กHow to Make Money Online…Driving your Car.ก

กHow to Make Money Online…Driving your Car.ก

by: George Papazoglou

Here’s an alluring income generating strategy, that’s widely adopted by top MLM Agents, Small Firms, Entrepreneurs and Marketers in virtually any field of industry. It still amazes me how most Internet entrepreneurs overlook this ‘nocost’, powerful, freeadvertising system, which is…

To Making Money Driving your Car with ID Plates!

The potential of free advertising using car plates is widely adopted by small firms to gigantic corporations. You can promote any kind of opportunity, or your own business with ID Plates. It is projected that an ID car plate can generate as many as 5000 new customers per year.

Hint: If you promote an affiliate program, you still can capitalize on ID plates by redirecting prospective visitors to a profitable merchant via your web site. All you have to do next is create an ID Plate by identifying it with your own URL. Better register a unique web site to track the success of your ‘boulevard campaign’;)

Think about it… your online business will harness costfree solid advertising, as drivers will consistently ‘observe’ your web site promoted as you drive your car, park and even at traffic jams or stoplights.

You could register a web site that intrigues *curiosity*; a URL that’s short and memorable to fully exploit this awesome promotion technique. After all, gigantic corporations like IBM, Microsoft and thousands of small businesses utilize this marketing concept why not you?

In fact, one of my most lucrative marketing programs, promotes its’ conceptual 90% with ID Plates ( you can find it at: http://cashchecks.com?ar ). Don’t take this offline marketing strategy for granted you could generate an extra 46figure income annually, even without an advertising budget.

Brand your business with every ‘viral technique’ you can think of กleave no stone unturnedก. In plenty of circumstances, your customers ‘frequentby’ even in the most unsuspected places… so,‘ID Plate’ your roadway to the bank!

About The Author

George Papazoglou, is the Author behind http://websitepromotion.gr

This article may be freely distributed / republished, as long as it contains the authorกs credits and the precise entirety of the provided article, titled: กHow to Make Money Online…Driving your Car.ก

[email protected]

This article was posted on October 28, 2003

by George Papazoglou

If You Don’t Know This, You Might Loose Your Commi

If You Don’t Know This, You Might Loose Your Commissions!

by: Frank Bauer

Are you aware that using certain tools to protect your affiliate commissions might in fact cause you to loose them?

Let me explain you how than can be and what you can do to protect yourself from commission loss…

The other day a good marketing friend of mine, letกs call her Eva, send me an email, telling me about a service that she believed me to be interested in… and in fact, I was.

She wrote: กIf you want to take a look, the link is: http://www.more4you.ws/monก

When I followed her URL, I noticed on that page, that her affiliate ID was missing on the main page, as well as on the order form page.

Since I wanted her to get credit for this, I emailed Eva:

กYour link will not earn you commissions as your affiliate ID doesn’t show at http://www.monopolizer.com/.

I recommend to use a forwarding link instead of placing the site into a frame.ก

She answered me that it worked fine when she followed the link herself. How was that possible you ask? Very simple.

When she originally got the affiliate link, she must have used the link one time directly and this way saved the cookie on her computer.

So I replied to Eva:

กI checked it again… if I visit their site through http://www.more4you.ws/mon, your ID is not shown anywhere.

But if I visit it through http://www.monopolizer.com/index.php?affiliateID=249040817 I can see your ID everywhere.

In general… cookie based systems often have a problem if you place the site into a HTML frame on another domain.ก

This time Eva replied to me:

กWell thatกs got me stumped… I used Covert Affiliate to generate that URL and I just cleared my cookies and tried it and I do not see my affiliate codes on the main page…ก

I actually noticed that problem of promoting through a frame already quiet a while ago. Also e.g. when I use Mikeกs MyViralWebsite system or any other system that displays your affiliate URL inside a HTML frame… itกs the same problem.

The tricky part about it… some programs work if called through a frame (meaning: your affiliate ID will be used) and others don’t.

My rule of thumb is: If I don’t see my affiliate ID on the other page, I will not use a HTML frame.

But for the reason I described before, make sure that you delete you cookies before you give it a try!

This is also the reason why I always use my own Add2it GoTo Pro tracking links whenever I promote another program.

The Add2it GoTo Pro links look e.g. like this:

http://www.add2it.com/go/to.pl?l=ListDotCom

To make that shorter and easier, I created and uploaded another tiny script called see.pl. Now I can use an even shorter link:

http://add2it.com/see.pl?ListDotCom

The last part, the กListDotComก, is what changes depending on what program I want to promote.

The advantage… not only do you get stats on how many people click that link every month, it also simply forwards to the URL you want to promote, prevents this way the กframeก problem while still hiding the ugly long affiliate link and this way it REALLY protects your commission.

Reprint rights to this article are granted, as long as it is not modified and the resources plus signature remain unchanged.

About The Author

Frank Bauer is the owner of Add2it.com Scripts & Services for your Web Business at http://www.add2it.com and the publisher of the More4you Newsletter at: http://www.more4you.ws. To see how he can help you, visit: http://www.frankbauer.name

[email protected]

This article was posted on October 04, 2004

by Frank Bauer

Developing Stateenabled Applications With PHP

Developing Stateenabled Applications With PHP

by: John L

Installment 1

Developing Stateenabled Applications With PHP

When a user is browsing through a website and is surfing from one web page to another, sometimes the website needs to remember the actions (e.g. choices) performed by the user. For example, in a website that sells DVDs, the user typically browses through a list of DVDs and selects individual DVDs for check out at the end of the shopping session. The website needs to remember which DVDs the user has selected because the selected items needs to be presented again to the user when the user checks out. In other words, the website needs to remember the State i.e. the selected items of the userกs browsing activities.

However, HTTP is a Stateless protocol and is illequipped to handle States. A standard HTML website basically provides information to the user and a series of links that simply directs the user to other related web pages. This Stateless nature of HTTP allows the website to be replicated across many servers for load balancing purposes. A major drawback is that while browsing from one page to another, the website does not remember the State of the browsing session. This make interactivity almost impossible.

In order to increase interactivity, the developer can use the session handling features of PHP to augment the features of HTTP in order to remember the State of the browsing session. The are basically 2 ways PHP does this:

Using cookies

Using Sessions

The next installment discusses how to manage sessions using cookies…

Installment 2

Cookies

Cookies are used to store Stateinformation in the browser. Browsers are allowed to keep up to 20 cookies for each domain and the values stored in the cookie cannot exceed 4 KB. If more than 20 cookies are created by the website, only the latest 20 are stored. Cookies are only suitable in instances that do not require complex session communications and are not favoured by some developers because of privacy issues. Furthermore, some users disable support for cookies at their browsers.

The following is a typical serverbrowser sequence of events that occur when a cookie is used:

The server knows that it needs to remember the State of browsing session

The server creates a cookie and uses the SetCookie header field in the HTTP response to pass the cookie to the browser

The browser reads the cookie field in the HTTP response and stores the cookie

This cookie information is passed along future browserserver communications and can be used in the PHP scripts as a variable

PHP provides a function called setcookie() to allow easy creation of cookies. The syntax for setcookie is:

int setcookie(string name, [string val], [int expiration_date], [string path], string domain, [int secure])

The parameters are:

name this is a mandatory parameter and is used subsequently to identify the cookie

value the value of the cookie e.g. if the cookie is used to store the name of the user, the value parameter will store the actual name e.g. John

expiration_date the lifetime of the cookie. After this date, the cookie expires and is unusable

path the path refers to the URL from which the cookie is valid and allowed

domain the domain the created the cookie and is allowed to read the contents of the cookie

secure specifies if the cookie can be sent only through a secure connection e.g. SSL enable sessions

The following is an example that displays to the user how many times a specific web page has been displayed to the user. Copy the code below (both the php and the html) into a file with the .php extension and test it out.

[?php

//check if the $count variable has been associated with the count cookie

if (!isset($count)) {

$count = 0;

} else {

$count++;

}

setcookie(กcountก, $count, time()+600, ก/ก, กก, 0);

?]

[html]

[head]

[title]Session Handling Using Cookies[/title]

[/head]

[body]

This page has been displayed: [?=$count ?] times.

[/body]

[/html]

The next installment discusses how to manage sessions using PHP session handling functions with cookies enabled…

Installment 3

PHP Session Handling Cookies Enabled

Instead of storing session information at the browser through the use of cookies, the information can instead be stored at the server in session files. One session file is created and maintained for each user session. For example, if there are three concurrent users browsing the website, three session files will be created and maintained one for each user. The session files are deleted if the session is explicitly closed by the PHP script or by a daemon garbage collection process provided by PHP. Good programming practice would call for sessions to be closed explicitly in the script.

The following is a typical serverbrowser sequence of events that occur when a PHP session handling is used:

The server knows that it needs to remember the State of browsing session

PHP generates a sssion ID and creates a session file to store future information as required by subsequent pages

A cookie is generated wih the session ID at the browser

This cookie that stores the session ID is transparently and automatically sent to the server for all subsequent requests to the server

The following PHP sessionhandling example accomplishes the same outcome as the previous cookie example. Copy the code below (both the php and the html) into a file with the .php extension and test it out.

[?php

//starts a session

session_start();

//informs PHP that count information needs to be remembered in the session file

if (!session_is_registered(กcountก)) {

session_register(กcountก);

$count = 0;

}

else {

$count++;

}

$session_id = session_id();

?]

[html]

[head]

[title]PHP Session Handling CookieEnabled[/title]

[/head]

[body]

The current session id is: [?=$session_id ?]

This page has been displayed: [?=$count ?] times.

[/body]

[/html]

A summary of the functions that PHP provides for session handling are:

boolean start_session() initializes a session

string session_id([string id]) either returns the current session id or specify the session id to be used when the session is created

boolean session_register(mixed name [, mixed …]) registers variables to be stored in the session file. Each parameter passed in the function is a separate variable

boolean session_is_registered(string variable_name) checks if a variable has been previously registered to be stored in the session file

session_unregister(string varriable_name) unregisters a variable from the session file. Unregistered variables are no longer valid for reference in the session.

session_unset() unsets all session variables. It is important to note that all the variables remain registered.

boolean session_destroy() destroys the session. This is opposite of the start_session function.

The next installment discusses how to manage sessions using PHP session handling functions when cookies are disabled…

Installment 4

PHP Session Handling Without Cookies

If cookies are disabled at the browser, the above example cannot work. This is because although the session file that stores all the variables is kept at the server, a cookie is still needed at the browser to store the session ID that is used to identify the session and its associated session file. The most common way around this would be to explicitly pass the session ID back to the server from the browser as a query parameter in the URL.

For example, the PHP script generates requests subsequent to the start_session call in the following format:

http://www.yourhost.com/yourphpfile.php?PHPSESSID=[actual session ID]

The following are excerpts that illustrate the discussion:

Manually building the URL:

$url = กhttp://www.yoursite.com/yourphppage.php?PHPSESSID=ก . session_id();

[a href=ก[?=$url ?]ก]Anchor Text[/a]

Building the URL using SID:

[a href=กhttp://www.yoursite.com/yourphppage.php?[?=SID ?]ก]Anchor Text[/a]

About The Author

John L is the webmaster of http://www.bimmercenter.com..

[email protected]

This article was posted on November 07, 2004

by John L

Clickbank Vendors: Two Simple Ways You Can Help Af

Clickbank Vendors: Two Simple Ways You Can Help Affiliates Protect Their Sales.

by: John Hocking

1) How To Remove Your Affiliates Clickbank Id From The URL.
As a merchant, you can hide the clickbank affiliate id for your affiliates by creating a redirect page and pointing your default hoplink to the redirect.
When some uses your hoplink http://hop.clickbank.net/?affid/yourid, the cookie will be set and they will land on your redirect page.
The redirect will send them to your domain without adding the ?hop= information. The cookie is already set and does not need to be shown.
This will help protect your affiliates commission and give your site a more professional appearance.
In the code examples below, you will need to replace [ and ] with less then and greater then symbols.
Create a file called hoplink.php
Add the following code

[?php
header(กLocation: http://www.yourdomain.comก);
exit;
?]

Upload hoplink.php to the root of your domain.
Login into your clickbank account.
Click to view or modify your account settings.
Click to modify your account.
Under Business Info, change the url of your website to be http://www.yourdomain.com/hoplink.php
Click on save changes.
Now when a visitor clicks on a hoplink, it appears that they came directly to your site and the affiliateกs id is no longer exposed. For this technique to be completely effective, the affiliate needs to cloak the hoplink as well.
2) How to Cloak Your Clickbank Vendor Id Using PHP
Most clickbank affiliate theft is caused by the fact that is easy to rebuild a hoplink and get credit for your own purchase. All you really need to know is the vendor id.
All you have to do is look at the source code of a typical sales link and you will see the vendor id.
For example: http://www.clickbank.net/sell.cgi?YourVendorId/1/Product_Description
To rebuild the hoplink you simply use http://hop.clickbank.net/?AffiliatesId/YourVendorId
Now when you click on the hoplink and the original affiliate has lost a sale.
As you can see, without knowing the vendor id, you can not successfully rebuild the hoplink and the affiliates sale would be protected.
Below is an example of how to do this in PHP.
You will need to replace [ and ] with less then and greater then symbols.
Create a file called order.php
Add the following code

[?php
header(กLocation: http://www.clickbank.net/sell.cgi?YourVendorId/1/Product_Descriptionก);
exit;
?]

Just replace YourVendorID with your Clickbank ID
Replace 1 with your product number
Replace Product_Description with your Product Description
Upload order.php into the same folder as your sales page.
Now link to order.php instead of using the raw order link and your Vendor ID is never exposed
This will make it very hard for affiliates to rob other affiliates of their commissions.
I encourage you to make these simple changes to protect the commissions of your affiliates.
Copyright 2004 John Hocking

About The Author

John Hocking is the creator of http://www.guidetoebookmarketing.com, a resource site on creating and marketing ebooks. You will find hundreds of resources, articles and ebook reviews. Learn how to create viral ebooks at http://www.viralebook.com

This article was posted on May 14, 2004

by John Hocking

CCNA Cisco Certification Testing Center Tips

CCNA Cisco Certification Testing Center Tips

by: www.SemSim.com

Candidates can register for the CCNA exam (640801 exam or 640821 INTRO or 640811 ICND ) at Pearson VUE or Prometric testing centers.
In order to do their best, candidates should know what to expect at the testing center for the Cisco CCNA certification exam. Since testing center guidelines may vary from one center to another, we recommend that the candidates call the local testing center to check about the guidelines. Here are some points providing information on what you can expect at the exam center:
Recertification: If you have taken a Cisco CCNA certification exam before, find out your Cisco ID and specify it before you start with your registration. This will ensure that you get proper credit for the exam and will help avoid any duplicate records.
Reach before time: We strongly suggest reaching the test center before time. Failure to do so may result in cancellation of the appointment.
Sign the logbook: You may be asked to signin the logbook upon arrival as well as upon departure. Do check on this.
You must carry your identification: You will be required to show a valid identification (ID), perhaps including a recent, recognizable photograph. If the supervisor questions your ID, you may be required to show another ID. You should check the testing center guidelines on identification and take all supplemental identification documents with you.
Generally Accepted Identification:
Passport
Photobearing driverกs license with signature
National/Military identification card
The following MAY not be accepted as valid ID:
Credit Cards (Please check with test center)
Private identification cards
Any expired ID
Read the testing center regulation form carefully: You will be provided with a Testing Center Regulation form by the supervisor. Read the regulations carefully and comply with them during the test.
Sign the confidentiality statement: The supervisor is responsible for asking you to sign the confidentially statement at the test center indicating that you will not reveal exam questions to other students after the test.
Supervisor sets up your test computer: The supervisor will ensure that the Cisco certification test displays on screen before handing over the machine to you.
Ask for sheets for scratch work: Scratch papers will be provided to you at the testing center. These are sometimes only available on request. Ask for some blank scratch sheets to do calculations and rough work. Jot down important points and tables (such as powers of 2, binary representation tables etc) before exam starts. This can be a big time saver. Do not take the scratch paper out of the testing room on completion of exam.
Items not allowed in the testing room: The candidate is not allowed to bring in the testing room personal items such as:
Books, revision sheets or notes: The exam is closed book
Cellular phones & alarms
Food or drinks may not be allowed
Calculators
Your session may be audio and video taped: Do not attempt to talk or communicate in any form to anybody in the testing room. Your session may be taped and can lead to immediate disqualification .
On exam completion: You will be explained by the supervisor what to do when you complete the exam. If not, or if you are unclear about what you should do, ask it yourself before beginning the exam.
Do not take with you the the testing material from the testing room: Return all of your testing materials, including the scrap paper, on the completion of your exam to the supervisor.
Certified copy of the exam result: Your supervisor will give you a certified copy of the exam report on completion of the test. This will list your score indicating strengths and weaknesses in the various test areas. Ask the supervisor for the certified copy, if you do not get it.

About The Author

SemSim.com provides training resources for Cisco certification exams: CCIE, CCNP, CCNA, CCDP, CCDA. It offers FREE learning resources to students such as study guides and router simulation labs at itกs online learning center located at: http://www.semsim.com/ccna/learn.html

http://www.SemSim.com : Making Cisco cetification easy!

[email protected]

This article was posted on July 02, 2004

by www.SemSim.com

Six Easy WhiteListing Ways… Stop Losing Importa

Six Easy WhiteListing Ways… Stop Losing Important Emails!

by: S Kumar

Are you dead sure about receiving of all the important emails that is sent to you?

‘the chances are that you are among the 42% of the people who ARE NOT receiving the genuine emails and newsletters that you requested forก.

Why this is so?

Increasingly, ISPs are using filtering systems to try and keep S/p/a/m out of customersก inboxes. Being automated, these filters are not perfect. Many authentic emails get caught in these filters.

Sometimes, they accidentally filter that กAllImportantEmailก you were waiting for. And you have no way to know which of your emails is filtered. The end result is, you end up losing critical info that may prove to be vital to your business.

Is there a way to solve the problem?

Fortunately for all of us, there exist simple solutions. But the action has to come from you to make sure that these critical communications reaches your mailbox Unblocked.

Six of the most common and easy solutions are given below. Itกs simple to implement.

#1. *The HOTMAIL User*: You can กSafe Listก an email ID in hotmail. Hereกs how:

Choose the กOptionsก tab from the top

Select กSafe Listก ( Given under the head Mail Handling)

Now type the email address that you want messages to be received without filtering in the one line form.

Now choose กAddก

#2 *The AOL User*: Place an email ID in the กAddress Bookก in AOL. Hereกs how:

Go to Keyword Mail Controls

Select the screen name to which the newsletter is send (e.g. กHomeBiz Tip EMagก)

Now choose กCustomize Mail Controlsก For This Screen Name

For AOL v7.0, include in the section: กexclusion and inclusion parametersก, the domains from which email is send. For e.g. @learnhomebusiness.com, @learnhomebusiness.net. For AOL v8.0, choose กAllow email from all AOL members, email addre^sses and domainsก

Choose กNextก.

Choose กSaveก displayed at the bottom.

Important Note On AOL 9.0 : AOL 9.0 has become more complicated. The best way is to place an email ID to the กPerson I knowก buddy list. All mail you receive from this email ID will pass through the filters. So, make sure that when you join for a newsletter, it is ADDED to your buddy list.

#3 *The YAHOO User*: Correct the กBulkก Folder in your Yahoo. Hereกs how:

1. Newsletters gets mistakenly filtered to your Yahoo กBulkก folder. Go to your กBulkก folder; locate the filtered newsletter and choose, ‘this is not S^pamก, next to the กFromก field.

Also, to ensure that you do not miss on important emails to your Yahoo Inbox, do these steps:

Open your Yahoo mailbox

Choose กMail Optionsก (Given at the right corner)

Choose กFiltersก

Choose กAdd ก button.

Now, in the top row From header: Choose กcontainsก.

Type the domain from which the newsletter is sent. For e.g. learnhomebusiness.com

Finally, at the bottom Move the message to: Choose Inbox.

Choose กAdd Filterก button.

#4. *For OTHER Users*: Meant for email programs like Outlook, Outlook Express, Eudora and Netscape Mail. Hereกs how:

Inform your ISP or the person responsible for your email that you want to receive all communications from a particular domain.

For e.g. a member of http://www.learnhomebusiness.com, asks them to whitelist the eZine กHomeBiz TipsEMagก so that he can continue to receive our Zerocost products without a break.

#5. *For Own Filter Software*: Many times the filter software installed in the computer is the culprit. Hereกs how to prevent it.

Look for กOptionsก in the filter software that you have installed in your computer. Then give permissions for all emails from a particular email ID or domain.

#6. *Two Additional Tips To Prevent Loosing Important Emails*:

Tip #1 : You may be currently receiving all your email messages without a hitch. But, itกs still advisable to whitelist and prevent future problems.

Tip #2 : No matter what the email system you are currently using, add the email ID of your optin Newslettersก to the กAddress Bookก of your particular email system.

Currently, whitelisting is the ONLY way to ensure that you receive all your important emails. Do not ignore this important aspect of email communication.

From a personal angle, the major chunk of what I learned so far is from small, nifty newsletters that arrives in my mail box with a welcome smile. I can never block these little capsules of vital info.

If I do, I am blocking myself from the ‘titbitsก that adds to my knowledge. Ultimately, Integrating these ‘titbitsก into my website http://www.learnhomebusiness.com, keeps it live and current Everyday.

About The Author

Copyright 2003: S. Kumar,

http://www.learnhomebusiness.com

Author of eBook:กBecome A Global Homebusiness Pro…ก

Direct Download Here At Zero Cost

http://www.learnhomebusiness.com/HomeBiz.htm

This article was posted on October 05, 2003

by S Kumar

26 Tips on How to be Safe in Your eBay Selling and

26 Tips on How to be Safe in Your eBay Selling and Buying

by: Brian McGregor

The irony of eBay is that as it grows to be ever more successful, it draws the unsavoury element of the internet towards it. Iกm talking about people who make it their business to attempt to defraud you and I in our eBay and PayPal transactions.

Of course, not all dodgy dealings on eBay are fraudulent. Some are just mischievous. Others are by chancers, who perhaps reckon their victims won’t be bothered to pursue them.

Whoever causes it, itกs left to the targeted buyer or seller to try and sort out the problem. All that we as users can do is to be extremely vigilant and cautious in all our eBay and PayPal activities.

Here is a list of practical steps, in no particular order, which buyers and sellers can take to help avoid becoming the next victim.

Hopefully you are already aware of some of these. It doesn’t necessarily follow that if one of these applies the auction or person is fraudulent. But if you use your head, and build up a view of the overall transaction based based upon a number of these factors, you will reduce your chances of getting conned.

a) Stock photos and descriptions

Because they don’t have the item they are กsellingก, some fraudsters use a stock photograph of the item. And they will probably use the manufacturerกs product description too. So, stock photos and no original description might be a sign. Search for other auctions by the same seller, and see if they are brazen enough to advertise the same item more than once.

b) A price too good to be true often isn’t true

A fraudster wants your money quickly, so you may find they offer to close their auction early with you as the กwinnerก having bid a price which you know to be somewhat of a bargain. Why would anyone close their auction early if the price hadn’t reached market levels? Iกll give you one guess.

c) High value or high volume, newly registered sellers

Although the vast majority of new sellers are genuine and honest, be cautious of buying from people selling high value items in bulk, very early on in their eBay career. This pattern isn’t quite normal. Think back to your own first sales. You would have been tentative, and probably have tried single, low value items initially. So, a new seller fitting this profile may be someone who has perhaps been previously suspended and has registered another ID.

d) 1 day listings

Although 1 day listing are used by genuine sellers who have more than one item or who want a quick sale, unfortunately this duration is attractive to fraudsters too. They sometimes use a 1 day auction duration to gain a quick sale before their actions can be reported and acted upon. So, be extra wary on auctions with 1 day listing.

e) Invitations to trade offeBay

This is a classic ploy of fraudsters. Having made some kind of contact with you, or you with them, they will invite you to purchase or to sell off eBay i.e. without using eBayกs auction services. The attraction here to the fraudster is that they can drive the transaction along the lines they prefer, whether that be escrow, PayPal etc. Another reason why trading off eBay is not a good idea is that you have to keep your own formal records of the transaction, and you forfeit any cover from eBay buyer protection and PayPal buyer protection. Plus, and this might be a minor point, but you will not be able to leave feedback to let others know your experience with this seller/buyer.

f) Payment methods with no recourse

Fraudsters prefer to chose payment methods in which the buyer has no protection, like wire transfers where the buyer has no way of tracing where the money is going. Western Union Money Transfers and BidPay are favourites and should be totally avoided. Postal orders are similar although they are a popular payment method among the genuine sellers as they require no clearance time. Bank transfers and cheques can only provide the possibility of your bank investigating the details of the account the money was transferred into. For the best protection use Paypal and fund with a Credit Card. Note there are limits on eBay and PayPal protection, and you should make yourself aware of what these are.

g) Unusual sales pattern

If your sellerกs feedback indicates that they normally deal in collectables, DVDs or other specific items, be suspicious that they are suddenly listing laptops, plasma TVs or other high value items. The change may indicate that this sellerกs account has been hijacked.

h) Bad english gives you a pointer

Some fraudsters operate from abroad but pretend to be in UK or USA. As they aren’t particularly adept at the english language they might use a translation tool like Babelfish to create their emails to you. So, watch out for emails that are not good english. In itself, it doesn’t prove anything, there are plenty of genuine eBay sellers for whom english is not their first language. But it might add to further evidence you have.

i) Location Location Location

In the case of lazy fraudsters you might find their locations don’t match up. By that I mean the auction says the goods are in the UK, but the sellerกs ID details show their location to be, say, Ukraine. This is not a good sign. Often in these cases if you contact these sellers you will receive an excuse as to why the item is not in the UK, and therefore can’t be collected in person. In short, if an auction says the item is in the UK and the seller says that it is not, I would avoid the auction. And don’t forget to cross check with their PayPal account, and see in which country this resides.

j) Ask questions

Always, always ask your seller a question. Any question. Their response, if you receive one, will help you judge how genuine the seller is. Beware auctions that carry a message asking you to contact the seller via a given email address as opposed to via the กAsk seller a questionก link. This could be an account hijacker trying to prevent buyers from กAsking the seller a questionก. They want to stop this from happening because such questions could be routed to the real account owner.

k) กeBay can vouch for meก email

A warning about a relatively new tactic used by fraudsters. If you are proving hard to land as a buyer/seller, they may claim they can get eBay to email you proof of their validity so that you can trust them. eBay, of course, will NEVER do this. The email sent out, however authentic looking, is fake and is designed to get you to part with your money or your goods. This applies equally to Square Trade and PayPal. They will never email you certifying the genuineness of anyone.

l)A PayPal warning

There are fraudsters who use stolen PayPal accounts to accept payments. To lower the possibility of this, check your sellerกs location as shown in eBay, and then see if it is one of PayPalกs permitted countries by clicking here: http://www.workwinners.com/nlr701.htm. If PayPal don’t offer their service in the country that the seller resides, be very wary.

m) Passwords

Never have the same password on your eBay and PayPal accounts. Or indeed on any other financial or personal site. Change your passwords every 3060 days on both eBay and PayPal.

n) Escrow

If your seller asks you to use escrow, and proposes an escrow company theyกve used before, this is a clear indication they are fraudulent. There are many fake escrow sites which will take your money fraudulently. The only escrow site recommended by eBay is http://www.escrow.com. An alternative in the UK is http://www.auctionpix.co.uk Please don’t be tempted to use any other escrow company, however professional looking their websites might be. It is a fact that 99% of escrow companies on the internet are fraudulent. They are set up solely to defraud money out of unsuspecting buyers, and to get goods without paying for them from unsuspecting sellers.

o) Pointers in feedback

Try to read the positive feedback as well as the negative. Read the way your seller responds to negative feedback as this will often give you an idea of how the seller will react if something goes badly wrong. If the seller is offering high value goods, be wary if their feedback has been built up quickly from low value purchases. Also, if the overall rating is good, but there are a disproportionate number of negatives in recent days/weeks, this might indicate the account has been taken over. Finally, be aware that feedback is not the guarantee it once was. Feedback can easily be manufactured. Also, if the user ID has been hijacked, youกll be reading the feedback of the original account owner, not the person with whom youกre currently dealing!

p) Credit Card payment

For high value items, or for amounts of money you can’t afford to lose, make sure you pay by credit card which has online fraud protection. This will give you some recourse if the seller is fraudulent. In this context, paying via PayPal is not the same. PayPal do have a buyer protection scheme, but there are criteria which the eBay auction has to satisfy in order to qualify. Even if the transaction qualifies, PayPalกs standard protection currently has a maximum value of $1,000. Note that payment by debit card provides zero protection.

q) Address and Telephone check

Use the Ask the seller a question link, and request they email you with their address and telephone number. Any reputable seller will give you their address and telephone number. When you get the number, call it, and see if you get through to the genuine seller.

r) Keystroke capturing virus

This is a computer virus which you inadvertently download onto your PC. Itกs task is to capture the keystrokes you make, and to send them to the virus placer. The fraudster then uses pattern recognition software to identify and extract personal information, like username, password, credit card numbers etc. To avoid this happening to you, it is wise to have good, uptodate virus, firewall and spyware checking software on your PC. Here is where you can get free software for each of these functions:

Virus protection http://free.grisoft.com/freeweb.php/doc/2/

Firewall http://www.zonelabs.com/store/content/company/products/znalm/comparison.jsp?lid=ho_za

Spyware checking http://www.lavasoft.com/support/download/

s) Shill bidding

Shill bidding is where people work in cahoots to inflate the bidding on an item. A seller has a กpartnerก who makes bids on the sellerกs items with a view to bumping up the bid price. They have no intention of buying the item. Fortunately, shill bidders and their associated seller can be stupid. The shill bidder will usually makes bids on other items from the same seller. Hereกs how to check to see if shill bidding is a feature of a particular seller. First, look at the sellerกs closed auctions over the last 30 days. If most of the closed auctions have no bids, it is unlikely the seller has shill bidders working with them. If all of the closed auctions have bids, take a look at the bid history. See if the same bidder appears in the list of bidders, usually with aggressive bidding and normally at the start of the auction. If so, you may have uncovered a shill operation, so avoid that sellerกs auctions.

t) Keep your transaction information

Keep your own record of the transaction when youกre buying. Don’t just rely on eBay. You want a record of the sellerกs identification, the item description, emails sent and received, plus the time, date and price of your bid.

u) กI noticed your bid….ก

Never deal with anyone who contacts you after seeing your bid on another auction. They will say something like, กI saw you bidding on that digital camera. I have the same model available for sale. I don’t have time to list it on eBay. It has more accessories than the one you lost out on. You can have it for xyz.ก If you bite, theyกll probably take you down the fake escrow route. Also, if you entertain this proposition, youกre operating outside of eBay and therefore have no auction protection whatsoever.

v) Changed eBay ID

Never deal with anyone who has a changed ID icon next to their name. This icon menas theyกve changed their ID in the last 30 days. Few legitimate people change their eBay ID. When was the last time you changed yours? Thereกs a 1% chance that an ID change is genuine, but 99% that it is fraudulent. Why take the risk?

w) Changed email address midstream

If a seller or buyer changes their email address on you in the middle of a transaction, stop dealing with them. It is likely their previous email account was closed down due to some irregularity such as a previous victim reported them. If you think about it, why would any genuine buyer or seller change their email address whilst corresponding on a transaction they wish to conclude expeditiously?

x) Complications

Never get involved in any transaction where the seller/buyer tries to introduce a third person into the financial arrangements. They might ask you to pay xyz, who will then pay the seller, and you will receive a discount or commission for your cooperation. Such proposals are always fraudulent. They prey on greed. Don’t be tempted.

y) Time is of the essence

This is a scam which is has more potential for success than traditional phishing attacks, as it is time sensitive. The fraudster searches for high value auctions that have just ended. The bid history for an auction contains hyperlinks to each bidder. The fraudster checks to see if the winning bidder is selling any items of their own. If so, they go to that auction and embed a request for payment from the first auction within a question for seller. This works because winning bidders are expecting request for payment shortly after an auction ends. A variation of this is to offer a bidder a กsecond chanceก. This time the กAsk the seller a questionก email pretends that the real winner has backed out, and offers the item at a lower price. The buyer, believing the story, is lured into paying to whom they believe is a genuine seller. Many eBayers have heard of the second chance system, but have no experience of it. This unfamiliarity coupled with the fact that a few weeks might have passed, makes this an effective method for fraudsters. The moral of this story is never get involved in any transaction which arrives in your inbox via the Ask the Seller a Question feature.

z) eBay IDs

Never us your email address as your eBay ID, or part of your eBay ID. Fraudsters have software which monitors internet traffic looking for information such as this. If your eBay ID and email address are the same, it is simple for a fraudster to plausibly communicate with other eBay members in your name.

Thatกs all in my list. If you have any further ideas on how to prevent fraudulent transactions on eBay, please let me know and I will promote these through future newsletters.

In the meantime, be aware, and be safe in your eBay buying and eBay selling.

About The Author

Brian McGregor specializes in showing website owners how to make more money from their sites by applying inventive and original use of eBay. For a free copy of ‘The eBay Traffic Funnel’ which shows you how to use the power of eBay to make more money with your website, visit http://www.moreauctionsales.com/websites/

[email protected]

This article was posted on January 26, 2005

by Brian McGregor

What To Expect At The Cisco Testing Center

What To Expect At The Cisco Testing Center

by: www.SemSim.com

Candidates can register for the CCNA exam (640801 exam or 640821 INTRO or 640811 ICND ) at Pearson VUE or Prometric testing centers.
In order to do their best, candidates should know what to expect at the testing center for the Cisco CCNA certification exam. Since testing center guidelines may vary from one center to another, we recommend that the candidates call the local testing center to check about the guidelines. Here are some points providing information on what you can expect at the exam center:
Recertification: If you have taken a Cisco CCNA certification exam before, find out your Cisco ID and specify it before you start with your registration. This will ensure that you get proper credit for the exam and will help avoid any duplicate records.
Reach before time: We strongly suggest reaching the test center before time. Failure to do so may result in cancellation of the appointment.
Sign the logbook: You may be asked to signin the logbook upon arrival as well as upon departure. Do check on this.
You must carry your identification: You will be required to show a valid identification (ID), perhaps including a recent, recognizable photograph. If the supervisor questions your ID, you may be required to show another ID. You should check the testing center guidelines on identification and take all supplemental identification documents with you.
Generally Accepted Identification:
Passport
Photobearing driverกs license with signature
National/Military identification card
The following MAY not be accepted as valid ID:
Credit Cards (Please check with test center)
Private identification cards
Any expired ID
Read the testing center regulation form carefully: You will be provided with a Testing Center Regulation form by the supervisor. Read the regulations carefully and comply with them during the test.
Sign the confidentiality statement: The supervisor is responsible for asking you to sign the confidentially statement at the test center indicating that you will not reveal exam questions to other students after the test.
Supervisor sets up your test computer: The supervisor will ensure that the Cisco certification test displays on screen before handing over the machine to you.
Ask for sheets for scratch work: Scratch papers will be provided to you at the testing center. These are sometimes only available on request. Ask for some blank scratch sheets to do calculations and rough work. Jot down important points and tables (such as powers of 2, binary representation tables etc) before exam starts. This can be a big time saver. Do not take the scratch paper out of the testing room on completion of exam.
Items not allowed in the testing room: The candidate is not allowed to bring in the testing room personal items such as:
Books, revision sheets or notes: The exam is closed book
Cellular phones & alarms
Food or drinks may not be allowed
Calculators
Your session may be audio and video taped: Do not attempt to talk or communicate in any form to anybody in the testing room. Your session may be taped and can lead to immediate disqualification .
On exam completion: You will be explained by the supervisor what to do when you complete the exam. If not, or if you are unclear about what you should do, ask it yourself before beginning the exam.
Do not take with you the the testing material from the testing room: Return all of your testing materials, including the scrap paper, on the completion of your exam to the supervisor.
Certified copy of the exam result: Your supervisor will give you a certified copy of the exam report on completion of the test. This will list your score indicating strengths and weaknesses in the various test areas. Ask the supervisor for the certified copy, if you do not get it.

About The Author

SemSim.com provides training resources for Cisco certification exams: CCIE, CCNP, CCNA, CCDP, CCDA. It offers FREE learning resources to students such as study guides and router simulation labs. For more information visit: http://www.SemSim.com : Making Cisco cetification easy!

[email protected]

This article was posted on June 18, 2004

by www.SemSim.com

How to Booost Your Affiliate Commissions by 30%

How to Booost Your Affiliate Commissions by 30%

by: Satyajeet Hattangadi

Affiliate marketing is one tough business. Everyone online today is looking to make or save money in any way they can.

In the good old days when internet marketing was in its infancy, most of the people who clicked on your affiliate links used to purchase without a second thought… but, now as times are getting tougher, and visitors getting more cynical, youกll be amazed at the number who won’t!

Just one flaw in a system and you will find dozens of unscrupulous people waiting to exploit it. Same goes for affiliate commission tracker systems. People who know how to manipulate the system will replace your affiliate ID with theirs and กhijackก your commissions.

Most affiliate links are some form or the other of http://www.thesite.com/?YOURID

Where your affiliate id is passed as a parameter. A thief has to simply change the กYOURIDก part to ‘tHEIRIDก to put your money in their pocket.

In other cases, there are visitors to your site who simply can’t stand the thought of you กmaking money off themก so they bypass you by simply chopping off the end of your affiliate link that contains your ID.

Instead of buying from http://www.thesite.com/?YOURID, the bypasser will simply กchop offก the affiliate ID at the end and simply buy from the plain URL http://www.thesite.com/ without your affiliate ID attached!

Bam! you just got cheated out of your rightful commission.

Studies have shown that this phenomenon causes about 30% lost sales.

By following some of these simple tips you will be able to at least confuse most hijackers and, in many cases, often disarm them completely.

You might notice I said most and not all. This is because if the hijacker is well versed at html and javascipt he will be able to eventually get to your affiliate link. However, most hijackers are just opportunists who will only act if they see an easy buck and its this segment that we can beat.

The simplest way to hide your affiliate links is using a javascript redirect page.

This is where you hide your affiliate link in a page on your site using a simple javascript that redirects people to your affiliate link.

This way your กnakedก affiliate link is not exposed in your actual email messages and ezine ads, but people get redirected to the true affiliate link.

One possible drawback of this method is that some affiliate programs, like clickbank for example, expose the affiliate link along with your ID in the browser address bar.

So if the viewer is eagleeyed he will notice that heกs been redirected through an affiliate link.

A safer method to hide your affiliate links is using a zeroframe or กinvisibleก frame that masks the affiliate link by making it appear you are sending people to a page on your website. In reality, you are actually sending them to your affiliate link.

This technique is also used by many domain redirection service sites.

Unfortunately if the user views the source of the page. He know whats that youกve loaded an affiliate link.

The solution is to use javascript encryption to scramble up the page code.

Even though there isn’t a 100% perfect solution to this problem, if you want to get paid more often through your affiliate links, make sure itกs not obvious you’re referring people to an affiliate link.

If they can’t see that its a affiliate link, lower the possibility of you getting stiffed of your commission.

If you are looking for a tool that lets you do all this plus earn affiliate commissions even from those folk who dont click your affiliate link then do check out Covert Affiliate at http://www.novasoftinc.net/covertaffiliate

About The Author

Satyajeet Hattangadi is the Owner of Novasoft Inc (http://www.novasoftinc.net), a software solutions provider, who specialize in affordable customized software solutions.

This article may be reprinted as long as the text and resource box are kept intact, and the links remain live and spiderable.

This article was posted on April 15

by Satyajeet Hattangadi

Someone Stole Your Commission

Someone Stole Your Commission

by: Bob Bishop

Someone Stole Your Affiliate Link!

If you use affiliate programs you may not be getting all the commissions you deserve!

Hijacking is what happens when someone replaces your affiliate id with theirs in the affiliate link. Let’s say your affiliate ID is cyberbooks and the product site is www.affiliatelife.com. Then your affiliate link would be www.affiliatelife.com/?cyberbooks.

Say the highjacker uses the affiliate ID of captainhook. What he would do is replace your ID with his, and buy from the URL www.affiliatelife.com/?captainhook.

Bypassing is what happens when someone sees an affiliate link and is either unfamiliar and uncomfortable with it, or just can’t stand the idea of your getting a commission (even though you’ve done the work to put the information in front of them).

So instead of buying from www.affiliatelife.com/?cyberbooks, the bypasser will simply ขchop offข the affiliate ID at the end and simply buy from the plain URL www.affiliate.com without your affiliate ID attached!

The bottom line: You don’t get your commission, and the hijacker puts your money in his pocket, in the form of a discount, by buying through his own affiliate link. Unfortunately, as long as people can see an affiliate code in the link that you offer them, a certain number of them are destined to hijack it – or bypass it.

If you’re using PayPal to sell digital products check your source code. In that code is the link to your thank you page which many people use as the download page for their digital product. All someone has to do is copy that link in your source code and voila’, they’re at your download page without having to pay for your product!

Your best bet to overcome this problem is to do some research and find some software that will cloak your affiliate links or hide your code.

This is something you should take care of before you start losing money!

About The Author

Bob Bishop is the publisher of the free ขTraffic Tip of the Dayข newsletter.

http://www.internettraffictips.com

Get a free copy of the Ultimate Link Tracker when you sign up for our newsletter!

This article was posted on November 14, 2002

by Bob Bishop

What Google Can Teach You About Success

What Google Can Teach You About Success

by: Nigel Owen

Let me share with you something that I found so interesting.

It was on a Sunday night Janary 2nd to be precise. I was watching the football games during the day on CBS and saw the promo for their show 60 Minutes later that night.

I love hearing about success stories so I was excited when they said they would be doing a feature on the SUCCESS of GOOGLE.

I just finished dinner and the segment was about to start so I went over to the TV.

The reporter was interviewing the 2 founders, they showed the company headquarters, and THEN they brought up something where I said BINGO.

Hereกs what caught my attention.

For quite a few years I was going nowhere. I had all the ideas in the world, but never did anything with them.

I procrastinated (a ton).

Fear was holding me back.

I was scattered.

(This wasn’t a fun time in my life.)

But, THEN things began to change BECAUSE of this ONE SUCCESS Principle. And this is the same SUCCESS PRINCIPLE that has helped Google soar.

Paraphrasing 60 minutes (the TV Show) last night.

Google Founders:

กEverything we do we start in BETA (BETA means a test).

For all our projects, we just get it out there, get it going, where itกs at a กCก level and then we get feedback on what people like, don’t like, and then we go from there.ก

Hereกs what Google was really saying and hereกs the success principle that changed my life.

กYOU don’t have to get it right, you just have to get it going.ก

(Read this again.)

I used to wait until everything was perfect and fear stared at me and I didn’t move.

This was for many years.

But then I decided to JUST GET GOING.

Think about it this way.

In school, we get graded, A, B, C and D.

As a trader, investor or market maker, even when your trading ideas are at a ‘C’, you should still get it GOING!

Then, find out which trading strategy you like/dislike and improve it.

It sounds so simple, but most people have 10 pounds of cement holding their ideas hostage.

Successful entrepreneurs and traders get going!

Itกs the only way to TRULY get wisdom and experience.

Ask yourself this question:

What have I been putting off, procrastinating about, that I can just get going today?

Are you currently trading the currency market but have yet to find a workable trading strategy?

Have you yet to even consider what this now in vogue market, the foreign exchange (FOREX) can do for your pocketbook?

THINK ABOUT THIS. What if you cud not only กget it goingก but, thru 2 people who have *beentheredonethat*, could *get it right* almost immediately?

Thru Rapid Forexกs selfstudy manuals you can.

http://www.forextrading.isour.biz

About The Author

Nigel Owen is a 36 yr old Englishman living in North Wales! Married with three children and a highly motivated individual who decided 3 years ago that he should retire at the age of 40. Through Network marketing and the internet he is working towards his goal.

His websites include:

http://www.forextrading.isour.biz

http://igiveaway20dollarbills.blogspot.com/

[email protected]

This article was posted on April 07

by Nigel Owen

Cisco Certification: Debug and Show commands for I

Cisco Certification: Debug and Show commands for ISDN

by: Chris Bryant

The major reason I recommend getting your hands on real Cisco equipment rather than a simulator is that real Cisco routers give you the chance to practice and learn show and debug commands.

The knowledge you acquire from debugs is invaluable. Frankly, it’s this knowledge that puts you above the ขaverageข CCNA who doesn’t have that handson experience. Watching debugs in action also gives you a head start on the CCNP. Since 90 – 95% of CCNAs go on to pursue the CCNP, it’s a great idea to get started with debugs now.

Don’t make the mistake of waiting until you’re studying for your CCNP and CCIE to start learning debugs and shows. The work you do for the CCNA is the foundation for everything you’ll do in the future.

Never, ever, ever practice debugs on a production network. There are debugs that will give you so much information that the router actually becomes overloaded and then locks up. Never practice debugs on a production network.

It’s important to know the proper show and debug commands for ISDN for several reasons. First, by watching ISDN in operation, you can see its processes and better understand what’s going on. Secondly, it’s difficult if not impossible to properly troubleshoot ISDN without knowing the proper show and debug commands. (It’s easy to overlook an ISDN authentication error just by looking at the configuration, but running debug ppp negotiation will quickly show you where the problem lies.)

Let’s take a look at the ISDN show and debug commands that every CCNA and CCNP should know.

Show ISDN Status

If you only know one ISDN show command, it’s got to be this one. Always use this command after configuring your ISDN switch type and any necessary SPIDs. The command will show you the switch type (and will also show you if you did not configure a switch type), and whether the SPIDs you entered are valid:

R1#show isdn status

Global ISDN Switchtype = basicni

ISDN BRI0 interface

dsl 0, interface ISDN Switchtype = basicni

Layer 1 Status:

ACTIVE

Layer 2 Status:

TEI = 91, Ces = 1, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED

TEI = 92, Ces = 2, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED

Spid Status:

TEI 91, ces = 1, state = 5(init)

spid1 configured, no LDN, spid1 sent, spid1 valid

Endpoint ID Info: epsf = 0, usid = 1, tid = 1

TEI 92, ces = 2, state = 5(init)

spid2 configured, no LDN, spid2 sent, spid2 valid

Endpoint ID Info: epsf = 0, usid = 3, tid = 1

Layer 3 Status:

0 Active Layer 3 Call(s)

Activated dsl 0 CCBs = 0

The Free Channel Mask: 0x80000003

Once in a while, you’ll get this output from show isdn status:

R2#show isdn status

The current ISDN Switchtype = basicni1

ISDN BRI0 interface

Layer 1 Status:

ACTIVE

Layer 2 Status:

Layer 2 NOT Activated

Spid Status:

TEI Not Assigned, ces = 1, state = 3(await establishment)

spid1 configured, no LDN, spid1 NOT sent, spid1 NOT valid

TEI Not Assigned, ces = 2, state = 1(terminal down)

spid2 configured, no LDN, spid2 NOT sent, spid2 NOT valid

Check your running configuration, and if the SPIDs look good, simply close the BRI interface and open it again. Then run show ISDN status again. If you then see ขspids are validข, you’re ready to proceed. If you still see a message that the spids are invalid, you’ve most likely mistyped the SPID.

Show AccessList

What’s this command got to do with ISDN? Everything.

Remember how the ISDN link comes up in the first place? Interesting traffic. By default, there is no interesting traffic. You define interesting traffic with the dialerlist and dialergroup commands, AND the accesslist command. If you have a problem with your link never coming up or with it coming up and staying up, use this command to see what traffic has been defined as interesting.

Show Dialer

Another helpful command to determine why an ISDN link is coming up and staying up. This command shows you how many successful calls and failed calls have taken place, what the current idletimer value is (by default, it’s 120 seconds), and most importantly, what the source and destination was for the current interesting traffic:

R1#show dialer

BRI0 dialer type = ISDN

Dial String Successes Failures Last called Last status

8358662 1 0 00:00:59 successful

0 incoming call(s) have been screened.

0 incoming call(s) rejected for callback.

BRI0:1 dialer type = ISDN

Idle timer (120 secs), Fast idle timer (20 secs)

Wait for carrier (30 secs), Reenable (15 secs)

Dialer state is data link layer up

Dial reason: ip (s=172.12.21.1, d=172.12.21.2)

Time until disconnect 62 secs

Connected to 8358662 (R2)

Here, you can see that the idletimer value is at its default, that there are 62 seconds left until the link comes down (unless interesting traffic resets the timer), and that the source of the interesting traffic was 172.12.21.1 and the destination is 172.12.21.2. If that destination is the multicast address of a routing protocol – say, 224.0.0.5 for OSPF – you know what traffic is keeping the line up.

Show ISDN History

Want to see what calls have been made in the last 15 minutes? Just run this command. It’s helpful if you’re walking in to an ISDN troubleshooting situation and want to see what calls have been made.

R1#show isdn history ISDN CALL HISTORYHistory table has a maximum of 100 entries.History table data is retained for a maximum of 15 Minutes.Call Calling Called Remote Seconds Seconds Seconds ChargesType Number .Number Name Used Left Idle Units/CurrencyOut 8358662 R2 121 0Out 8358662 R2 121 0

Debug PPP Negotiation

Not only do you need to know this command for your CCNA and CCNP exams, you MUST know it to be an effective ISDN troubleshooter.

When PPP authentication is first configured, it’s simple to mistype a password, or forget to configure a ขusername / passwordข combination. Instead of continually reading your running configuration to see what the problem is, run debug ppp negotiation and send a ping to bring the line up. You’ll quickly see where the problem is.

R2#debug ppp negotiation

PPP protocol negotiation debugging is on

R2#ping 172.12.21.1

BR0:1 PPP: Phase is AUTHENTICATING, by both

BR0:1 CHAP: O CHALLENGE id 1 len 23 from กR2ก

BR0:1 CHAP: I CHALLENGE id 1 len 23 from กR1ก

BR0:1 CHAP: O RESPONSE id 1 len 23 from กR2ก

BR0:1 CHAP: I SUCCESS id 1 len 4

BR0:1 CHAP: I RESPONSE id 1 len 23 from กR1ก

BR0:1 CHAP: O SUCCESS id 1 len 4

By mastering these simple ISDN show and debug commands, you increase your chances of passing the CCNA and CCNP exams greatly, and vastly improve your onthejob skills.

I recommend you visit www.cisco.com/univercd for more show and debug commands. Learning to negotiate this valuable online resource will truly help you become more valuable on the job. Every Cisco router and switch command, along with default and usage guidelines, can be found on this site. I’ll have an article posted soon to help you learn your way around the site; in the meantime, I urge you to begin adding this website to your troubleshooting toolkit.

Chris Bryant

CCIE #12933

About The Author

Chris Bryant, CCIE #12933, is the owner of The Bryant Advantage. The Bryant Advantageกs website offers FREE ebooks and tutorials for the CCNA and CCNP exams, FREE subscriptions to กCisco Certification Centralก, and sells the best CCNA and CCNP prep courses and books on the market today. Visit his site at www.thebryantadvantage.com today!

[email protected]

This article was posted on January 04, 2005

by Chris Bryant