Twitter launched “follow” button

Twitter launched the “follow” button earlier today, it now enables users to subscribe to the twitter feeds of actors, individuals, companies, blogs, etc.. straight from their websites with a simple click.

The way it worked before was by publishers redirecting users straight to their twitter accounts, from there the users would have to click “follow” and then if they wanted, the user would have to go back to the previous website. Overall, this wasn’t very practical for web designers. Now, website publishers can simply add the twitter button to their site and increase the number of “follow us” without having to redirect their viewers to the twitter website.

But don’t worry there wont be any “accidental” follows form your end, when you click the button a small window appears so you can preview the profile before you follow them. We have a button at the bottom right of our red status bar. Check it out, click on the twitter and see what we’re talking about. A new window opens up and from there you can see if you want to follow us, or just randomly visit our site to check for new news.

If you want to add your very own Twitter button, click here.

Three Valuable tips on How to be successful on Twitter

You know a lot of people have been asking “how do you become successful using twitter” or “how do you get articles so popular on different sites” even the classic “how do you go ‘viral’ on the internet” and really there is no real specific answer to all of that. It takes a little bit of luck, an a whole bunch of “know how”

People who have had twitter for years and only get 20 or 30 followers get frustrated at the fact that no one is really seeing what they are doing online, or they don’t have any –Tweets- being re-tweeted. The main reason is not because of “unpopularity” (although that does have something to do with it) but it’s more the reason is because of how they write their tweets and how they communicate with everyone else.

The first thing you need to answer is, “what is this tweet going to accomplish?”  then, make it interesting. 

When you tweet – (@tekbull, Volkswagen is coming out with a new car!) – I really don’t know what in the world you are talking about, of course VW has new cars, they make them every day, I then completely ignore what the heck you are tweeting about. You have to give specifics about what you are talking about.

Now if you tweet –(@tekbull, It’s unbelievable that even in this economy Volkswagen is coming out with new car designs (link)-

It makes me want to click on your links, and if I find it amazing I then retweet your tweet so all my other followers see that VW is a gutsy car company.

The second thing is take advantage of your tools! 

The @ symbol and the # are amazing tools that can get you more noticed, faster, and easier. When you use the @ symbol to communicate with a specific person, that person will be able to see “hey someone is trying to get a hold of my attention” if you followed the first rule, and you did a good job, you got my attention. And if it’s good enough, I’ll try to get the next person’s attention, etc.

If you use the # symbol, you are targeting a large audience, and you need to make sure that you really follow step #1 on this one, otherwise your tweet will be disregarded as just another bulk maker.

When you post links, Hash Tags, @ symbols, in your tweets, you get the attention of a lot of people, that’s your foot in the door, you just have to be prepared to tweet it open, before they tweet you out.

Let people know who you are! 

Okay this goes without saying, YOU NEED TO LET EVERYONE KNOW WHO YOU ARE, I don’t know who “EvilNickel” is personally, and unless I’m searching for Evilnickel, I will not be able to find him. However, if he filled his information up, Real Name, Real E-mail, City, State, Age etc. We can find him even if we’re not looking for him. Just the mere act of searching for someone in Texas at least gives him the chance to be spotted.

Overall, these are just 3 simple tips as to what you can do to be noticed in Twitter, which can be very profitable, the more “followers” you get the more value you have to a company.You need to also have valuable information to supply to your followers, no one wants to know that your walls are green (maybe your friends and family, but not businesses) however, people want to know that you painted your walls using a specific tool, or a specific pattern.

Batman Fans crack the Twitter code for the next Batman Film!

When fans of the Batman Series visited  visit the site for the film The Dark Knight Rises — now in production for a July 20, 2012 release — you’ll end up in a black screen accompanied by a track featuring eerie chanting. The fans began to take shots as to what the chanting was all about, until a guy from SuperHeroHype Forums using the name of “Riskproduction” used an audio program and he found that the spectrum in the audio said  “#thefirerises.” the all so famous twitter hashtag.

After following the maze of trends they finally landed on a Twitter account @TheFireRises, which features hundreds of tweets linking to this site, featuring an image of actor Tom Hardy as super villain Bane. But this was no ordinary image, the image was composed of thousands of individual images from Twitter, and Facebook that composed the image by clicking the “add me” link at the top left of the screen.

Talk about advertizing campaigns uh? and the dedication of fans to try and figure out what it all means, not a bad move by DC with their new movie. They definitely got the viral status they wanted for this movie. I can’t wait for the next one to come out, they have some big shoes to fill after the Joker died.

Via: Slashfilm

Facebook feature will check photos for child abuse

We’ve been bashing facebook lately with the whole PR attack on Google, and the all so classic ‘security’ issues. But for once facebook seems to be doing something right. While this is a minor “privacy” issue, it can potentially be a very good feature. Facebook is adding a new feature to it’s service, it will crawl through all of your photos using a sophisticated program that will detect Child Abuse, this is a new effort to drive pedophiles away from the site and make facebook a safer, user friendly website.

The program is called ‘PhotoDNA’, and it’s a system built by Microsoft, not very surprising since Microsoft own a good chunk of Facebook shares. The system is is actually connected to NCMEC, which is the National Center for Missing and Exploited Children, it’s based in Virginia.

NCMEC collected over 10,000 images from local and national law enforcement units of children being abused, they put up the images as “samples” for the PhotoDNA, they have millions more on file to continue to add to the program as the system runs through facebook.

The way that the system works, is once an image is uploaded into the database, the computers will divide the database images into small sections and then assign a digital fingerprint, for each of the tiny sections. Once the small sections are given a “fingerprint”, the system will be uploaded to facebook where it will begin to look at your pictures looking for the “fingerprint” in other images, It will be more like a “compare these to images and tell me if they look alike” kind of program.

Bill Harmon, is a lawyer for Microsoft’s digital crimes unit, stated that PhotoDNA is so accurate that it detects child pornography with “zero false positives” he added that “Some images become ‘popular’ and are used time and time again – making good targets for the PhotoDNA program,” So if an image is spotted on a site, and is marked as being “abusive” the image will be added to the database and added to facebook, if the image is found on facebook it will automatically send out the red flag. So this program is not looking for a specific image, it’s looking for images that have already been found, while this may not stop child abuse from happening, it can stop it’s distribution from happening. I’m sure that in the future PhotoDNA will be able to compare the images against “similarities” but right now it’s not that good yet, but it’s a hell of a lot better than what we have right now… a “report” button at the bottom of the page.

Microsoft already added this on their Bing image search engines and it has found millions of images from around the world. Hopefully with the new addition to the facebook network we’ll detect the millions of pedophiles that migrated from myspace to facebook during the myspace boom. Check out the video below to see how PhotoDNA works.


How to have 400 Girlfriends on Facebook at the same time!

Axe has you covered, thanks to their girlfriend campaign and the all so popular Relationship Status on facebook, you may have noticed that your Bro’s have a little to many girl friends. But that’s not so bad, some of us are big enough to share, and as they all know each other It’s not a deal breaker. Until Valentine’s Day comes.

Check this application out, it started out in Tunisia after Axe began their Campaign in March, the application lets you list yourself in a relationship, or engage you’re your self with multiple girls at the same time.

When your other bros get jealous and they click on the status, they are taken to the Axe app where they can also be in a relationship with as many girls as they want. Check out the video below, it is definitely something that has gone viral on facebook, and while it’s not yet caught on in the USA it is sure to hit the US pretty quickly. Check out the video below to see how and why they came up with this new controversial ad campaign. What do you think about the ad campaign? And also, how many girlfriends do YOU have?


Via: Axe

Skype coming to an X-box near you!

While Google and Facebook were fighting over who was going to get Skype, Microsoft swiftly came in and took over the service for a good $8.5 Billion dollars in Cash-Money!

Whats the next step for Skype now that Microsoft owns it? well re-integration of course, Microsoft plans to integrate the system into every single Microsoft orifice as quickly as possible. It plans to integrate Skype into the Xbox 360, Kinect, Outlook Mail service, and Microsoft Phones, this will put Microsoft in a good standing within the communications sector. With the acquisition of Skype MSN might get the chance to come back to life.

The possibilities are virtually endless when it comes to integration of Skype into MS Products, Internet Explorer with Skype client capabilities? or even video chat via your cellphone or Kinect while you are playing Xbox Live.

“Microsoft and Skype share the vision of bringing software innovation and products to our customers,” said Tony Bates, the current head of Skype who will become the president of the newly created Microsoft Skype Division. “Together, we will be able to accelerate Skype’s plans to extend our global community and introduce new ways for everyone to communicate and collaborate.” So I guess that includes Skype for Apple Products? it looks like it for now, Microsoft said the service will continue to run “smoothly”, they aren’t looking to pull the plugs on any one…. at the moment… We’ll see how long that lasts.

Via: NY Times

Millions of People at risk of ID Theft Via Social Sites.

Here is some food for thought, What happens when you forget your password? or when you call a company and need to establish your Identity over the phone? well you probably have to answer a few “Security” questions, or “Challenge” questions, the questions are supposed to identify one person – Us, but it also includes, con-artists and criminals.

Whats your Pets name?
Where were you born?
Where did you go on Your Honeymoon?

All of the questions listed above are just some of the question that you may be asked in order to identify who you really are. Usually this means that only you know the answer to the questions. Unfortunately, we don’t really have a clue as to how vulnerable we really are, specially thanks to social media sites like Facebook. A survey taken last month showed: (Credit goes out to Harris Interactive for the following information.)

According to Harris Interactive, 18 percent of men will accept a woman’s friend request, even if they do not know the person. About 7 percent of women will accept an unknown man’s friend request. A total of 5 percent of U.S. adults will accept every friend request they receive. The key to stealing a person’s identity is built with just a handful of pieces. And much of that information is openly available on social networks.

Only 50 percent trust that their connections will keep their information private. Yet more than 24 million Americans leave their personal information “mostly public” on social networks. The results are based on a survey last month of 1,011 Americans 18 and over, including 387 who are on social networks.

Leaving personal information public and allowing practically anyone to view your profile is a dangerous prospect, Harris Interactive observed. The company said that the basic information found in a social profile can help “build the dossiers [that criminals] need to beat challenge questions and other security measures on financial accounts.” It’s a sentiment with which ID Analytics agrees.

“Americans’ lack of caution in friending members of the opposite sex online is striking,” Thomas Oscherwitz, chief privacy officer at ID Analytics, said in a statement. “Friending someone online is not risk free Most social networking profiles contain personal information that can be used by fraudsters, and when you friend someone, you are giving them access to this information.”

So let me dissect what all of this means to you, when someone invites you to be-friend them, it gives them access to all of your information, the person then goes into your Social Media Account aka Profile, they start to read over past conversations, over the history of your page, they look at pictures, they look at your contact information etc. And using the information they gathered they hack into your e-mail accounts, bank accounts, etc. The list goes on and on.

So let me give you a scenario, when you go into Facebook, you have the option of selecting “forgot password” if you do that, facebook will state, “Please enter your e-mail to send you a reset link”

The e-mail link is obtained via your “information” tab, they (ID Thieves) type that in, then they go to your e-mail account and again click “forgot password” this time, they are asked to please provide 3 “security questions” that usually range from “what is your pets name?” “what is your mom’s maiden name?” “Where did you have your honey moon?” like the examples I’ve already given above.

Well all of those answers can be found in a Trustworthy person’s Facebook account, you add a thief as a friend and before you know it, they find that one picture of you holding your pet, “Shnoodlefry”: with your friends, a picture later, they find that you went to Hawaii for your honey moon under your “honey moon in hawaii” Album, lastly Facebook has incorporated the “Family Tree” Tab. Most people now list their Mother, Father, Cousin, etc. on their Facebook, and if you are a Married Woman, then you even have the option of “Maiden Name” which looks like — Jane Doe (Jane Smith). The sad thing about it, is that most Americans believe this information is innocent, it may be innocent to us, but to a skilled con-artist, this is the holly grail.

Once they have access to your e-mail account, they can change everything, including security answers, passwords, etc. And completely take over your e-mail accounts, which probably holds information to passwords or they can request “password reset links” to facebook, banks, online stores, e-bay, paypal etc. Banks are a bit more secure but regardless, the same can be done over the phone, a bank teller wont be able to tell the difference between Jane Smith and Bob Doe over the phone. They ask you the security questions, and once answered they give them full access to their information. Which in turn, now have access to everything you have tried to protect for your entire life, and all of it can be done over your social network Page..

So what can you do? well for starters, don’t be so open about who you are in any social website, also give out fake security questions, something that doesn’t make sense for example, “what is your Mothers Maiden name? – Bob Cat- or something along those lines you get the gist of it. But most importantly, try to avoid people that you don’t know, and block “Private” information from everyone but your self, after all, no one needs to know Your FULL date of birth, your Phone number, your E-mail Address. or other Private Information, “But Tek Bull what If I want my friends to be able to see that?” well in that case your friends don’t know you very well do they?

Let that soak in for a bit, and stay safe.

You can read more at CNET