Creating A Network That Works

Creating A Network That Works

by: Diane Hughes

Do you ever stand in awe of those people who seem to know everybody and everything? I know I do! Regardless of what you’re looking for, these people have their finger on the pulse of the กNet and know where to find it. Their network of resources and people is incredible! Yours can be, too. Itกs actually very simple to create a network that works to bring you business, offers feedback and provides those resources that we all need to have.
Make A Wish List
The first step in creating a network that works is making a list of what you want. Go ahead, think of the perfect situation where you would have anything you needed at your fingertips. For example, if you have a Web design business you might find it very helpful to create associations with people who offer services that compliment yours. Why? Because if these people are heavily involved with the process of getting a Webbased business up and going, they could send you many leads and that could turn into paying clients.
What else might you want? Perhaps free advertising or publicity to bring more business your way? Sure! Write it down on the wish list.
Making Wishes Come True
Now, the next step is to find the resources you need in order to make those wishes realities. Itกs not as difficult as it sounds. Just expand on your wish list a bit in the following way.
We mentioned needing associations with service providers that compliment our example of Web design. So write down companies that provide: Web hosting, merchant accounts, shopping carts, autoresponders, Internet checks, copywriting, graphic design and scripting/programming.
We also said we needed some advertising or publicity. So add to the list the following: ezine ad swaps, banner ad swaps, local newspapers, local TV and radio stations, Chambers of Commerce.
Finally, itกs time to go to work. The best way to start is to alert your friends and associates of what you are trying to accomplish. Itกs simple to send a quick email that states something to the effect of, กIกm in the process of expanding my resources and find Iกm in need of the following [provide the list]. If you know of anyone who you highly recommend in one of the above areas, please offer them my phone number and email address. I am interested in arranging a joint affiliation with them in order to increase both our businesses.ก
You can also send the same message to any lists or bulletin boards you frequent. Most people are more than happy to refer those they have had pleasant working relationships with.
Final Decisions
Lastly, once you get the results from your search back, contact the ones you feel most comfortable with. Again, honestly explain what you are doing and that you would like to create a joint partnership with them in order to exchange leads, prospects and services.
Even if someone does not suit your needs at the moment, enter them into your database for future reference. I once had a graphic designerกs email address and samples for 6 months before having a need for them. However, because I had already established contact, once my need arose it was smooth sailing!
When you are ready to begin your projects, just contact those on your list who can fill a need. Perhaps you want to advertise your Web design services. You can ask someone in your network (a Web host, a graphic artist, etc.) to participate in joint advertising with you. This will allow you to get excellent exposure for ½ the price because those costs are shared with your กpartnerก.
You can also set up a referral process. I have several arrangements with others in where we exchange referrals. Some do it for a fee, others just do it on a oneforone basis. You and your network member can decide what works best for you.
The results of this simple process are normally tremendous. The majority of small business owners are always looking for ways to expand their businesses. Exchanging leads with one another, creating joint affiliations and bartering are great ways to create a broad network that truly does work!
Copyright 2004 Diane Hughes

About The Author

Diane C. Hughes * ProBizTips.com

FREE Report: Amazingly Simple (Yet Super Powerful) Ways To Skyrocket Your Sales And Build Your Business Into A Tower of Profits! ==>> http://madmarketer.com/diane

This article was posted on May 31, 2004

by Diane Hughes

Book Summary: Effective Networking For Professiona

Book Summary: Effective Networking For Professional Success

by: Regine Azurin

This article is based on the following book:

Effective Networking for Professional Success

กHow to Make the Most of Your Personal Contactsก

by Rupert Hart, Stirling Books, 1997

ISBN 0 949 142 09 3

125 pages

We are all ขselfemployedข now.Today there is absolutely no job security. We are living in an age of corporate downsizing, and freelance consultants, or selfemployed workers are growing by the day. Networking is one skill you need to practice to get ahead and survive these uncertain times.

Wisdom in a Nutshell:

1. Networking is essential for both new jobs and business contracts.

2. Effective networking is 12 times more effective than answering advertisements

3. Advertising is becoming ineffective except on a large scale.

4. Networking helps you find hidden opportunities and can set you apart from the competition.

5. An indirect approach is better than a direct one. Use someone you know to introduce you to your target contact. Never go straight to your target without a gobetween who will put in a good word for you.

6. You can overcome your natural shyness, your fear of using people, and your fear of rejection.

The 3 key networking techniques are:

1. Build a network of partners to keep an open eye and ear for new opportunities for You.

2. Reach targeted individuals in two ways: directly or indirectly.

3. Build visibility by raising your profile. Go to every social gathering you possibly can.

Building your network is an ongoing process. You need to increase your range of contacts constantly.

Planning your campaign:

1. Define your objective

2. Select the right technique

3. Understand that ขdeal flowข or your number of prospects must be great in order to bag one new business contract.

4. Identify your target

5. Work out your positioning. This is a short statement of what you are about, what you can offer.

6. Think about what you can do for your network partners in exchange for information and contacts.

Building Network partners:

1. Talk to everyone you know about opportunities

2. Clarify what network partners can and will do for you

3. Know which contacts to build into network partners

4. Find those friendly network spiders, those types of people who just seem to know everyone.

5. Use the telephone.

How to grow and refresh your network:

1. Go out of your way to be where people are.

2. Get into the habit of being talkative.

3. Get the contact details of people you meet. Not just exchanging business cards but stapling information like birthdays, anniversaries, hobby clubs, and key information onto their cards.

4. Choose the right method for the right person.

5. Warm up longcold contacts.

How to find targeted individuals:

1. Focus on what you want to achieve and how people can help you.

2. Use your network partners to find suitable companies.

3. Gather key information on these companies.

4. Figure out who is the one with the power to hire you.

5. Find people connections and common areas of interest.

Reaching targets through network partners:

1. Find and persuade the best partner for your targeted individual.

2. Engineer an introduction.

3. Build wordofmouth exchanges about yourself.

Reaching targets directly:

1. Decide if you should write a letter or not.

2. Be able to demonstrate your achievements.

3. Have a line ready to get you past the secretary.

4. Act as though you expect to be put through.

5. Be ready to leave a short, persuasive message for the decisionmaker.

Your opening line:

1. Be cheerful, confident and straightforward.

2. Exploit connections and recommendations.

3. Mention common interests.

4. Report news of interest to the target.

5. Wait for a response. Know when to shut up.

6. Write down your opening lines before picking up the phone.

How to be visible without really trying:

1. Ask a question at a conference.

2. Make a point in a meeting.

3. Write letters to your industry magazine.

4. Introduce yourself to lots of people at an industry show or ball.

5. Buy people a drink at the bar at a lecture.

6. Discuss a book with an industry leader.

7. Wear bright ties.

8. Make people laugh.

9. Have an opinion on everything. (But keep an open mind)

10. Hand out an unusual business card.

11. Recast your CV to be a little different.

12. Take up an unusual hobby. (But not too unusual)

13. Don’t overlook using the email and Internet to communicate your cause.

About The Author

By: Regine P. Azurin and Yvette Pantilla

Regine Azurin is the President of BusinessSummaries.com, a company that provides business book summaries of the latest bestsellers for busy executives and entrepreneurs.

http://www.bizsum.com/lite.php

กA Lot Of Great Books….Too Little Time To Readก

Free Book Summaries Of Latest Bestsellers and More!

Mailto: [email protected]

BusinessSummaries is a BusinessSummaries.com service.

(c) Copyright 20012005, BusinessSummaries.com

[email protected]

This article was posted on March 22

by Regine Azurin

VoIP Telephony Basics

VoIP Telephony Basics

by: Jeremy Maddock

VoIP (Voice over Internet Protocol) Telephony is the process of routing voice conversations over an Internet Protocol network, rather than through traditional circuitswitched telephone lines. The voice information is converted into digital data packets and then transmitted over an IP network, such as the internet, or a local area network.

The main advantage of VoIP is the fact that it is highly efficient, and thus very affordable. The cost of transferring digital information over an IP telephony network is significantly less than that of transferring analog information over a traditional telephone line. Because of this, VoIP users can make long distance and international calls to anywhere in the world, at any time of day, for a fraction of what an ordinary phone company would charge.

Although call quality was originally a problem for VoIP customers, this issue has improved greatly with today’s progressing technology. Because of the fact that VoIP traffic goes over a broadband line, there is enough bandwidth available to allow for very good sound quality.

As anyone familiar with telecommunications would probably tell you, VoIP Telephony is revolutionizing the way that people around the world make phone calls. More and more people are seeing the benefits of VoIP, and the number of users worldwide is growing at an astounding pace.

If you have a broadband internet connection, and a touch tone telephone, you are fully equipped to set up your very own broadband phone system, and start making use of VoIP Telephony to save money on all your long distance phone calls.

For more information on the benefits of VoIP, and how you can start using it to save money on your phone bill, please visit http://voiptelephony.teleclick.ca/connect/ …

About The Author

Jeremy Maddock is the owner of a successful telecommunications news website – http://www.teleclick.ca

This article was posted on September 10

by Jeremy Maddock

Tiscali Broadband

Tiscali Broadband

by: Neil Shevlin

Named after a small village in Sardinia, Tiscali UK is part of Tiscali SpA which has headquarters in Cagliari, Italy. They offer broadband all over Europe, but they have the most online users in the UK. Tiscali is ranked fourth largest ISP in the UK.

Tiscali offer Broadband at 512Kbps, 1Mbps and 2Mbps with a free connection and free modem and they have no maximum download limit, unlike some ISP’s who cut their customers off after a finite amount of usage.

Tiscali do not have a very good reputation as an ISP. Customer support is often the first thing to suffer when ISP’s lower their package costs and Tiscali is no exception. The call centre is based in India, the costs are substantial, you will be put on hold and even then the advice may not be so useful. Emails to the company will receive automated replies, often with very little to do with the problem. Don’t think you won’t have to try this out, if you signup for Tiscali you are bound to want to try and contact them with a problem or complaint. Spam emails to Tiscali accounts are a major problem, they often have downtime and also some speed problems.

Since BT opened their phone line network (The Local Loop) for other companies to use ISP’s have had the option to connect their own equipment up at BT’s telephone exchanges so they can setup their own ADSL rather than use a variation of BT’s. This means that ISP’s can provide ADSL cheaper and faster at much more competitive prices; this will explain how Tiscali can offer broadband so cheaply. Unfortunately they only provide a small line at each telephone exchange that is split between all local residents. BT and other services that use BT’s network split the bandwidth down a fast line that connects directly to the BT network. This means that users of Tiscali’s broadband service could find their connection isn’t as fast as it claims and their download speeds limited. This depends on how many other people in your area are using the Tiscali network locally. This service is due to be upgraded in the future to improve speeds, but many customers have tired of waiting and moved away from Tiscali because of it.

Tiscali also offer Pay As You Go and unlimited dialup internet access at 56Kbps, at prices much cheaper than BT. They also offer a midband internet service which connects similarly to broadband but at the lower speed of 150kbps or 256kbps. With all dialup and broadband accounts they also offer additional features, such as an email address, web space, exclusive video channels and downloads.

In terms of Price, Tiscali are one of the main contenders, explaining why they are the fourth largest UK broadband provider. Their three packages closely rival BT’s and they are keeping up in terms of speed and price with their competitors.

Unfortunately because of their poor reputation and potential speed problems, although Tiscali are one of the cheapest broadband providers around that is all that is reliable with them.

About The Author

Neil Shevlin is the owner of UK Cheap Broadband which is a great place to find broadband links, resources and articles.

For more information go to: UK Cheap Broadband www.ukcheapbroadband

© Copyright 2005

Please feel free to copy and paste this article and itกs resource information.

This article was posted on August 18

by Neil Shevlin

The Lowdown on VoIP

The Lowdown on VoIP

by: Mike Schuda

It seems like technology is headed for a massive telephone change over. The traditional Public Switched Telephone Network (PSTN) is looking to be replaced by VoIP. VoIP is short for Voice over IP. VoIP is the routing of conversations over an IP network or the Internet. VoIP uses a packetswitched network instead of the circuitswitched voice transmission lines used by traditional telephone networks. VoIP does not need an Internet connection to work. A company that has a LAN connection with all of its computers can utilize VoIP technology.

VoIP is a great technology, but has a variety of issues with implementation. VoIP may face problems with latency because IPs do not provide Quality of Service guarantees, nor do they provide their packets of information in sequential order. Highspeed Internet connections are required for VoIP and firewalls often prove tricky for VoIP technology. To combat this, many people use Session Border Controllers (SBC).

VoIP technology has many advantages. There are more new features with VoIP because of the lack of an International Telecommunications Union. VoIP is still very much an open market for developers, so the technology is constantly being improved. VoIP also has a lower cost than traditional sources because of the monopolies that exist or traditional phone companies being controlled by the government. Some users even see VoIP phone calls as free because they do not have to pay extra for the service. The user only pays the Internet service provider, and therefore the usage of VoIP seems to be free. You can also take your VoIP phone wherever you go because all you need is a network connection to make it work. VoIP technology will also benefit network agents who work for call centers. Agents can help callers from anywhere in the country with an Internet connection. Finally, because VoIP is on the computer, there is increased functionality. Conference calls can be held, information can be sent, and things like address books can be updated and shared over VoIP.

While VoIP has many advantages, there are a few drawbacks to the service. One of the biggest drawbacks is reliability. Telephone lines have back up generators in case of power outages, so phones can keep working. Because VoIP is connected to the Internet, a power outage will end a VoIP call when the computer shuts down. To combat this, users must buy an expensive uninterruptible power supply or a generator that must then be installed on the premises. Internet connections are also subject to disconnection, depending on crowded networks, and the quality of the ISP. If the Internet connection drops, then the VoIP call will be dropped. VoIP is also a problem for emergency calls. Because of the nature of the Internet and VoIP systems, emergency workers cannot trace calls. In the event that someone with an emergency has a problem but is unable to give an address, the emergency worker will not be able to trace the call and find the person. VoIP carriers are already attempting to fix this problem by implementing a technical workaround. Finally, it will be very difficult to integrate VoIP on a massive scale, because while the standard Plain Old Telephone System (POTS) has a common standard, VoIP does not.

VoIP has many advantages as well as some large drawbacks. The main roadblock in the way of global VoIP adoption is reliability. When VoIP proves that it can be just as reliable as traditional telephone services have been over many years, then it will start to be adopted. VoIP technology is always improving, so the problems with VoIP today are likely to be solved sooner than many people expect. VoIP can truly revolutionize both the business world and home life.

About The Author

Mike Schuda is fascinated by new technologies and writes for VoIP Lowdown ( http://www.voiplowdown.com ).

This article was posted on September 10

by Mike Schuda

How To Avoid Getting Scammed

How To Avoid Getting Scammed

by: Dean Phillips

Listed below are some of the most popular and common scams:

1. Nigerian Letter Scam:

This oneกs been around for many years but continues to flourish. Many of these emails claim to be from a person in Africa, usually Nigeria. The writer claims to have access to millions of dollars, either from a relative or from knowledge of an idle account. A percentage of this money is promised to the victim if they will allow the money to be processed through their personal bank account. The victim is instructed to keep their share and send the remaining money to the scammer.

The check given to the victims is fraudulent. The victim is then liable to the bank for the check they wrote to the scammer.

Hereกs what will happen when you give strangers your bank account information: They will take your money. Period.

2. Phishing Scams:

กPhishingก is a hightech scam that uses spam or popup messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or other sensitive information.

Phishers send an email or popup message that claims to be from a business or organization that you deal withfor example, your Internet service provider (ISP), bank, online payment service, or even a government agency. The message usually says that you need to กupdateก or กvalidateก your account information.

Recent phishing victims include Yahoo, Citibank, eBay, Best Buy and Bank of America among others.

If you get spam that is phishing for information, forward it to [email protected].

3. Chain Letters:

In this classic scam, you’re asked to send a small amount of money (usually $5.00) to each of several names on a list, and then forward the letter including your name at the top of the list, via bulk email. Many of these letters claim to be legal. They even include a section of the U.S. Postal Code on illegal schemes. Don’t be fooled. They are not legal. And if you participate, not only will you be breaking the law, youกll lose your money as well.

4. WorkAtHome And Business Opportunity Scams:

These scams tempt victims with ads stating กno experience necessary,ก promise high earnings and claim to have inside information. The scammers usually require victims to pay anywhere from $35 to several hundred dollars or more for information, kits or materials that do not provide the promised results.

Frequently, these schemes involve making handicrafts, stuffing envelopes, medical billing, or state, กUse your home PC to make money fast in your spare time!ก

In the craft making or envelope stuffing scam, after paying fees and completing the assembly of the products, victims are told their work is low quality and unworthy of compensation.

Medical billing scams require victims to purchase supplies and lists of doctors who, inevitably don’t exist or are not interested in the service.

5. Bulk Email Scams:

These solicitations offer to sell you bulk email addresses (spam software) or services to send spam on your behalf. Example: ‘reach 100 million websites, $39.95ก! The software is usually of poor quality. Itกs spam and a scam. Don’t do it.

6. Auction and retail scams:

These schemes typically offer highvalue items, such as Cartier watches, Beanie Babies and computers, in hopes of attracting many consumers. What happens is the victim wins the bid, sends the money and receives nothing or receives products of much lower quality than advertised.

7. Guaranteed Loans or Credit Scams:

This scam comes in a variety of flavors: home equity loans that don’t require equity in your home, personal loans regardless of credit history, etc. After you pay the application fees, you receive a letter saying that your loan request was denied. Usually, you never here from these companies again.

8. Credit Repair Scams:

These scams promise to erase accurate, negative information from your credit file so that you can qualify for loans, mortgages, unsecured credit cards, etc. It doesn’t work. Not only that. If you follow their advice and lie on loan or credit applications, misrepresent your social security number, or get an Employer Identification Number from the Internal Revenue Service under false pretenses, you will be committing fraud and violating federal laws. Another variation of this scam is the promise of a brand new credit file. Don’t do it.

9. Vacation, Sweepstakes And Prize Award Scams:

In these scams you receive notification congratulating you because youกve won a fabulous vacation, a car or some other prize award. All you have to do to collect your prize is pay a small fee (usually several hundred dollars). In return, what you end up getting is a toy car, (I kid you not) or a vacation certificate to the Bahamas or some other exotic vacation spot. Itกs really a lousy deal. You have to pay for your own airfare, and the accommodations that they arrange are usually in rundown hotels. Let the buyer beware!

10. Employment Scams:

Employment scammers take advantage of job seekers. They claim to offer employment services, inside information or inside contacts to jobs. After paying a fee, victims learn they only provide advice, help writing a resumeor less. Some fraudulent employment services simply sell lists of companies that they have gotten from public directories. They usually have not contacted those companies directly or know if there really are any job openings.

11. Multilevel Marketing (MLM) or Network Marketing Scams:

I know Iกm going to ruffle a few feathers with this one, so let me just say right now that all MLM or network marketing companies are not scams. Obviously, there are some good, reputable companies out there. However, there are so many bad ones that Iกm compelled to include the entire industry on this list. Before getting involved with any MLM or network marketing company, investigate, investigate and then investigate some more. Don’t get caught up in the hype. And hereกs a fact no MLM or network marketing company will ever tell younot even the legitimate ones: Unless you have outstanding sales ability and/or people skills, it is extremely difficult to make any money in MLM or network marketing.

Here are some other things you should watch out for: Make sure the website you’re visiting contains all three of the following:

A real persons name (not just a company or business name)

A telephone number

A street address (not just a P.O. Box)

If all three of the above are not present, walk away from the offer.

Before purchasing anything, you should always check first to see if the company has had any complaints lodged against it. The following websites publish complaints and/or scams:

http://www.scamwatch.com

http://www.worldwidescam.com

http://www.bbb.org

If you do get scammed, report it to the aforementioned websites immediately. You probably won’t be able to recover your money. Few people ever do. But at least by reporting the crime and making it public record, you make it harder for that company to scam anyone else.

In closing, always carefully investigate any business opportunity, and remember: If it sounds too good to be true, it probably is!

About The Author

Dean Phillips is an Internet marketing expert, writer, publisher and entrepreneur. Questions? Comments? Dean can be reached at mailto: [email protected]

Website: http://www.letsmakemoney.net

This article was posted on October 09, 2004

by Dean Phillips

The Damn Truth About Network Marketing

The Damn Truth About Network Marketing

by: Scott Lucas

The Damn Truth About Network Marketing:

How I Was Wrong and How You Can Learn From My Mistakes

by Scott Lucas

© 2003, http://www.WebCashLeads.com/2894

It’s interesting to hear people’s opinions about Network Marketing. There are some people that think it’s a pyramid scheme, a scam, not a profession, or that it does not work. SHAME ON THEM! If only these same people got educated about the industry, they would think differently.

The people I’m referring to are the people who have been exposed to our industry either directly, they’ve been approached in the past or indirectly, they know of someone who was in Network Marketing, or was also exposed.

This is sickening! Uncle Harry tells you it’s illegal and that you’ve been brainwashed into thinking you can be successful in Network Marketing. Your landlord thinks it’s one of those ขpyramid thingsข and that Network Marketing doesn’t work, and your friend Marty says, ขYour doing one of those things AGAIN?!ข

Two of the above situations happened to me. No, I don’t have a Uncle Harry. First of all, my landlord is closedminded and doesn’t care to know the truth. Now don’t get me wrong, I don’t say that to poke fun but to illustrate how there are other people like my landlord. I once heard that the truth shall set you free. Lets just hope they accept the truth.

As for Marty, that was a legitimate question. I’ve been in the marketing industry off and on for 5 years. My first experience was direct marketing traveling the East Coast, business to business, selling an all natural degreaser. I spent 3 months BROKE, living and mooching off the company, and only sold 1 case of 12 bottles the entire time. It was a very interesting experience and one I will never forget.

I did direct marketing again selling vacuums for about two months and sold NOTHING, then I tried once more selling a pendant and ID card that was used to retrieve personal and medical information electronically. I sold NOTHING.

So I tried Network Marketing. The first company I was with is over 30 years old and is on the NYSE. First I was a customer then I became a distributor, and I still use the service today. I have saved money using this service and will continue to do so. For about 7 months, I only sold one plan to my motherinlaw and that was that. It was with this company that I was introduced to selfdevelopment or self help. The training, support and resources were ALL there but one thing was missing my REASONS! So I ended up QUITTING.

During my next venture in Network Marketing, I was going to college to earn an Associates Degree in Computer Networking. I was learning to become a MCSE (Microsoft Certified Systems Engineer). I was doing great, fantastic and on my way until I let myself get DISTRACTED. Four months before the end date of college, I came across another company. The pay plan was awesome… the people were great and supportive… I paid a total of $600 to attend three seminars and I felt great. But something happened. I had a lot of products in my basement and was using the products, but I lost BELIEF.

I was off the path! Oh my God! I also had thousands worth of products that were just sitting there collecting dust! What the hell was I going to do? Well, I did NOTHING.

In between companies, I dabbled with Internet Marketing. Buying courses, ebooks, programs, websites, audios, videos, reports and almost anything learning how to have a profitable home based business. There were so many ขgurusข and selfproclaimed ขwho donersข (those who said they’ve done it, but really haven’t).

Within a 5 year period I had invested $15,000 and felt lost, confused, aggravated, frustrated but more importantly shame. I was ashamed of myself because I was a FAILURE. I felt as if I failed myself, and others were there NOT to boost me up but to say, ขI told you soข (in a nutshell). Though very few of my family and friends knew about my experiences, the few who knew was enough.

I was wrong!! I should not have felt ashamed even though I was confused, aggravated, lost and frustrated. With so many Network Marketing companies and Internet Marketing courses, how could ANYONE make an educated decision to learn ONE system and stick with it? Multiple streams of income? Which ones do I choose? The ad copy looks great and is compelling me to buy but should I buy ANOTHER ebook, program or course when I haven’t even APPLIED what I’ve learned from all the others? That’s if I took the time to read it.

I was blaming everything and everyone for MY failure! I fell VICTIM to the myth that all I had to do is position myself in front of a trend and the money would come to me. That all I had to do was sit in my underwear, on the couch, send some postcards every now and then and watch the money roll in. My victim mentality was getting me, my family, my dreams, my hope and future in Network Marketing NO WHERE!

Do not make the same mistakes I have made. If you are still reading this, thank you and god bless you. That tells me one of three things:

You have the victim mentality and you’re still doing what I’ve done for the past 5 years.

You’ve been there and done that and have found the path.

You’re looking for a way out of the victim mentality and have not found the path.

If you’re still confused, aggravated, lost and frustrated then I know how you feel. If you’ve been there and done that and have found the path, you’re a good student! If you have the victim mentality but are looking for a way out but have not found the path, this is what I’ve found out.

I used to feel that the more I knew, the more money I would make. What I found is that it’s NOT TRUE. The more you know about marketing from more than ONE PERSON, the more likely you are to be confused, aggravated, frustrated and lost. Why? Because you’re learning from more than person about the same subject when both of them give you completely different answers. How else would you explain buying all those ebooks, courses and programs about Internet Marketing? Have you read all of them? I was guilty of doing this to.

To be a good student, one must find a teacher or mentor and MODEL what they did to reach their GOALS. Notice I said ขaข teacher or mentor. This means ONE person, not two or more.

Very few people understand the concept of modeling and goal setting when it comes to a profitable business, whether it be Network Marketing or Internet Marketing. I know I did because I just wanted to know how to make money.

The SECRET to making money in Network Marketing, Internet Marketing or any business is a mandatory law that very few marketers know, or will share with the masses because this law will break their business or will change your victim mentality into a success mentality.

ALL successful people had a MENTOR and those who want to be successful in marketing, have to have a mentor. This is a law, a mandatory principle to your success. If you continue breaking this law, as I once did, you will have similar results in your marketing career as I once did.

For the sake of your confusion, frustration, aggravation and DEBT, either change what you’re doing RIGHT NOW or STOP what you’re doing all together because you will not succeed.

Scott Lucas

Elizabethtown KY

2707376187 (anytime)

mailto:[email protected]

About The Author

Scott Lucas is an upandcoming entrepreneur that knows the mandatory law the Internet is trying to steal from you, but you don’t even realize it. If you feel the Internet could be your goldmine, now is your chance to take back the 93.5%! http://www26.brinkster.com/abnormalthinker/stolensuccess.htm

* This article is copyrighted and all rights are reserved. *

This article was posted on May 18, 2003

by Scott Lucas

Networking Basics

Networking Basics

by: Kashif Raza

A network is a group of computers, printers, and other devices that are connected together with cables. The sharing of data and resources. Information travels over the cables, allowing network users to exchange documents & data with each other, print to the same printers, and generally share any hardware or software that is connected to the network. Each computer, printer, or other peripheral device that is connected to the network is called a node. Networks can have tens, thousands, or even millions of nodes.

Cabling:

The two most popular types of network cabling are twistedpair (also known as 10BaseT) and thin coax (also known as 10Base2). 10BaseT cabling looks like ordinary telephone wire, except that it has 8 wires inside instead of 4. Thin coax looks like the copper coaxial cabling thatกs often used to connect a VCR to a TV set.

Network Adapter:

A network computer is connected to the network cabling with a network interface card, (also called a กNICก, กnickก, or network adapter). Some NICs are installed inside of a computer: the PC is opened up and a network card is plugged directly into one of the computerกs internal expansion slots. 286, 386, and many 486 computers have 16bit slots, so a 16bit NIC is needed. Faster computers, like highspeed 486s and Pentiums, , often have 32bit, or PCI slots. These PCs require 32bit NICs to achieve the fastest networking speeds possible for speedcritical applications like desktop video, multimedia, publishing, and databases. And if a computer is going to be used with a Fast Ethernet network, it will need a network adapter that supports 100Mbps data speeds as well.

Hubs

The last piece of the networking puzzle is called a hub. A hub is a box that is used to gather groups of PCs together at a central location with 10BaseT cabling. If you’re networking a small group of computers together, you may be able to get by with a hub, some 10BaseT cables, and a handful of network adapters. Larger networks often use a thin coax กbackboneก that connects a row of 10BaseT hubs together. Each hub, in turn, may connect a handful of computer together using 10BaseT cabling, which allows you to build networks of tens, hundreds, or thousands of nodes. Like network cards, hubs are available in both standard (10Mbps) and Fast Ethernet (100Mbps) versions.

LANs (Local Area Networks)

A network is any collection of independent computers that communicate with one another over a shared network medium. LANs are networks usually confined to a geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people. The development of standard networking protocols and media has resulted in worldwide proliferation of LANs throughout business and educational organizations.

WANs (Wide Area Networks)

Often a network is located in multiple physical places. Wide area networking combines multiple LANs that are geographically separate. This is accomplished by connecting the different LANs using services such as dedicated leased phone lines, dialup phone lines (both synchronous and asynchronous), satellite links, and data packet carrier services. Wide area networking can be as simple as a modem and remote access server for employees to dial into, or it can be as complex as hundreds of branch offices globally linked using special routing protocols and filters to minimize the expense of sending data sent over vast distances.

Internet

The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups. With the meteoric rise in demand for connectivity, the Internet has become a communications highway for millions of users. The Internet was initially restricted to military and academic institutions, but now it is a fullfledged conduit for any and all forms of information and commerce. Internet websites now provide personal, educational, political and economic resources to every corner of the planet.

Intranet

With the advancements made in browserbased software for the Internet, many private organizations are implementing intranets. An intranet is a private network utilizing Internettype tools, but available only within that organization. For large organizations, an intranet provides an easy access mode to corporate information for employees.

Ethernet

Ethernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace and the ability to support virtually all popular network protocols, make Ethernet an ideal networking technology for most computer users today. The Institute for Electrical and Electronic Engineers (IEEE) defines the Ethernet standard as IEEE Standard 802.3. This standard defines rules for configuring an Ethernet network as well as specifying how elements in an Ethernet network interact with one another. By adhering to the IEEE standard, network equipment and network protocols can communicate efficiently.

Protocols

Network protocols are standards that allow computers to communicate. A protocol defines how computers identify one another on a network, the form that the data should take in transit, and how this information is processed once it reaches its final destination. Protocols also define procedures for handling lost or damaged transmissions or กpackets.ก TCP/IP (for UNIX, Windows NT, Windows 95 and other platforms), IPX (for Novell NetWare), DECnet (for networking Digital Equipment Corp. computers), AppleTalk (for Macintosh computers), and NetBIOS/NetBEUI (for LAN Manager and Windows NT networks) are the main types of network protocols in use today. Although each network protocol is different, they all share the same physical cabling. This common method of accessing the physical network allows multiple protocols to peacefully coexist over the network media, and allows the builder of a network to use common hardware for a variety of protocols. This concept is known as กprotocol independence,ก which means that devices that are compatible at the physical and data link layers allow the user to run many different protocols over the same medium.

Topologies

A network topology is the geometric arrangement of nodes and cable links in a LAN, and is used in two general configurations: bus and star. These two topologies define how nodes are connected to one another. A node is an active device connected to the network, such as a computer or a printer. A node can also be a piece of networking equipment such as a hub, switch or a router. A bus topology consists of nodes linked together in a series with each node connected to a long cable or bus. Many nodes can tap into the bus and begin communication with all other nodes on that cable segment. A break anywhere in the cable will usually cause the entire segment to be inoperable until the break is repaired. Examples of bus topology include 10BASE2 and 10BASE5. 10BASET Ethernet and Fast Ethernet use a star topology, in which access is controlled by a central computer. Generally a computer is located at one end of the segment, and the other end is terminated in central location with a hub. Because UTP is often run in conjunction with telephone cabling, this central location can be a telephone closet or other area where it is convenient to connect the UTP segment to a backbone. The primary advantage of this type of network is reliability, for if one of these กpointtopointก segments has a break, it will only affect the two nodes on that link. Other computer users on the network continue to operate as if that segment were nonexistent.

PeertoPeer Networks

A peertopeer network allows two or more PCs to pool their resources together. Individual resources like disk drives, CDROM drives, and even printers are transformed into shared, collective resources that are accessible from every PC.

Unlike clientserver networks, where network information is stored on a centralized file server PC and made available to tens, hundreds, or thousands client PCs, the information stored across peertopeer networks is uniquely decentralized. Because peertopeer PCs have their own hard disk drives that are accessible by all computers, each PC acts as both a client (information requestor) and a server (information provider). A peertopeer network can be built with either 10BaseT cabling and a hub or with a thin coax backbone. 10BaseT is best for small workgroups of 16 or fewer users that donกt span long distances, or for workgroups that have one or more portable computers that may be disconnected from the network from time to time.

After the networking hardware has been installed, a peertopeer network software package must be installed onto all of the PCs. Such a package allows information to be transferred back and forth between the PCs, hard disks, and other devices when users request it. Popular peertopeer NOS software includes Most NOSs allow each peertopeer user to determine which resources will be available for use by other users. Specific hard & floppy disk drives, directories or files, printers, and other resources can be attached or detached from the network via software. When one userกs disk has been configured so that it is กsharableก, it will usually appear as a new drive to the other users. In other words, if user A has an A and C drive on his computer, and user B configures his entire C drive as sharable, user A will suddenly have an A, C, and D drive (user Aกs D drive is actually user Bกs C drive). Directories work in a similar fashion. If user A has an A & C drive, and user B configures his กC:WINDOWSก and กC:DOSก directories as sharable, user A may suddenly have an A, C, D, and E drive (user Aกs D is user Bกs C:WINDOWS, and E is user Bกs C:DOS). Did you get all of that?

Because drives can be easily shared between peertopeer PCs, applications only need to be installed on one computernot two or three. If users have one copy of Microsoft Word, for example, it can be installed on user Aกs computerand still used by user B.

The advantages of peertopeer over clientserver NOSs include: � No need for a network administrator � Network is fast/inexpensive to setup & maintain � Each PC can make backup copies of its data to other PCs for security. By far the easiest type of network to build, peertopeer is perfect for both home and office use.

ClientServer Networks

In a clientserver environment like Windows NT or Novell NetWare, files are stored on a centralized, high speed file server PC that is made available to client PCs. Network access speeds are usually faster than those found on peertopeer networks, which is reasonable given the vast numbers of clients that this architecture can support. Nearly all network services like printing and electronic mail are routed through the file server, which allows networking tasks to be tracked. Inefficient network segments can be reworked to make them faster, and usersก activities can be closely monitored. Public data and applications are stored on the file server, where they are run from client PCsก locations, which makes upgrading software a simple tasknetwork administrators can simply upgrade the applications stored on the file server, rather than having to physically upgrade each client PC.

In the clientserver diagram below, the client PCs are shown to be separate and subordinate to the file server. The clientsก primary applications and files are stored in a common location. File servers are often set up so that each user on the network has access to his or her กownก directory, along with a range of กpublicก directories where applications are stored. If the two clients below want to communicate with each other, they must go through the file server to do it. A message from one client to another is first sent to the file server, where it is then routed to its destination. With tens or hundreds of client PCs, a file server is the only way to manage the often complex and simultaneous operations that large networks require.

Computer Networking is the very important and the crucial part of the Information Technology. Millions of the computers are networked together to form the Internet. Networking plays a important role in every kind of organization from small to medium sized, in Banks, Multinataional Companies, Stock Exchanges, Air Ports, Hospitals, Police Stations, Post Offices, Colleges, Universities, and even in home, in short networking plays an important role everywhere where computers are used. This article will be interesting for the students, network professionals and for the people who are interested in the computer networking

About The Author

This article is created and submitted by Kashif Raza http://www.cisconotes.net

[email protected]

This article was posted on February 14, 2005

by Kashif Raza

The security risks and ways to decrease vulnerabil

The security risks and ways to decrease vulnerabilities in a 802.11b wireless environment

by: Richard Johnson

Introduction

This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from happening. Wireless networks have not been around for many years. Federal Express has been using a type of wireless networks, common to the 802.11 networks used today, but the general public has recently just started to use wireless networking technology. Because of weak security that exists in wireless networks, companies such as Best Buy have decided to postpone the rollout of wireless technology. The United States Government has done likewise and is suspending the use of wireless until a more universal, secure solution is available.

Background

What is Wireless?

Wireless LANs or WiFi is a technology used to connect computers and devices together. Wireless LANs give persons more mobility and flexibility by allowing workers to stay connected to the Internet and to the network as they roam from one coverage area to another. This increases efficiency by allowing data to be entered and accessed on site.

Besides being very simple to install, WLANs are easy to understand and use. With few exceptions, everything to do with wired LANs applies to wireless LANs. They function like, and are commonly connected to, wired Ethernet networks.

The Wireless Ethernet Compatibility Alliance [WECA] is the industry organization that certifies 802.11 products that are deemed to meet a base standard of interoperability. The first family of products to be certified by WECA is that based on the 802.11b standard. This set of products is what we will be studying. Also more standards exist such as 802.11a and 802.11g.

The original 802.11 standard was published in 1999 and provides for data rates at up to 2 Mbps at 2.4 GHz, using either FHSS or DSSS. Since that time many task groups have been formed to create supplements and enhancements to the original 802.11 standard.

The 802.11b TG created a supplement to the original 802.11 standard, called 802.11b, which has become the industry standard for WLANs. It uses DSSS and provides data rates up to 11 Mbps at 2.4 Ghz. 802.11b will eventually be replaced by standards which have better QoS features, and better security.

Network Topology

There are two main topologies in wireless networks which can be configured:

Peertopeer (ad hoc mode) – This configuration is identical to its wired counterpart, except without the wires. Two or more devices can talk to each other without an AP.

Client/Server (infrastructure networking) – This configuration is identical to its wired counterpart, except without the wires. This is the most common wireless network used today, and what most of the concepts in this paper apply to.

Benefits of Wireless LANs

WLANs can be used to replace wired LANs, or as an extension of a wired infrastructure. It costs far less to deploy a wireless LAN than to deploy a wired one. A major cost of installing and modifying a wired network is the expense to run network and power cables, all in accordance with local building codes. Example of additional applications where the decision to deploy WLANs include:

Additions or moves of computers.

Installation of temporary networks

Installation of hardtowire locations

Wireless LANs give you more mobility and flexibility by allowing you to stay connected to the Internet and to the network as you roam.

Cons of Wireless LANs

Wireless LANs are a relatively new technology which has only been around since 1999. With any new technology, standards are always improving, but in the beginning are unreliable and insecure. Wired networks send traffic over a dedicated line that is physically private; WLANs send their traffic over shared space, airwaves. This introduces interference from other traffic and the need for additional security. Besides interference from other wireless LAN devices, the 2.4 GHz is also used by cordless phones and microwaves.

Security Issues of WLANs

Wardriving

Wardriving is a process in which an individual uses a wireless device such as a laptop or PDA to drive around looking for wireless networks. Some people do this as a hobby and map out different wireless networks which they find. Other people, who can be considered hackers, will look for wireless networks and then break into the networks. If a wireless is not secure, it can be fairly easy to break into the network and obtain confidential information. Even with security, hackers can break the security and hack. One of the most prevalent tools used on PDAs and Microsoft windows devices is, Network Stumbler, which can be downloaded at http://www.netstumbler.com. Equipped with the software and device, a person can map out wireless access points if a GPS unit is attached. Adding an antenna to the wireless card increases the capabilities of WiFi. More information can be found at: http://www.wardriving.info and http://www.wardriving.com to name a few.

Warchalking

Warchalking is a method of marking wireless networks by using chalk most commonly. Wardriving is usually the method used to search for networks, and then the person will mark the network with chalk that gives information about the network. Some of the information would include, what the network name is, whether the network has security, and possibly the contact information of who owns the network. If your wireless network is Warchalked and you don’t realize it, your network can be used and/or broken into faster, because of information shown about your network.

Eavesdropping & Espionage

Because wireless communication is broadcast over radio waves, eavesdroppers who just listen over the airwaves can easily pick up unencrypted messages. These intruders put businesses at risk of exposing sensitive information to corporate espionage. Wireless LAN Security – What Hackers Know That You Don’t www.airdefense.net Copyright 2002

Internal Vulnerabilities

Within an organization network security can be compromised by ways such as, Rouge WLANs (or Rouge Aps), Insecure Network Configuration, and Accidental Associations to name a few.

Rouge Access Points – An employee of an organization might hook up an access point without the permission or even knowledge of IT. This is simple to do, all a person has to do is plug an Access point or wireless router into an existing live LAN jack and they are on the network. One statistic in 2001 by Gartner said that, ขat least 20 percent of enterprises already have rouge access points.ข Another type of attack would be if, someone from outside the organization, enters into the workplace and adds an Access Point by means of Social Engineering.

Insecure Network Configurations Many companies think that if they are using a firewall or a technology such as VPN, they are automatically secure. This is not necessarily true because all security holes, big and small, can be exploited. Also if devices and technologies, such as VPNs, firewalls or routers, are misconfigured, the network can be compromised.

Accidental Associations – This can happen if a wireless network is setup using the same SSID as your network and within range of your wireless device. You may accidentally associate with their network without your knowledge. Connecting to another wireless LAN can divulge passwords or sensitive document to anyone on the neighboring network. Wireless LAN Security – What Hackers Know That You Don’t www.airdefense.net Copyright 2002

Social Engineering – Social Engineering is one of the most effective and scariest types of attacks that can be done. This type of attack really scares me and can be done for many other purposes besides compromising security in wireless networks. A scenario: Someone dressed up as a support person from Cisco enters the workplace. The secretary sees his fake credentials and lets him get pass the front desk. The impersonator walks from cubicle to cubicle, collecting user names and passwords as he/she goes. After finding a hidden corner, which seems to be lightly traveled, he plugs an insecure Access Point into the network. At the same time he configures the Access Point to not broadcast its SSID and modifies a few other settings to make it hard for the IT department to find this Rouge Access Point. He then leaves without ever being questioned by anyone because it looks like he just fits in. Now, all he has to do is be within 300 feet from the access point, (more if he added an antenna), and now has access to all kinds of secure documents and data. This can be a devastating blow to any corporation and could eventually lead to bankruptcy if the secrets of the company were revealed to competitors.

Bruce Schneier came to my classroom and said the following about Social Engineering, ขSomeone is just trying to do their job, and be nice. Someone takes advantage of that by targeting this human nature. Social Engineering is unsolvable.ข

Securing Wireless Networks

According to Bruce Schneier and others such as Kevin Mitnick, you can never have a totally secure computing environment. What is often suggested is to try and control the damage which can be done if security is breached. One can try many different tools on the market which can help prevent security breaches.

WEP – WEP supports both 64 and 128bit keys. Both are vulnerable, however, because the initialization vector is only 24bits long in each case. Its RC4 algorithm, which is used securely in other implementations, such as SSL, is quite vulnerable in WEP. Http://www.infosecuritymag.com/2002/jan/cover.shtml Wireless Insecurities By Dale Gardner. Different tools exist to break WEP keys, including AirSnort, which can be found at www.airsnort.net. Although this method is not a secure solution, it can be used to help slowdown an attacker if other means are not possible financially or otherwise.

VPN and IPSec IPSec VPNs let companies connect remote offices or wireless connections using the public Internet rather than expensive leased lines or a managed data service. Encryption and authentication systems protect the data as it crosses the public network, so companies don’t have to sacrifice data privacy and integrity for lower costs. A lot of VPNกs exist on the market today. An important note about VPNs is, interoperability does not really exist, and whatever you use for your server has to be the same brand as your clients most of the time. Some VPNs include:

Borderware

BroadConnex Networks

CheckPoint

Cisco

Computer Associates

DMZ – Adding this to your network enables you to put your wireless network on an untrusted segment of your network.

Firewalls – Firewalls are all over the place. Firewalls range from hardware to software versions. By adding a firewall between the wireless network and wired network helps prevent hackers from accessing your wired network. This paper doesn’t go into specifics about different firewalls and how to set them up, but there are many. Some of the firewalls include:

ZoneAlarm (an inexpensive based software firewall) Zonelabs.com

Symantec has many different firewalls depending what you require.

PKI Publickey infrastructure (PKI) is the combination of software, encryption technologies, and services that enables enterprises to protect the security of their communications and business transactions on the Internet. What is PKI? http://verisign.netscape.com/security/pki/understanding.html

Site Surveys – Site Surveys involve using a software package and a wireless device to probe your network for Access Points and security risks.

Proactive Approaches

Since wireless technology is insecure, companies or anyone can take a proactive approach to try and identify hackers trying to gain access via wireless networks.

Honeypots – are fake networks setup to try and lure in hackers. This enables administrators to find out more about what type of techniques hackers are using to gain access. One product is Mantrap created by Symantec.

ขManTrap has the unique ability to detect both host and networkbased attacks, providing hybrid detection in a single solution. No matter how an internal or external attacker tries to compromise the system, Symantec ManTrapกs decoy sensors will deliver holistic detection and response and provide detailed information through its system of data collection modules.ข

http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=157

Intrusion Detection – Intrusion Detection is software that monitors traffic on the network. It sounds out a warning if a hacker it trying to access the network. One such free product is Snort.

ขBefore we proceed, there are a few basic concepts you should understand about Snort. There are three main modes in which Snort can be configured: sniffer, packet logger, and network intrusion detection system. Sniffer mode simply reads the packets off of the network and displays them for you in a continuous stream on the console. Packet logger mode logs the packets to the disk. Network intrusion detection mode is the most complex and configurable configuration, allowing Snort to analyze network traffic for matches against a user defined rule set and perform several actions based upon what it sees.ข http://www.snort.org/docs/writing_rules/chap1.html#tth_chAp1

Network Monitoring Network Monitoring would be products such as snort that monitor the flow of traffic over the network.

Quick tips and tricks

When setting up wireless networks and access points there are a few quick steps that can be taken to immediately secure the network, even though it does not make it secure. Some of these ways include:

Change your default SSID: each router or access point comes with a default SSID. By changing this it can take longer for an attacker to know what type of device he is trying to hack.

Change the default password – generic default passwords are assigned to access points and routers. Sometimes the password is admin. By changing this password, the attacker cannot modify settings on your router as easily.

Disable broadcasting SSID: By default APกs broadcast their SSIDs, if you shutoff this setting it is harder for outsiders to find your AP.

Enable MAC filtering: WARNING: this can only work in smaller environments where a centralized access list does not need to be maintained. You can enable only specific wireless cards to access the AP by only enabling those MAC addresses.

Turn off shares: If security is important, scanning for shares and turning off the shares on the network can help. Also encrypting sensitive data can prevent hackers from accessing the data.

Put your wireless access points in a hard to find and reach spot.

Keep your drivers on all wireless equipment updated. This helps patch existing security vulnerabilities.

Read current press releases about emerging wireless news.

About The Author

Richard J Johnson

Network+ Certified

RJ Computer Consulting

http://rjcomputerconsulting.com

[email protected]

This article was posted on February 24, 2003

by Richard Johnson

Avoid the Top 10 Network Marketing Mistakes

Avoid the Top 10 Network Marketing Mistakes

by: D.J. Harr

Just completed this for the December Noni Pearls Magazine, thought I would share it with all of you. Hope you enjoy it.

Avoid the most common mistakes

Here are the 10 most common mistakes that networkers make. These mistakes are often ones of attitude, missed judgment calls, or misinformation.

Common mistake in network marketing #1

Inflated Earnings Expectations

There are many millionaires in the Network Marketing Industry. There are also many millionaires in the NBA as well, but how many schoolyard ballplayers make it to the NBA? VERY FEW! This is the case in Network Marketing and those who become millionaires as well. While a large number home based business owners earn a great parttime income. The average individual spends more time dreaming about what they are going to do, or spends their time in fruitless activity. Realistic expectations for the average parttimer should be an extra $400$500 per month. Don’t sell anyone else the millionaire line. It may happen, but it simply is not the average.

Common mistake in network marketing #2

Go For the Product, Not the Plan

I hear it nearly every day. Just last night I received an unsolicited call. The conversation went something like this: …กHello, I understand you want to start a home based business and make boat loads of moneyก……I stopped her at this point and asked her if she has used that introduction very long. She said, กoh yes, I have been doing this for years now!ก So I asked her how effective she was in calling phone numbers with that opener. She said, กI make lots and lots of moneyก. Our conversation went on for about 10 minutes with her telling me how much money she was making and how easy it was to make กboat loadsก of money. Ten minutes into our conversation, she had yet to reveal what it was she was representingwhat was it she was selling to make BOAT LOADS of money with? This should be one of the first things you speak about.

It was at this point in time I informed her that I currently had a home based business and was not looking to enter into another business. กCould we please speak business to business here as I am not a prospectก. She stammered a little bit but politely agreed. As it turns out, she simply copies pages out of the phone book and calls each name one at a time. She has been doing this for a year with very little positive results, and is struggling tremendously to earn more than $200 per month. You guessed it, I asked her if she would be interested in learning more about my company and the team benefits. In the end, I mailed her a copy of the current magazine and some additional literature. She was excited to hear that we work with our team members one on one coaching and mentoring. She stated that the person who signed her up has never spoken or responded to communication in more than 3 years. This is just sad and pathetic.

Too often, the temptation is to speak with our recruits or prospects about the กmoneyก which can be earned. As a result, you may sign a few new people up who are looking only for the money…while this may work, you are missing one of the biggest, best and most effective sales tools…….YOUR PERSONAL TESTIMONIAL. How effective is a man, who has never cleaned, cooked, or used a vacuum cleaner in his life going to be at selling items to make these chores easier? It is much more simple to speak about the กbusiness endก when your audience believes you because you believe in the products.

Of course, a fair compensation plan, which provides good incentives, is important. But in the long run it is the companyกs quality products which people bond themselves to. The management and the vision make all the difference in the world.

Common mistake in network marketing #3

Don’t Think Short Term

The Network marketing business is like any other worthwhile endeavor. Realistically, a distributor should not expect to see the real fruits of their labor until at least six months into their business. Those who have been truly successful have been at it a long time. Don’t expect it overnight and never quit working towards the goal.

Common mistake in network marketing #4

It’s Not Easy Money

We have heard it a million times, we may have even believed it a time or two. This is one of the things I hate most about the industry. People seem to think that the pitch should be กeasy moneyก, you don’t have to work, you don’t have to sell, you just make a list, sign a few people up and they do all the work for you! Sound familiar? Still waiting for the pigs to fly into your mailbox delivering great big checks?

Experienced Network Markers will tell you that it is not an easy money game. It is not merely a recruiting game. Distributors who are successful know their product, know their customers, know the companyกs vision, and are prepared to do that which is necessary. HARD WORK. Look at the name Network Marketing.

Common mistake in network marketing #5

ขFreeBeeข Product – Forget About It

You get what you give and you take what you get! It’s not about offering something for nothing, it’s about adding value to what you have! I cannot stress this enough.

If you want to sit on a roller coaster of ups and downs. Downs being the money you spend for a freebee or a gimme product, the Ups being the instant traffic or interest you have while someone walks up to you…. with their hand out for your freebee. You will generate a great deal of Interest only in the trinket, but not what it is you have to say! Once they have what they want, they will never look back. You want activity, likewise, you also want FRUITFUL activity. If you must offer something for free, associate a value with it that benefits the individual. We offer a $25 Gift Certificate for all new Case Autoship Qualified Distributors. They in turn may use this with the company on a future purchase. Why do we do this? Because the chances of them trying another product from the company is highwe know the quality is second to none and feel that the additional exposure will show them the true value of other products.

Common mistake in network marketing #6

Don’t Ignore the Company Track Record

A distributor who is looking to increase their odds of becoming successful is looking for a company with a good, strong, firm, and consistent track record. A track record demonstrates quality of management and products. This is very important for those who are genuinely กbusiness buildersก.

Common mistake in network marketing #7

Run Don’t walk!

You should avoid a company who requires you to carry large investments of inventory. The monthly minimum should be what you can realistically use in a single month. Autoship programs for both customers and distributors, represents a far more fair and longterm approach than large front load requirements.

Common mistake in network marketing #8

Look for Products with Profit Margins

There are many Network companies in the world today. A great deal of them offer very low if any profit margin return. As a business builder, you know that Network marketing isn’t for everyone. However if you have a good product, the product can be sold to everyone, you have a good thing going. Far too often distributors concentrate on the compensation plan and earnings hype then spending time looking at the profitability of the products or services offered by a company. A company with an exclusive product, these companies, can justify a higher profit, which means the ability to pay commissions in the long term from the sale of the products.

Historically, this is why the largest and most successful Network Marketing companies have had, as their mainstay, consumable products that are proprietary. These products are unique to the company, allowing for sufficient profit to pay commissions. If the products are available in every shopping club, grocery store or nutrition store, chances are, that is where the public will make their purchase.

Common mistake in network marketing #9

Don’t be a junkie or a pingpong

Very few distributors in the industry have developed the ability to work multiple programs effectively. These types of distributors are few and far between. As the average distributor is parttime to begin with, you should carefully pick a company and stick with it. History favors the longterm committed distributor rather than the nextopportunityjunkie who hops from opportunity to opportunity. Focus and energy is hard to maintain with one company and its products, let alone several. Splitting your time and energy with several companies will most likely end with limited or paled results. Focus in on yourself, your goals, and your desires in one direction.

Common mistake in network marketing #10

Turn off the TELEVISION

Activity is the name of the game in network marketing. You must do more than complete the distributor application; call your friends and sit back waiting for the money to be rolling into your mailbox. Turn your television off and get proactive. Do you know how many hours you could find in a day if you simply were willing to turn the television off?

The most successful people in network marketing are the ones who are constantly recruiting, selling and calling upon the same prospective customers and recruits multiple times. Those who sit back and watch the television in all their spare time will have unfulfilled expectations.

For the full version of this article or others please visit http://www.nonipearls.com

This article is in the December issue in the Building your Business section. Can’t find the answer to what you are looking for? Join in the Community Forum, someone will come along and answer your questions for you.

About The Author

Noni Pearls Magazine© is an official publication of the Noni Pearls Team and is published four times per year (give or take a few articles each month). No reproduction, copies, or duplication of any kind may be made of this material without the express written permission of Noni Pearls. http://www.nonipearls.com

[email protected]

This article was posted on November 20, 2004

by D.J. Harr

Overcoming the Five Obstacles to Affiliate Success

Overcoming the Five Obstacles to Affiliate Success

by: Bill Platt

Nearly every mass marketable product or service available online sports an Affiliate Program or MLM matrix to encourage small business people to sell those products or services to others.

For beginners in the online marketplace and even some proกs, these programs offer the best opportunity for earning substantial incomes to their participants.

Yet, despite the promise of Affiliate Programs and MLMกs for making money online, fewer than 5% of all participants will ever be successful with them! Only one out of a hundred will ever earn more than $1000 per month from the programs!

There are several factors contributing to these dismal numbers:

Failure to try

Failure to learn

Building sales without any concern about building a network

Building a network without any concern for sales

Failure to duplicate

FAILURE TO TRY

Many people will argue this point. They argue that they tried and the program failed them. Yet, if you were to persist in your queries, most peopleกs idea of trying is throwing a banner on their website or running one or two untested ads. Folks, that just does not cut it!

Being successful in an Affiliate Program, MLM program or anything else be it online or offline requires much more than a halfhearted, shortlived attempt at promoting a program.

FAILURE TO LEARN

Whatever endeavor is undertaken, success comes with knowledge. College is good at teaching folks the basics of hundreds of professions. Folks understand that in order to be a CPA, an attorney, a chemist, an engineer or any of a number of professions, they must learn a great deal of knowledge before they will be successful in the field.

Yet, the same people will come online and believe they can turn on the computer and already know everything there is to know about running a successful online business.

To be successful as an online marketer, it helps to at least become acquainted with web design, graphics design, copy writing, marketing research, promotion, advertising, customer service and many other areas. It also helps to know about areas specific to the Internet such as search engine optimization, web traffic patterns, direct email marketing, and networking with others.

As an online marketer, you should either have knowledge of these various disciplines or be prepared to hire on people who already possess these skills. Unless you have very deep pockets, you should be prepared to learn a few of these skills for yourself.

BUILDING SALES WITHOUT ANY CONCERN ABOUT BUILDING A NETWORK

The largest advantage of the Affiliate Program or MLM program is the ability to grow a network of affiliates underneath of you.

While you are able to sell a certain amount of products or services to the consumer, a team of people who can sell just as many products or services as you can, will add to your full income potential. Due to the nature of the Affiliate Program and the MLM program, you will earn a small percentage from the sales of all of the people in your network of sellers.

As an affiliate without a network, your potential earnings are limited by the number of products and services you can sell by yourself.

With the average Affiliate Program or MLM, the first tier of your network will generally net you a 10% to 20% cut of all of the products and services your first tier people sell. With only five sellers underneath of you on your first tier, you are at the minimum capable of doubling your monthly income.

BUILDING A NETWORK WITHOUT ANY CONCERN FOR SALES

The most devastating cause for failure is building a network of people whose sole focus is building a network of affiliates!

Folks, no matter the size of your network, be advised. No income can be earned until someone sells a product or service!

What good is a network of thousand marketers whose only concern is building a network and not selling the products and services which are required to earn commissions?

A thousand affiliates with no sales adds up to a whopping zero dollar check for you!

FAILURE TO DUPLICATE

The most important person in your network is YOU!

You begin by making an honest effort. You followup by building your knowledge base, continuing to learn always. You then focus on actually selling products and services. Always in the back of your mind, you are looking ahead to the day when you will begin building your network of affiliates.

The important thing to remember is that your network is always a mirror image of YOU and YOUR EFFORTS.

Duplication is the process of actually teaching someone else to do exactly as you do. Nothing more, nothing less.

If you are doing everything right, then those who look to you for guidance and leadership will be making a sincere effort, learning, selling products and services, then building their network, and leading their people to success, just as you are.

It is up to you and you alone to avoid the common pitfalls in Affiliate Programs and MLMกs. It is up to you to do what it takes to succeed in making money online. It is up to you to develop the skills necessary for success and to lead your team by example.

Keep things simple and manageable. Focus your attention to doing what it takes to be successful in whatever program you take on. Then find five good people to lead in the development of their online business and truly DUPLICATE YOURSELF with each of these five people.

You have what it takes to join the 5% who are successful with Affiliate Programs and MLM programs. It is now time to get to work and make your dreams of online marketing success a reality.

About The Author

Bill Platt is coowner of Double Eagle Business Center (DEBC).

By providing an honest and well thought out MLM Opportunity, DEBC meets all the legal requirements for an online MLM plus offers products and services which can support any online business, along with an innovative and a generous commission structure for Affiliates. http://PathTrax.com/x.pl/BP121,52

[email protected]

This article was posted on May 27, 2002

by Bill Platt

Networking Know How

Networking Know How

by: Karen Zastudil

Networking, even to a seasoned professional, can seem intimidating or scary at times. The reason for this is due to the fact, that networking can be positive or negative! We don’t often think of กnegativeก networking. Not knowing what constitutes the difference between the two makes it easy to network in a negative manner.

I am sure that you will agree that the term กnetworkingก is one of the most overused and misunderstood words in our vocabulary. To give you an idea of how the term came to be misunderstood, lets first look at the dictionary definition. To paraphrase the dictionary, networking is defined as ‘the exchange of information or services among individuals, groups, or institutions.ก What we don’t see included in the definition is the purpose of networking. We need to view networking in a much broader concept than the dictionary definition. If we view networking as the process of developing and maintaining quality relationships that are mutually beneficial, it won’t take long to realize that networking is an ongoing process. The continual building of relationships that can last a lifetime is what makes networking an ongoing process. When we lose touch with someone, then call on them when we are in need, we have just created a negative networking situation.

Positive networking needs to become a way of life. As the old saying goes กItกs not what you know but who you know.ก This is true more than ever in todayกs competitive world. Networking is not something that comes easily to many people. You may be basically a shy person, possibly feel you don’t have the resources, or as most of us are today, just plain busy. You may feel you just don’t have the time to network. The fact is that every time you meet someone new, you are given the opportunity to network, learn new things and enrich your life. Because we have broadened our definition of networking to include its purpose, we really don’t have time not to network.

Building relationships that will help you reach your potential is easier than you may think. Welcome new opportunities to meet new people. Don’t save your networking for specific situations or places. Networking can be done any place, any time. Learn about the other person you are networking with and how you can help them. Help others connect to the people you know can help them, keep your promises and stay in touch. These are all important aspects that are often overlooked when developing network relationships that are mutually beneficial.

Networking takes time and will be everevolving. You will always have opportunities to meet new people to add to your list of contacts. Once you have established a relationship, identify the people who can help you, stay connected, and keep your network growing. Identify the organizations and activities where people you want to know gather, get involved and become known.

To give an example of how this works, identify a group that you would like to join. Attend two meetings before joining. While at the meetings introduce yourself to two people and exchange business cards. Arrange two followup meetings for coffee or lunch. Now you will know if you truly want to be part of this group and you will have expanded your network by two.

Networking does not have to be difficult, in fact it can be fun. Keep in mind that it is something you will need to constantly work at and before you know it, you will have a strong network behind you to back your efforts

About The Author

Karen is a graduate of of Cleveland State University and is a freelance writer. Visit her website at http://www.womenatthesummit.com A site of general interest to women. Topics include: Pregnancy, Children, Parenting, Health and wellness, Diet and Fitness, Relationships, Money, Travel and more.

(c)2004 Karen Zastudil

[email protected]

This article was posted on October 31, 2004

by Karen Zastudil