site. Also Generally this option is free.

————————————————-

Pop-Ups, Exit or otherwise.

A pop-up is the term given to when an extra window which opens while the user is viewing a website or just after a user leaves a website i.e. exit pop-us. While these may be used to provide important information to a user some websites may use far too many pop-ups resulting in the user having to close many pop-up messages. This usually results in users not reading such pop-up messages and becoming annoyed. Software exists which will help prevent pop-up being displayed. If you pay for pop-up’s each one will generate a click to you which you will pay for. Users will hardly ever follow the pop-up to your site because as soon as they see the pop-up loading they will close it. This generates false hits, as the pop-up is loaded and close, false hit which you pay for. As the Pop-Up loads you pay for that click but the visitor just closes the Pop-Up without visiting your main site. It is our view most Internet users just find them totally irritating and annoying. They just close the pop up window without evening reading it. The user is left alienated to the site serving the Pop Up and may never access the site again.

What does a Pop-Up or Fly-In Ad Look Like? These can be made to appear as a user loads a page, after a time delay or after a users has closed the page.

Examples http://www.solutions.ukdots.com/advertising_methods.html

Advice: We don’t recommend this method. Only use Pop-Ups to provide important information to users. This method may get initial traffic put user off going on sites in the longer term.

————————————————-

Fly Ads.

These are a type of Pop-Up, (see above), which moves across the users display.

It is our view most Internet users just find them totally irritating and annoying. They just close the, (Fly Ad), pop up window without evening reading it. The user is left alienated to the site serving the Pop Up and may never access the site again.

We believe Fly ads are even more irritating than normal Pop Ups.

What does a Pop-Up or Fly-In Ad Look Like? These can be made to appear as a user loads a page, after a time delay or after a users has closed the page.

Examples http://www.solutions.ukdots.com/advertising_methods.html

Advice: We don’t recommend this method. Only use Pop-Ups to provide important information to users. This method may get initial traffic put user off going on sites in the longer term.

————————————————-

Windows Messenger Service.

Windows Messenger Service is able to send messages to people. This was meant for the Systems Administrator to send alerts to users. For example that the network was closing down for back up of files.

Their is software available which claims to be able to use Windows Messenger Service to send messages, (could be used for adverts), to anyone who has Windows Messenger Service.

These messenger alerts appear like Pop-Ups on the users display. )Although hyperlinks are not possible, so far as I know).

To stop these alerts:- (This may stop all messengers including those from the Systems Administrator).

Advice: We don’t recommend this method. Only use Windows Messenger Service to provide important information to users.

————————————————-

Free For All, FFA, sites. Submission to. (see below)

Free For All sites, of which they are many thousands, allow users to place a description and link to their website for free. These sites list a limited number of links. As newer links are posted older ones are removed. Their are programs which are able to submit descriptions and links to Free For All site. These sites are termed as high traffic because so many links are being posted to them, tens of thousands, by software. Your description and link may only be displayed for only a short time before being rotated off the site as new sites are posted. The main point of these Free For All sites is not to provide a link to you but to email you with advertising when you supply your details. This is counted as Opt-in emails an one method that Opt-In E-Mail or Safe Lists and other Bulk E-Mail methods use to send emails to you.

Free For All sites are sometimes known as reverse advertising because they are not their to advertise you but to advertise there own products or services when they email you. These sites are not usually visited by real people but only by the software which posts details to them. Sometimes real people may view there pages to see if their own site has been listed and could if your timing is lucky see your link. Reverse Marketing is the term giving the FFA pages because these site are not really there to promote your website but to promote the products and service of the FFA website owner when they email you. Your email details may be sold to other services increasing Spam to your email. Sometimes some search engines will find FFA temporary links to your site. This may help increase link popularity to your site. Some FFA sites are better than others.

Some FFA sites don’t even display pages, I assume this is because too many submissions are being made for the bandwidth of the site. Some FFA sites require conformation of your email address before they will list your site.

Returning emails may be posted as soon as you suggest a site or after sometime after.

Advice: We don’t recommend this method. (Sites related to increasing website traffic are probably more likely you produce results). Although May be used but make sure you use a separate email account which is automatically deletes all emails to it. The Spam emails you get will increase if you submit to FFA sites even if you use a separate email account. Use a program such as Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail which is able to post to lots of FFA pages as well as to the Major Search Engines.

You are not likely to receive any significant Traffic using this method of listing your sites. Not many actual people visit them and your link may only be displayed for a few minutes before being rotated off the list. You may get a few visits, if you submit to every day via the scheduler in Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail Their are so many FFA sites that Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail is probably the best way to submit to them automatically. You need to set up a junk email account say with Yahoo or Hotmail. Use this when submitting to FFA websites. This will need emptying from time to time, set filters to delete all emails except any you wish to confirm. The amount of Spam you receive, (even to none Junk email addresses), will increase because of techniques such as harvesting emails. Once a day is the normal level of submitting to FFA sites.

FFA links don’t give much benefits in improving traffic to your website, most FFA links are manly used to email you with you with advertising emails. There main purpose than to collect your email address, which they may sell to other advertisers. They may also place your email on opt-in list or so called safe lists.

Most, not all, search engines don’t list FFA sites and the temporary nature of links will probably not help website ranking.

————————————————-

Reverse Marketing. Free For All, FFA, sites. (see above)

Free For All sites are sometimes known as reverse advertising because they are not their to advertise you but to advertise there own products or services when they email you. These sites are not usually visited by real people but only by the software which posts details to them. Sometimes real people may view there pages to see if their own site has been listed and could if your timing is lucky see your link. Reverse Marketing is the term giving the FFA pages because these site are not really there to promote your website but to promote the products and service of the FFA website owner when they email you. Your email details may be sold to other services increasing Spam to your email.

Advice: We do not recommend this method. Do not use a FFA sites to send advertising, spam, to users. Some hosts do not allow this an will remove your account if done. You will require a large bandwidth because of the automatic nature of submissions. Most emails will be ignored anyway. Your business will get a poor reputation. Note OptIn E-Mail or Safe Lists and other Bulk E-Mail methods (Spam) above.

————————————————-

Classifieds Sites

Some methods may be used to post links to thousands of these Classifieds Sites. Real people do sometime visit these Classifieds Sites. With our Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail method we still post to these sites because a small number of people still use them. Some of these people may visit your site. As with Free For All, FFA, sites posting to these may generate emails back to you which contain advertising.

Advice: Might as well use this method as it does not cause any major problems but make sure you use a separate email account which is automatically deletes all emails to it.

————————————————-

Search Engines (Yahoo, Goggle, Alta Vista, etc)

Search engines continue to be one of the major forces on the internet. Most internet users have of the major search engines. There are thousands of websites competing for the same keywords. To get any large amount of traffic from these sites you may need to be listed in the first or second page. Campaigns to achieve this can be very expensive in time and money.

Please note that it is still worth while to submit to such websites using our methods because even a lower listing should generate some traffic to your site.

Becoming more an more expensive as search engines charges increase. Some of these major search engines are using the Pay per Click system to generate an income and stay in profit. Some may require a payment per year to list you.

Advice: An absolute must if you wish your website to be found. If you are not listed by any search engines then the chances of anyone finding you are very remote. Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail is able to submit to all the Major Search Engines. Some search engines may only direct traffic to the language or country relating to the website. It is also possible to Spam Search Engines by submitting web pages too often, different search engines may have different policies. The average level is about once a month, (anymore than this should be avoided), Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail will help avoid this. Also view the General guide.

————————————————-

Submission to Major Search Engines

The number of site and the actual site submitted to may vary from time to time.

As with all submission methods, submission of sites may not be accepted by all engines. For example some engines are country specific. Also it may take some time and a number of submissions before search engines list a site. No guarantee can be given that search engines or other places will list a site using this method but most sites will be accepted if they are within the rules of a search engines or other places .

Advice: An absolute must if you wish your website to be found. If you are not listed by any search engines then the chances of anyone finding you are very remote. Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail is able to submit to all the Major Search Engines. Some search engines may only direct traffic to the language or country relating to the website. It is also possible to Spam Search Engines by submitting web pages too often, different search engines may have different policies. The average level is about once a month, (anymore than this should be avoided), Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail will help avoid this.

————————————————-

Pay per Clicks

Usually a type of search engine which charges an amount for every time a person clicks on your link. You bid on the Keywords that you wish to people to find your product or service under. When a user searches using for these Keywords they will see a listing and brief description of your site. You will only pay if that user decides to click on your description and follow the link to your actual site. Remember that the user has searched on Keywords that relate to your site and seen your description. This indicates that they have least have an interest in your products and service. Different amounts may be bid on different Keywords and large numbers of Keywords may be used, so long as they relate to you product or service.

You have a lot of control over how high you wish to be listed for each Keyword. You may start or stop at any time. Requires a non-refundable deposit. You will bid against other users for Keywords so the amount you pay for popular Keywords may be expensive, remember you will pay this every time someone follows your link. Some advertisers may make higher biding to try to discourage competition. Some sites advertise prices as low as 1cent, (US dollars), per click but because of the biding process to be listed higher the realistic charges per click could be much higher e.g. $ 2.00 to $ 5.00 per click on popular keywords.

Advice: Becoming a must do. (Even major some search engines use some form of this method). We recommend this method because of the level of control. Could result in some Click Fraud. PPC can turn out to be very expensive because other users are bidding so high to also improve brand image. When submitting to pay-per-click search engines, it is important to keep in mind that you pay for every click-through. Therefore it is recommended that keywords, title and description relate to your site and the products or services you sell in order to avoid irrelevant clicks.

————————————————-

Affiliate marketing Pay per Performance or Pay per Action

With this method you pay if a customer actually purchases a product or service from you. Usually this is commission based say 5% to 50% of the product or service price. This sound great and we think this method is one of the better ones. The main problem is that it usually requires a large non-refundable deposit and an amount to be paid to the service which implements the service for every time someone follows a banner or link to your site. Takes a lot to implement the tracking code and payment which is reflected in the deposit required. This method can be very effective for people with a lot of products or service which users are likely to purchase. This method is known also as affiliate marketing, pay-for-performance advertising or performance-based advertising. This method is known a affiliated marketing, because of the tracking code used to link to your site this method may not increase your website ranking which could be improved because of links to your site.

Advice: Use if you have a high turnover. As it could be very costly. Could result in some Click Fraud.

————————————————-

Off-Line Advertising

People still read newspapers and magazines. They still watch television and listen to the radio. If you use this method it may take a lot of advertising to increase your brand image. Can take time to implement. Don’t discount it though because the famous Yahoo search engine has been known to sponsor television programs and advertise at football matches. Some options; Advertising hoardings, billboards, busses (inside and out), pens and other gifts.

Advice: Display your website address at every opportunity; emails, letters (inside and out), on cars or vans, etc. Use paid methods if you have a high turnover. As it could be very costly. Avoid Fly Posters and other dubious methods you could face legal action.

————————————————-

Viral Traffic

Using any method that encourages people to pass details of your website, products and services. This strategy has resulted in exponential growth for some websites, (although this is quite rare). One person tells 2 people, those 2 tell 4, those 4 tell 16 and so on; growing extremely rapidly.

Claiming to offer payment, or other rewards to people who pass on the information. Sounds like a Pyramid scheme to me. Could involve a lot more work than implied. A few people to join under you because you will earn a % of the traffic they send or others under them send. If you join the programs and then send a few people to join under you, you could easily have a clamed 100,000+ page views of your web page EVERY WEEK or even EVERY DAY the more people you have join under you the better you will do!!

Advice: We cannot recommend this method. May work if you have the time to and ability to convince other to join. It could be very time consuming. Could be only short lived, i.e. a website about a particular major news event. Pyramid scheme could be illegal.

————————————————-

MLM, Multi-Level Marketing

A combination of different marketing techniques. Most of those listed above.

Advice: May be useful if you have a very high turnover and large product range. As it could be very costly and has resulted in some bad press for this reason.

————————————————-

Click Fraud

This occurs when a website receives invalid clicks on paid listings. This may be done by a competitor or individual who has no intention of using your services. This is done with the sole purpose of costing you money or financial harm. Click Fraud may occur from competing advertisers or simply individuals just wanting to harm or frustrate others. There is some form of monetary predation on all engines. Most advertisers experience some form of click fraud, even if on very low levels. Software may also be used to try to simulate clicks and cost money. Note that some potential customers will may wish to view your site an number of times before making a purchase. Each time they view your site you may be charged for that click.

Advice: Watch your Traffic Logs for signs of fraud for example repeated clicks from on user and no purchases. Most search engines use special programming code to prevent repeated erroneous clinks to prevent Click Fraud.

————————————————-

Doorway Page Sites

A doorway page is a page designed to try to get a high ranking, more optimised for ranking, with search engines. This pages link to the main site.

Advice: Not recommended for main search engine listings, as some search engines are able to spot this methods and block the site. Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail is able to produce doorway pages for your site. These doorway pages could be useful for listing on FFA, Free For All, sites.

————————————————-

Content Doorway Pages Cross Population Traffic Producer

Click here to find out a way round this, a way that is very likely to get you listed.

Advice: Recommended for search engine listings. Will provide links back to your sites. You have control over content etc. Will cost for hosting of new website, website name, maintenance and promotion.

————————————————-

Cloaking

A method of using dynamic software into automatically trying to fool search engines in to believing their are more links, and similar to doorway page more optimised for ranking, than if a person loads the page.

Advice: Not recommended as some search engines are able to spot this methods and block the site.

————————————————-

Meta Tags

Meta Tags: These are not displayed to the user. Some search engines may still use these to help find that page.

Advice: Recommended use Meta Tags. Some search engines may still use them. Only ever use relevant Meta Tags that relate to your web page. They should never be abused or over used. Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail is able to produce, insert and upload the meta tags for your website. Meta Tag use by search engines are used less because of PPC and other paid method. Some search engines don’t rely on meta tags much because they don’t trust the information in them.

————————————————-

Competition

Although any competition is only a click away and the levels of that competition is extremely high people who use the internet generally like to use the internet as a form of research before purchasing for this very reason.

Advice: Use the Internet to advertise. Your competition is using the internet to improve their Brand Image so you need to do likewise.

————————————————-

ROI, Return On Investment

If you pay for advertising then you would like to see some ROI, Return On Investment. This is say if you pay $ 50.00 then you would hope to generate say $ 25.00 extra profit i.e. a turn over of $ 75.00.

It should be noted that any extra profits may not only occur just from any direct sales on a website. A number of sales may occur because customers contact you directly after they have found out about your products and services via the website.

To establish your website and to become known, increase your Brand Image, you may have to be willing to make a loss on advertising at first, could be used as a Loss Leader.

Banner Advertising are usually priced per thousand impressions with a low click through rate.

Email marketing usually priced per thousand, or even claimed million, with a low click through rate. (May receive a negative reaction).

Pay Per Click may cost $ 0.05, or more, per click. Only pay for a click, not a sale. Some may have a minimum required click through rate and therefore cost.

Pay per Performance or Pay per Action: Affiliate marketing will probably cost even more than Pay Per Click. This method is likely to get your website linked to, (not just on search engines), to and clicked on from more websites, because you pay commission to that website for a sale.

Advice: Don’t expect instant results. Possibly offer discounts for people who have used the website so that you are able to gauge the success of any campaign. Internet users are hoping for some form of saving and a discount would help encourage them in making a purchase. Remember that some advertising is more subliminal e.g. Banners may not get many clicks but the message may be noticed. Traffic is not Sales. Visitors may view your site, (a visit you may have to pay for), but may not make a purchase. They mat wish to visit your site a number of times before buying. This is something you may need to consider before advertising. Do some Market Research before paying for larger amounts of advertising.

————————————————-

Useful Links

Compare Bargains Internet Advertising, Website advertising and promotion. http://www.comparebargains.com/internet_web_tools.html Internet Marketing. Internet, Web tools, Traffic, Hosting links. Internet, internet directory, internet provider, internet marketing, internet service, cheap internet, internet service provider, broadband internet, web tool, web master tool, web design tool, web site tool, web site management tool, traffic, web site traffic, increase traffic, hosting, web site hosting, web page hosting, cheap web hosting, unix hosting, ftp hosting, domain hosting, domain hosting, web hosting services, seo, (search engine optimisation) company, internet marketing, web site marketing, web marketing, advertise online. This site has lots of advertising links to sites which indicate special offers, discounts and bargains and therefore allows you to choose from and compare any special deals. http://www.comparebargains.com/internet_web_tools.html

Traffic Seeker http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail


The automatic program. Posts to 800,000 places including all the Major Search Engines like Yahoo, Google, Excite, Hotbot, AltaVista, Lycos, InfoSeek, Directhit, Splat, Northernlight, Whatuseek, Webcrawler, Scrubtheweb, Rex, Overture, Infomak, Searchit, Snooper, Searchcity, Voila, Canada, Anzwers. PLUS lot’s of other places http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail >>>> Make Doorway pages. Rank checking and more… Free updates. Program details of how to Automatically achieve this while you sleep…

http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail

Freeware, shareware and software links. http://www.downloads.ukprofessionals.com/index.html Perl, CGI, Java, web masters tools, etc. Computer languages and Programming code. Other website promotion and traffic boosting. More Webmaster tools. Small and quick shareware to download. http://www.downloads.ukprofessionals.com/index.html

Traffic Seeker

http://www.trafficseeker.com/cgi-bin/reseller/clickthru.cgi?id=billytail

Latest information http://www.solutions.ukdots.com/advertising_methods.html







Barbedwire Technologies Appoints Canadian Country Manager John D. Herrington, Senior Technology Executive, Added to Spearhead Canada Expansion

(PRWEB) November 15, 2003

San Jose, CA, November 18, 2003 – Barbedwire Technologies, today announced the addition of John Herrington, as Canadian Country Manager. His breadth of experience leading teams for aggressive high growth technology firms in Canada is a perfect fit for Barbedwire. Mr. Herrington will quickly leverage his industry background to expand Barbedwire’s share of the important Canadian Security market.

Herrington, who will report directly to Barbedwire Technologies Vice President of Worldwide Sales, Steve Behrens, has more than 18 years of Canadian sales and management experience with several security and other technology companies. Before joining Barbedwire, Herrington was Country Manager, Canada at SonicWall, a manufacturer of security solutions. Prior to that, he was director of sales and marketing at D-Link Networks and a senior manager at Tech Data Canada.

“John brings a wealth of network security sales expertise and Channel development in Canada that we are confident will enhance our current sales infrastructure and help accelerate the adoption rate of our leading-edge technologies,” said Steve Behrens, “we have already made significant Canadian inroads with our distribution partner Cinet, based in Montreal, and John’s strengths will multiply our growth.”

About Barbedwire Technologies

Barbedwire Technologies provides high performance security solutions for SMB and Enterprise class networks with prices that almost any size organization can afford. Featuring the STAR Engine for IPS, the IP Warrior Secured by Check Point Firewall/VPN appliance and the Minesweeper appliance for IDS, VA, WiFi, and Web filtering including Anti-spam, Anti-Virus, and URL filtering. For more information visit us at http://www.barbedwiretech.com or call 1-866-667-0565.

###







GFI LANguard Security Event Log Monitor (S.E.L.M.) 5 raises the bar for event log management

GFI LANguard Security Event Log Monitor (PRWEB) November 15, 2003

event log management

Monitors critical events on IIS, Exchange, SQL and ISA Server; supports Windows 2003

GFI LANguard Security Event Log Monitor (S.E.L.M.) 5, released today, raises the bar for Windows event log management: GFI LANguard S.E.L.M. can now scan for critical Internet Information Server (IIS), Exchange Server, SQL Server and ISA Server events, in addition to important security events. GFI LANguard S.E.L.M. enables administrators to automatically monitor critical servers in real time as it immediately notifies them of problems, permitting them to take instant corrective action.

How GFI LANguard S.E.L.M. works

GFI LANguard S.E.L.M. continuously scans the event logs of all Windows NT/2000/XP/2003 machines on a network, consolidating them into a central log for fast analysis and generating detailed activity reports. When it identifies critical events – such as network users attempting to access shares or secured files, email queues becoming too big, bad hard disk blocks, etc. – GFI LANguard S.E.L.M. 5 sends the administrator real-time alerts, thereby permitting immediate action against potential attacks and problems as they occur.

GFI LANguard S.E.L.M. detects insider hacking

GFI LANguard S.E.L.M. ships with a security event analysis engine, which allows administrators to quickly catch internal hackers.

“Internal security breaches and backdoors cost US business over $ 1 billion annually in damages. Firewalls cannot help against this. GFI LANguard S.E.L.M. combats insider hacking by continually auditing all machines on the network and alerting administrators immediately when high security events occur,” said Nick Galea, GFI CEO. “With GFI LANguard S.E.L.M. 5, administrators have a major tool in their network security arsenal and considerably more peace of mind.”

New features

Other new features in GFI LANguard S.E.L.M. 5 include:

*Windows 2003 Server compatibility (both scanning and installation – installation of MSMQ 3)

*Event analysis intelligence for SQL Server, IIS, ISA Server and Exchange Server

*Redesigned and simplified user interface

*Ability to run a command when a particular event is triggered

*Ability to send short notifications for transmission by SMS or pager

*Configuration usability enhancements, such as groups of custom rules and filter nodes grouping in the Event Viewer

*More information in event descriptions and links to GFI’s KnowledgeBase for further details

*Addition of custom rules to reduce spamming and “noise events”

*New object access report – allows administrators to monitor access to particular critical files.

Specifications, pricing and availability

GFI LANguard S.E.L.M. requires no agents or client software, has no impact on network traffic, and can be scaled to networks of thousands of servers and workstations. It is available from distributors around the world or online at the GFI site. Pricing starts at US$ 350 for a 2 server/25-workstation package. Administrators can check whether they need GFI LANguard S.E.L.M. at http://www.gfi.com/lanselm/whylanselm.htm. More product information and a free starter pack are available at http://www.gfi.com/lanselm.

About GFI

GFI is a leading provider of Windows-based network security, content security and messaging software. Key products include the GFI FAXmaker fax connector for Exchange and fax server for networks; GFI MailSecurity email content/exploit checking and anti-virus software; GFI MailEssentials server-based anti-spam software; GFI LANguard Network Security Scanner (N.S.S.), security scanning and patch management software; and GFI LANguard Security Event Log Monitor (S.E.L.M.) that performs event log based intrusion detection and network-wide event log management. Clients include Microsoft, Telstra, Time Warner Cable, Shell Oil Lubricants, NASA, DHL, Caterpillar, BMW, the US IRS, and the USAF. GFI has offices in the US, the UK, Germany, Cyprus, Romania, Australia and Malta, and operates though a worldwide network of distributors. GFI is a Microsoft Gold Certified Partner and has won the Microsoft Fusion (GEM) Packaged Application Partner of the Year award.

All product and company names herein may be trademarks of their respective owners.







Roaring Penguin Software Inc. Releases CanIt 2.0 Anti-Spam Solution

November 25, 2003 (PRWEB) November 25, 2003 -

spam solution, has been made more powerful with a major new release. Roaring Penguin Software today announced availability of CanIt 2.0, which provides enterprises, campuses and ISPs with additional features, functions and options for spam and virus filtering.

CanIt 2.0 further empowers IT administrators by incorporating statistical spam-detection techniques (popularly known as Bayesian filtering), greater spam detection sophistication, a web-based interface that can match the look and feel of an enterprise’s website, and numerous new features that make administration of the solution even simpler.

“By learning what is or isn’t spam, CanIt 2.0 is sophisticated enough to stay abreast of new spamming techniques,” said David Skoll, President of Roaring Penguin Software, Inc. “In addition, Bayesian analysis, a probability-based technique, makes it more difficult for spammers to reach users. With CanIt-PRO, individual end-users adjust spam protection to suit their particular preferences while the Bayesian filters learns each individual’s unique definition of spam.”

In addition to statistical filtering, the new release includes numerous administrative enhancements. “Administrators will find that CanIt is even more customizable than before,” added Skoll. “One can now edit or add spam rules in a spreadsheet and import these back into CanIt, saving time and effort. This is helpful for administrators who create custom rules or want to transfer their rules to others.”

E-mail administrators will also benefit from enhanced spam detection features, will be able to configure CanIt to scan for and reject viruses and Windows executable files even if the database server goes down, and can choose to set permissions on individual mail stream settings.

Based on the acclaimed MIMEDefang e-mail inspection and manipulation software, also developed and maintained by Roaring Penguin, CanIt 2.0 offers the industry’s most complete and flexible anti-spam and anti-virus solution. It can be deployed in any enterprise e-mail environment, including on all Linux and UNIX servers. As a stand-alone gateway appliance, it can protect e-mail environments running non-UNIX servers, such as Microsoft Exchange, Lotus Notes and Novell Groupwise.

CanIt is available in standard and professional versions as either a software download or on a plug-and-play appliance. CanIt-PRO is ideal for very large enterprises, ISPs, and campus environments, where control and management of the system needs to be distributed to individual departments or users. A trial version of CanIt can be obtained at http://www.canit.ca/evaluation.php.

About Roaring Penguin

Founded in 1999, Roaring Penguin Software Inc. specializes in providing intelligent computing infrastructure for enterprises. Since 2000, the company has focused on enterprise e-mail filtering, spam fighting and related product lines. Today, Roaring Penguin develops, deploys and supports a range of acclaimed mail-filtering and networking products. For more information visit http://www.roaringpenguin.com. A trial version of CanIt can be obtained at http://www.canit.ca/evaluation.php.

###







GFI Network Server Monitor keeps servers up and running

(PRWEB) December 7, 2003

GFI today introduced GFI Network Server Monitor, a tool that automatically monitors the network and servers for failures, and allows administrators to identify and fix issues before users report them. Alerts can be sent by email, pager or SMS. Actions, such as rebooting a machine, restarting a service or running a script, can be done automatically. GFI Network Server Monitor is easy to set up and use, and is competitively priced.

Easier to use than traditional network monitoring products

Although there are several network monitoring tools on the market, GFI Network Server Monitor stands out because of its ease of use; its intuitive rules interface makes monitoring a network child’s play. With GFI Network Server Monitor, administrators can monitor their network within an hour of installing it. By comparison, conventional network monitoring programs are complex to install and have a steep learning curve.

Competitively priced

A further difference in other network monitoring/management products is that they are traditionally rather expensive. For example, Microsoft Operations Manager costs US$ 395 per monitored processor. By contrast, GFI Network Server Monitor costs US$ 695 for unlimited monitoring of all workstations and servers (independent of the number of processors) in a network; a five-server monitoring license costs US$ 375.

Automatically sends alerts via email/pager/SMS and takes corrective action

When it detects a failure, GFI Network Server Monitor can send alerts via SMS, pager, email or a network message. After an unexpected condition has occurred, GFI Network Server Monitor can automatically correct the problem by restarting a service (or multiple services) upon failure; rebooting a server; or launching an executable, batch job or VBScript.

Includes out-of-the-box checks to monitor all aspects of a network

GFI Network Server Monitor includes checks for:

*Exchange Server 2000/2003 – Checks the status of an Exchange Server by monitoring critical Exchange services and performance counters (Information Store, mailboxes, SMTP service, etc)

*All popular database servers (SQL/ORACLE/ODBC) – Natively checks the availability of all leading database applications, including Microsoft SQL Server, Oracle and others via OBDC

*HTTP, FTP, SMTP, POP3, IMAP servers – Checks for availability and ensures that the servers are responding correctly

*Windows servers and workstations, UNIX/Linux and Novell – Monitors Windows, UNIX/Linux and Novell platforms

*Processes, services and CPU usage – Enables the checking of critical processes, services and CPU usage on local and remote computers

*Users, groups and other Active Directory information – Monitors Active Directory information such as group membership of the domain admins group, and the addition of new members; also checks user accounts (locked out, disabled, etc), computer accounts and so on

*Remote event logs – Scans Windows event logs on local or remote computers and looks for specific event sources, categories and IDs, as well as for patterns in the event description

*SNMP devices – Monitors all devices that support SNMP, such as routers, switches and wireless access points

*Disk and file – Performs directory size and disk space monitoring, checks physical hard disk status and authenticates file size and file existence.

Custom monitor functions using VBscript and RSH

Although GFI Network Server Monitor includes an extensive set of default monitoring functions, custom checks can be added by writing a VBscript (Windows) or a RSH shell script (UNIX). From VBscript, WMI and ADSI functions can be used. WMI is an interface to a broad range of hardware/software/OS-related properties of a computer, allowing users to perform almost any check. ADSI is an interface to Active Directory. The GFI Network Server Monitor website lists a number of sample scripts, and others are continuously added to the site (more information is available at http://www.gfi.com/nsm/scripting/).

Pricing and availability

GFI Network Server Monitor is available from distributors around the world or online at the GFI website (http://www.gfi.com). Pricing begins at US$ 375 to monitor five servers. For more product information, visit http://www.gfi.com/nsm/.

About GFI

GFI is a leading provider of Windows-based network security, content security and messaging software. Key products include the GFI FAXmaker fax connector for Exchange and fax server for networks; GFI MailSecurity email content/exploit checking and anti-virus software; GFI MailEssentials server-based anti-spam software; GFI LANguard Network Security Scanner (N.S.S.) security scanning and patch management software; GFI Network Server Monitor that automatically sends alerts, and corrects network and server issues; and GFI LANguard Security Event Log Monitor (S.E.L.M.) that performs event log based intrusion detection and network-wide event log management. Clients include Microsoft, Telstra, Time Warner Cable, Shell Oil Lubricants, NASA, DHL, Caterpillar, BMW, the US IRS, and the USAF. GFI has offices in the US, the UK, Germany, Cyprus, Romania, Australia and Malta, and operates through a worldwide network of distributors. GFI is a Microsoft Gold Certified Partner and has won the Microsoft Fusion (GEM) Packaged Application Partner of the Year award.

All product and company names herein may be trademarks of their respective owners.

###







Software602 announces 602PRINT PACK 3.0 – New Version of Affordable PDF and TIFF Converter!

(PRWEB) December 7, 2003

Jacksonville, Florida– Software602 has released the new version of 602PRINT PACK 3.0. This set of advanced print drivers simplifies PDF conversion from any Windows 98SE/NT/ME/2000/XP application. In addition to the popular PDF format, the new version now supports conversion into many common graphic formats (TIFF, JPEG, BMP, PCX and PNG). The affordable price of $ 29.95 makes this a must have product for any user with the need to create PDF or graphic files.

602PRINT PACK includes three different print drivers. Print2PDF creates virus free Portable Document Format (PDF) files. It supports custom page sizes and orientation, page color, watermark insertion and different file resolutions. Print2Picture can create one of 5 different graphic formats that can be viewed by Internet Explorer or any standard graphic file viewer. Print2Mail converts any document into a standard HTML e-mail with .GIF format graphics that allows visibility by any e-mail client. All three drivers can assure the documents authenticity by inserting an image stamp/signature into the final document before it is saved to the hard drive or automatically sent by e-mail. Watermark insertion is available and watermark visibility can be customized for perfect blending with the document. Any Windows application that can print can access these three print drivers to convert any document on demand!

602PRINT PACK 3.0 supports batch processing for automated PDF conversion of multiple office documents with only one click. Access to all default parameters for automated conversion can be easily changed from the included 602PRINT PACK Configuration utility. This application also allows user-friendly integration with any third party software.

More information and a free trial version of 602PRINT PACK is available at:

http://www.software602.com/products/printpack/

Software602 is an International software vendor providing technologies for personal and business computing. The company offers a wide range of software designed to simplify everyday computing. Its most popular products are 602PC SUITE – FREE Alternative to MS OFFICE and 602Pro LAN SUITE – Secure mail server with anti-virus & anti-spam, built-in firewall and proxy for controlled Internet sharing.

More information about the company is available at:

http://www.software602.com/


###

PR Contact:

Software602, Inc.

Premysl Pech

904-642-5400

pr@software602.com