Benefits of Online Marketing
Benefits to Consumers:
(1) Convenient— customers can shop 24 hours a day from anywhere without going to the store physically.

(2) Interactive & Immediate— consumers can interact with the seller's site to find the information, products,or services they desire, then order or download them on the spot.

Benefits to Marketers:

(1) Customer Relationship Building— companies can interact with customers to learn more about their needs and to build customer databases.

(2) Reduce Costs & Increase Efficiency— avoid the expense of maintaining a physical store, costs of rent,insurance, and utilities. Digital catalogs cost less to produce than printing and mailing paper catalogs.

(3) Greater Flexibility— unlike a paper catalog whose products and prices are fixed until the next printing,an online catalog can be adjusted daily or even hourly, adapting product availability, prices, andpromotions to match changing market conditions.

(4) Access to Global Markets— The Internet is a global medium, which allows buyers and sellers to click from one country to another in seconds.

Email Etiquette - The bestway to email someone
A company needs to implement etiquette rules for the following three reasons:

* Professionalism: by using proper email language your company will convey a professional image.

* Efficiency: emails that get to the point are much more effective than poorly worded emails.

* Protection from liability: employee awareness of email risks will protect your company from costly law suits.

What are the etiquette rules?

There are many etiquette guides and many different etiquette rules. Some rules will differ according to the nature of your business and the corporate culture. Below we list what we consider as the 32 most important email etiquette rules that apply to nearly all companies.

32 most important email etiquette tips:

1. Be concise and to the point
2. Answer all questions, and pre-empt further questions
3. Use proper spelling, grammar & punctuation
4. Make it personal
5. Use templates for frequently used responses
6. Answer swiftly
7. Do not attach unnecessary files
8. Use proper structure & layout
9. Do not overuse the high priority option
10. Do not write in CAPITALS
11. Don't leave out the message thread
12. Add disclaimers to your emails
13. Read the email before you send it
14. Do not overuse Reply to All
15. Mailings > use the bcc: field or do a mail merge
16. Take care with abbreviations and emoticons
17. Be careful with formatting
18. Take care with rich text and HTML messages
19. Do not forward chain letters
20. Do not request delivery and read receipts
21. Do not ask to recall a message.
22. Do not copy a message or attachment without permission
23. Do not use email to discuss confidential information
24. Use a meaningful subject
25. Use active instead of passive
26. Avoid using URGENT and IMPORTANT
27. Avoid long sentences
28. Don't send or forward emails containing libelous, defamatory, offensive, racist or obscene remarks
29. Don't forward virus hoaxes and chain letters
30. Keep your language gender neutral
31. Don't reply to spam
32. Use cc: field sparingly

Protect Your Computer

Simply put, firewall software does its best to monitor the information traveling between the Internet and your computer. It is an effective tool in preventing unwanted data from finding its way from the Internet to your personal computer.

While a number of software firewall applications are available, for the sake of simplicity we recommend using the built-in firewall provided with Windows XP Service Pack 2. If your version of XP has not been upgraded to SP2, we recommend visiting http://www.windowsupdate.com before proceeding with this guide. To find out which service pack you are running, right-click on the My Computer icon on your desktop and select Properties.

The Windows Firewall can be turned on and off through the Security Center, which is in the control panel. To access the control panel, click on the Start menu in the lower left-hand corner of the screen.
IP setting

The following is a suggestion we make for most students, but it is not required. If you use services such as remote desktop, you may want to skip this section. For most computer users, however, this step will increase your security.

1. Right-click on My Network Places and select Properties.
2. Right-click on Local Area Connection and select Properties.
3. Scroll down to and double-click on Internet Protocol (TCP/IP).
4. Click Advanced.
5. Select the DNS tab at the top of the Advanced window.
6. Uncheck the box titled Register This Connection’s Addresses in DNS.
7. Select the WINS tab at the top of the window.
8. Uncheck the box titled Enable LMHOSTS Lookup.
9. Select Disable NetBIOS over TCP/IP.
10. Click OK three times and close the Network Connections window. 11. Reboot your computer.

Conscientious downloading

Think before you download. The majority of Internet threats are not clever enough to sneak onto your computer without you opening the door for them. These simple rules can help prevent you from welcoming unwanted downloads.

* Never open email attachments from people you don’t know.

* Never open suspicious and unexpected email attachments, even from people you DO know.

* When pop-up advertisements appear on your screen, do not click on them or follow their instructions. Be especially wary of pop-ups warning you about viruses or spyware on your system. If it’s not coming from your anti-virus program, it’s probably not valid.

* Do not use file-sharing software. (Kazaa, eDonkey, Limewire …). Not only is it illegal to download and share music and movies you do not own, they very often are packed with viruses and spyware. For more information about problems with file-sharing software, visit our File-sharing and p2p page.

* Do not use file-sharing software

* When downloading shareware and freeware, try to download from reliable and well-known sites such as www.download.com. Be cautious of less reputable sites or ones you haven't previously used.

Logon password
An important part of ensuring security on a Windows XP computer is to make sure you have an administrator password set. We also recommend keeping passwords on any other accounts as well. This not only provides local security for your machine, it also makes unwanted remote connections more difficult.

To check, change or create account passwords in Windows XP, all you need to do is access the User Accounts control panel. This can be found by clicking on the Start menu, then selecting Control Panel.

Optimize for Performance
Remove temp files

Windows uses temp files to perform various tasks, but many remain long after they're necessary. Deleting them makes more space available on your hard drive. Follow these steps to free up the space:

1. Click on My Computer, then right-click on the hard drive and select Properties.
2. In the General tab, click on Disk Cleanup. A new window will open with check marks next to various sections including Temporary Internet Files, Temporary Files and Recycle Bin.
3. You can check all of these, but we recommend that any options to compress files should be unchecked. Compressing files may save some space, but it will slow your computer down significantly.
4. Click OK, then confirm that you want to delete them.

Recycling bin

By default, the Recycling Bin can be up to 10 percent of your available hard drive space. With the size of today's hard drives, this is far more than necessary. Follow the steps below to resize your Recycling Bin.

1. Right-click on the Recycle Bin on your desktop.
2. Select Properties.
3. Drag the slider to 2 percent.
4. Click Apply.
5. Click OK.

Internet Explorer optimization

Decreasing the size of your Internet Explorer cache will help keep it from becoming a problem if you don't frequently clean it out manually. We recommend setting it to around 50 Mb, but you can set it as high or low as you like. To change the size, follow these steps:

1. Open Internet Explorer.
2. Click on the Tools menu and select Internet Options.
3. Under Temporary Internet Files click Settings.
4. Adjust the slider or manually enter a size in megabytes.
5. Click OK.

Mozilla Firefox optimization

Decreasing the size of your Firefox cache will help keep it from becoming a problem if you do not frequently clean it out manually. We recommend setting it to around 50 Mb, but you can set it as high or low as you like. To change the size, follow these steps:

1. Open Firefox.
2. Click on the Tools menu and Options.
3. Select the Privacy section and click on the Cache tab.
4. Enter a size in megabytes.
5. Click OK.

Simplify Windows GUI settings

Aesthetic features such as shadowed folders, fade effects and animations are unnecessary and can slow your computer. Follow the steps below to turn off these settings.

1. Right-click on My Computer and select Properties.
2. Select the Advanced tab.
3. In the Performance section, click Settings.
4. Uncheck all boxes except the bottom three. Note: We recommend leaving only the bottom three options checked, but you can change this to suit your needs.
5. Click Apply.
6. Click OK.

Viruses and Trojans, How to protect your assets
Mihu Solutions is committed to you to protect their computers and information from viruses and spyware. Follow the instructions below to clean up your computer.

First you'll need to disable Windows System Restore. Windows XP uses a restore utility that automatically backs up selected system files. This means an infected file could be stored there as a backup file, and removal programs will not be able to delete it. Disabling the System Restore Utility will allow you to remove the infected files from the restore location.

We also recommend that you boot your computer into Safe Mode while you perform these cleaning operations. Do this by clicking repeatedly on the F8 key when you first start your computer. If Windows begins to load, you did not hit F8 in time. When done correctly, you'll see a boot menu. We suggest using Safe Mode with Networking so you still have Internet access to update programs while scanning.
Disable System Restore

1. Right-click My Computer.
2. Click Properties.
3. Click on the System Restore tab.
4. Check Turn off System Restore on All Drives.
5. Click OK.
6. Click Yes at the confirmation window.
7. You will be prompted to restart the computer. Click Yes.

NOTE: You should re-enable the Restore Utility after cleaning up your computer. Follow the steps above and remove the check mark next to Turn off System Restore on All Drives.

Scan with Stinger

Stinger is a utility that detects and removes specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist users when dealing with an infected system.

Download Stinger http://vil.nai.com/vil/stinger/polipstinger.asp and read the FAQs at the bottom of the download page.

By default, Stinger will repair all infected files found.

Scan with McAfee VirusScan

IMPORTANT! Anti-virus programs usually conflict with each other! Only one anti-virus program can run on your computer at any given time! If you already have an anti-virus program installed on your computer, you MUST uninstall it before you install McAfee VirusScan. Removal tools such as Stinger used above are not considered anti-virus software, and will not cause a problem.

Install McAfee and restart your computer

You'll also need to update your virus definitions. This is important because new viruses come out all the time, and they will only be detected by anti-virus software if you keep its files up to date.

To update your virus definitions:

In the lower right-hand corner of your screen, right-click on the McAfee icon, then click Update Now.
Next, scan for viruses

1. Right-click on McAfee icon again.
2. Click On-Demand Scan.
3. Select All fixed drives.
4. Click Start to run a full scan.

For the latest information visit the McAfee Virus Information page.

Clean up spyware

No one program will find all spyware problems and fix them for you. For best results, run a scan with all programs suggested here for best results.
Scan with Spybot

Download Spybot here:

At the download screen, choose to save the tool to the desktop.
Install Spybot

1. Locate the file you just downloaded and double-click on it to install the program.
2. During installation check the box to Download updates immediately.
3. Accept the rest of the default settings and click Finish when installation completes.

Run Update Wizard

Follow the instructions to complete the Wizard window that pops up after installation.
Run a full scan

1. Click on Search & Destroy.
2. Then Check for problems.

Scan with AdAware

Download AdAware here http://www.lavasoftusa.com/software/adaware/

Follow the instructions on the Lavasoft USA website to download the free version of AdAware.
Install AdAware

1. Locate the file you just downloaded and double-click on it to install the program.
2. Accept the default settings and click the checkboxes to have AdAware automatically update and run a full system scan when installation completes.

Updating AdAware

Before starting any scan, a button called Check for Updates will appear. Perform this check frequently and install the newest definitions.
Scanning with AdAware

After updating as described above, we recommend performing full system scans. While a “smart” scan may run faster, it is not as thorough.

Now that you've cleaned up your computer, don't forget to re-enable the Restore Utility.

When To Use A Registry Cleaner Utility?
Like it is said, "too much of a good thing is bad". It is the same with registry cleaners. Registry cleaners are not toys to be played with. They do help, but when they are needed most.

The pertinent question here will be to ask when is it necessary to use a registry cleaner and why? Well, once you know what a registry is and how it works you will need to know how to clean it up when it gets full of junk. Here is where you will be educated on the use of a registry cleaner utility and where you can get one. Instructions of how to use registry cleaner will follow. So down to the first part of explaining what the system registry is.
What Is A System Registry?

The system registry is undoubtedly one of the most important parts of the operating system. It is the backbone of the system. The registry stores all the information that the operating system needs to run the PC. This information includes data pertaining to all the programs, hardware and user permissions on the system. When a user logs onto a computer by entering the username and password the system immediately refers to the registry to see what the user is allowed to do on the PC.

According the OS will proceed. If a program or application is run the OS will refer to the registry to locate the DLL files that will run the program. The registry constantly updates its database with information as the comp is used. This bloats the registry. So, a problem with the registry will reflect in the general well being of the system. This is why the registry has to be kept clean and healthy by running a registry cleaner utility when the system begins to show signs of slowing down and being sluggish.

Why Does The Registry Slow The System Down?

As mentioned, the registry updates itself with information. This makes the registry grow in size. As the registry is a hierarchical database the system refers to it serially. This means that the system begins looking for information from the beginning of the registry and goes through each entry individually. This is the case every time the operating system refers to the registry, which may be many times a second. As the registry automatically updates itself there many links and entries that are useless because the registry never deletes an entry. So when the registry is scanned the OS has to go through the useless entries as well. There are many tens of thousands of entries in the registry that lead to nowhere. These entries delay the search every time. A good registry cleaner such as PC registry cleaner or Windows XP registry Cleaner will detect these links and remove them. Then the Registry cleaner will fill the empty spaces by compacting the registry. This further enhances the performance of the PC.