Tuesday, March 5, 2013

How Email Spam Blocking Works

This article is about how email accounts and Internet Service Providers filter out spam. How to get around these spam blockers will come in a future article. It is important to understand what is considered spam and how it is blocked if you want to get around it. First of all, you should not be sending spam, but non-spam messages are frequently interpreted as spam, and as an email marketer, you do not want to be blocked.

Most email services come with spam filters, which allow users to block mail that is considered unsolicited or scammy. Spam filters work by analyzing emails and finding keywords and phrases associated with spam. They also analyze the structure and format of the email, including grammar and punctuation. The primary form of spam filtering is Bayesian spam filtering, which is a simple yet extremely mathematical way of separating spam from legitimate email (in fact, one of the first Bayesian spam filters developed was about only fifty lines of code). The program uses Bayes' theorem, which relates to probability (in the case of spam, the probability that an email is spam). When using Bayesian filtering, users initially have to separate spam from real email, and the Bayesian filter analyzes the spam and real emails and determines which words are most present in spam email and which in regular emails. Then when emails are received, the filter reads it and sees the ratio of spam words to non-spam words. If the ratio is significantly high, the application marks it as spam and either puts it in the junk, bulk, or spam folder (or in some cases, simply deletes it).

Not only do email services have spam filters, but also ISPs themselves have methods of filtering out spam. ISPs will usually block email if the number of recipients is too high, there is an excessive amount of links, or spam-associated words and phrases are present. Once an ISP has blocked email from your IP address a certain number of times, they will blacklist you. When you are blacklisted, most of the email messages you try to send, especially marketing related ones, will simply not be sent, or will be returned to you undelivered. ISPs will also greylist emails based on how the email server sends them (and not on the content of the messages). Greylisting, like blacklisting, returns emails to you undelivered, but unlike blacklisting, it works on a per-email basis. For example, one email you send may be greylisted, and the next you send may not.

How Email Spam Blocking Works

A final type of list is the whitelist, which is purely on the user side. A whitelist is basically an address book, and if a sender is not part of that address book, their mail will not be delivered. However, a whitelist has flaws, since Internet users frequently get mail that is legitimate but from unknown addresses, so all that mail would be blocked. Some whitelists protocols, when getting an email from an unknown address, return the sender a confirmation email they must click before the recipient actually receives the original email.

Spam combatant software is getting more and more advanced everyday, and the results of email marketing are declining proportionally. A quick tip, which will be elaborated on later, is that you will not be blocked if you do not send spam.

How Email Spam Blocking Works
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Justin Kander is a partner with [http://www.getprocash.com], a website which gives users a multitude of ways to make money online [http://www.getprocash.com].

mobile phone watches Special Price Gingham Cradle Sheets Set Best Buy Kichler 15504Bk 10 Gauge Low Voltage

Tuesday, February 19, 2013

How Do I Stop Receiving Spam Emails?

I often have people ask me the simple question, "How can I stop these spam emails?" I don't know if you've ever noticed but in IT the short / simple questions users ask quite innocently are the hardest and longest questions to answer. After about the 100th time I'd heard this question I decided to put together a list of advice which I'm including below.

1. Check if your ISP has a facility to filter out spam before you receive it.

2. Check if your anti virus software has an option to enable spam filtering. If it doesn't it may have a low cost upgrade to a version, which includes spam filtering.

How Do I Stop Receiving Spam Emails?

3. If you are using Microsoft Outlook Express as your email client upgrade to the Open Source Thunderbird email client from the team who brought you the Firefox web browser. This includes an excellent spam filter and it's free of charge.

4. Have two email accounts. For example you can easily set-up an account on G-mail and another on Yahoo. Use one for personal or business use and use the other when registering on web sites or mailing lists.

5. Never use your main email address when posting to mailing lists or newsgroups.

6. If you need to put your email address on a web page consider displaying it as a graphic rather than text - this will avoid spiders gathering your address automatically.

7. If you want a "contact us" feature on your web site, consider setting up a form that people can fill in rather than using the mailto: option. This will avoid spiders gathering the address automatically. If you set-up a feedback form you should also implement a Captcha - those difficult to read letters and numbers you get asked to key in to prove you're really human.

8. Don't encourage spammers by letting them know you've read their junk! Make sure your email client doesn't display embedded graphics inside emails by default. Modern email marketing systems give the graphics in each email they send a different name. When your email program downloads the graphics from their web server they log that you've opened their email and they know they've got a good email address.

9. Think twice before you switch on an out of office reply. This is another sure way of encouraging spam. When you're on leave why not route your email to another account for someone to monitor for you. Also consider that out of office replies often contain alternative contact details such as your mobile / cell phone number. These can then be used by spammers to start spamming you via SMS as well.

10. Never respond or reply to junk emails. I know it's tempting to send an email back asking them to stop sending you this rubbish but you can be sure this will only encourage the spammers to send you more!

11. If you have your own domain name (for example yourcompany.com) check how your ISP has set-up your account. Until recently most ISP's set-up domain names with catch-all email addresses. This means that the spammer can use what is known as a dictionary attack to flood your ISP and your email account with spam. They do this by reading each word from a dictionary in turn and try to send mail to it for example Apple at yourcompany.com, Ant at Yourcompany.com, Atom at Yourcompany.com. If you don't want a catch all email set-up just let your ISP know, most will be only to pleased to disable this for you.

12. Try and avoid setting up generic emails addresses on your domain such as info@yourcompany.com and sales@yourcompany.com. These generic addresses are now so common that spammers will always try these first.

13. If you have followed these suggestions and are still suffering from a lot of spam, check your spam filter to see what settings it has. You need to find a balance between receiving too much spam and rejecting good emails. Spam filters work by scoring emails, the more suspicious they are the higher the spam score. As spammers get cleverer they are finding ways to lower their score. This means you may need to progressively tweak down the threshold.

14. Train your spam filter. There are usually two key ways to do this. First add the people you want to receive emails from to your address book. This is sometimes known as white listing email addresses and your spam filter should leave emails from these addresses alone. Then on an ongoing basis if your spam filter lets a spam email through highlight the message and use it's report spam option. If you do this enough it will gradually learn the characteristics of the spam you receive and the good email you receive and make a better job of separating them

I don't think you'll ever stop spam completely because there is really no sure way of defining what is and isn't spam but with a little set-up work you can drastically reduce the amount of spam you receive.

How Do I Stop Receiving Spam Emails?
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Linda runs a number of websites and advises companies on IT and their web strategy. Linda's IT Management 101 Blog contains an ever growing list of useful IT and Web Strategy tips and trick.

cell phone watches Best Offer Spectra Premium F55A Fuel Tank For Best Buy Kichler 15504Bk 10 Gauge Low Voltage Best Offer Cooper Tires Discoverer Stt 35X12 50R17Lt

Saturday, February 9, 2013

Cyberethics (Information System Ethics)

In order to examine ethical issues, it is first necessary to define ethics. Today, we regard ethics as a "rational process founded on certain principles." However, I believe a definition that is more applicable to this project is the ethical theory that existed in ancient Greece. There, ethics was the study of what was good for both the individual and society. We will look at some online issues and how they may be good and/or bad for society. Cyberethics is quite simply the study of ethics on the Internet.
"Ethics begins when elements within a moral system conflict."
Cyberethics is often called as Information System Ethics. Information System ethics can be defined as "The study of moral, legal, ethical issues involving the use of information and communication technologies"
There are many unique challenges we face in this age of information. They stem from the nature of information itself. Information is the means through which the mind expands and increases its capacity to achieve its goals, often as the result of an input from another mind. Thus, information forms the intellectual capital from which human beings craft their lives and secure dignity.

However, the building of intellectual capital is vulnerable in many ways. For example, people's intellectual capital is impaired whenever they lose their personal information without being compensated for it, when they are precluded access to information which is of value to them, when they have revealed information they hold intimate, or when they find out that the information upon which their living depends is in error. The social contract among people in the information age must deal with these threats to human dignity. The ethical issues involved are many and varied in Information System Ethics.

Ethics is required in information Systems to overcome the following ethical issues.

Cyberethics (Information System Ethics)

Privacy: What information about one's self or one's associations must a person reveal to others, under what conditions and with what safeguards? What things can people keep to themselves and not be forced to reveal to others?

Accuracy: Who is responsible for the authenticity, fidelity and accuracy of information? Similarly, who is to be held accountable for errors in information and how is the injured party to be made whole?

Property: Who owns information? What are the just and fair prices for its exchange? Who owns the channels, especially the airways, through which information is transmitted? How should access to this scarce resource be allocated?

Accessibility: What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards?

Information System ethics explores and evaluates:

o the development of moral values in the information field,

o the creation of new power structures in the information field, information myths,

o hidden contradictions and intentionality's in information theories and practices,

o the development of ethical conflicts in the information field. etc

Now let us take a look at privacy by the following examples. A few years ago, Florida lawmakers gave the go ahead to have monitors stationed in bathrooms at Tallahassee Community College to determine if the facilities were being underutilized. Students and faculty vehemently protested that the monitors violated their privacy. State officials said that the value of the information gained through the study was more important than the threat to privacy. Other issues like collection of private data of the users using internet by monitoring the traffic is strongly related to one's policy as that information can be further used for illegal purposes. These types of privacy issues are needed to be addressed properly so that they should not exploit one's freedom. One issue that I kept thinking about when I was constructing my Web page was whether it was ethical to lift an image from someone's home page and use it on my Web page without crediting the source. Such ethical issues come under property.

One reason that topics such as online gambling and pornography have become such firestorms of controversy in cyberspace is the simple fact that so many people have access to the Web sites. Simply put, if no one had access to online pornography no one would care. With this another issue "Censorship" comes which should be deal in efficient way as it is not easy to implement. Ethical issues can also be religious, moral or any other.These type of issues are not easy to deal with.

Similarly, let us take China into consideration on the issue of "Censorship". China has implemented the methods of censoring the internet that are somewhat harder to bypass for people generally unfamiliar with the way internet works. There is ,for example internet censorship as implemented in China--using a list of banned words that are censored on the fly. As users in china request a webpage , the incoming page is first inspected by government servers n blocked if a banned term such as "Democracy" is present. Human censors are also actively looking at what people browse on the internet, and block websites as they see fit.

Crimes on internet are also increasing in a continuous manner.Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, Industrial espionage, child porn, kidnapping children via chat rooms, scams, cyber terrorism, viruses, spam and so on. All such crimes are computer related and facilitated crimes. Many recent cases seen like Microsoft's website was brought down for a little time resulting in a huge loss to Microsoft. Similarly, NUST, one of the best considered university in Pakistan got Hacked and redirected to another domain. Credit card fraud have grown in an increasingly manner. Leakage of Military information from internet is another internet crime. Software known as Google earth, which shows information about different places including military land or can lead to robbery planning, is becoming an ethical issue around the world. Many people protest against this leakage of information but still one can't deny that it is one of the major enhancements in Information Technology.

The question about how to police these crimes has already been constructed, but this task is turning out to be an uphill battle. Since the first computer crime law, the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, the governments have been trying to track down and stop online criminals. The FBI of different countries have tried many programs and investigations in order to deter Internet crime, like creating an online crime registry for employers .The reality is that Internet criminals are rarely caught. One reason is that hackers will use one computer in one country to hack another computer in another country. And that criminal isn't working alone. Loosely organized groups--which security experts call "Web gangs"--conduct much of the illegal activity online. The structure of Web gangs may be patterned on that of traditional organized crime, in which the members of the group may never come into contact with one another and may never be aware of who they are working for.

Conclusion:

We live in an exciting time in history. The widespread availability of computers and Internet connections provides unprecedented opportunities to communicate and learn. Unfortunately, although most people use the Internet as a powerful and beneficial tool for communication and education, some individuals exploit the power of the Internet for criminal or terrorist purposes.

We can minimize the harm that such individuals do by learning ourselves, and teaching young people, how to use the Internet safely and responsibly. The term "cyberethics" refers to a code of safe and responsible behavior for the Internet community. Practicing good cyberethics involves understanding the risks of harmful and illegal behavior online and learning how to protect ourselves, and other Internet users, from such behavior. It also involves teaching young people, who may not realize the potential for harm to themselves and others, how to use the Internet safely and responsibly.

Cyberethics (Information System Ethics)
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Muhammad Bilal Azmat,
Operations Manager,
Koolmobile.
Phone:+923002122629

watch mobile phone Save Save On La Mer The Powder 03 Beige Best Buy Oe Replacement Cadillac Srx Driver Side

Monday, February 4, 2013

How To Set Up Free Email Accounts

Setting up free email accounts is easy. I personally like to have at least two working emails and from my point of view if you have more than one account it is good to have free email account. I have Yahoo and hotmail free email accounts and I am fully satisfied with the service they provide. Apart from these two, I also have an email account with my cable Internet provider.

For routine emails I mostly use my hotmail account as it is the right place to do online shopping and casual interactions. My free email account in hotmail has a fun name showing my general attitude about the messages I send from there as they are all amusing and chatty. I especially like my hotmail account because it provides a wonderful anti spam feature. This anti spam is so great because it puts unwanted email into a junk folder and doesn't block your inbox.

I use my Yahoo free email account for some more serious communications such as contacting my online learning instructors or doing my freelance writing assignments. I chose a more serious name for my free email account in Yahoo as it relates to the messages that come from my account which are studious and proficient. This account also has a good anti spam feature that keeps possible junk mail away from my inbox folder.

How To Set Up Free Email Accounts

As I mentioned above, my third free email account is with my high speed cable Internet provider. The cable company I chose offers free email account to its customers. These accounts are suitable for keeping messages for friends and relatives. I hardly ever give my high speed cable email account to anyone, so I have no spam and few messages. In case I used this account more and got more messages in it, then I would take advantage of the anti spam feature my cable internet company offers and it would stop unwanted junk mail.

Nowadays everyone should have an email account. Most of the people have one or more email accounts. There are some people willing to pay for the service but you can easily save some money by conducting a little research and set up reliable free email accounts. If you chose to have several email accounts you would be able to organize your messages into different categories for family and friends, for work and other.

How To Set Up Free Email Accounts
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Morgan Hamilton offers expert advice and great tips regarding all aspects concerning E-mails. Get the information you are seeking now by visiting Free Email Accounts [http://www.howtoinfocenter.com/how-to-information/how-to-tips/how-to-set-up-free-email-accounts.html]

watch mobile phone Best Buy Blue Sea Systems 9012 Solenoid Switch

Saturday, January 26, 2013

5 Basic Types of Internet Advertising

There are many forms of internet advertising available. Television basically only has one form, a short video clip either convincing people to use a product or at least forcing a customer to remember a product or service for the future. Conversely, there are many different ways to appeal to customers online and some of these ways are more effective than others. The basic kinds of internet advertising are pop-ups, e-mail advertisements, banner advertisements, endorsements from other websites, and social media.

Pop-ups used to be a very popular form of advertising. Generally, websites would send a tracking file to your computer called a cookie when you visited. These cookies could track your internet viewing and help companies tailor advertising to you. Often they could do other things like pop up advertisements on your computer. These pop-ups would force people to see the ads before being closed. Companies relied on this strategy to expose potential customers to their websites by force. However, most common spyware software will now prevent pop-ups and will block websites that use them. Do not scare customers away with this aggressive strategy. Avoid pop-up marketing.

E-mails can be another source of information for past customers. When a customer purchases a product at your website ask them if you can send regular updates with specials and new products. Remember that that is all they have agreed to. Selling your customers' e-mail address to other companies that spam or being an email spammer yourself will turn off your customers. Instead, have a visible privacy policy available on your website and use it. Spam e-mails are often blocked and easily deleted meaning that many of your hopeful e-mails will never be seen by your customers.

5 Basic Types of Internet Advertising

Banner advertisements can be another way to attract customers. Remember that these web placements cost money. Programs like Google AdSense may increase hits to your website but you pay by the click. The more popular your advertisement is, the more you pay. Also one of the more popular web browsers today, Mozilla Firefox, has add-on that blocks these advertisements. While they may be beneficial, think carefully before putting money into banner advertising. If you do decide to use banner advertising be sure to place ads on website that are relevant to your business

Affiliate marketing, which relies on other people to help market your products, may be another way to increase your traffic. This is equivalent to the commercial model for advertising. Basically another person or website endorses your products and business and convinces customers to visit you. Much like a celebrity selling a product through a commercial, you are relying on endorsements from other websites. Just remember that many companies associated with affiliate marketing charge commission meaning they get a percentage of sales. If your profit margin is relatively low you may either need to increase your prices, make less money, or maybe even take a loss for a while.

Last, consider social media for advertising. This can be something free like setting up a Facebook account where you communicate with existing customers. Or you can pay social networks like Facebook to advertise for you by placing ads on users' homepages. Since people often have to accept Facebook's scripts, it can be harder to block these advertisements.

Remember that not all forms of internet advertising are equal. It is easy to block and avoid spam, pop-ups, and some banner advertising. More effective ads like affiliate marketing can be expensive but they are still worth considering. Remember to track advertising's effect on your business and make educated decisions so that you know your money is being spent effectively.

5 Basic Types of Internet Advertising
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Discover how to build your own autopilot internet business that earns ,000s every month within 8 to 12 weeks. (Seriously, this is something we've helped *thousands* of people do.) Start living the life you want. Enjoy your freedom. Kill your day job. Create an online business starting right now. How? That's easy... Read our blog for our step-by-step system:

Go read the Rhodes Brothers Make Money Online System now.

Take action right now. Click that link above and change your life, like hundreds of other people like you have done. Go to http://IMsimple.com/make-money-online/ now...

watches mobile phone Special Price Luxe Amendoim 4 5 X 48 Special Price Gingham Cradle Sheets Set

Wednesday, January 23, 2013

How To Determine The Origin Of Spam

Spam will continue spreading as far as it makes profit. If nobody buys from spammers or acts upon their scams, spam will end. This is the obvious and easiest way to fight spam. You can ignore and delete spam emails you receive. But you can also take vengeance on the spammer by complaining to the spammer's Internet Service Provider (ISP). The ISP will block their connection and maybe impose a fine (depending on the ISP's acceptable usage policy). Spammers beware of such complaints and try to disguise their messages. That's why finding the right ISP is not always easy.

Let's look inside a spam message. Every email message includes two parts, the body and the header. The body is the actual message text and attachments. The header is a kind of the envelope of the message. The header shows the address of the message sender, the address of the message recipient, the message subject and other information. Email programs usually display these header fields:

From: shows the sender's name and email address.

How To Determine The Origin Of Spam

To: shows the recipient's name and email address.

Date: shows the date when the message was sent.

Subject: shows the message subject.

The From: field usually contains the sender's email address. This lets you know who sent the message and allows you easily reply. Spammers, of course, don't want you to reply and don't want you to know who they are. Therefore, they put forged email addresses into the From: lines of their emails. So the From: field won't help you if you want to determine where the spam email comes from.

Just like a postal letter goes through a number of post offices before it's delivered to the recipient, an email message is processed by several mail servers. Each mail server adds a line to the message header - a Received: line - which contains

- the server name and IP address of the machine the server received the message from and

- the name of the mail server itself.

Each Received: line is inserted at the top of the message header. If we want to reproduce the message's path from sender to recipient, we start from the topmost Received: line and walk down until the last one, which is where the email originated.

Just like the From: field the Received: lines may contain forged information to fool those who would want to trace the spammer. Because every mail server inserts the Received: line at the top of the header, we start the analysis from the top.

The Received: lines forged by spammers usually look like normal Received: fields. We can hardly tell whether the Received: line is forged or not at first sight. We should analyze all the Received: lines chain to find out a forged Received: field.

As we mentioned above, every mail server registers not only its name but also the IP address of the machine it got the message from. We simply need to look what name a server puts and what the next server in the chain says. If the servers don't match, the earlier Received: line is forged.

The origin of the email is what the server immediately after the forged Received: line says about where it received the message from.

Let's see how determining of the spam email origin works in real life. Here is the header of a spam message we've recently received:

**************************************************

Return-Path:

Delivered-To: press @ mydomain.com

Received: from unknown (HELO 60.17.139.96) (221.200.13.158) by mail1.myserver.xx with

SMTP; 7 Nov 2006 10:54:16 -0000

Received: from 164.145.240.209 by 60.17.139.96; Tue, 07 Nov 2006 05:53:35 -0500

Date: Tue, 07 Nov 2006 12:48:35 +0200

From: Pharmacy

Reply-To: umceqhzjmndfy

X-Priority: 3 (Normal)

Message-ID:

To: press@mydomain.com

Subject: Cheap Med*s V!agra Many Med_s QnNXpRy9

MIME-Version: 1.0

Content-Type: text/html; charset=us-ascii

Content-Transfer-Encoding: quoted-printable

**************************************************

At first, look at the forged From: field. The email address in the From: and Reply-To: lines doesn't exist. So, the spammer took care about directing bounced messages and all the indignant replies people may send to a non-existing email account.

Secondly, the Subject: line. It contains the variations of the "Meds" and "Viagra" words that are known to be met in spam messages. Plus, the subject contains a range of random characters. It's obvious that the subject line is skillfully tailored to fool anti-spam filters.

Lastly, let's analyze the Received: lines. We start from the oldest one - Received: from 164.145.240.209 by 60.17.139.96; Tue, 07 Nov 2006 05:53:35 -0500. There are two IP addresses in it: 60.17.139.96 says it received the message from 164.145.240.209.

We check if the next (and last in this case) mail server in the chain confirms the state of the first Received: line. In the second Received: field we have: Received: from unknown (HELO 60.17.139.96) (221.200.13.158) by mail1.myserver.xx with SMTP; 7 Nov 2006 10:54:16 -0000.

mail1.myserver.xx is our server and we can trust it. It received the message from an "unknown" host, which says it has the IP address 60.17.139.96. Yes, this confirms what the previous Received: line says.

Now let's find out where our mail server got the message from. For this purpose, we look at the IP address in brackets before the server name mail1.myserver.xx. It is 221.200.13.15. This is the IP address the connection was established from, and it is not 60.17.139.96. The spam message originates from 221.200.13.15. It's important to note that it's not necessarily that the spammer is sitting at the computer 221.200.13.15 and sending spam over the world. It may happen the computer's owner doesn't even suspect of being sending spam. The computer may be hijacked by a Trojan, which is spreading spam without the machine's owner knowing it.

We hope this information will help you identify the spammer's ISP and report them about spam so they can take proper measures.

How To Determine The Origin Of Spam
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Author is a technical expert associated with development of computer software like Advanced Administrative Tools, Advanced Email Verifier, G-Lock EasyMail, Spam Blocker More information can be found at Anti Spam Blocker Resources

watches mobile phone Best Offer Cooper Tires Discoverer Stt 35X12 50R17Lt Best Price Niagara Cutter Ts109 T Slot Shank Best Buy Pac Strapping 5830116B36 5 8 X

Sunday, January 20, 2013

What Is CLSID?

Before you go ahead and download a registry cleaner understand why it is necessary. As a web page loads on your system, you may be prompted to install several ActiveX components before the page can be fully downloaded. This is so that the browser can interpret the ActiveX components and display them properly on the system. This only would only occur if the controls used in the web page were not already on the system. If you decline permission for the installation, the page will not function properly. However, once these ActiveX controls are on your system, you won't have to download them again, even when you come across them on other web sites. These downloads clutter up the registry over time and need to be removed with the help of some registry shareware cleaner.

Other ID Tags

So how can the web page determine that the required ActiveX controls are not installed on the system or not? The browser does this by referring to the 'CLSID' in the 'OBJECT' tag of the web page. To cut a long explanation short, an ActiveX control is added to a web page using the and container tags. The 'CLSID' is unique to each ActiveX component; it is with the 'CLSID' that you specify which control you are using. The Registry has a special section for CLSID and they run into thousands of ID's. The useless records in the Registry have to be removes with the aid of a registry cleaner. Free PC registry cleaners are available for download and help keep the system running smoothly. If you were to look at a CLSID it would look something like this: CLS ID: 99B42120-6EC7-11CF-A6C7-00AA00A47DD2.

What Is CLSID?

So How Does CLSID work

'CLSID' is a unique registry-identifying component that is used to identify an ActiveX control. The actual download process consists of six different steps. First, Internet Explorer will process the 'OBJECT' tag in the browser code and get your requirements from it. Then Internet Explorer will determine if a download is needed by checking different things. Then Internet Explorer will process the 'CAB' file and the 'INF' file. Then the control and its dependencies will be installed. Finally, the control will show up on the screen.

The Registry is the centre of all records for the system. The registry records all the activities such as the users and the hardware details of the system. It also records where what program or file is located on the disk. This is why the registry gets filled up with redundant entries over time and as it gets older it keeps building up and slowing down the system. Registry Repair and Cleaners are ideal for such times when your computer has grown sluggish and irritatingly slow. PC registry cleaners can greatly enhance the speed and performance of your system.

It is all code language and you need not understand the technicalities of it. Suffice it to know that if the browser determines, through the 'CLSID' on your browser that your system already has that 'CLSID' in the registry the browser will load and display the page, else it will prompt you to download that particular control.

What Is CLSID?
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Author is admin and technical expert associated with development of computer security and performance enhancing software like Registry Cleaner, Anti Spyware, Window Cleaner, Anti Spam Filter etc. Visit home page: http://www.pcmantra.com. Read More at PCMantra Resource Center.

watches mobile phone Best Buy Kichler 15504Bk 10 Gauge Low Voltage