How to Change Browser Security Settings

The security settings on your Web browser determine what types of pages you visit and they protect you from potentially dangerous sites. For example, many browsers give you the option to block particular websites that are known to "phish," which means they try to trick you into disclosing your personal financial data. These features are initially set when you first download your browser, but you have the ability to change them if you feel they are inappropriate for your needs. Make use of the tools on your Web browser to change your security settings, as you prefer.

Instructions Internet Explorer

  • Launch your Internet Explorer Web browser.
  •  Click the "Tools" menu and select the "Internet Options" title. 
  • Click the "Security" option at the top of the "Internet Options" window.
  • Click an item, such as "Internet" or "Restricted sites," to access the menus that controls these features. Click the slider menu and the buttons to specify each setting.
  • Restart your Internet Explorer browser to save your edited security rules.

Safari

  • Bring up your Safari browser.
  • Click the "Edit" (Windows) or "Safari" (Mac) menu and select the "Preferences" option.
  • Click the "Security" tab in the dialog window.
  • Click the boxes to activate or deactivate the security settings that you want. For example, in the "Web content" section, you have the option to block pop-up windows, while in the "Accept cookies" section you determine when it is appropriate for your browser to accept cookies.
  • Close the dialog window and restart your browser. Your security settings are now changed.

Firefox

  • Start your Firefox Web browser.
  • Select the "Options" item from the "Tools" menu. On a Mac, click the "Preferences" option from the the "Firefox" menu.
  • Click the "Security" button at the top of the window.
  • Click the boxes, such as "Block reported attack sites," to enable or disable the items that you prefer. Firefox also gives you the ability to specify how you want your passwords and warning messages handled.
  • Restart Firefox to allow your new settings to take effect.

 

How to Change Your Mobile Web Browser

The line between mobile phones and full-fledged computers is becoming blurred more and more every day. According to a study released by ABI Research, by the year 2015 over 3.8 billion mobile handsets, or roughly 60 percent of the world's mobile phones, will come with some type of mobile browser. Just because a cell phone comes with a mobile browser doesn't mean that the stock browser is your only option for surfing the Internet, however. There are a number of alternative browsers for Android, iOS and BlackBerry devices, and you can change your mobile Web browser directly from your Internet-enabled smartphone.

Instructions iPhone

  • Tap the "App Store" icon on the iPhone's home screen, followed by the "Search" icon at the bottom of the App Store application window.
  •  Type the name of the mobile browser you want to download, then tap "Search" to search for the application. Opera, Mercury and Mango are a few of the Safari alternatives available on the iTunes App Store.
  • Tap the name of the mobile browser you want to install. Tap the "Free" button, followed by the "Install" button to install the browser onto the iPhone.
  • Tap the new browser's application icon on the iPhone's home screen to launch the browser.

Android

  • Tap the "Market" icon on the Android device's home screen to launch the Android Market, then tap the "Search" icon.
  • Type the name of the browser alternative you want to download, then tap the "Enter" button. Dolphin, Skyfire and Steel are a few of the Android mobile browser alternatives available on the Android Market.
  • Tap the name of the mobile browser in the list of search results, then tap "Install" to install the browser onto the Android device.
  • Tap "Menu | Settings | Applications | Manage Applications."
  • Tap the "Browser" option, followed by the "Clear Defaults" button. The next time you attempt to perform a task that requires the use of a Web browser, you will be prompted to select the new default browser. Select the mobile browser you installed to set it as the device's default browser.

BlackBerry

  • Select the BlackBerry browser application on the BlackBerry device's home screen to launch the browser.
  • Navigate to m.opera.com and select the "Download Opera Mini" link to download and install the Opera Mini browser onto your BlackBerry device.
  • Select the Opera Mini browser to launch the application.

Tips & Warnings

  • You cannot change an iPhone's default Web browser without first jailbreaking the device.
  • As of March 2012, Opera Mini is the only BlackBerry browser alternative available.
  • You cannot change a BlackBerry device's default Web browser.
  • Some BlackBerry applications allow you to highlight a link, press the "BlackBerry" button and select the "Open with Opera Mini" option to open the link with Opera Mini.

 

How to Change Your Browser Preferences

Google Chrome, Microsoft Internet Explorer and Mozilla Firefox are three software applications commonly used to browse the Web. Each browser gives users the ability to adjust configuration settings, called “preferences,” to suit their Web surfing habits and security requirements. Personalize your browser by changing its default settings. The options and menus vary depending on the browser that you are using.

Instructions  All Browsers

  • Open your browser from the Windows Start menu or by clicking the browser’s icon on the desktop or taskbar.
  •  Keep pen and paper handy to record the original settings so you can return to that configuration if needed. 
  • Put checkmarks in the boxes next to each option that you want to change or click a box containing a checkmark to disable any settings that you don’t want to keep. Some settings have radio buttons or require that you open a menu and select your choice. For other options, you might type text, such as a URL, into an input field.

Chrome

  • Click the 'Wrench" icon at the top right corner of any Chrome window to access the Tools menu. Choose "Options" from the drop-down menu.
  • Review the four sections of the sidebar in the Options window. The Basics, Personal and Under the Hood sections contain the primary user preferences that Chrome applies by default to cookies, themes, download locations and other browsing activities. The Extensions section displays a list of installed add-ons.
  • Customize your settings by clicking on a section title in the sidebar to see its defaults. Change the default to the option you prefer.
  • Close the “Options” menu by clicking the “X” at the right of its tab. Once you close the tab, Chrome automatically saves your changes.

Firefox

  • Open the “Tools” menu on the top menu bar of any Firefox window and choose “Options” from the list.
  • Click on the tabs in the Options menu to view the user preferences that you can change. Modifying the Firefox defaults for General, Tabs, Content, Applications, Privacy, Security, Sync and Advanced affects the browser’s appearance, homepage, password features and other important behaviors.
  • Click “OK” to save your changes in each section. Firefox automatically closes the Options window. Reopen it to make changes in another section.

Internet Explorer

  • Open the Internet Explorer “Tools” menu by clicking its icon – a sprocket – at the top right corner of any Internet Explorer window. Choose “Internet Options” from the menu to see the current settings.
  • Customize your preferences such as the browser language, homepage and content restrictions by changing the default configurations under the General, Security, Privacy, Content, Connections, Programs and Advanced tabs in the Internet Options window.
  • Modify your settings by clicking the title of any tab to view its available options. Click “OK” to save any changes that you make and to close the Internet Options window when you finish.

Tips & Warnings

  • A common browser preference that users change is the default homepage. This option determines what page your browser opens when you click the “Home” button or icon on the browser toolbar. Most browsers also let you choose what page you see when you launch the browser. This might be your favorite website, the last page you visited or a blank page.
  • Saving your login information and passwords in your browser is convenient, but some users prefer to save passwords using third-party software or a different method. Change the default setting for your browser to the method that you prefer.
  • Change your browser’s appearance settings to control the font size on Web pages, the colors of the browser windows, the shape or design of icons and the placement of menus and tabs. You can also enable accessibility options if needed.
  • Changing your browser’s security settings can make the application vulnerable to hijacking or other malicious attacks. Review your browser’s “Help” page or FAQ before you change settings that you don’t fully understand.

 

How to Change Your Browser's Default Search Engine

Even if you have a massive collection of bookmarks, you are likely to use search engines to locate new resources, videos and other information on the Web. All of the major Web browsers have default search settings, and each browser also provides an option for making your favorite search engine the default when you perform a search. The configuration procedures vary by browser, but you can change this setting with just a few clicks of your mouse.

Instructions

Google Chrome

  • Place your mouse pointer on the Chrome “Settings” icon (it looks like a small, flat wrench) on the far right side of the address bar. Click once on this icon to open the drop-down menu.
  •  Scroll down and select “Options” from this drop-down menu. The Basics menu opens, displaying five sections you can modify. Locate the “Search” section near the bottom of the Basics menu.
  • Click the inverted triangle at the end of the box that shows the name of your current default search engine. This opens a drop-down menu from which you can select another search engine. Highlight your preference, such as Bing or Yahoo, and select it as your default search engine.
  • Close the window after you’ve made a selection by clicking the “X” on the window tab. Your search engine preference is saved in Chrome.
  • Enable protection for your chosen search engine settings in Chrome and prevent unauthorized changes by installed programs. The Chrome browser does not have a menu option to prevent changes to the default search engine, but developers and software administrators enable this feature by modifying the command line for the browser’s startup routine. You should attempt this only if you understand the use of command line switches.
    Right-click the "Chrome" icon on your desktop or taskbar. Choose “Properties” from the context menu to open the Shortcut window, where you will see the path to the application displayed in the Target box. Type “--Protector” (without quotes) at the end of the file path and close the Shortcut menu.

Internet Explorer 9

  • Click the “Sprocket” icon at the top right corner of the Internet Explorer window to open the Tools menu.
  • Select “Manage Add-ons” from the list. In the Manage Add-ons window, select “Search Providers” from the list in the left column. This displays the available search engines in the right column. The word “Default” appears next to the name of your current default search engine.
  • Choose another search engine, such as Google, by placing your cursor on its name. Right-click on the name and choose “Set as Default” from the context menu to overwrite your previous settings.
  • Prevent programs and extensions that you install on your browser from resetting or overwriting your preferred search options by placing a checkmark in the box next to “Prevent programs from suggesting changes to my default search provider” at the bottom of the Manage Add-ons window.
  • Close the “Manage Add-ons” window by clicking the “X” in the top right corner or by clicking the “Close” button near the bottom of the window.

Firefox 10

  • Click the inverted triangle beside the icon for your current default search engine on the left edge of your Firefox search box. The Firefox search box is to the right of the address bar, just below the main toolbar at the top of the browser window.
  • Choose “Manage Search Engines" from the drop-down menu. Place your cursor over the search engine that you want to use. Click the “Move Up” button until your choice is the first search engine in the list.
  • Close the “Manage Search Engines” box by clicking the "OK" button.
  • Block changes to your search preferences by setting Firefox to alert you when a program attempts to modify the browser's settings. Open the “Tools” menu on the top toolbar and select “Options.” Click the “Lock” icon to open the "Security" tab. Tick the box beside “Warn me when sites attempt to install add-ons." Close the dialog window by clicking “OK."

Tips & Warnings

  • Create a custom list of search engines in your Chrome browser by typing the URL of a search engine such as YouTube or Wolfram Alpha in Chrome’s address bar. Leave the site window open and click the “Tools” icon. Choose “Options” from the menu and click “Manage search engines” to add the site your Chrome search engine list automatically.
  • Customize your Internet Explorer search engine list by clicking the “Find more search providers” hyperlink at the bottom of the “Search Providers” window to find and add search engines that are not in your list. This opens the Internet Explorer Gallery. Choose “Search” from the left sidebar. Scroll through the icons to find add-ons for search engines such as Facebook, Amazon and Lycos. Choose a search engine by clicking on its icon. Click the “Add to Internet Explorer” button, then click the “Add” button in the “Do you want to add this search provider?” confirmation box. Look for additional custom search engines, such as Ebay, by choosing “Shopping” or another category in the Internet Explorer Gallery sidebar.
  • Select the “Get more search engines” hyperlink at the bottom of Firefox’s “Manage Search Engines” dialog box to add search engines such as Twitter and Wolfram Alpha to Firefox. Sort the list by name or date to see the full list of Firefox search add-ons. Select the add-on of your choice and install it by clicking the “Add to Firefox” button. You might need to restart your browser before the search engine appears on your list.

 

How to Browse Anonymously

Although many users believe that their Web surfing activities are anonymous, a great deal of identifying information is transmitted to and from websites that you browse. A history of the sites you've visited is stored on your computer even after you close your browser, and most websites keep logs of visitors' IP addresses and other statistical data. For those who wish to surf the Web anonymously, most of the major browsers offer secure browsing modes to give users more anonymity as they travel the Web.

Instructions Internet Explorer

  • Run Internet Explorer and open the "Tools" menu. Click the "InPrivate Browsing" option to open a new window that invokes this secure browsing mode. Alternately, press "Ctrl-Shift-P" on your keyboard to launch an InPrivate browsing window, or right-click a pinned Internet Explorer icon on the taskbar and select the "InPrivate Browsing" option from the context menu.
  • Browse as you normally would. If you visit websites where you have accounts, you will need to log in manually because InPrivate browsing mode does not load any cached information or cookies from previous browsing sessions. If you return to one of these websites later in a regular browsing session, your login information will be stored in the usual manner.
  • Close the InPrivate browsing window when you are finished. Make sure that you don't have any content you want to save in other tabs, as all information will be lost when your close the window.

    Mozilla Firefox

    • Launch Firefox. Click the "Firefox" button in the upper left corner of the window and select the "Private Browsing" option. Alternately, press "Ctrl-Shift-P" to start a private browsing session.
    • Click the "Start Private Browsing" button to begin your private browsing session when prompted. Any tabs that you currently have open will be saved and then closed, allowing you to recover your current browsing session once you have finished browsing privately. The "Firefox" button will turn purple to indicate that you are browsing privately.
    • Browse as you normally would, keeping in mind that no user data or preferences will be loaded from previous browsing sessions. Click the "Firefox" button and select the "Stop Private Browsing" option to return to standard browsing mode and reload your previously saved session. Alternately, press "Ctrl-Shift-P" again to terminate private browsing.

    Google Chrome

    • Launch Chrome and click the "Wrench" icon to access the options menu. Click the "New Incognito Window" option to start browsing in Chrome's Incognito Mode. A new window will open with an Incognito Mode icon that looks like a man in a trench coat and fedora. Alternately, you can launch an Incognito Mode window by pressing "Ctrl-Shift-N" on your keyboard while in Chrome.
    • Browse as you normally would. Note that user data and preferences from previous browsing sessions won't be loaded while you are browsing in Incognito Mode.
    • Close the Incognito Mode window to end your private browsing session. Any cookies or other data produced by the browsing session will be deleted when the window is closed.

    Tips & Warnings

    • There are other ways to browse anonymously, such as the TOR browser that was explicitly designed to mask IP addresses and the Anomymizer.com website that routes browser traffic through its own servers to hide your IP information.
    • Plugins can add encryption features to some popular Web browsers. Firefox users can use the FoxTOR or Ultrasurf plugins to surf the Web anonymously; the latter is also available for Internet Explorer users. Chrome users can install the TOR Button plugin, which adds a toggle button to the browser that can be used to turn anonymous browsing on and off.
    • To protect your personal information, you can manually delete cookies, temporary files and other data using the "Options" or "Preferences" feature specific to your browser. Make sure that you manually log out of websites and set your browser to never remember passwords before doing this to ensure that login data isn't saved or ignored when clearing cookies and other files.
    • Turn off "third party" cookies to reduce the trail you leave as you surf the Web. Cookies are often placed on your computer when you browse a website, but some cookies can be read by other websites for advertising and similar purposes. In your browser's privacy settings, select "Customize Settings" or its equivalent and uncheck the box beside "Accept Third-party Cookies" or a similarly named option.
    • Web browsing is often not completely anonymous. Even users who deploy secure plugins and alternate browsers designed for anonymity can sometimes be tracked through the websites they visit or activities they perform online. If you post in chat rooms or on message boards, be aware that your comments may impart revealing information that defeats your efforts to surf the Web anonymously.

     

    How to Disable Browser Plugins, Extensions and Add-Ons

    Internet Explorer and Mozilla Firefox call them "Add-Ons." Google Chrome calls them "Extensions." By any name, third-party files extend the abilities of your browser far beyond mere Web surfing. Every major browser manufacturer offers a gallery with thousands of extensions that enable enhanced browsing, add functionality to Facebook or Twitter, or add games to your browser. In addition, utilities such as Adobe Flash install a second category of third-party files known as plugins. These work in the background and usually connect with external software, enabling your browser to play videos, use Web applications and more.

    Although extensions, add-ons and plugins should normally assist you in using the Web, too many extensions or plugins may slow your browser down or create conflicts. If problems occur, or you're simply ready to remove a specific feature you no longer need, you'll want to be able to disable plugins and extensions quickly.

    Instructions

    Microsoft Internet Explorer 8 and Later

    • Locate the New Tab button near the top of the browser window to the right of the address field and any other open tabs. Right-click the empty space between the New Tab button and the Home house-shaped icon. Select "Command Bar" from the context menu that appears. Choose "Manage Add-ons" from the Tools drop-down menu to open the Manage Add-ons dialog box. IE9 hides the Command Bar by default, but IE8 does not. In IE8, the Tools menu is already visible.
  • Choose the add-on type you want to disable. By default, the Manage Add-Ons window lists the currently loaded add-ons.
  • Choose the add-on you want to disable and click "Disable." IE will also disable any add-ons dependent on the add-on you're disabling. If other related add-ons are installed, IE will display them and allow you to disable them as well.

    Mozilla Firefox

    • Click the orange "Firefox" button in the top left-hand corner of the browser window and choose "Add-ons" from the right column of the menu to open an Add-ons Manager tab in the active browser window. If you are using Windows XP, click on "Tools" from the menu bar near the top of the browser window and choose "Add-ons."
    • Click "Extensions" to view the installed extensions that add features to Firefox, or click "Plugins" to view plugins that add compatibility and functionality, such as Apple QuickTime or Adobe Acrobat.
    • Find the add-on you want to disable and click its "Disable" button. If you want to delete an extension entirely, click "Remove." Restart Firefox to complete the process.

    Google Chrome

    • Click the wrench icon at the top right of the browser window, choose "Tools" and choose "Extensions" to open a new "Options" tab.
    • Uncheck "Enabled" to disable an extension, or click "Remove" to delete it completely.
    • Enter "chrome://plugins/" in Chrome's address bar to view plugins that add compatibility and functionality, such as Apple QuickTime or Adobe Flash, and click the "Disable" link under the plugin you want to disable.

      Tips & Warnings

      • Internet Explorer 9 may display a dialog box to inform you when a new add-on version is installed, or when add-ons are loading slowly. You may prevent the latter dialog from appearing by clicking "Disable Add-Ons" or choosing a longer delay setting from the "Tell me when the total add-on time is greater than" pop-up menu.
      • Some plugins, such as McAfee Virtual Technician, Adobe Flash and Java, provide functionality that will be unavailable if you disable them. For this reason, most applications don't allow you to delete plugins as you can extensions.


     

    How to Update Microsoft Internet Explorer

    Microsoft Internet Explorer is the most widely used of all Internet browsers. The options you have available when you use it are very helpful and convenient. Using Microsoft Internet Explorer is one of the best ways to surf the Internet, but make sure you are getting all of the latest features possible. The best way to do this is to keep Microsoft Internet Explore updated. You can easily accomplish this by following the steps provided explaining how to Update Microsoft Internet Explorer.

    Instructions

    • Connect to the Internet. Make sure you have an Internet connection available to update Internet Explorer.
  • Click on the “Start” button located on the bottom left of your computer screen.
    Click on “All Programs” or you can hold the mouse pointer over it to open it, if you have Microsoft Windows XP.

  • Select “Windows Update”, which will be in the first (left side) pane of listed installed programs. You may have to then select “Check for Updates”. This opens the Microsoft Update page.
  • You will have the option to select either “Express” or “Custom” updates. It is recommended that you choose "Express" to get all of the high-priority updates available. Your computer will be scanned checking for all of the latest updates that are available.
  • Once the scan is complete, you will see a list with all of the possible (and recommended) Microsoft Windows updates. Make sure all of the Microsoft Internet Explorer updates are selected.
  • Click on “Install Updates” to download. You may have to select “Run” (or “Save” if you want to save a copy of them) to begin the process.
  • Once the Microsoft Windows updates have downloaded, follow the directions given to install them. You may have to restart your computer to complete the updates.
  • Tips & Warnings

    • You can update Microsoft Internet Explorer through the Control Panel. Select “Start,” “Control Panel” and then select “Windows Update” that is listed on the left side. You could also do an update for Microsoft Internet Explorer by going directly to the Microsoft Windows Update page listed in the resources.
    • If this is your first time doing any Microsoft Windows updates (Internet Explorer or other Microsoft programs on your computer) you will have to verify your copy of Microsoft Windows when you first open the Microsoft Windows Update page. This is a very fast and easy process to complete. Simply follow the directions given. Once you have verified your copy of Microsoft Windows, you can proceed with updating Internet Explorer.

     

    Email Safety & Attachments

    Electronic mail is used every day by millions of people for personal and business communication. Understanding email security risks and how to avoid them is key to helping safeguard your email usage.

    Sensitive Information

    • When sending personal information such as an address or telephone number, verify that the email address you are sending it to belongs to the person you intend to receive it. Sensitive information such as passwords, bank account numbers and Social Security numbers should never be sent via email.

    Phishing

    • Scams called "phishing" attempt to dupe consumers into revealing account login information by pretending to be a legitimate company and sending an email claiming that there is a problem with their account. Always check with the company that a suspect email is claiming to be.

    Junk Mail

    • Unsolicited or "junk" email is also called "spam." Install a spam filter onto your desktop mail client or use a trusted webmail provider that provides powerful spam filters to automatically delete messages from known spammers.

    Sending Attachments

    • Before sending, check with your email provider to ensure that your attachment meets the size limits set by your administrator. If your document contains sensitive data, you can provide a layer of protection by first compressing it in a different file format (such as .zip or .rar) and requiring a password to access the data.

    Receiving Attachments

    • Always run a virus scan on an attachment before opening it. Never open an attachment from a spammer or otherwise unsolicited or unknown source. Never open attachments with the extension .exe as this may open a virus that can harm your computer.

    How to Change the POP Settings on Your Email

    Changing the POP settings for your desktop email client might be necessary if your Internet service provider, or ISP, modifies the settings on your mail server. If that occurs, you must change your POP settings before the local client, such as Windows Live Mail, can sync with the mail server.

    "POP" is an acronym for Post Office Protocol, which controls the communications between your desktop email client and your mail server. The most commonly used email clients, such as Outlook, Thunderbird and Windows Live Mail let users perform this task through simple menus. Once you obtain the required information from your email provider, it only takes a few minutes to change the POP settings on your desktop client.

    Instructions

    All Mail Clients

    • Obtain the correct POP settings, security type and port numbers for your account from your ISP. This information is often available in your registration confirmation or in the customer support area of the provider's website. If your service provider recently changed the server's POP settings, look for the new settings in an email from your ISP announcing the server upgrade or change.

  • Save the POP settings in a text file so you can refer to this information as needed. If you do not configure these settings correctly, you'll receive an error message when you attempt to retrieve your email from the mail server.
    • Launch your desktop email client. The program must be running for you to make any changes to the POP settings.

    Live Mail

    • Find the name of the email account that you need to modify by scrolling through the list in the left panel of the Home window. Right-click on the email account and choose “Properties” from the pop-up menu.
    • Click the “Servers” tab in the Properties window to see your current POP settings. Look in the input field next to “Incoming Mail (POP3).”
    • Delete the existing information from this field and type the new POP server name, which is typically pop.yourispname.com or mail.yourispname.com.
    • Tick the radio button for the authentication protocol your ISP instructed you to use. The most common protocol is “Secure Password Authentication,” but you might need to select a different protocol.
    • Click the “Advanced” tab and verify that the port number for “Incoming mail (POP3)” matches the number provided by your ISP. If it does not match, type the correct port number into the box. Click “OK” to close the window and save your new POP settings.

    Outlook

    • Click the "File" menu and select “Info.” Choose "Account Settings" and then select "Email." If you have more than one email account in Outlook, highlight the name of the account that you want to modify, then click “Change” to open the POP settings page.
    • Locate the “Incoming mail” text box in the Server Information section of the settings page. Replace the existing information with the new POP server settings that you obtained from your email provider. Change the "Authentication" setting, too, if necessary.
    • Click the “Advanced” tab. Compare the “Incoming mail” port number with the one you were given and change it if it doesn’t match. Click “OK” to save your settings.

    Thunderbird

    • Open the “Tools” menu and select “Account Settings.” Thunderbird displays all of your email accounts in the left pane of this window.
    • Choose the email account that you want to modify by clicking on it. Select “Server Settings” under that account.
    • Change the server settings if they do not match the information supplied by your ISP. Enter the correct information and click “OK” to save your changes.

     

    What Is an Easy Way to Embed a JPG in Email?

    Nearly every email client lets you copy and paste a JPG photo or other image right into the body of an email message, as long as the message is in rich text or HTML format, not plain text. Email clients and webmail applications that do not embed copied and pasted images give users another way, such as an "Insert image" button to guide users through inserting a picture.

    Email Formats

    Email messages can be formatted as plain text or HTML. You can't embed an image in a text email, but you can embed one in an HTML message. An easy way to tell the difference is to check and see if your email program will allow you to change the color or font of the words in the email body. If it will, then the format is HTML. If the email format is plain text, you can change it to HTML or rich text in the message settings. For example, in Windows Live Mail, if formatting options are grayed out in the New Message window, click the "Rich Text (HTML)" button in the Message ribbon. In Gmail, click the "Rich formatting" link above the compose window.

    Copy and Paste

    • The first step to embedding a photo is to copy it. If you have a photo displayed in an email, in a document or on a Web page, you can copy it just like text. Right-click on the photo and choose "Copy." Alternatively, highlight the photo by clicking and dragging the mouse cursor over it and then either press "Ctrl-C" on the keyboard or click "Edit," "Copy." After copying the photo, move to the email message in which you want to embed it. Right-click in the location where you want the photo to appear and choose "Paste," or press "Ctrl-V" on the keyboard, or click "Edit," "Paste."

    Insert

    • The ability of most email clients and some webmail apps to accept a copied and pasted image is relatively new. Before users could rely on the system clipboard for image embedding, they could insert an image using a method similar to adding a file attachment -- and they still can. In Gmail, for example, after ensuring the message is in rich text format, click on the icon that looks a bit like two mountains (for the more literal-minded, the icon with two overlapping triangles). Users of the Thunderbird email client can click on the icon representing a dog-eared sheet of paper and then choose "Image" from the resulting drop-down menu.

    Attach Instead

    • An alternative to embedding a photo in the body of an email is to send it as an attachment. If you do this, the recipient will see the email as text and below it see either the image or images you attached or a link to click on to view or save the image.



     

    Email Mailbox Full Messages

    Online email services such as Gmail, Hotmail and Yahoo give free account users gigabytes of space for storing messages and attachments. These Web-based mail services allow users to save virtually any message, document or photo received in an email without fear of using up their allotted space. Still, even an email account with an incredibly large inbox can fill up over time. A full mailbox is even more apt to be a problem if you use a school or work email account with a disk-space quota that limits the amount of messages and attachments you can store on the server. If your inbox becomes full, you may occasionally receive “Mailbox Full” errors, which effectively prevent you from receiving and sending messages. If you receive this error while you are checking your messages, you can use tools built into your email client to clean your inbox and quickly restore your ability to send and receive messages.

    Why the Error Happens

    • The most common reason that a “Mailbox Full” message appears is the fact that your inbox on the mail server has reached its quota or storage limit. All servers impose some sort of limit on the amount of space an account can use on the server’s hard drive. If you are the owner or postmaster of a website, your inbox might not have a specified size limit, but storage is still limited by the physical size of the server’s hard drive. On the other hand, if you have a regular email account on a school or business website, chances are your account has a default size limit. Because organizations may have thousands of email users on a single server, inbox quotas can be relatively small. In fact, many organizations limit inbox storage to a modest 50 to 250MB. If you receive text-only emails, you’ll be able to store thousands of messages in this space, but if you receive email with photos or music attachments, your allotted space on the mail server may fill up quickly. The bottom line is that the more messages you save (or neglect to delete) on the email server, the faster your inbox will fill up. Even if you have a multi-gigabyte email account with Gmail or Yahoo, you will eventually exceed your inbox quota.

    Store Messages Locally

    • Some users regard their email accounts as free online storage because the files in their inboxes are readily available to them from the mail server. Over the long term, this option is only viable for users with accounts that provide a lot of storage space for messages and attachments. If you have a Gmail account with 3GB of email storage, you can probably leave important documents and photos on the mail server indefinitely. But if you have an email account with minimal storage, leaving important files on the server may quickly push you over your quota. Another fact to consider is that server backups by schools and smaller organizations might not be as frequent, putting your important data at risk if the server crashes. Virtually all email clients offer an option for deleting email on the server after downloading the messages to your local computer. In widely used applications such as Outlook, Outlook Express and Thunderbird, enabling this feature is as simple as opening the Options or Preferences menu on the application toolbar and clicking on a few settings. Instead of using the mail server as online storage for your files, consider opening a free account with DropBox or SkyDrive. You can then safely store your important files in the cloud and free up precious space in your inbox.

    Clear Email on Remote Server

    • Using the “Delete messages on server” option can help you free up space in your inbox, but this option might not work for older messages that existed on the server before you enabled the feature. In some cases, email clients check only for new messages when communicating with a server, so if you have older messages on the server, your software might not see them at all. In this case, you might need to create a new profile in your email client and then enable the “Delete messages on server” option before clicking the “Send/Receive” button on the toolbar for the first time. When creating the new profile, use the same login information that you used for your primary profile. Then, when you click the “Send/Receive” button in your email client, the application should download all messages in your inbox on the mail server, including the old messages that were not previously detected. Once you have created the new profile, downloaded your mail and deleted all messages on the server, set the new profile as your default. You can delete the old profile from your email client or leave it as is so you can reference older messages not included in the new profile.

    Preventing Future Errors

    • Although neglecting to delete old emails on the server is the primary reason for “Mailbox Full” error messages, spam and old email subscriptions are major culprits as well. If you receive a lot junk mail in your inbox, be sure to mark those messages “Spam” or “Junk.” This tells the software that any messages received from those senders in the future should be routed directly to the junk mail folder and deleted from the server. Also, report spam to your email or network administrator so that he can filter and delete messages from offenders before they reach your inbox. If you subscribe to online newsletters, review your subscriptions and unsubscribe from any that you do not use regularly. Some organizations send daily newsletters with embedded images that can fill up an email inbox rather quickly.

    How to Request Confirmation That an Email Has Been Read

    Waiting for a response to some emails can be nerve-wracking, such as when you send a message to your boss asking for a raise or when you're giving your realtor your highest bid on a house. As more time passes with you inbox empty, your stress level can continue to build. Email read receipts can help ease some of that anxiety by sending you a notification the moment the recipient opens your email. However, not all email programs offer a read-receipt feature, and different email settings on your recipient's server may prevent the read receipt from generating. A read receipt can be a handy tool to let you know your email's status, but keep in mind it won't always work effectively.

    Instructions

    Microsoft Outlook

    • Open Microsoft Outlook and enter your password if necessary. Click "New" to compose a new message. Write your email as you normally would.
    •  Click on the "Options" tab at the top of the email window.
    • Find the "Tracking" group. Select the type of receipt you prefer by checking the box beside your selection. "Request a Read Receipt" notifies you when the recipient opens the email. "Request a Delivery Receipt" informs you when the email is successfully delivered to the recipient's email server, but not when the recipient opens the email. Click "Send."
    • Configure your email to request a read receipt every time you send a message by clicking on Outlook's "File" tab and choosing "Options." Click "Mail," then "Tracking." Select "Read Receipt Confirming the Recipient Viewed the Message" for a read receipt or "Delivery Receipt Confirming the Message was Delivered" for a notification the email was delivered to the recipient's email server.

    Thunderbird

    • Open Mozilla Thunderbird. Click "Write" in the top left corner of the page to compose a new message. Write your email.
    • Click "Options" at the top of the window. Select "Return Receipt." This lets you know when your recipient receives that specific email. Click "Send."
    • Set your configurations to send return receipts every time you send an email. Click on the "Tools" menu and choose "Options." Under "Advanced," select "General."
    • Check the box beside "When Sending Messages, Always Request a Return Receipt."

    Windows Live Mail

    • Log in to your Windows Live Mail account and click "New" to compose a new email. Write the email.
    • Click on the "Tools" menu on the email message's menu bar. Check the box beside "Request Read Receipt." Send your email.
    • Change your email options to request a read receipt automatically with each email you send. Click on the "Main Menu" button in the top left corner of Live Mail -- it's dark blue and looks like a piece of paper. Choose "Mail," then "Options." Choose the "Receipts" tab and check the box beside "Request a Read Receipt for All Sent Messages." Click "OK."

    Google Apps for Business, Education and Government

    • Log in to your Google Apps for Business, Education and Government email account. Read receipts aren't available for personal Gmail accounts. The Google Apps account offers business-grade hosted email services at a small monthly fee after a 30-day free trial.
    • Compose your email. Click on the "Request Return Receipt" link, which is found directly below the "To" field. Click to check the box beside "Request Read Receipt."
    • Click "Send." A read receipt is requested from each individual listed in the "To" and "CC" fields. Google Apps doesn't send read receipts to group mailing lists, only to individual email accounts. When returned, the receipt shows up below the body of the message if you're using conversation view or as a separate message if you're using the standard view.

    Tips & Warnings

    • Read receipts are not reliable and often fail to inform you when the email has been read. If the recipient checks his email on his smartphone, it's unlikely to send a read-receipt notice to you. Also, the feature relies on the recipient's email server to send a reply, but many are configured in a way that prevents read receipts from being sent. Many email programs, such as Outlook, ask the recipient if he wants to notify the sender that the email has been read. If he selects "No," then no read receipt is sent.
    • As an alternative that may help you track when a recipient has opened an email from you, purchase email tracking software such as Point of Mail, Zendio or ReadNotify. These programs typically track other information in addition to when an email is opened, such as if a recipient clicked on a link in your message and how long he spent looking at your message. Some can text your cell phone to let you know a specific email was read and when.
    • Use read receipt requests sparingly for the best results. Recipients who are prompted by their email programs to decide whether to send you a read receipt are more likely to click "Yes" if it only happens occasionally. If you request a read receipt with each email you send, recipients are likely to ignore them.

     

    Printing Your Email Contact List

    According to a study released by the Email Marketing Reports website, over a billion computer users have a registered email account with either Gmail, Yahoo Mail or Windows Live Mail. These Web-based email clients, as well as desktop email programs such as Outlook, allow you to keep track of the incoming and outgoing emails tied to your account, and keep track of your email contacts in a digital address book. You can also print these contacts, though the steps for doing so vary depending on your client.

    Outlook

    • Launch Outlook and click the "Contacts" tab in the navigation pane. Click the "Address Cards" option beneath the Current View heading. Click the "View" menu and move your cursor over the "Arrange By" option. Move your cursor over the "Current View" option and select "Customize Current View." Place a checkmark next to the contact information you want to print, then click the "View" menu and move your cursor over the "Arrange By" option. Move your cursor over the "Current View" option and select "Phone List." Click the "File" menu and select "Print" to print the Outlook email contacts.

    Thunderbird

    • Launch Thunderbird and click the "Address Book" option. Click the "Tools" menu, select "Export," type a name for the file in the space provided, then select the "Comma Separated (.csv)" option from the "File type" drop-down menu. Click the "Export" button to export the contacts. Double-click the CSV file to open the file in the computer's default text editor, click the "File" menu and select the "Print" option to print the contacts.

      Gmail

      • Log in to your Gmail account. Click the "Gmail" drop-down menu on the left of the screen and select the "Contacts" option. Click the "More" drop-down menu above your list of contacts, then select "Print..." and click the "All Contacts" radio button. Click "Print" to print the email contact list.

      Windows Live Mail

      • Launch Windows Live Mail and select the "Contacts" option in the navigation pane. Click the "File" menu and select the "Export" option. Select the CSV format from the "Format" drop-down menu, type a name for the file in the space provided and click the "Save" button to save the file. Double-click the CSV file to open the file in the computer's default text editor, click the "File" menu and select the "Print" option to print the contacts.

      Disclaimer

      • When you send an email to someone, his contact information is not added to your contact list unless you have your email client configured to do so automatically. Only contacts who are added manually appear in your contact list and, therefore, only contacts you've added manually are printed when you print your email contact list. Double-check your contact list to make all of your contacts are present, and manually add any absent contacts before printing.


    How to Clean up the Spam in Your Gmail Account

    Like many email services, Gmail uses a smart filter to determine if messages should go into your Inbox or your Spam folder. Each time you mark a message as spam, the filter uses information in the message to better detect unwanted, bulk, commercial email in the future. The more often you report messages as spam, the smarter the filter becomes and the less spam lands in your Inbox. You can use a search filter to quickly sort spam from your Inbox. You can then save that filter to send future spam directly to the Trash without it ever appearing in your Inbox again.


    Instructions

    Cleaning out Spam

    • Log into your Gmail account in a new Web-browser window. Select "Inbox" in the left-column menu. Click the arrow located on the right side of the Search field to reveal the search options.

  • Type search criteria that applies to much of the spam you have received into the appropriate search field. For example, you can type a name, email address or partial email address in the "From" field. You can also type words that are used in the spam messages in the "Has the Words" text fields. Note that if you type more than one word in these fields, any messages without one of those words will not be selected.

  • Click the "Search" button. All emails that fall within your search criteria are displayed. Scan the results to ensure only spam is now displayed.

  • Click the "Select" button below the Search field and select "All." Click the "Report Spam" button (a circle with an exclamation mark) that now appears to the left of the Select button. The spam is reported to Google and is deleted from your Inbox.

  • Filtering Future Spam

    • Click the Arrow beside the Search field on your Gmail page. Type an email address belonging to a spam account in the "From" field. Alternatively, you can filter all email coming from a domain by typing the domain name in the From field. This is the part of the address following the "@" symbol. You can also type words in the "Has the Words" text fields that contain spam, but that your friends and colleagues would never use.
    • Select the "Delete It" option, then click the "Create Filter" button. Any incoming messages using your search criteria will automatically be sent to your Trash folder.
    • Open your Trash folder from time to time and mark the spam by selecting the messages and clicking the "Report Spam" button.
    • Edit your filter at any time by clicking the gear icon in the upper-right corner of the Gmail window. Select settings, then click the "Filters" tab. Click "Edit" then change the filter as desired. Click "Edit Filter Actions," then "Update Filter" to save the changes. You can also click "Delete" to permanently delete the filter.

    Removing Messages From the Spam Folder

    • Review the contents of your Spam and Trash folders at least once a month to ensure nonspam messages have not been placed there. Messages in the Spam and Trash folders are automatically deleted after 30 days.
    • Select any message that was incorrectly marked as spam and click the "Not Spam" button to remove it from the Spam folder.
    • Select for permanent deletion any individual spam message in the Spam folder by clicking the check box on the left of the message. Alternatively, select all of the messages in the folder by clicking the "Select" button above the messages and selecting "All." Click "Delete Forever" to permanently delete the selected messages. When the Spam folder is empty, Gmail will display the message: "Hooray! No Spam Here!"
    • a filter to ensure the sender's messages are not placed in the Spam folder again. Copy the name or email address of the sender. Click the Arrow beside the search field and paste the name into the "From" field.
    • Click the "Create Filter With This Search Link," then select the "Never Send It To Spam" option. Click the "Create Filter" button. Messages from this sender will always be placed in your Inbox.

    Tips & Warnings

    • Another way of ensuring someone's messages are not mistakenly sent to the Spam folder is to add the person's email address to your Gmail contact list.


     

    How to Choose an IM Carrier

    When it comes to choosing an instant-messaging carrier, never have there been so many to choose from. IM services are now offered by social-media websites like Twitter and Facebook, email services like Yahoo and Windows Live, and voice services like Google and Skype. Before choosing an IM carrier, consider which will work best with your computer and any other Internet-enabled devices you use, as well as those used by the people you will want to connect with.


    Instructions

    • Examine websites and services you already use to see which have IM capabilities. Facebook, Yahoo, Skype, Gmail and Windows Live all have IM capabilities. Twitter also includes a basic instant-messaging feature through its Direct Message page.
    •  Consider how accessible you want to be on any IM service. Examine each service for privacy settings that allow you to communicate with some people while remaining invisible to those you may not feel like talking to. Most services, including Google Chat, Skype, Windows Live and AIM, let you remain invisible, appearing offline while you are online, even while you're chatting with someone. Facebook Chat lets you limit which contacts can see you when you are online by selecting visibility options for different groups of friends. Note that there are third-party applications that others can use to determine whether you are using an invisibility setting or if you are actually offline. 
    • Consider whether you want to install a dedicated client for instant messaging, or if you want to use a Web browser to use the service on your computer. Facebook, Yahoo, Google and Windows Live use Web browsers for their IM services. Skype uses a client you install to your computer. With AIM, you can install a client or use a Web browser.
    • Examine your smartphone or tablet to determine which IM services include apps for your device. If there are particular people you want to chat with, ensure their computer operating system or mobile device is able to access the same service you plan to use. Facebook Messenger and Skype both have apps available for Android, Blackberry and Apple phones. Twitter includes these devices as well an app for Windows Phone 7 devices.
    •  Consider security before selecting an IM carrier. If being able to chat without your messages being intercepted by others, your chat sessions in a Web browser should use the HTTPS protocol. This is a secure version of the HyperText Transfer Protocol (HTTP) that uses Secure Sockets Layer encryption to protect data from being intercepted. Google Chat, Twitter and other services use HTTPS for security. Facebook does not use HTTPS by default, but it can be enabled by changing your security settings. Skype uses encrypted Transport Control Protocol (TCP) and User Datatgram Protocol (UDP) to protect your messages from being intercepted.
       

  • Consider additional features you may want to use in addition to chatting using an IM carrier. Google, Facebook, Yahoo and Skype are among those that let you use video chatting with their service.



  •  

    The Best Photo Sharing Websites

    Online portfolios for hobbyists and serious photographers provide sharing options that eliminate the tedium of sending your photos by snail mail. Uploading your pictures to a photo-sharing website not only gets them out of the camera but also provides a safe place to back up your treasured memories. The best photo-sharing sites also make it easy to upload from mobile devices and to publish your photos on blogs and social media sites. Many of the best sharing sites offer free accounts with storage limits and paid accounts with upgraded features.

    Flickr

    • Now owned by Yahoo, Flickr accounts are automatic for Yahoo Mail users. Those who don’t have Yahoo accounts can register with an email address or an existing Facebook or Google account. Flickr members with free accounts can upload up to 300MB of media per month, which includes a maximum of two videos. A Flickr Pro account offers unlimited storage for a nominal yearly fee. Flickr users have access to basic photo-editing tools for uploaded pictures only through Picnik, a photo-editing service. When Picnik closes down in April 2012, Flickr members will need third-party tools to edit photos in their accounts.
      With Flickr’s privacy options, you can restrict who views your photos and prevent unauthorized downloading. Flickr supports uploads by email and from popular mobile phone platforms, including Android, Blackberry, iPhone and Windows 7. It has a desktop application and provides integration with programs such as Aperture, iPhoto, Picasa and Windows Live Gallery. Alexa’s list of Top 50 websites by traffic ranks Flickr.com as number 37 in the U.S. and 47th globally. Flickr is the only photo-sharing website in the Alexa Top 100.

    Photobucket

    • Photobucket gives its members unlimited photo storage space, a feature that sets it apart from other free photo-sharing websites. Users also receive a generous storage allowance of 500 videos per account. Register using a Facebook or Twitter account or an email address. Users can keep media private with password protection or allow public viewing and use. Photobucket supports Android, Blackberry, iPhone and Windows 7 phones and provides the Snapbucket app for iPhone and Android sharing.
      Photobucket gives users the ability to organize files utilizing tags, albums and slideshows. Free photo-editing tools and photo-gift options also draw users to Photobucket. Professional accounts, available for an annual fee, are ad-free and members can upload high-resolution photos; professional members also receive discounts on photo-printing services and gifts.

    IPhoto

    • Apple's iCloud is free with all of its OS 5 devices. Included in the iCloud service is Apple's cross-platform photo-sharing service iPhoto, which provides options for syncing, storing and sharing your photos. All users must also have an iPad, iPod Touch or iPhone to set up a photo-sharing account; PC users must have Vista or Windows 7. Apple provides 5GB of free storage and lets users upload documents and music to the same account. Sign up with an existing iTunes account or by creating a new iCloud account. Organize your collections by theme, date or custom tags. The service has Facebook, Twitter, Flickr and email integration options. Apple provides editing options that you can use to create and gift items. Privacy options for iCloud give you the ability to restrict access to your media.

    Picasa

    • The Picasa photo-sharing site is a Google service that appears as a top choice on almost every photo-sharing review list. In addition to the reliability and familiarity of Google, Picasa offers simplicity for novices. Once you download and install the desktop software, Picasa automatically searches your computer’s hard drive for photos and adds them to your online account. Picasa also uploads your photos to Web albums that you can make public or share privately by email invitation. Users need a Google or Gmail account to register for Picasa. The 1GB of photo storage is part of your total for all Google services. You can add 20GB of additional shared storage for Google services for a few dollars a year. The online Web album has no editing tools, which are provided only in Picasa’s desktop software. Picasa supports email, Google+, Blogger and Twitter integration. Facebook sharing requires a third-party application. Picasa’s integration with Google Maps makes it simple to embed location data in your photos with Google’s geotagging tools.

    Smug Mug

    • Smug Mug, a paid photo-sharing site, was selected by Consumer Search as best photo-sharing site in 2009 and was a PC World “Best Bet” in 2011. A basic, paid membership includes a choice of more than 50 photo gallery templates. Smug Mug provides CSS and HTML customization options, a custom site name and 1080p video uploads for Power members and Pro members, who pay higher annual membership fees. Pro membership includes e-commerce options you can use to sell media downloads. Smug Mug memberships do not impose storage limits, but a maximum file size of 24MB is enforced. You can create slideshows, photo gifts and embed photos in blogs and emails. Share photos directly on Twitter and Facebook, Tumbler and FriendFeed. The service provides integration with iPhoto, Lightroom and Picasa. Smug Mug apps are also available for iPhone, iPad and Android devices. Use the site’s privacy options to hide your photos completely or use passwords to protect certain galleries.

    How to Market Your Small Business on Twitter

    If you're not sure whether Twitter supplants soap operas as a time sink or offers you some of your best opportunities to build relationships with customers and enhance your company's brand identity, the answer may not surprise you. Like any marketing medium, or any medium that can be used for marketing, Twitter offers you results commensurate with how thoughtfully you approach it and how wholeheartedly you engage in it. Look past its non-traditional exterior to see Twitter's real ability to connect people in ways that can transform your company -- a little bit at a time.


    Instructions

    •  Remember that success on Twitter can build slowly, and that trying to hurry it by buying followers or using shady shortcuts doesn't work. As SocialMediaToday points out in a case study of hardball marketing run amok, "There is no magic pill, magic ticket or free ride to success in social media and business."
    • Be yourself. That means two things on Twitter. First, make your tweets sound like the cohesive voice of your business. If you're small, capitalize on your identity as a one- or two-person business and equate your size with a focus on treating customers like individuals. Second, even if you're bigger than a sole proprietorship, assign one person who's good at communicating your authentic value as a business to be your official and singular voice on the service. Keeping your participation real goes a long way toward attracting followers. As Twitter itself suggests, "Share photos and behind the scenes info about your business. Even better, give a glimpse of developing projects and events. Users come to Twitter to get and share the latest, so give it to them!"
    • Balance overt attempts to attract customers with tweets that convey your company's personality without making an obvious commercial pitch. When you do post a discount offer or a special sales event, your followers pay greater attention to it because you're not always explicitly soliciting their business.
    • Use your Twitter presence to gather more than customers. You can share insights with fellow business people, and even find opportunities to barter services, collaborate on a project with community implications, build a network of like-minded entrepreneurs or learn from veteran business owners. Use mentions and following strategically to build a position of authority in your field. Twitter recommends that you "Reference articles and links about the bigger picture as it relates to your business."
    • Think twice about following everyone who follows you. If you're using your Twitter timeline as a place to rub elbows with customers and suppliers, trying to keep up with a long list of people you followed only as a thank you turns your tweet stream into a raging river of who-can-read-all-that. If you do decide to follow back routinely, define whom you'll follow and whom you won't on the basis of attributes you can discern easily, then create original, non-automated thank-you responses in keeping with your focus on authenticity. As Mashable points out in an essay on the American Express OPEN Forum, "If you do decide to follow everyone, authenticity is key. Your followers will be able to tell whether they're talking to a robot or a person — and a real person is always more valuable on Twitter."
    • Leverage your plans for charitable giving into your Twitter strategy. Consider the relationship between Halo Pets, a holistic pet food company, and the twin websites Freekibblekat.com and Freekibble.com. Modeled on the FreeRice microgiving concept, in which visitors correctly define words to add small numbers of grains of rice to the total donated toward world hunger, these two websites donate small amounts of pet food to homeless animals in shelters. Visitors take a daily multiple-choice quiz, and right or wrong, their participation adds to the kibble donation.
      New Twitter followers of the charitable sites trigger additional kibble donations, as do new followers of the Halo corporate Twitter account. Followers see discounts on pet food, previews of the daily trivia questions, and other informational and commercial tweets. The relationship unifies two congruent organizations in an endeavor that's consistent with both their goals, and gives the commercial enterprise added credibility for its visible commitment to a cause.

    Don't

    • Avoid the "too-much-information," or TMI, phenomenon. If you overshare with your target audience, you may wear out your welcome. Never give your desired customers a reason to unfollow you. As difficult as it is to garner worthwhile followers, it can be many times more difficult to reacquire them, especially if they tell their friends why they stopped following you in the first place.
    • Don't bribe people to follow you. It's one thing to offer special discounts, one-time or longer-term, to your followers. It's another to post repeated tweets about how grateful you'll be for followers, or anything else that sounds awkward, desperate and just plain wrong. Ask yourself if you'd make the same pitch or solicit business the same way if you were on the phone or in the office with the people you're courting on Twitter. If the answer is no, don't implement the strategy.
    • Ignore messages -- formerly direct messages -- and tweets that ask specific questions or offer specific comments at your peril. If someone's taking the time to engage you on specific grounds that relate directly to what you do or what you didn't do, meet her halfway and learn something from how you're perceived, good or bad.
    • Be the powerboat, not the ocean liner. Ocean liners need lots of space and time simply to turn around and move in the opposite direction. Twitter's short, direct communications encourage and foster nimble abilities to move in new directions you weren't expecting to go. Listen to what your customers ask, and don't be afraid to change a bad policy swiftly in response to criticism, or continue a special offer if too few customers found out about it in time.
    • Resist the temptation to tweet about or at an event just because it's different to do so. Different killed the Edsel, a remarkable car with advanced features -- and a grille that looked like a chrome gourami. On a Network Solutions blog, Joe Loong describes five things you don't want people remembering you tweeted about, including two that involve life and death. You don't want to be the company that live-tweeted a child's funeral, or the doctor live-tweeting a kidney operation. Some things need not see the light of day.
    • Don't get into a back-and-forth defending yourself against an accusation of a deal gone wrong from a disgruntled customer who clearly gets more enjoyment out of visibility than you do. Take the high road. In the long run, it's far less expensive to maintain.
    • Sign up for Twitter to help build brand equity for your business, not to become a compulsive retweeter with nothing original to say. If your Twitter output consists of nothing but what other people think, your customers and prospects have no idea where you stand and every reason to suspect you don't, either. The occasional retweet can be a great way to show your agreement with an equally great idea, but think about how annoying “me-too” behavior can be in real life, and avoid being a digital bore.  

      Tips & Warnings

      • Proofread your tweets before you post them. Yes, you can delete a mistake and repost a corrected version, but that's just plain tacky.
      • Don't use the privacy of direct messages as a way to shove complaints under the rug.
      • Check and post to your timeline at least once a day. Develop a feel for when your tweeps are likeliest to communicate and be where they are when they're there.
      • Never say anything on Twitter that you wouldn't want the entire world to read or know. Potentially, that's who is reading what you tweet.