Tuesday, December 28, 2010

part time job earn money from online it's real

1
Work from Home. Earn $2000/month. No Investment. Part Time, 1-2h/day.

Wanted Online Internet job workers. Job is only through Internet. Work from home part time jobs. You can earn $1500-2500/month working 1-2 hours/day, no matter where you live. These are genuine Data entry jobs & Internet jobs. No Investment required. Only serious enquires please. For more details visit http://www.earnparttimejobs.com/index.php?id= 3111717

2

Earn $2000/month via part time jobs. Easy form filling data entry jobs

Earn $1500-2500 per month from home. No marketing / No MLM .
We are offering a rare Job opportunity where you can earn working from home using your computer and the Internet part-time. Qualifications required are Typing on the Computer only. You can even work from a Cyber Café or your office PC, if so required. These part time jobs require working for only 1-2 hours/day to easily fetch you $1500-2500 per month. Online jobs, Part time jobs. Work at home jobs. Dedicated workers make much more as the earning potential is unlimited. No previous experience is required, full training provided. Anyone in any country can apply. Please Visit http://www.earnparttimejobs.com/index.php?id= 3111717

3

Wanted: Internet workers. Earn $1500-2500/month working part time on internet.

Dear Friends, Are you interested in making $1500 to $2500 per month with a part time job? This is not a get rich quick scheme. This is a legal opportunity to earn money online when you do it as a part time job. This opportunity is a proven way to make $1500 to $2500 per month, no matter where you live. There are already 1,200,000 people around the world who grabbed this opportunity and are making tons of money every month. If you are interested to know more about this opportunity, visit http://www.earnparttimejobs.com/index.php?id= 3111717

4
Part time Internet Jobs for Everyone. Earn money online by data entry jobs

Are you looking for work from Home part time jobs? Home based typing jobs are now being offered by many Companies! Receive your paychecks every month! Full training provided by the company itself. No Selling Required. Please visit the website http://www.earnparttimejobs.com/index.php?id=3111717

5

How to Earn $2,500 every month without Investment through part time jobs?

You can earn $2,500 the very first month from data entry jobs on internet. This is an easy work from home form filling job. Work less than 1 hr daily. No investment. Open for anyone, worldwide. Please visit the website http://www.earnparttimejobs.com/index.php?id= 3111717

Saturday, December 11, 2010

Event ID List Error Codes in Windows

The list below details the error codes displayed in the dialog boxes in Windows:

Code Description
1 Incorrect function.
2 The file specified.
3 The path specified.
4 The system can not open the file.
5 Access is denied.
6 Invalid descriptor
7 The control blocks of memory have been destroyed.
8 Not enough space to process this command.
9 Address of control block storage invalid.
10 Environment incorrect.
11 Attempt to load a program incorrect format.
12 Access code is invalid.
13 Data not valid.
14 Insufficient memory for this operation.
15 The reader specified.
16 Unable to delete the directory.
17 Unable to move the file to a different disk drive.
18 There are no more file.
19 Media write protected.
20 The device specified.
21 The device is not ready.
22 The device does not recognize the command.
23 Data Error (cyclic redundancy check).
24 The program issued a command length incorrect.
25 The reader can not find area or specific track on the disc.
26 Unable to access the disk or the disk specified.
27 The reader can not find the sector requested.
28 The printer is out of paper.
29 Writing on the device not specified.
30 playback on the device specified.
31 A device attached to system not functioning properly.
32 The process can not access the file because it is used by another process.
33 The process can not access the file because another process has locked a portion.
34 The reader does not contain the correct diskette. Insert xxx (serial number of volume: xxx) xxx in the drive.
36 Too many files opened for sharing.
38 End of File reached.
39 The disk is full.
50 This claim is not supported.
51 Windows can not find the network path. Verify that the network path is correct and the destination computer is not busy or turned off. If Windows still can not find the network path, contact your network administrator.
52 You were not connected because there was a duplicate name on the network. Go to System in Control Panel and change the computer name and try again.
53 The network path was not found.
54 The network is busy.
55 The resource or device specified network is no longer available.
56 The network BIOS command limit has been reached.
57 A network adapter error occurred.
58 The specified server can not perform the requested operation.
59 Unexpected network error.
60 The card is not compatible remote.
61 The queue of the printer is saturated.
62 The server does not have enough space to store the file to print.
63 Your file waiting to be printed was deleted.
64 The specified network name is no longer available.
65 Network access is denied.
66 The network resource type is incorrect.
67 Network name not found.
68 The name limit for the network adapter on the local computer has been exceeded.
69 Exceeding the limit of NetBIOS sessions.
70 The remote server has been paused or is in phase.
71 It is possible to connect to this remote computer at this time because there are already as many connections as the computer can accept.
72 The printer or device specified disk has been suspended.
80 The file exists.
82 Unable to create directory or file.
83 Fail on the interruption 24.
84 Not enough memory to process this request.
85 local device name already in use.
86 The network password specified is invalid.
87 The parameter is incorrect.
88 Error writing to the network.
89 The system can not run another process at this time.
100 Can not create another system semaphore.
101 Another process has the exclusive semaphore.
102 The semaphore is set and can not be closed.
103 The semaphore can not be restored.
104 Can not request exclusive semaphores at a break.
105 The semaphore is no longer the owner.
106 Insert the diskette for the reader xxx.
107 The program stopped because you have not inserted on the other disk.
108 The disk is either in use or locked by another process.
109 The communication channel has been closed.
110 Unable to open the device or file specified.
111 Filename too long.
112 Not enough space on the disk.
113 There is more internal file identifiers available.
114 The internal file identifier is incorrect target.
117 The IOCTL call made by the application is not correct.
118 The value of verification in writing is invalid.
119 The system does not support the requested command.
120 This function is not supported by the system.
121 The timeout period has expired semaphore.
122 The data area passed to a system call is insufficient.
123 Syntax of the file name, directory or volume incorrect.
124 The system call level is incorrect.
125 The disk has no volume name.
126 The specified module could not be found.
127 The specified procedure could not be found.
128 There are no child processes to wait.
129 The application xxx can not be executed in Win32 mode.
130 Attempt to use a file descriptor on an open disk partition for an operation different from a disk I / O flow.
131 Attempt to move the file pointer before the beginning of the file.
132 Unable to establish the file on the device or file specified.
133 JOIN or SUBST command can not be used for a drive that already contains readers joints.
134 Attempt to use a JOIN or SUBST command on a drive that has already been attached.
135 Attempt to use a JOIN or SUBST command on a drive that has already been substituted.
136 The system tried to delete the join of a drive not included.
137 The system tried to delete the substitution of a drive not substituted.
138 The system tried to join a drive to a directory on a joined drive.
139 The system tried to substitute a drive to a directory on a substituted drive.
140 The system tried to join a drive to a directory on a substituted drive.
141 The system tried to substitute a drive to a directory on a joined drive.
142 Operation JOIN or SUBST impossible now.
143 The system can not join or substitute a drive to a directory on that drive.
144 The directory is not a subdirectory of the root directory.
145 The directory is not empty.
146 The specified path is used in a substitution.
147 Insufficient resources to process this command.
148 Can not now use the path specified.
149 Attempt to join or substitute a drive to a directory which is the target of a previous substitute.
150 Either the trace information system were not specified in your CONFIG.SYS file, the track is prohibited.
151 The number of specified semaphore events for DosMuxSemWait is not correct.
152 DosMuxSemWait did not execute. Too many semaphores are already set.
153 List DosMuxSemWait incorrect.
154 The volume label entered exceeds the limit of characters in the file system destination.
155 Can not create another thread.
156 The recipient process has refused the signal.
157 The segment is already discarded and can not be locked.
158 Segment already unlocked.
159 The address of the thread ID is incorrect.
160 One or more arguments are invalid.
161 The specified path is invalid.
162 A signal is already pending.
164 The system can not create more threads.
167 Unable to lock a portion of a file.
170 The requested resource is in use.
173 No application lock was waiting for the cancellation.
174 The file system does not support atomic changes to the type of lock.
180 The system detected a segment number incorrect.
182 The operating system can not run xxx.
183 Can not create a file that already exists.
186 The past is incorrect indicator.
187 The name of the semaphore system specified was not found.
188 The operating system can not run xxx.
189 The operating system can not run xxx.
190 The operating system can not run xxx.
191 xxx Unable to run in Win32 mode.
192 The operating system can not run xxx.
193 xxx is not a valid Win32 application.
194 The operating system can not run xxx.
195 The operating system can not run xxx.
196 The operating system can not run this application program.
197 Currently, the operating system is not configured to run this application.
198 The operating system can not run xxx.
199 The operating system can not run this application program.
200 The code segment can not be greater than or equal to 64 K.
201 The operating system can not run xxx.
202 The operating system can not run xxx.
203 The system could not find the environment option specified.
205 No process in the sub-tree of the order has a signal handler.
206 File name or extension is too long.
The stack 207 of the ring 2 is currently used.
208 Wildcards (* or?) Were specified incorrectly or too many.
209 The signal being posted is incorrect.
210 The signal handler can not be established.
212 The segment is locked and can not be reallocated.
214 Too many dynamic link modules are attached to this program or dynamic link module.
215 Can not nest calls to LoadModule.
216 The image file xxx is valid, but it is for a different kind of computer from the current computer.
230 The status of the communication channel is not valid.
All 231 instances of the communication channels are occupied.
232 The communication channel is about to be closed.
233 There is no process at the other end of the channel.
234 More data are available.
240 The session was canceled.
254 The name extended attribute (EA) specified was not valid.
255 The extended attributes (EA) are inconsistent.
258 timed out waiting.
259 No data are available.
266 The copy functions can not be used.
267 The directory name is invalid.
275 The extended attributes (EA) are not in the buffer.
276 The extended attribute file on the mounted file system is damaged.
277 The file of the table of extended attributes (EA) is full.
278 The descriptor extended attributes (EA) specified is invalid.
282 The mounted file system does not support extended attributes.
288 Attempt to release mutex which the appellant does not own.
298 A semaphore has been over-subscribed.
299 Only part of a request ReadProcessMemory or WriteProcessMemory was made.
300 Oplock request is denied.
301 Receipt of invalid Oplock was received by the system.
302 The volume is too fragmented to complete this operation.
303 The file can not be opened because it is being removed.
317 The message text associated with the number 0xxxx is not in the message file for xxx.
487 Attempt to access invalid address.
534 Arithmetic results exceeding 32 bits.
535 There is a process at the other end of the canal.
536 The system waits for a process opens the other end of the canal.
994 Access to the extended attribute (EA) has been refused.
995 The operation of input / output has been abandoned due to the discontinuation of a thread or at the request of an application.
996 The input / output overlap is not in a reported condition.
997 An operation of input / output overlap is running.
998 Access to this memory location is invalid.
999 Error during a paging operation.
1001 Recursion too deep, stack overflowed.
1002 The window can not act on the message sent.
1003 Could not perform this function.
1004 Indicators invalid.
1005 The volume does not contain a file system known. Check that all file system drivers are loaded and necessary if the volume is not damaged.
1006 The open file is no longer valid because the volume that contains it has been damaged externally.
1007 The requested operation can not be performed in full screen mode.
1008 Attempt to reference a token that does not exist.
1009 The configuration registry is damaged.
1010 The registry configuration key is invalid.
1011 Unable to open registry configuration key.
1012 Unable to read registry configuration key.
1013 Could not write registry key configuration.
1014 One of the files in the Registry database has to be restored.
1114 An initialization routine of a dynamic library (DLL) failed.
1115 A system shutdown is in progress.
1116 The system is not being stopped, it is impossible to cancel the system shutdown.
1117 Unable to meet demand due to an error device I / O
1118 Failed to initialize the serial device. The serial driver will be unloaded.
1119 Unable to open a device that shares an interrupt (IRQ) with other devices. At least one other device that uses that IRQ was already opened.
1120 An operation of input / output port was completed by another write to the serial port. (The IOCTL_SERIAL_XOFF_COUNTER reached zero.)
1121 An operation of input / output port has been completed since the waiting period has expired. (The IOCTL_SERIAL_XOFF_COUNTER has not reached zero.)
1122 No sign of address ID has been found on the floppy.
1123 Discordance between the field ID of the disk sector address and track controller floppy drive.
1124 The floppy disk controller reported an error not recognized by the floppy disk driver.
The 1125 controller floppy returned inconsistent results in its registers.
1126 While accessing the hard disk, a recalibrate operation failed despite several attempts.
1127 While accessing the hard disk, a disk operation failed even after several tests.
1128 While accessing the hard drive, reset the necessary disk controller has proved impossible.
1129 Meeting of the physical end of tape.
1130 Not enough memory on the server to process this command.
1131 A fatal embrace potential was detected.
1132 The base address or offset in the file is not properly aligned.
A 1140 attempt to change the power state of the system has encountered the veto of another application or another driver.
The BIOS 1141 tried unsuccessfully to change the power state of the system.
1142 An attempt to create a number of links exceeds the maximum number allowed by the file system was made.
1150 The specified program requires a newer version of Windows.
1151 The specified program is not a Windows or MS-DOS.
1152 Unable to start multiple instances of the specified program.
1153 The specified program was written for an earlier version of Windows.
1154 One of the libraries required to run this application is damaged.
1155 No application is associated with the specified file for this operation.
1156 An error occurred while sending the command to the application.
1157 One of the libraries required to run this application can not be found.
1158 The current process has used all its share allocated by the system of descriptors for the objects of the Manager window.
1159 The message can be used only with synchronous operations.
1160 The indicated source element has no media.
1161 The indicated destination element already contains media.
The 1162 does not exist.
1163 The indicated element is part of a magazine that is not present.
1164 The indicated device requires reinitialization due to errors.
1165 The device has indicated that cleaning is required before further operations are attempted.
1166 The device has indicated that its door is open.
1167 The device is not connected.
1168 Element not found.
No correspondence in 1169 for the key indicated in the index.
1170 All the properties are not specified on the object.
1171 The past GetMouseMovePoints is not in the buffer.
1172 The tracking (workstation) is not running.
1173 identifier volume could not be found.
1175 Unable to delete the file to replace.
1176 Unable to move the replacement file to the file replace. The file to be replaced has retained its original name.
1177 Unable to move the replacement file to the file replace. To replace the file has been renamed using the backup name.
The 1178 amendment to the log volume is being removed.
The 1179 amendment to the log volume is not active.
1180 A file was found, but it is perhaps not the correct file.
1181 The log entry has been removed from the newspaper.
1200 The specified device name is invalid.
The 1201 device is not currently connected but it is a stored connection.
1202 The local device name has a remembered connection to another network resource.
1203 No network accepted the given network path.
1204 The network software name specified is invalid.
1205 Unable to open network connection profile.
1206 The network connection profile is damaged.
1207 Unable to enumerate an object that is not a container.
1208 An extended error has occurred.
1209 The format of the specified group name is invalid.
1210 The format of the computer name specified is invalid.
1211 The format of the specified event name is invalid.
1212 The format of the domain name specified is invalid.
1213 The format of the service name specified is invalid.
1214 The format of the specified network name is invalid.
1215 The format of the specified share name is invalid.
1216 The format of the specified password is invalid.
1217 The format of the specified message name is invalid.
1218 The format of the specified message destination is invalid.
1219 Several connections to a server or a shared resource by the same user, using more than one user name are not allowed. Remove all previous connections to the server or shared resource and try again.
A 1220 attempt to establish a session with a network server took place while the maximum number of sessions on this server was already outdated.
1221 The name of the workgroup or domain is already in use by another computer on the network.
1222 Either there is no network, the network has not started.
1223 The operation was canceled by the user.
1224 The requested operation could not be performed on a file with a user mapped section open.
1225 The remote system refused the network connection.
1226 The network connection was gracefully closed.
1227 The endpoint of the transport network has an address associated with it.
1228 An address has not yet been associated with the network termination point.
1229 An operation was attempted on a network connection that does not exist.
1230 An invalid operation was attempted on an active network connection.
1231 The network location can not be achieved. For information concerning the resolution of problems of the network, see Windows Help.
1232 The network location can not be achieved. For information concerning the resolution of problems of the network, see Windows Help.
1233 The network location can not be achieved. For information concerning the resolution of problems of the network, see Windows Help.
1234 No service operates on the network termination point of destination of the remote system.
1235 The request was aborted.
1236 The network connection was adopted by the local system.
1237 The operation could not be completed. A new test should be performed.
1238 A connection to the server could not be performed because the maximum number of simultaneous connections has been reached.
1239 Attempt to logon for a slot or a day not allowed for this account.
1240 The account is not authorized to login from this station.
1241 The network address could not be used for the operation required.
1242 The service is already registered.
1243 The specified service does not exist.
1244 The requested operation was not performed because the user was not authenticated.
1245 The requested operation was not performed because the user is not connected to the network. The specified service does not exist.
1246 More work in progress.
1247 Attempted execution of an operation of initialization when the initialization has already occurred.
1248 No additional device available.
1249 The specified site does not exist.
1250 A domain controller with the specified name already exists.
1251 This operation is only supported when connected to the server.
1252 The structure of the group policy should call the extension even if there was no change.
1253 The specified user does not have a valid profile.
1254 This operation is not supported on a Microsoft Small Business
1255 The server is being stopped.
1256 The remote system is not available. For information about network troubleshooting, see Windows Help.
1257 The security identifier provided does not come from a domain account.
1258 The security identifier provided does not have a domain component.
The 1259 dialogue was canceled AppHelp which prevents the application startup.
1260 Windows can not open this program because it was prevented by a software restriction. For more information, open the event or contact your system administrator.
1261 A program is trying to use a registry value is invalid, usually caused by an uninitialized register. This error is specific to Itanium systems.
1262 The share is currently offline or does not exist.
1263 The Kerberos protocol encountered an error while validating the KDC certificate during logon through smart card.
1264 The Kerberos protocol encountered an error when trying to use the sub-system of the smart card.
1265 The system detected a possible attempt to breach of security. Verify that you can contact the server that authenticated you.
1266 The smartcard certificate used for authentication has been revoked. Please contact your system administrator. There may be additional information in the event log.
An 1267 untrusted certificate authority was detected While processing the smartcard certificate used for authentication. Please contact your system administrator.
1268 The revocation status of the smartcard certificate used for authentication could not be determined. Please contact your system administrator.
1269 The smartcard certificate used for authentication was not trusted. Please contact your system administrator.
1270 The smartcard certificate used for authentication has expired. Please contact your system administrator.
1271 The computer was locked and can not be stopped without the force option.
1273 A recall of application sent invalid data at the time of the call.
1274 The structure strategy group should call the extension in the update of the strategy first phase.
Loading the 1275 driver has been blocked
1276 A dynamic link library (DLL) referenced a module that is not a DLL or executable image of a process.
1300 The appellant does not enjoy all privileges referenced.
1301 A mapping between account names and security IDs was done.
1302 No limit quota system has been specifically defined for this account.
1303 No encryption key is available. A known encryption key was returned.
1304 The password is too complex to be converted into a password LAN Manager. The term LAN Manager password returned is a null string.
1305 Version number unknown.
1306 Indicates two version numbers are incompatible.
1307 This security ID may not be assigned as the owner of this object.
1308 This security ID may not be assigned as the main group of an object.
1309 A thread that does not present the identity of a customer has tried to act on a token impersonation.
The 1310 group can not be disabled.
1311 No server access is currently available to process the application logon.
1312 A specified logon session does not exist. It may already be over.
1313 A specified privilege does not exist.
1314 The client does not have a required privilege.
1315 The name provided is not a properly formed account name.
1316 The specified user already exists.
1317 The specified user does not exist.
1318 The specified group already exists.
1319 The specified group does not exist.
1320 Either the specified user account is already a member of specified group or it is impossible to delete the specified group because it contains a member.
1321 The specified user account is not member of specified group.
1322 You can not disable or delete the last remaining administration account.
1323 Unable to update the password. The value provided as the current password is incorrect.
1324 Unable to update the password. The new password provided contains values not allowed in passwords.
1325 Unable to update the password. The value provided by the new password does not meet the specifications of length, complexity or history of the area.
1326 Logon failure: unknown user name or password incorrect.
1327 Logon failure: Restriction of user account. Possible reasons are blank passwords not allowed, restrictions on hours Logon or restriction strategy was applied.
1328 Logon failure: violation of restriction of hours of access.
1329 Logon failure: user not authorized to log on to this computer.
1330 Logon failure: the password for the specified account has expired.
1331 Logon failure: account currently disabled.
1332 No mapping between account names and security IDs was done.
1333 Too many local user identifiers (LUID) were requested at the same time.
1334 There is more local user identifier (LUID) available.
1335 Part-under authority of a security ID is invalid for this particular purpose.
1336 Structure of the list of access control (ACL) is invalid.
1337 Structure of security ID is invalid.
1338 Structure of security descriptor is invalid.
1340 Unable to build the access control list (ACL) or the heading of access control (ACE) inherited.
1341 The server is currently disabled.
1342 The server is currently enabled.
1343 The value provided is not valid for an identifier authority.
1344 There is more memory available for the updates of safety information.
1345 The specified attributes are invalid or inconsistent with the attributes defined for the group as a whole.
Either a 1346 impersonation level required was not provided, the impersonation level provided is invalid.
1347 Can not open a security token for a limited level.
The 1348 class of validation information requested is not valid.
1349 The type of token is inappropriate for such use.
1350 Unable to perform a security operation on an object that no security was involved.
1351 The configuration information could not be read from the domain controller because the computer is not available or access was denied.
The server 1352 SAM (security account manager) or LSA (Local Security Authority) was not appropriate in the state to achieve the security operation.
1353 The area was not in proper condition to perform the security operation.
1354 This operation is allowed only for the primary domain controller.
1355 The specified domain does not exist or could not be contacted.
1356 The specified domain already exists.
Tentative 1357 exceeded the maximum number of domains per server.
1358 The requested operation is not possible due to irreparable failure of the media or the alteration of a data structure on disk.
1359 An internal error has occurred.
1360 The generic types of access that should already be mapped to the types of non-generic access have been encountered in an access mask.
1361 A security descriptor is not in the right format (absolute or self-relative).
1362 Only the logon process can use the action requested. The calling process has not registered as a logon process.
1363 Unable to open a new session with an ID already in use.
1364 A specified authentication package is unknown.
The session opened in 1365 is not compatible with the requested operation.
1366 The Logon ID is already used.
1367 An application log contains a value of connection type is invalid.
1368 Unable to borrow an identity by using a named pipe so that no data has been read into this channel.
1369 The transaction state of a subtree in the registry is incompatible with the requested operation.
1370 A database of internal security is damaged.
1371 Unable to perform this action on accounts.
1372 Unable to perform this action on the panel predefined.
1373 Unable to perform this action on this special user preset.
1374 User can not be excluded from the group because it is currently his main group.
1375 The token is already used as a primary token.
1376 The specified local group does not exist.
1377 The specified account name is not a member of the local group.
1378 The specified account name is already a member of the local group.
1379 The specified local group already exists.
1380 Logon failure: the user does not type logon requested on this computer.
1381 The maximum number of secrets that can be stored in a single system was exceeded.
1382 The length of a secret exceeds the maximum allowed.
1383 The database LSA (Local Security Authority) shows an internal inconsistency.
1384 During a logon attempt, the security context of the user has accumulated too many security IDs.
1385 Logon failure: the user does not type logon requested on this computer.
1386 A password coded crossover is required to change the user password.
1387 Unable to add or remove a member of the local group because the member does not exist.
1388 A new member can be added to the local group because the member has an incorrect type.
1389 Too many security IDs have been specified.
1390 A password coded crossover is required to change the password for this user.
1391 Indicates an ACL contains no heritable components.
1392 The file or directory is corrupted and unreadable.
1393 The disk structure is corrupt and unreadable.
1394 There is no user session key for the specified logon session.
1395 The service you are accessing is dismissed for a particular number of connections. It is not possible to establish connections to the service at this time because there are already as many connections as the service can accept.
1396 Logon failure: the target account name is incorrect.
1397 Mutual Authentication failed. The password server is deprecated on the domain controller.
1398 The time and date are not the same between the client and the server.
1399 This operation can not be performed on the current domain.
1400 window handle invalid.
1401 menu descriptor invalid.
1402 Cursor descriptor invalid.
1403 descriptor table accelerators invalid.
1404 Descriptor hook invalid.
Descriptor 1405 to a structure of multiple windows is invalid.
1406 Unable to create child window above.
1407 Class window found.
1408 Invalid window, part of another thread.
1409 Hot Key is already included.
1410 Class already exists.
1411 Class does not exist.
1412 It remains open windows in that class.
1413 Invalid index.
1414 descriptor Icon invalid.
1415 Using words dialog private.
1416 Identifier box found.
1417 No wildcards.
1418 Thread does not have clipboard open.
1419 Hot Key is not included.
1420 The window is not a valid dialog window.
1421 Control ID not found.
1422 Invalid message for a combo box because it has no edit control.
1423 The window is not a box.
1424 The height must not exceed 256.
1425 descriptor device context (DC) is invalid.
1426 type of hook procedure invalid.
1427 The hook procedure is invalid.
1428 Unable to establish a non-local hook without a module descriptor.
1429 This hook procedure can only be defined globally.
1430 The journal hook procedure is already installed.
1431 The hook procedure is not installed.
1432 Invalid message for a list box to a single selection.
1433 LB_SETCOUNT sent to a list box active.
1434 The list box does not allow tab stops.
1435 Can not destroy object created by another thread.
1436 Child windows can not have menus.
1437 The window has no menu system.
1438 style message box is invalid.
1439 Parameter scope system (SPI_ *) invalid.
1440 Screen already locked.
1441 All descriptors windows in a structure of multiple windows should have the same parent.
1442 The window is not a child window.
1443 Order GW_ * invalid.
1444 thread identifier is invalid.
1445 Unable to process a message from a window that window is not an MDI (multiple document interface).
1446 pulldown menu already active.
1447 The window does not scroll bars.
1448 interval scroll bar can not exceed MAXLONG.
1449 Unable to display or remove the window in the manner specified.
1450 Insufficient system resources exist to complete the requested service.
1451 Insufficient system resources exist to complete the requested service.
1452 Insufficient system resources exist to complete the requested service.
1453 Insufficient quota to complete the requested service.
1454 Insufficient quota to complete the requested service.
1455 The paging file is insufficient to complete the process.
1456 No menu item found.
1457 descriptor keyboard configuration is invalid.
1458 Hook type not allowed.
1459 This operation requires an interactive Windows station.
1460 This operation ended because the waiting period has expired.
1461 screen descriptor invalid.
1500 The event log file is corrupted.
1501 The event log file could not be opened, the registration of events did not start.
1502 The event log file is full.
1503 The event log file has changed between read operations.
1601 Unable to access the Windows Installer service. This can occur if you run Windows in Safe Mode. Contact your support personnel for assistance.
1602 The user canceled the installation.
1603 Fatal error during installation.
1604 Installation suspended, not ended.
1605 This action is only valid for products currently installed.
1606 identifier feature is not included.
1607 identifier component is not registered.
1608 Unknown property.
1609 The descriptor is in an invalid state.
1610 The configuration data of this product are damaged. Contact your technical support.
1611 Component qualifier not present.
1612 The installation source for this product is not available. Verify that the source exists and that you can access.
1613 This installation package can not be installed by the Windows Installer service. You must install a service pack that contains a newer version of the Windows Installer service.
1614 Product is uninstalled.
1615 SQL query syntax invalid or unsupported.
Section 1616 of the recording does not exist.
The 1617 device has been removed.
1618 Another installation is already underway. Finish in to perform this installation.
1619 Unable to open the installation package. Verify that the package exists and that you can access it, or contact the application vendor to verify that this is a valid Windows Installer package.
1620 Unable to open the installation package. Contact the application vendor to verify that this is a valid Windows Installer package.
1621 An error occurred while starting the user interface of the Windows Installer service. Contact your technical support.
1622 Error opening installation log file. Verify that the location specified log file exists and is writable.
1623 The language of this installation package is not supported by the system.
1624 Error applying transforms. Verify that the specified transform paths are valid.
1625 This installation is forbidden by system policy. Contact your system administrator.
1626 Unable to perform.
1627 Function failed during execution.
1628 The table specified is invalid or unknown.
The 1629 data have a type error.
1630 The data of this type are not supported.
1631 The Windows Installer service failed to start. Contact your technical support.
1632 The drive that contains the temporary directory is full or inaccessible. Free up space on the drive or verify that you have access permission in writing to the temporary directory.
1633 This installation package is not supported by this processor type. Contact the retailer of your product.
1634 Component not used on this computer.
1635 Unable to open this patch package. Verify that the patch package exists and that you can access it, or contact the application vendor to verify that this is a valid Windows Installer patch package.
1636 Unable to open this patch package. Contact the application vendor to verify that this is a valid Windows Installer patch package.
1637 This patch package is not executable by the Windows Installer service. You must install a service pack that contains a version of Windows Installer service later.
1638 Another version of this product is already installed. The installation of this version can not continue. To configure or remove the existing version of this product, use Add / Remove Programs from Control Panel.
1639 Argument command line invalid. See the Development Kit Windows Installer for a detailed help from the command line.
1640 Only administrators have the right to add, delete, or configure software on the server during a remote session Terminal Server. If you want to install or configure software on the server, contact your network administrator.
1641 The requested operation was completed successfully. The computer will be restarted to reflect the changes.
The 1642 patch upgrade can not be installed by the Windows Installer service because they lack the program to upgrade, patch or upgrade is intended for a different version of the program. Verify that the program to be upgraded exists on your computer and your patch upgrade is correct.
1643 The patch package is not permitted by software restriction policies.
1644 One or more customizations are not permitted by software restriction policies.
1700 Link chain invalid.
1701 The handle link is to an invalid type.
1702 Handle liaison invalid.
1703 The RPC protocol sequence is not supported.
1704 The RPC protocol sequence is invalid.
1705 The universal unique identifier (UUID) of the channel is not valid.
1706 endpoint format is invalid.
1707 The network address is invalid.
End of 1708 found.
1709 Value sunset invalid.
1710 universally unique identifier of the object (UUID) not found.
1711 The universal unique identifier of the object (UUID) has already been registered.
1712 The universal unique identifier of type (UUID) has already been registered.
1713 The RPC server is already listening.
1714 No protocol sequences have been registered.
1715 The RPC server is not listening.
1716 Type Manager unknown.
1717 Interface Unknown.
1718 There is no connection.
1719 There are no protocol sequences.
1720 Unable to create the endpoint.
1721 Insufficient resources to perform this operation.
1722 The RPC server is unavailable.
1723 The RPC server is too busy to complete this operation.
1724 Options network invalid.
1725 There are no remote procedure call active in this thread.
1726 Failed to remote procedure call.
1727 The remote procedure call failed and did not execute.
1728 An RPC protocol error occurred.
1730 The transfer syntax is not supported by the RPC server.
1732 The type universal unique identifier (UUID) was not recognized.
1733 Symbolic Name invalid.
1734 Limits table invalid.
1735 The binding does not contain a name heading.
1736 Syntax name is invalid.
1737 The name syntax is not supported.
1739 No network address is available to construct a universal unique identifier (UUID).
1740 The endpoint is a duplicate.
1741 Authentication type unknown.
1742 The maximum number of calls is not enough.
1743 Chain too long.
1744 RPC protocol sequence found.
1745 Procedure number out of range.
1746 The binding does not contain any authentication information.
1747 Authentication Service Unknown.
1748 Level Authentication unknown.
1749 Security Context invalid.
1750 Service Authority unknown.
Section 1751 is invalid.
1752 The server endpoint can not perform the operation.
1753 The endpoint mapper has no endpoint available.
1754 No interfaces have been exported.
1755 Name Topic incomplete.
1756 Option version invalid.
1757 There is no longer a member.
1758 There are no export cancel.
1759 The interface was not found.
Section 1760 already exists.
1761 Item not found.
1762 The name service is unavailable.
1763 The network address family is invalid.
1764 The requested operation is not supported.
1765 There is no security context available to allow impersonation.
1766 An internal error occurred during a remote procedure call (RPC).
1767 The RPC server attempted an integer division by zero.
1768 Error addressing the RPC server.
1769 A floating point operation performed by the RPC server caused a division by zero.
1770 A floating point operation performed by the RPC server caused a negative overshoot.
1771 A floating point operation performed by the RPC server caused excess capacity.
1772 The list of RPC servers available for connection of self-descriptors is exhausted.
1773 Unable to open the file of the translation table of characters.
1774 The file containing the translation table of characters is less than 512 bytes.
1775 A null context handle was passed from client to the host during a remote procedure call (RPC).
1777 The context handle changed during a remote procedure call (RPC).
The 1778 handles liaison moved to a remote procedure call do not match.
1779 The stub is unable to get the handle remote procedure call (RPC).
1780 A null reference pointer was passed to the stub.
1781 enumeration value out of range.
1782 The number of bytes is not enough.
1783 The relay has received incorrect data.
1784 The supplied user buffer is invalid for the requested operation.
1785 The disk media is not recognized. It may not be formatted.
1786 The workstation does not have a secret clearance.
1787 The security database on the server does not have a computer account for the relationship with this workstation.
1788 The relationship between the primary domain and trusted domain failed.
1789 The trust relationship between this workstation and the primary domain failed.
1790 Logon Failure on the network.
1791 A remote procedure call is already underway for this thread.
1792 A logon attempt took place while the service network logon was not started.
1793 The user account has expired.
1794 The redirector is in use and can not be unloaded.
1795 The specified printer driver is already installed.
1796 The specified port is unknown.
1797 Printer driver unknown.
1798 Print Processor unknown.
1799 The specified separator file is invalid.
1800 The specified priority is invalid.
1801 The printer name is invalid.
1802 The printer already exists.
1803 Printer Command invalid.
1804 The data type specified is invalid.
1805 The environment specified is invalid.
1806 There is no more connection.
1807 The account used is an inter-domain account. Use your global user account or local level to access this server.
1808 The account used is a computer account. Use your global user account or local level to access this server.
1809 The account used is a server for approval. Use your global user account or local level to access this server.
1810 The name or security ID (SID) of the domain specified is inconsistent with the approval information for this domain.
1811 The server is in use and can not be unloaded.
1812 The specified image file did not contain a resource section.
1813 The specified resource type can be found in the image file.
1814 The specified resource name can not be found in the image file.
1815 The language ID specified resource can be found in the image file.
1816 insufficient quota available to process this command.
1817 No interfaces have been registered.
1818 The remote procedure call was canceled.
1819 The connection handle does not contain all the necessary information.
1820 failed communication when calling a remote procedure.
1821 The requested authentication level is not supported.
1822 No principal name said.
1823 The error specified is not an error code Windows RPC correct.
1824 A UUID identifier that is valid only on this computer has been allocated.
1825 An error specific security package has occurred.
1826 Thread not canceled.
1827 Operation invalid handle the encoding / decoding.
1828 Incompatible version of the serializing package.
1829 Incompatible version of the RPC stub.
1830 The RPC channel object is invalid or corrupted.
1831 An invalid operation was attempted on an object given RPC channel.
1832 The version of the RPC channel is not supported.
1898 The group member was not found.
1899 Unable to create the entry of the database of the endpoint mapper.
1900 The universal unique identifier of the object (UUID) is invalid UUID.
1901 The specified time is invalid.
1902 The specified form name is invalid.
1903 The specified form size is invalid.
1904 Someone is already waiting on the descriptor specified printer.
1905 The specified printer was deleted.
1906 The printer status is not valid.
1907 The password of the user must be changed before opening a session for the first time.
1908 Unable to find a domain controller for this domain.
1909 The referenced account is currently locked and may not be possible to connect to it.
1910 The object exporter specified was not found
1911 The object specified was not found.
1912 The solver object specified.
1913 The rest of the data to be sent in the buffer request.
1914 Handle remote procedure call asynchronous invalid.
1915 Handle for asynchronous RPC call invalid for this operation.
1916 The RPC channel object has already been closed.
1917 The RPC call was completed before the channels are treated.
1918 No more data available in the RPC channel.
1919 No site name is available for this computer.
1920 The system can not access the file.
1921 The file name can not be solved by the system.
1922 The entry type is incorrect.
1923 Unable to export all objects UUID to the specified entry.
1924 Unable to export the interface to the specified entry.
1925 Unable to add the specified profile.

Tuesday, November 23, 2010

Google Backlinks: How to get backlinks for your blog from Google

Backlinks from Google plays a big role when we think of getting high rankings for our blog in search engines especially Google or we want to get high page rank for our blogs. The same thing applies to websites as well. So to gain maximum benefit from your backlinking effort, try to get backlinks from high page rank websites and don’t forget to include your main keyword that you want to get high rankings for as part of your anchor text (text linking to your website). Suppose, I want to bring SFM blog top rankings for making money online keyword on Google, so I would focus on getting links for my blog home page from high PR blogs using the making money online keyword (or using some related keywords on some occasions).

Image Credit
How to check Google Backlinks

Now let’s talk about how to check backlinks for a website on Google. I know of two ways to check backlinks in Google.

Using link command

This method can be used to check backlinks for any website available on internet. So to check backlinks for Scopeformoney.com, I have to go to google.com and type:
link:http://www.scopeformoney.com/

So this way, we can get backlinks for any website in Google. If you want to check your website backlinks on Google, just replace my blog URL with your blog or website URL. The same command applies for internal pages as well. When I tried link command for SFM blog, Google is showing 236 results against my blog. So Google is showing 236 backlinks to SFM. The only downside to this method is that, it does not include all links counted by Google; you can take it as a sample of kind of websites linking to a particular domain.

Using Google Webmaster Tool

This method will show you total backlinks to your website home page and internal pages considered by Google. But the only downside to this method is that, you can use this method to check backlinks for a website or blog on Google which you own. So to check backlinks, login into webmasters tool account, click on the website you want to check backlinks in Google. Under ‘Your site on the web’ menu, click on ‘Links to your site’, here you will see total link count, website urls linking to your website home page and internal pages as shown below:

Google webmaster tool is showing 2,638 backlinks to ScopeforMoney.com home page. This way, we can check backlinks to our website home page and internal pages and which URL’s are actually linking to our website pages. Here is the screenshot of the websites that are linking to SFM home as per Google Webmaster tool:

And if don’t have created a Google webmaster tool account for your website, create now which will take few minutes only to activate.

Do you know any other way to check Google Backlinks for a website with details like URL’s list that are linking to your website, please share in the comments section below.
Google Backlinks for SFM

Now let’s talk about backlinks for ScopeForMoney blog from Google. Google webmaster tool is showing 2,638 links against SFM. So how I generate this amount of links for my make money online blog, let’s share it with you:

Links in blogroll

I created a list of high PR and popular blogs that deals with money making, seo, affiliate marketing, blogging, and social media kind of topics. I send invitations to them and ask them if they are interested in doing blogroll exchange with my blog. Once some of them are ready for blogroll link sharing, it’s just about adding links for each other on our blogs in blogroll, footer section or within content if we are aiming at getting links within posts. Blogroll gives good amount of links to my blog because links in blogroll generally remains available throughout the website.

Guest Posting

Writing guest posts on other blogs has also given good amount of links from Google to my blog. I so far have written 30-35 guest posts on other blogs in my niche. If you also interested in getting some good backlinks for your blog in Google, don’t forget to submit your guest post to 50 blogs that allows guest blogging.

Ezine Publishing

I have been able to generate some quick backlinks for my blog in Google by submitting some articles on Ezine publishing directories. I used ti submit my articles to EzineArticles, GoArticles, ArticleBase, ArticleDashboard and AmericanChronicle.com. I keep 2-3 backlinks to my blog home page and internal pages in the signature section while submitting my articles to these Ezine publishing websites.

Discussion Forums

Working as an expert in discussion forums related to my blog niche has also helped me a lot. I have been very active on DPForum, SitePoint, WebProWorld and V7N discussion forums.

Blog Commenting

Commenting on other blogs solves lots of my motives like bringing traffic to my blog, brand building, getting more comments on my blog and most importantly getting links for my blogs. I have created a list of Dofollow blogs where our links will be actually counted and thus will help us in getting higher search engine rankings and page rank for our blogs. But when you leave comments on other blogs, never try to spam them, give some valuable feedback, suggestion or leave your questions if you have any about the topic being covered.

Internal linking

Linking pages within a website also plays a big role for building lots of authority links and rankings on Google. So I used to link to my other posts whenever they fix in naturally. Another thing I have done is added a Related Post plugin on SFM, I have some related posts to a post if some related posts exists. This way as well, I have been able to interlink my blog pages.

Using Social Bookmarking Networks

I used to submit some of posts from my blog on top Social Bookmarking websites where I’m currently active. Submitting my content on these networks gives me some instant traffic and backlinks for my blog pages in search engines including Google.

Using Blog Directories

When I started SFM blog, I submitted it to lots of blog directories. We have to enter our blog details like Title, URL, Description, Keywords etc with most of blog directories. I have created a list of Top 10 Blog Directories, where you can submit your blog for building some quality backlinks for your blog.

Wednesday, October 13, 2010

Best Keyboard Shortcuts

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system.
• Windows key + R = Run menu
This is usually followed by:
• cmd = Command Prompt
• iexplore + "web address" = Internet Explorer
• compmgmt.msc = Computer Management
• dhcpmgmt.msc = DHCP Management
• dnsmgmt.msc = DNS Management
• services.msc = Services
• eventvwr = Event Viewer
• dsa.msc = Active Directory Users and Computers
• dssite.msc = Active Directory Sites and Services
• Windows key + E = Explorer

• ALT + Tab = Switch between windows
• ALT, Space, X = Maximize window
• CTRL + Shift + Esc = Task Manager
• Windows key + Break = System properties
• Windows key + F = Search
• Windows key + D = Hide/Display all windows
• CTRL + C = copy
• CTRL + X = cut
• CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts
• [Alt] and [Esc] Switch between running applications
• [Alt] and letter Select menu item by underlined letter
• [Ctrl] and [Esc] Open Program Menu
• [Ctrl] and [F4] Close active document or group windows (does not work with some applications)
• [Alt] and [F4] Quit active application or close current window
• [Alt] and [-] Open Control menu for active document
• Ctrl] Lft., Rt. arrow Move cursor forward or back one word
• Ctrl] Up, Down arrow Move cursor forward or back one paragraph
• [F1] Open Help for active application
• Windows+M Minimize all open windows
• Shift+Windows+M Undo minimize all open windows
• Windows+F1 Open Windows Help
• Windows+Tab Cycle through the Taskbar buttons
• Windows+Break Open the System Properties dialog box



acessability shortcuts
• Right SHIFT for eight seconds........ Switch FilterKeys on and off.
• Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.
• Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.
• SHIFT....... five times Switch StickyKeys on and off.
• NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts
• END....... Display the bottom of the active window.
• HOME....... Display the top of the active window.
• NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.
• NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.
• NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.
• LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.
• RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




Type the following commands in your Run Box (Windows Key + R) or Start Run
• devmgmt.msc = Device Manager
• msinfo32 = System Information
• cleanmgr = Disk Cleanup
• ntbackup = Backup or Restore Wizard (Windows Backup Utility)
• mmc = Microsoft Management Console
• excel = Microsoft Excel (If Installed)
• msaccess = Microsoft Access (If Installed)
• powerpnt = Microsoft PowerPoint (If Installed)
• winword = Microsoft Word (If Installed)
• frontpg = Microsoft FrontPage (If Installed)
• notepad = Notepad
• wordpad = WordPad
• calc = Calculator
• msmsgs = Windows Messenger
• mspaint = Microsoft Paint
• wmplayer = Windows Media Player
• rstrui = System Restore
• netscp6 = Netscape 6.x
• netscp = Netscape 7.x
• netscape = Netscape 4.x
• waol = America Online
• control = Opens the Control Panel
• control printers = Opens the Printers Dialog
• internetbrowser

type in u're adress "google", then press [Right CTRL] and [Enter]
add www. and .com to word and go to it


For Windows XP:
• Copy. CTRL+C
• Cut. CTRL+X
• Paste. CTRL+V
• Undo. CTRL+Z
• Delete. DELETE
• Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
• Copy selected item. CTRL while dragging an item
• Create shortcut to selected item. CTRL+SHIFT while dragging an item
• Rename selected item. F2
• Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
• Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
• Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
• Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
• Highlight a block of text. CTRL+SHIFT with any of the arrow keys
• Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
• Select all. CTRL+A
• Search for a file or folder. F3
• View properties for the selected item. ALT+ENTER
• Close the active item, or quit the active program. ALT+F4
• Opens the shortcut menu for the active window. ALT+SPACEBAR
• Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
• Switch between open items. ALT+TAB
• Cycle through items in the order they were opened. ALT+ESC
• Cycle through screen elements in a window or on the desktop. F6
• Display the Address bar list in My Computer or Windows Explorer. F4
• Display the shortcut menu for the selected item. SHIFT+F10
• Display the System menu for the active window. ALT+SPACEBAR
• Display the Start menu. CTRL+ESC
• Display the corresponding menu. ALT+Underlined letter in a menu name
• Carry out the corresponding command. Underlined letter in a command name on an open menu
• Activate the menu bar in the active program. F10
• Open the next menu to the right, or open a submenu. RIGHT ARROW
• Open the next menu to the left, or close a submenu. LEFT ARROW
• Refresh the active window. F5
• View the folder one level up in My Computer or Windows Explorer. BACKSPACE
• Cancel the current task. ESC
• SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:
• To Press
• Move forward through tabs. CTRL+TAB
• Move backward through tabs. CTRL+SHIFT+TAB
• Move forward through options. TAB
• Move backward through options. SHIFT+TAB
• Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
• Carry out the command for the active option or button. ENTER
• Select or clear the check box if the active option is a check box. SPACEBAR
• Select a button if the active option is a group of option buttons. Arrow keys
• Display Help. F1
• Display the items in the active list. F4
• Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:

• Display or hide the Start menu. WIN Key
• Display the System Properties dialog box. WIN Key+BREAK
• Show the desktop. WIN Key+D
• Minimize all windows. WIN Key+M
• Restores minimized windows. WIN Key+Shift+M
• Open My Computer. WIN Key+E
• Search for a file or folder. WIN Key+F
• Search for computers. CTRL+WIN Key+F
• Display Windows Help. WIN Key+F1
• Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
• Open the Run dialog box. WIN Key+R
• Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:
• Switch FilterKeys on and off. Right SHIFT for eight seconds
• Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
• Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
• Switch StickyKeys on and off. SHIFT five times
• Switch ToggleKeys on and off. NUM LOCK for five seconds
• Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:

• Display the bottom of the active window. END
• Display the top of the active window. HOME
• Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
• Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
• Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
• Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
• Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW

Wednesday, September 8, 2010

AUTOMATIC FREE BLOG PUBLISHING SOFTWARE

Many bloggers email me about any best automatic blog publishing software available in internet. In this post, I will give small details of some of the popular automatic blogging software which me and my friends have used at least once. You may try any one of this and automate your blog publishing. Select any one of these software and download to your computer. Please be careful that you have a valid antivirus with you. Most of these software work with adding the blog account for automatic publishing. In this case, an antivirus can protect your account details from hackers.

( All links checked on 30/04/2010)

FREE BLOG PUBLISHING ScribeFire – Download and install this plugin for your Google Chrome browser and Mozilla Firefox. You can install it quite easily and easy draft options. I am using this for quick uploading of blog posts.

Windows Live writer – Download this software and install in your computer. You can publish posts to many blogs from single platform , easy alignment of blog posts, videos posting, picture formatting facilities, easy linking options and much more.I am using this as my automatic blogging tool.

BlogDesk – Download another free automatic blog publishing software that is optimized for the blogging platforms like WordPress, MovableType, Drupal, Serendipity and Expression Engine.

W.bloggar – View and Download this Post and Template editor, with several features and resources that is compatible with most of the weblog systems I have not yet tried this software. But my friends said good opinion about this.

There are many other software also available in internet. If you have good experience about any other software, kindly let us know so that we can include it in the next post.

21 WAYS TO MAKE MONEY FOR A BEGINNER BLOGGER

Most people start blog to make some money with in a short time. Here in this post we are suggesting some useful tips for a beginner blogger who struggle much to make money out of blog. Please remember that there is no shortcut to make money from blogging. Being a beginner, you had to follow some discipline while posting, marketing, link building and making relationship with other bloggers.

If you have any more suggestions please share it with us so that we can include in our next post.

TIP: TURN ADVERTISEMENTS AS YOUR PRIMARY INCOME SOURCE

MAKE MONEY BLOG

Take part in contests and competitions – There are lot of competitions going on in blogosphere where you can take part free of cost and earn money quickly. Just visit this page to know what are the latest contests available for a blogger to take part. Free Contests for bloggers

Include an affiliate program – There are many affiliate programs available in internet. When you display an advertisement and a visitor of your blog follows that link. You will get paid when a sale happened through that referred link. Top Affiliate programs are Google Affiliate Network and Amazon Associates

Join any PPC programs - Pay Per Click or PPC is the most popular advertising program in which ads are placed on your blog and you are paid when ever your visitors click on IT. Your income will automatically increase when the traffic to your blog also increases. Major PPC program I suggest is Adsense

Join any CPM programs - Cost Per Thousand impressions is another easy method of monetizing a blog. The revenue generated by the impressions made by an advertisement. In this method, there is no need of any click by visitors in your site. As there are more visitors, then the impressions will be more and you will get more money. Top CPM programs are Adsense, valueclickmedia.com, tribalfusion.com

Join any Link Money programs – The links in your blog can earn you money. You had to shorten the URL links that you are posting in your blog, according to the program. When visitors click on this links, then they will be redirected to destination URL with displaying an advertisement. An easy way to make money especially in porn blogs, where visitors aggressively click on most links. Major link money programs are Linkbee

Join any PPP program - PPP or pay per play is a new advertising method in which the reader hears an audio advertisement for few seconds when they open your blog or website. This will give you a commission and this have an advantage of getting paid for each visitor to your blog or website. SellingPPP , NetAudio are such websites. Please take care that if you are using any free blogging services, then your blog hosting company approves this method or not.

Join Twitter and monetize it – You must open a twitter account when ever you start a blog. Then monetize a twitter using different twitter money programs. Major Twitter money making programs are Revtweet, SponsoredTweets

Find more blogging jobs – There are many companies in internet where small and medium freelance jobs are offered. Find an appropriate one for you and start earning money from that. Want to know new blogging jobs? Click here to know more jobs which is hourly updated.

Display advertisements - Keep two or three or four 125 x 125 area in your blog to display advertisements. Offer direct advertisement display opportunity in your blog. Being a beginner, give only low advertisement rates or provide a negotiable rates. Once your blog becomes popular, then you can ask for a standard rate.

Join Money Widgets – You had to embed a widget into your sidebar that displays some advertisements. Your income will increase as you will get high value advertisements. Major Money widgets are thenewsroom.com, widgetbucks.com, scratchback.com

Join any Review sites – There are many sites that gives you money when you write any post about a product of an advertiser referred by that company. SponsoredReviews, payperpost

Ask for Donations - You should add a PayPal donation button to your blogs asking readers to make a monetary donation to keep the blog alive, by asking "If you like this blog, why not buy me a doughnut?"

Join any Text Link Ads — As the name indicates, text based link advertisements which will help you to earn a lot. Major programs are Text-Link-Ads and Text-Link-Brokers

Join any Feed Advertisements – Before proceeding to this, burn your feed using Feedburner. Then monetize your feed using Google Adsense or Bidvertiser. Click here to know more

Join any Paid Surveys and Polls – Get paid when you fill out surveys and polls or place them on your blog for others to fill out and earn money. Beware of scammers in this area.

Offer Tutorials through your blog - Offer tutorials of latest software in the market, or any other subject of your expertise and collect money from the clients. Be sure to provide excellent service so that the customer will not deviate from you

Offer to work as a consultant through your blog – Blog readers consider you as an expert in the topic you are handling. So it will be useful if you act as a consultant of the subject with negligible fees.

Offer to write in other blogs - You should consider writing in other blogs, because this will help to increase traffic to your blog. If you are confident to write more then you should consider receiving a payment for writing in other blogs.

Offer to write e-books - Write e-books and sell it through your blog

Convert your blog into a book – This is an interesting way to make money. You can convert your blog into a book by yourself and then sell it through various channels like Amazon, Ebay etc. Want to know more? Click here

Sell your blog – Still unsuccessful in making money from blog. This is the last option. I suggest you to sell it to others. Yes, if you use this step, blogging is not your cup of tea.

How We Got a Link from CNN and Drove Loads of Traffic with Infographics

Unless you've been living in a cave, you know the flavor of the month for link baiting is INFOGRAPHICS!!! They're everywhere, and many major online publications (Huff Post, Fast Company, BoingBoing, Mashable, etc) make it a habit of running cool infographics each day. What's more, infographics hit the front pages of social giants like Digg, Reddit, StumbleUpon on a regular basis.

Now even though we may be a bit late to the infographic link bait and social traffic bonanza party, we still wanted an invite. So we decided it was time to roll out our own infographics link bait campaign. After sitting on the sidelines and seeing what works (and what doesn’t), we felt we had a pretty good idea how to create something that would go viral. So we launched two graphics that were wildly successful and completely shattered our expectations for links, traffic, leads and brand exposure.

As we've done in the past--like when we got a link from the New York Times--we enjoy sharing the process with our readers though a comprehensive case study. These marketing wins always provide valuable insight and lessons for us, and hopefully provide some useful takeaways for others as well.

Step One: Create the Bait

The first step in launching an infographic campaign (with the potential to go viral) is to select a great concept or topic. Successful infographics topics can run the gamut, from political, to financial, to offbeat, etc. But whatever the topic, it must be compelling, informative and even provocative. And like really great link bait, infographics that go viral seem to evoke some sort of emotion, be it humor, fear, lust, shock, empathy, etc.

Infographic Topic Selection

For our two infographics, we began by brainstorming a list of potential topics and we narrowed it down to a select few that we felt had the best chance to be killer link bait and really strike a chord with people. The final topics we selected for our infographics were "Internet privacy" and “Google flops.” We saw these as the strong ideas for a few reasons.

Internet Privacy Topic

  • People love to spy: Being an Internet marketing software provider, we've learned that people love spying (especially on their competitors)
  • People don't like being spied on: On the flipside, as much as people love to spy, they hate being spied on and having their privacy violated

Google Flops Topic

  • People hate Google: Success breeds hatred and jealously and Google stirs up a lot of vitriol around the Web
  • People secretly enjoy "schadenfreude": The concept of schadenfreude is German and means “pleasure derived from the misfortunes of others,” and the bigger the success the more pleasure taken in the failure, so Google is a great candidate

In addition, both concepts are germane to our niche. So any links we'd acquire from the infographics would have some degree of relevancy for SEO/link building purposes.

To create our infographics, we used two separate design resources. One was Warlock Media. Chris Angus runs an SEO company called Warlock Media - we found Chris by asking for recommendations from the SEO Book SEO training community (NOTE: if you don't have a trusted colleague with a good reference for a vendor, leveraging a respected community like the one at SEO Book or the SEO Dojo SEO training community are great ways to identify quality resources). Given Chris’s extensive experience with link baiting, viral marketing and running successful infographics campaigns, we wanted to pick his brain on those subjects for this case study. So throughout this article, Chris has provided some expert commentary.

Here's what Chris Angus had to say about infographic topic selection.

"When choosing a concept, we pick ideas that are topical while being able to illustrate large numbers, comparisons and disparities. The essence of an infographic is to show numbers in a visual way which would otherwise be hard to really understand, as they are usually off the scale of what we can comprehend. Of course, the concept needs to be interesting and entertaining, while the data creates the story and path which visitors will follow from start to end; hopefully enjoying themselves along the way!"

"Try to get an interesting/shocking/quirky angle to the piece. There's no point drafting an infographic on, say, how many people in the US own cats - nobody cares and it certainly isn't groundbreaking. Instead, how many cats in the US have feline AIDS? What implications does this have? How many get put down and what happens to all the corpses?"

In short, selecting a great topic was a critical first step in creating a great infographic, link bait piece that ended up getting shared thousands upon thousands of times across the Web. Because no matter how slick the graphics were, without an interesting topic, we knew our infographics would wither and die on the link bait vine.

Infographic Concept Research

Obviously, the research phase of your infographic design is key, since you want the data to be factually accurate.

  • Google Flops Infographic: We did all of our own research. Most of the data we gathered was readily available since Google’s failures are well documented (and celebrated) across the Web.
  • Internet Privacy Infographic: Warlock Media did all the leg work and topic research, which was fantastic. All we had to do was vet the data that Warlock gathered to ensure it was accurate, compelling and met our quality standards. As a side note, we were really impressed by the level of detail and quality of the research and data Warlock collected and how they kept us in the loop every step of the way.

For more insight on data collection, I'll let Chris from Warlock talk about how they conduct research for infographics.

"The research element of any given project is a massive task, but there are numerous things which are taken into consideration while carrying it out. It's not just a case of gathering as much information as possible on a given subject. There's much more to it. For example, while exploring the data available you have to nurture the narrative of the finished product as it emerges and keep an eye out for what will work visually (and equally, what won't!). It's not uncommon for the infographic to suddenly go in a completely different direction halfway through the research process. *ahem* Don't be afraid to scrap an idea. While in the initial research phase, your topic might seem like the most marvelous piece ever conceived by a human mind, but you have to recognize when you're flogging a dead horse even if that point comes two days into researching. Usually, with a good eye you can spot this a mile off, but sometimes it's inevitable."

"In terms of getting the information itself, it's no good just copying and pasting from Wikipedia. When you're working at this kind of accuracy level, it is scary how inaccurate Wikipedia can be. I'm not slamming Wikipedia. It's great. But I don't understand why some people in the field rely on flaky sources when it's so easy to call a University or news source and say, "Hi, can I just verify something?"It's astounding how much extra info you can dig up once you go beyond Google et al"."

Infographic Design Strategy

Along with topic selection and research, the design stage of creating an infographic is a critical juncture. Great infographics keep the user engaged from start to finish. So the concept must not only serve as a visual journey, but one that's informative and entertaining as well. Once again, I’ll let infographic expert Chris Angus give his thoughts on what it takes to design a successful infographic.

"A strong title, illustrative header section and recognizable theme are very important when trying to grab a user's attention. With the privacy infographic for WordStream, we went for the classic Orwellian propaganda poster vibe as it not only provided us with an opportunity for an attention grabbing "Big Brother" header graphic (nothing attracts a person's attention like a human face or eye), but also a great color scheme to use throughout."

"The eye itself also references the All Seeing Eye (or Eye of Providence), on the American Dollar bill which has a long history of being interpreted of representing the omnipotent eye of God watching over mankind and is also related to the fabled Free Masons, a great subject for conspiracy theorists who would already have an interest in Internet Privacy issues. The subtle old poster texture and small additions like the CCTV cameras and the American Eagle (freedom) add further relevant substance to the artwork."

"Wherever possible we communicated the statistics in as simple and visual way as possible. It has to be easy to scan down the infographic and get the basic idea with as little effort as possible. If then the viewer is still interested there needs to be enough textual information for them to learn more about the subject."

"We placed Facebook at the top as it's clearly the most popular social network and conveniently has made drastic changes to its default privacy settings over the past few years, and quickly followed with another huge and recognizable brand: Google."

"The final section makes the reader aware of how these privacy issues online are merely a reflection of more intrusive policies in the real world. Therefore it ends on a dramatic note and color-wise is designed in such a way to reference the illustration top of the infographic, offering sufficient closure to the reader’s journey through the statistics."

So by now, I'm sure you're dying to see the infographics we came up with. Well, here they are:

Step Two: Promoting the Infographic

One we created our infographic link bait, it was time to get to work promoting it. It would be wonderful if we lived in a world where great content just bubbled to the top by sheer virtue of being "great." But we don't and it doesn’t. So to get some major league visibility, we knew we'd have to knuckle down and "spread the word" aggressively.

Prospecting for Outreach Candidates

A big part of our infographics promotional strategy was mining for and reaching out to prospects. Crafting a targeted outreach strategy is a necessary component of any online marketing campaign, be it link bait, content placement, social baiting, etc. When compiling our "pitch lists," typically we're looking for websites, bloggers, media types that are:

  • Highly relevant - to our viral marketing concept (NOTE: like all facets of SEM, from link building to landing page content development, being highly relevant leads to greater success)
  • Highly influential - and run prominent, authoritative, heavily trafficked websites, news outlets or blogs.

One of the most effective methods for finding outreach prospects is to run queries in Google and Google blog search for sites and blogs that are relevant to your viral marketing/promotional concept.

Using the "Internet privacy" topic from our infographic as an example, we discovered new prospects by running a series of queries such as:

  • [Internet privacy]
  • [online privacy]
  • Internet privacy] blog
  • [online privacy] blog
  • [Internet privacy] article
  • [online privacy] article
  • [Internet privacy] protection
  • [online privacy] protection

By the way, if you're ever at a loss for keywords to plug in alongside your concept seed terms, I'd recommend you use our keyword tool to get ideas. You can also use the Link Building Query Generator created by Garrett French and Ben Willis over at Ontolo, which works great for infographic promotional queries as well.

Reaching Out to Prospects

To connect with influencers, it's important to obtain their personal email address and not ping them through some info@ black hole. Bloggers and influencers get tons email requests and link begs each day, so to stand out and make an impact you MUST distinguish yourself from the pack. I can't stress this enough. And emailing them directly with personalized notes is a very effective approach.

To find the personal contact info of thought leaders, check out this post I wrote on How to Find Anybody's Email Address.

Promoting Your Content/Infographic on Social Media

Fortunately, our infographics went "front page" on Digg, Reddit and Stumbleupon, which helped drive a boatload of traffic and contributed to the viral "chain reaction" effect we experienced, as front page visibility on these social bookmarking sites exposed us to even more potential bloggers and site owners. We did a lot of outreach for social, plugged away aggressively on Twitter and Facebook as well, and leaned on our friends and connections we've made in our space to help with the social pimping.

For the Internet Privacy Infographic, Chris and Warlock Media did a ton of the promotion, which they offer as part of their infographics design package. Here's Chris commenting on promoting infographics and what steps they take to try and catapult something to viral status.

"The first step of the promotion is submitting the infographic to Digg. Popular social networks are a fantastic tool to get some traction on an infographic and getting like minded people talking about what you've created. We've been using Digg for many years, and needless to say, have a fair chance at cracking the front page. Once something hits the front page of Digg it should propagate around the other networks naturally as other regular people will take the story from Digg and submit it to most of the other social networks for you. If the content is excellent, there is a fair chance it'll become popular content naturally at some of the other places it finds itself. At the moment, we focus on just a few of the biggest networks which include: Digg, Facebook, Twitter and sometimes some of the slightly smaller networks like: Reddit, Delicious and StumbleUpon depending on how things are shaping up in terms of exposure."

"Social traffic is fairly low quality, but if you get enough traffic, a bunch of people should link to whatever they have seen. However, we're seeing a sharp downward trend in the amount of traffic and links we're getting from the traditional sites; especially Digg. It wasn't unusual to get high 5 figures or low 6 figures in terms of visits if the content went popular as well as a few dozen bloggers linking to your content, nowadays it's far, far less and you're only getting a handful of links from the blogosphere."

"The absolute best way to get your infographic flying is to get an authority blogger in your niche to feature it or talk about it. Once a person of authority gives it his or her blessing, people will naturally accept it and it will spread like wildfire. While everyone would love a mention by a superstar (like Seth Godin), it’s probably not going to happen. I would advise talking to a few slightly less famous people whom are likely to help out if they find what you’ve done interesting."

"Viral marketing is a strange beast and the best analogy I have is to compare it riding a bicycle. It needs to have enough energy to keep moving forward and keep going, if there isn't enough initial energy it’s not going to go anywhere and you’ll fall off your proverbial bicycle. What I’m trying to explain, is you need to get to “critical mass”, once you’ve got there, things should run pretty smoothly, however, if you don’t quite get enough people visiting your infographic or content initially, it’s likely that it’s not going to work. Ever."

Step Three: Evaluate the Infographics ROI

We're a pretty "metrics driven" marketing department, so before launching any sort of marketing campaign, we always establish some success metrics, or KPIs (key performance indicators). By establishing these types of measurable objectives, we can easily determine whether or not:

  • The campaign was a success or a failure (money and time spent vs ROI...has this been a smart use of our resources?)
  • The campaign is worth pursuing again (or should we move on to find another "big idea" with greater potential?)

Our Infographics Campaign KPIs

Our goals from the outset (per infographic) were to:

  • Get on the front page of at least one major social bookmarking sites
  • Amass at least 20 quality links from NEW, authoritative domains (PR4 or higher)
  • Drive at least 75 new leads

In sum, both infographics campaigns were huge successes. We completely crushed our goals and far exceeded even our wildest expectations. To you a better idea what kind of success we enjoyed, let's take a look at the highlights.

Infographic Metrics: Social Media Activity

Despite all the hits we got from blogs and media websites, social media sites sent the vast majority of traffic.

Half of the top ten referrers for the infographics campaign came from big social media websites Stumbleupon, Digg, Reddit, Facebook and Twitter. And overall, social media sites drove roughly 75% of all the traffic, which is pretty astounding. This data should be a wake-up call to marketer or site owner out there who has YET to integrate a social media strategy into their marketing efforts.

Once it hit the front page of Digg, Reddit and Stumbleupon, that exposure set off a chain reaction and spurred a spike in activity on Facebook and Twitter. As of writing this case study, social mention totals for both infographics were almost 2K "likes" on Facebook and 1200 Tweets.

Also, Chris mentioned it earlier, but it's worth noting again that most of the traffic you get from the social sites (particularly the bookmarking/voting sites like Digg, Reddit and Stumbleupon) is of low value because:

  • Bounce rates are high
  • Additional page views are anemic
  • Conversion rates are notoriously poor or nonexistent
  • Traffic dies almost immediately once you move off the front page

That being said, that's not the objective in my opinion, at least directly anyway. Going "front page" on social voting sites is meant to generate exposure on a mass scale to a large audience of people who are prone to sharing. Any sales you get from social exposure are likely indirect and tied more to the links, citations and brand signals you earn, which improve your organic search presence and overall brand recognition.

Infographic Metrics: Traffic, Links and Conversions Data

Traffic Data: The referred traffic we received from Digg and other sites was swift and sudden. Check out this spike, which catapulted our visits by 2455.556 % in one day from landing on the front page of Digg:

Spike in traffic from landing on the front page of Digg

Given the residual traffic we're still seeing from the all the sites that have embedded/linked to the graphics coupled with a 15% bump in organic traffic (the flood of links, citations and brand signals has contributed to a temporal rankings boost, part of which will be permanent, I suspect). After the dust settles, I expect we'll level off to a new normal somewhere in the middle. So we can attribute about a 25% overall increase in traffic from the infographics.

By the way, here's a chart of how our overall traffic is trending since launching the infographics:

Total traffic numbers during the infographics link bait campaign

Link Totals: The infographics earned close to 3500 links, with 79 of those links coming from authoritative sites of PR4 or higher (with more still rolling in every day). BTW, yes, I'm using Toolbar PageRank as a KPI. Yes, I know it's for "entertainment purposes only." So prepare to be "entertained." Here’s the breakdown of link data:

Link data for our infographic case study

When you compare the quantity and quality of links we earned, the infographics campaign vastly outperformed all of our previous link bait campaigns.

Placement highlights include:

  • CNN.com
  • Fortune.com
  • Techcrunch (US and Japan)
  • Wikipedia
  • Blogoscoped
  • Huffington Post
  • Epic.org
  • Privacy.org

and many, many more...

One of the key benefits of these infographics links is they compelled sites to link to us who would never have under normal circumstances. For example, CNN.com isn't going to link to us because we just created a new keyword tool, and there's nothing newsworthy enough about our company that warrants a story on the home page of Fortune.com. However, by creating two compelling infographics, we were able to attract unique links from some of the most prominent and trusted news resources on the Web.

Leads and Conversions: So far, we've attributed roughly hundreds of leads to the infographics, which have converted into actual sales.

Take Aways: What We Learned During This Infographics Marketing Campaign

More on Topic Selection and Relevancy

Now, even though we wanted the concepts for our infographics to have some degree of relevancy, we didn’t want them to be too narrowly focused. We knew making them too "niche specific" would mean that they'd only appeal to a very narrow group of people, which would make it far more difficult for the bait to go viral. Let’s face it, an infographic on something as esoteric as "link building" isn’t going to get us in CNN.com.

So when designing your own infographic, you definitely want relevancy, but you also want it to have universal appeal (if possible), so that it engages a broad audience and earns wider distribution. The more people that share it, the more coverage, links and citations you'll earn

Topic is Key, But so is "Theme"

A big part of the design stage is adopting a cool "theme." In my mind, the theme of your infographic is different than the concept/topic, and theme as well as concept are both important to success. As Chris said, the theme he chose for the Internet Privacy Infographic was one of Big Brother and Communist propaganda. And for the Google Flops Infographic, our designer Carmine Zinni came up with the spooky graveyard theme to celebrate Google's list of failures. Had we just published a list of Google’s failures in pictorial, it wouldn’t have had the same impact and gone viral. But the graveyard theme was really clever, which played a major role in helping it go viral.

On the Ripple Effect of Going Viral

What’s interesting to note is how these social voting sites like Stumbleupon, Digg and Redditt feed off one another. For example, the Google Flops Infographic was sort of a late bloomer and met with lukewarm response when initially launched. Following outreach, it did get a few blog mentions, but no major play on the big social bookmarking sites. As a result, it seemed to be dying a slow death.

Then, we did a second round of outreach and suddenly it went hot on Stumbleupon, which set off a chain reaction and it got hot on Reddit. Landing on the front page of both sites breathed new life into a campaign that had one foot in the grave. You see, social platforms like Digg, Reddit and Stumbleupon serve as a "showroom window," and hitting the front page will expose your content to so many fresh eyes, including an audience of Web mavens (ie webmasters, bloggers, journalists), which leads to even more coverage and additional salvos of activity.

So after going hot on Reddit, we started seeing referred traffic from all over the world and subsequently landed on the home page of a big French news site. This prompted the infographic to get featured in a host of additional French blogs. Then it was published on CNN.com, which prompted Techcrunch to blog about it and to feature it in Techcrunch Japan too, which then exposed it to numerous Japanese news sites, which lead to an explosion of mentions and links on Japanese blogs.

The whole thing was like a big game of telephone. Hence, a viral marketing campaign was born.

And the most satisfying part of all, for me anyway, was watching as both infographics went viral in front of our eyes, and we were smack in the middle of all the action.