Monthly Archives: September 2010

You are browsing the site archives by month.

Results of Poor Cross Cultural Awareness

Results of Poor Cross Cultural Awareness. Having a poor understanding of the influence of cross cultural differences in areas such as management, PR, advertising and negotiations can eventually lead to blunders that can have damaging consequences.

Read More →

How To Create Your Own Money Making Website

The only way to success in any online venture is to have a good product and a healthy amount of customers.

Read More →

Is Your Home Business Properly Insured?

Do you work from home full-time or part-time? Chances are your homeowner’s insurance doesn’t cover your home business, or at least not to the extent you need it to.

What Is Wardriving And How Can You Prevent It

Imagine a car equipped with nothing more than a laptop computer, a portable GPS receiver, and a wireless network card slowly strolls through your neighborhood. Unknown to any onlookers, this is no ordinary vehicle; rather, it is a wardriving machine. As the car strolls past homes and businesses, a wireless network card (available at any electronics store for as low as $25) scans for any wireless access points. Anyone with a wireless network (and there are many out there) is vulnerable. The computer is looking for what is called an SSID. An SSID is your wireless network name and it is being constantly transmitted by your access point, letting computers know of its presence. The wardriver uses software such as Netstumbler (for windows) or Cismet (for linux) to scan the airwaves for SSIDs. The program can track various access points at once and monitor the signal strength. These programs can also check to see if the network is encrypted. The wardriver will generally configure his or her software to log any strong unencrypted signals. Using the GPS receiver, the coordinates of the strong signal will be recorded. After this preliminary drive, the wardriver can return to the locations that were recorded, and connect to the access point. Once connected to an unencrypted network, the wardriver can use the victim’s internet access, and can also explore computers on the network. If files are being shared within someone’s private network, all of that information is susceptible to a wardriver. Furthermore, once in the network, a wardriver can sniff network traffic and can view any information such as passwords and credit card numbers you send out to the internet

The Six

Start your own business, and soon enough, you find yourself in a situation
where there are many things you want to say, all of them unprintable.

Read More →

Defining Your Goals

Probably one of the most important things we do with our Partnering For Your Success students is to help them define their goals. We discuss their need for both short and long term goals. This might sound trite to you, or you might say, Yeah, everyone says to define my short term and long term goals.

Read More →

4 Marketing Myths Threaten Your Sales

These 4 marketing myths can cause you to lose sales if you base your marketing decisions on them. But the related marketing tips I included with each myth will boost your sales if you act on them instead.

Read More →

Get Motivated and Stay Motivated

Because starting a new business takes a lot of sustained effort over a long period of time, staying motivated can be a challenge. When your motivation is flagging, you can’t muster any enthusiasm for your work or give it your all. If you want to keep the motivation going, it helps to know yourself and what your own personal motivators are.

Read More →