Category Archives: SMS Gateways

NSE5 Study Guides

Question: 1

What output profiles can you confine for report event notifications? (Choose two)

A. SMS

B. Forward to another FortiAnaiyzer device

C. Upload to a server

D. Email

Answer: C, D

Question: 2

Which statements are true regarding content archiving, also known as Data Leak Prevention (DLP) archiving? (Choose two)

A. Allows full and summary archiving

B. It is configured globally for all policies.

C. The default behavior is to do full archiving.

D. The DLP engine examines email, FTP, NNTP, and web traffic.

Answer: A, D

Question: 3

Given the Antivirus and IPS update service is enabled, and the FortiGuard settings as shown in the exhibit. The desired behavior is for managed devices to use public servers for these updates should FortiManager become unreachable, which is not the case with the current configuration. What two actions are necessary to correct this? (Choose two)

A. Change the server override mode from strict to loose.

B. Change the pat from 8890 to 443 n the Use Override Server Address for FortiGate/FortiMail settings.

C. Uncheck the option Use Override Server Address for FortiGate/FortiMail.

D. Change the IP address to a pubic FDS server and pat to 443 n the Use Override Server Address for FortiGate/FortiMail settings.

Answer: A, C

Question: 4

What remote authentication servers can you configure to validate your FortiAnalyzer administrator logons? (Choose three)

A. RADIUS

B. Local

C. LDAP

D. PKI

E. TACACS+

Answer: A, C, E

Question: 5

Which two statements are correct regarding synchronization between primary and secondary devices in a FortManager HA duster? (Choose two)

A. Al device configurations ncbdng global databases are synchrorized in the HA cluster,

B. FortiGuard databases are downloaded separately by each cluster device.

C. FortiGuard databases are downloaded by the primary FortManager device and then synchronized with al secondary devices.

D. Local logs and log configuration settings are synchronized in the HA cluster.

Answer: A, B

Question: 6

Workflow mode introduces which new permissions for Super_Admin administrative users?

A. Self-approval, Approval, Reject

B. Self-disapproval, Approval, Accept

C. Approval, Self-approval, Change Notification

D. Change Notification, Self-disapproval, Submit

Answer: C

Question: 7

Which two statements are correct regarding header and footer policies? (Choose two)

A. Header and footer policies can only be created h the root ADOM.

B. Header and footer policies can only be created in the global ADOM.

C. Header and footer policies are created in policy packages and assigned to ADOM policy packages.

D. Header and footer policies can be modified h the assigned ADOM policy package.

Answer: B, C

Question: 8

What two statements are correct regarding administrative users and accounts? (Choose two)

A. Administrative user accounts can exist locally or remotely.

B. Administrative user login information is available to all administrators through the Web-based

C. Administrative users must be assigned an administrative profile.

D. Administrative user access is restricted by administrative profiles only.

Answer: A, C

Question: 9

What statement correctly compares FortiManager physical and virtual appliances?

A. Physical and virtual FortiManger appliances may mange unlimited devices and have unrestricted storage.

B. Physical and virtual FortiManger appliances use licenses to increase managed device and storage capacity limits.

C. Physical and virtual FortiManger appliances have unrestricted daily logging rate.

D. Physical and virtual FortiManger appliances use model types and licenses respectively, to differentiate managed device and storage capacity limits.

Answer: D

Question: 10

What is the purpose of locking an ADOM revision?

A. To prevent further changes from Device Manager,

B. To disable revision history.

C. To prevent auto deletion.

D. To lock the Policy and Objects tab.

Answer: C

Question: 11

Which two statements describe a “modified” device settings’ status in the Configuration and Installation Status widget of a managed FortiGate device?

A. Configuration changes were made directly on the managed device,

B. Configuration changes were made from Device Imager for a managed FortiGate e device.

C. Confutation changes were instated to a managed FortiGate device.

D. Confutation changes in Device Manager no longer math the latest revision in the device’s revision history.

Answer: B

Question: 12

What effect do administrative domains (ADCMs) have on report settings? (Choose two)

A. Hone. ADOMs cannot be used with reports.

B. Reports must be configured with (her own ADOM.

C. Chart Library, Macro Library, Dataset Library, and Output Profile become ADOM- specific.

D. Dataset Library becomes global for al ADOMs.

Answer: B, C

Question: 13

What statements are true regarding disk log quota? (Choose two)

A. The FortiAnalyzer stops logging once the disk log quota is met.

B. The FortiAnalyzer automatically sets the disk log quota based on the device.

C. The FortiAnalyzer can overwrite the oldest logs or stop logging once the disk log quota is met.

D. The FortiAnalyzer disk log quota is configurable, but has a minimum o 100mb a maximum based on the reserved system space.

Answer: C, D

Question: 14

Which ports are commonly used by FortWanager? (Choose two)

A. TCP 541 for remote management of a ForUGate unit.

B. TCP 5199 HA heartbeat or synchronization (FortMaTager HA cluster).

C. TCP 703 HA heartbeat or synchronization (FortiManager HA duster).

D. TCP 514 for remote management of a FortiGate urat.

Answer: A, B

Question: 15

What statements are true regarding FortiAnalyzer ‘s treatment of high availability (HA) dusters? (Choose two)

A. FortiAnalyzer distinguishes different devices by their serial number.

B. FortiAnalyzer receives logs from d devices in a duster.

C. FortiAnalyzer receives bgs only from the primary device in the cluster.

D. FortiAnalyzer only needs to know (he serial number of the primary device in the cluster-it automaticaly discovers the other devices.

Answer: A, B

Question: 16

If RAID isn’t supported, what are other types of backup mechanisms (ie.methods to preserve your log data in the event of disk failure, deletion, or corruption?(Choose three)

A. Backing up logs through the Web-based manager or CLI.

B. Forwarding logs a syslog server.

C. Uplaoding logs to an FTP, SFTP, or SCP server.

D. Archiving logs.

E. Enabling full archiving.

Answer: A, B, C

Question: 17

Which statement correctly names the Administrative Domains modes supported on FortiManager?

A. Normal and Analyzer

B. Backup and Analyzer

C. Normal, Backup, and Collector

D. Normal and Backup,

Answer: D

Question: 18

Which tabs are available on the FortiManger Web-based manager? (Choose two)

A. Device Manager

B. Policy & Objects

C. FortiGate

D. Database

Answer: A, B

Question: 19

What are the operating modes of FortiAnalyzer? (Choose two)

A. Standalone

B. Manager

C. Analyzer

D. Collector

Answer: C, D

Question: 20

What are three different methods you can employ to send event notifications when an event occurs that matches a configured that matches a configured event handler?

A. Email

B. SMS

C. SNMP

D. IM

E. Syslog

Answer: A, C, E

Question: 21

What is ‘hot swapping’?

A. Hot swapping means administrators can confine FortiAnalyzer to write to all hard device in order to make the array fault tolerant.

B. Hot swapping means administrators can replace a failed disk on devices that support software RAID while the device is still running.

C. Hot swapping means administrators can ensue the parity data of a redundant drive is valid while the device is still running.

D. Hot swapping means administrators can replace a fated d* on devices that support hardware RAID while the device is still running.

Answer: D

Question: 22

Refer to the exhibit. What does the clock icon denote beside the Bandwidth and Application Report.

A. It is a custom report.

B. It is an imparted report from either a different FortiAnalyzer device or a different (but supported) ADOM.

C. It is h the process of generating.

D. It is a scheduled report.

Answer: D



Source by Patrick McPherson

How to Log Denied Packets on Palo Alto Firewall

Palo Alto firewalls have recently featured in Gartner Report as a next generation firewall and they are getting popular at a very rapid pace. The core feature of a Palo Alto Firewall is its ability to detect and recognize applications. This allows administrators to define rules sets and filtering based on applications rather than traditional method of restricting TCP or UDP port numbers as with what Gartner calls first generation firewalls.

Palo Alto Firewall is also a Unified Threat Management gateway device that combines multiple features in a single box. These features include Antivirus, Anti Spyware, Vulnerability Protection, File blocking, Data Protection, Denial of service protection and URL Filtering through Brightcloud.

With all these advanced features it is also important to understand and find out what is being blocked by the firewall. Without this visibility it is difficult to provision, migrate and seamlessly integrate the services through this firewall because the way data is filtered is different from a traditional firewall. By having a realtime knowledge on whats being blocked through the firewall, administrators can make changes on the fly and cut migration times.

The simple way to have visibility on denied packets is to configure a default deny access rule at the end of your rule set under Policies Tab if configuring through graphical user interface of the Palo Alto firewall. If administrators are looking to monitor all traffic passing through the firewall they should put any to any rule and default action as block.

Now with the above action, administrators will also notice that traffic between the same security zone are getting dropped as well due to the above any to any rule. This should ideally be addressed as well, as it will potentially drop locally generated traffic. To resolve this issue, administrators can simply add an explicit allow statement for each security zone. For example if administrators have configured a security zone called “Inside”. There needs to be an allow statement for traffic to pass through from source zone as “Inside” and destination zone as “Inside”. This rule should be places above the default deny rule kept at the bottom of the rule set. Similar rules needs to be created for every security zone that is dropping traffic between itself.

Although it is not mandatory for administrators to have all explicit allow and default deny statements in their rule base but it definitely make their tasks easier at managing this next generation firewall.



Source by Amit D Jain

Benefits of Using a Personal Firewall

Do you really think your computer is completely protected by the best antivirus program alone? Think again. Not all computer threats are viral in nature. In fact, computer viruses are just a fraction–though a big fraction–of the many forms of computer security threats these days.

It is important that you protect your system with the best antivirus firewall software, not just an antivirus program alone. The firewall component is as important as the antivirus component, since many other types of malware also pass through various vulnerable ports and openings on your computer.

Despite your efforts to update your antivirus programs and scan the entire computer daily, it is without doubt considered lacking when it comes to securing the safety of your computer and other important information that it contains. Many have already been victimized by hackers without knowing what went wrong. Despite people’s awareness of the benefits of an antivirus program, there are still some who are victims of identity theft.

Some people might think that an antivirus is enough to avoid malicious software and computer threats. But, they are actually wrong. An antivirus program alone can’t protect your computer user from cybercrime. You also need firewall protection, which is an important computer application that protects computers from hackers and is specifically only for end users. With firewall protection, the computer is expected to be safe from intrusion from outsiders so that the entire user’s personal data is unscathed.

Aside form checking the network traffic of the computer, a personal firewall has also many other benefits. For example, your computer will have total control of what comes in and out of the computer. The firewall will show necessary data regarding a certain program and/or server that is trying to connect with your computer. It will warn you of any attempt made by a certain application trying to access the Net or the local network.

Your personal firewall filters and scans possible malicious software and warns the user if there is any malicious outside program trying to access your computer. It will immediately act after detecting suspicious behavior, such as tampering the user’s computer. The personal firewall also hides the computer from automated port scans by blocking unauthorized network traffic.

So, it is best to not just rely on antivirus and frequent scans of your computer. As a computer user, you are responsible over knowing what the latest technology is when it comes to computer protection and safety. These days, the most secure way to go is to use the best antivirus firewall software that fits your security needs.



Source by John Roy Foley

Website Defacement Prevention – Discover 5 Popular Methods to Prevent Defacement

Have you ever watched a train go by and seen the cars covered in graffiti? How about driving through a town or city, where the graffiti covers walls, buildings, barriers and fences? It’s truly an embarrassing sight to see. Why do people feel the urge to deface property in such a manner? Is it merely to make a statement?

Do you realize there are people on the Internet who want to hack your web server and leave their own form of graffiti on the web sites hosted therein? They want to alter the content in an attempt to cause you embarrassment. Worse, they may want to steal valuable information because there is money to be made in such criminal activity.

How does an attacker gain access to the system and alter the content? There are several ways.

Accessing the server directly by exploiting security vulnerabilities in the operating system or web application software allows an attacker to gain access. Some vulnerabilities are exploited at the client side by hijacking sessions, executing scripts in the client browser, or executing remote browser control.Regardless of the method of access, there are measures that can be taken to prevent unauthorized malicious access to servers and client computers.

As the saying goes, knowledge is power. Knowledge is gained by having access to information.

Face it business is a global activity. Improving a company’s business position in the global market place often requires decisions to be made in a very short time. Making the right decision means having the appropriate information in the hands of the decision makers. Decision makers need information they can rely upon.

If they receive information that is invalid or compromised, the resulting decision may be incorrect and cost time, money and resources.

The goal is to protect the data contained on client and server systems.

1. Increase website security.Website security begins with managing the physical security of all servers. At the very least, web servers, application servers, communications servers, and communications equipment should be secured in a locked room accessible by those that have a need to access these devices.

2. Incorporate web server security.Securing the server in a locked room secures the hardware.But, what about securing the software and the data? After all, an attacker can still gain access through the connections and exploit vulnerable operating systems and web applications. Ensure the security updates and patches available for the operating systems and application software are current. Encrypt data and data streams accessing the server. If your company performs its own web application development, improve the web application security by adopting secure practices.

3. Install a web application firewall. You probably incorporate a firewall for the communications devices. A network firewall limits access to devices through various communications channels and analyzes incoming data with defined communications policies. Likewise, a web applications firewall analyzes incoming application data to determine if the data is legitimate or an attack on the system.

4. Tighten web application security. Many attackers exploit security vulnerabilities found in application and web application programs. If your company performs its own application and web application development, incorporate practices that do more to secure the code and eliminate holes that can be exploited.

5. Schedule regular security testing. How do you know if your systems are at risk? Well, you can wait until you are attacked and exploited, or you can take a proactive approach and develop security-testing policy and conduct security testing at regular intervals.



Source by Tomer Shoha

Top Ten Facts About Spyware

Unless you’ve been on another planet for the last five or six years you have surely heard of Spyware and I would hope you are taking precautions against your PC being infected. But do you know that the precautions you take may be ineffective in protecting your PC? Here are my Top Ten Facts about Spyware – some of them may shock you!

1. The average home PC contains 30 pieces of spyware according to an audit carried out in 2006 by security company Webroot Software. The type of infections range from the relatively harmless adware programs to malicious system monitors and trojan horses. Adware programs are software installations that display advertisements. System monitors are much more malicious and track a computer user’s Internet activity and capture personal information. Trojan Horse is the name given to malicious software which, although harmless itself, opens the way for more malicious software to be installed. Webroot Software found that, on average, the 30 pieces of spyware would contain at least 1 system monitor and 1 trojan horse.

2. Your identity can be a few mouse clicks away for criminals. Spyware can gather and report all the personal information about you including credit card numbers, bank account details, user names and passwords. According to The Identity Theft Resource Center, 13.3 people in the U.S. become victims of identity theft every minute. Although not all of these are due to spyware, it’s still a chilling thought that it can happen so easily if your PC is infected with this kind of malicious software.

3. Spyware can slow down you computer. Any computer has a limited amount of system resources. Every time another piece of software is run the computer must share out its resources ever more thinly. Malicious software infections result in longer boot times and an overall slowing down of the PCs performance.

4. Spyware can dramatically slow down your Internet connection. Every Internet connection has a limited amount of data it can transfer at any one time. All spyware communicates with the Internet thereby using up some of your available Internet communication. The more spyware, the more Internet communication will take place and the less space on your Internet connection for your own use.

5. Spyware can turn you into a ‘spammer’. Some spyware can download other software on to your PC that can relay Spam. In some cases this may lead to your Internet connection being blocked altogether if your ISP (Internet provider) traces instances of Spam to you.

6. Spyware can easily be installed on your computer without your knowledge. In some cases just one piece of Spyware can lead to many, many more as the initial infection downloads and installs other malicious software stealthily in the background.

7. Spyware can allow hackers to control your PC. Some versions install ‘backdoors’ to your PC that can allow someone from the outside to connect to your PC over the Internet and take full control of its use. Your PC can then be turned in to a ‘zombie’ that sends out spam, Trojan horses and computer viruses in their millions.

8. Some Spyware removal programs install Spyware. Why would they do that? In order to hide their own spying software. Think about it. You install an Anti-Spyware program to protect yourself against Spyware. The bogus Anti-Spyware program sweeps your PC for all Spyware except it’s own secret list of allowed spy software. You think it’s doing a great job and feel secure in using your PC when all the while secret spy software is sending out spam or monitoring your use looking for personal details. See spywarewarrior.com for a list of bogus Spyware removal software.

9. The best Anti-Spyware program only finds 90% of Spyware. Check out the review of Anti-Spyware software in any PC Magazine and you’ll find that none of them detect any more than 90% and most cannot remove more than 80%. Don’t be fooled in to thinking it’s not worth using any Anti-Spyware programs, after-all 90% is a whole lot better than 0% which would be the detection rate without the Anti-Spyware software.

10. Many computer users resort to wiping their PC and re-installing everything again in order to rid their system of Spyware. While this will do the trick, there is no guard against re-infection and can be a waste of time or lead to a loss of important data. After the system is back in use it may only be a matter of minutes before it’s infected again (see the BBC ‘Honeypot’ report mentioned on my website).



Source by Tim Maguire

Reasons for Making Mobile Marketing Your Priority

In the marketing arena, marketers are always on the lookout for great things that will keep them ahead of their competitors in the market. You do not have to worry anymore because the solution lies in your purse or the pocket. We are living in an era where mobile marketing is bringing forth a tremendous opportunity for marketers to a greater level. Cell phones help the marketer to reach wider audiences in real time and on a personal level, which is a different engagement you cannot find in other communication channels.

Significance of Mobile Marketing to Businesses

According to the recent most statistics, almost all customers own a mobile device. Seventy percent of the customers have a mobile phone, seventy-five percent own a laptop, and fifty-five percent own a tablet. At least seventy percent of this population uses their mobile devices for accessing the internet and not the laptop. With an increase in the population of smartphone users, the number of devices in the world exceeds the current population.

Using the mobile device is the most viable option, and marketers need to make adjustments towards this medium as many users possess these devices. The extensive use of mobile devices among customers is a growing and crucial part of the market. It helps in unlocking the potential held in the massive, captive, expanding, and engaged audience.

Nowadays, many companies are taking the full advantage of this option as it is the new thing in the market. In case your brand is not in mobile marketing, you need to make sure that you get a bandwagon as your competitor will leave you behind. Below are some reasons as to why businesses have to give priority to mobile marketing.

i. Social media offers a platform for adverts

Twitter, Facebook, and other platforms have understood the potential that resides in mobile marketing. They have recognized this potential and have evolved their adverts platforms for you to target mobile customers efficiently. All you need to do is clicking a button to start. This change will take a few minutes if you use social media marketing.

ii. Mobile Advertising Reaches New and Broad Audiences

The number people who are using mobile advertising exclusively are increasing. If your business is not using mobile advertising, then you are not going to reach your target audience and potential customers.

iii. Retailers are Getting Mobile Arrangements Wrongly

The news around nowadays shows how retailers are struggling to keep their profit margins high as a result of poor returns. Most retailers have taken their employees and shareholders by surprise in recent years because of a massive decrease in sales and net profits. Such companies view mobile marketing and e-commerce as an option when they are planning their budget. However, despite the vast opportunities the channel gives, the retailers struggle in investing in mobile marketing which makes them fall into the rat race of dwindling sales and profits.

iv. Mobile Devices are Growing Online Growth

With improving internet infrastructure and escalating smartphone penetration in the world, mobile devices have become a primary method that consumers use as a gateway to accessing the internet. Recent research shows that internet access by use of smartphones is a daily action for more than 83% of all users in the world.

v. Google Advice Retailers to Use Mobile Marketing

The main reason that will make you start mobile advertising is the Google Mobilegeddon update which penalizes websites which have not begun to put mobile marketing into consideration. Your site has to be easy to browse and responsive on mobile devices. In simple terms, your site will get a slap from Google by going down in the search engine ranks. These penalties are getting stricter with time, and your company has to take necessary measures before feeling the impact.

vi. It is Personal

It is hard to get brand close to the audiences when you are doing it behind a computer. Using mobile devices is however different. These devices are special accessories which people carry along at all times. They provide a different physical aspect as compared to other media.

This form of marketing is personalized because it allows retailers get closer to consumers. You will have a high chance of converting these people into high-paying customers. For now, mobile marketing is in the market to stay, and researchers say that it will be gaining momentum as time goes. Businesses and firms that are waiting will find it hard to get on board making them spend a lot of money.

vii. You Have the Chance Of Hitting Them Time and Again

In case your strategy is targeting desktops, you need to put in mind that there is a possibility that your audience is also using mobile devices. Therefore, it might take a few attempts to reach and resonate with customers. In case you miss the laptop chance, use the smartphone to get him/her and convert the viewer.

viii. It is Getting Costlier With Time

Facebook advertising is the best example when looking at what might happen in the event an advertising method has grown in popularity. Costs have continued rising in the recent past for no good reason. However, you might attribute it to the increase in the market competition.

The mobile marketing space is similar; you will have to engage it now or later. It is advisable to do it now because tasting costs are quite affordable than wait for the future when you will have to break the bank before gaining any return.

ix. Mobile Advertising Opens Up Possibilities and Virtual Realities

Including exciting technologies such as virtual reality will make mobile ads more useful and engaging. The vast options show that it is easy to make a profit from this channel. Therefore, you need to understand that there exists an opportunity for all businesses in all industries.

x. Mobile Marketing is Large and Has Taken Charge

Recently mobile advertising had gone back to face to face mode of shopping. When the internet became populous, the mobile has once again hit the market spending a lot by the use of mobile devices. Research says that by 2018, more than 25% of business profits will be coming from mobile devices. Therefore, mobile advertising is a modest way of ensuring you get profit as people are always ready to purchase via their smartphones.



Source by Joshua Osore

Pre-paid SIM Card For Egypt

Egypt is the fifteenth most populous country in the world and its 78.8 million populations, as per the census held in 2006, live near the fertile banks of the river Nile, having an area of about 15,500 sq miles. The area is the only farming land found in the country, where agriculture is possible. The major part of the country forms a part of the Sahara Desert and is not much inhibited. The urban areas in the country is densely populated , with majority spread across greater Cairo, Alexandria and other major towns in the Nile Delta. Incidentally, Cairo is the largest city in Africa and the Middle East.

Egypt holds one of the richest evidence of ancient civilisation and some of the world’s ancient and famous monuments attract millions of tourists to the country. These monuments include the Giza Pyramids and the Great Sphinx of Giza. You will find a large number of ancient artifacts such as the Karnak Temple and the Valley of the Kings, in the southern city of Luxor. In the present days, Egypt has come to be known as the main political and cultural centre of the Middle East. About 2,000 years back the ancient culture of Egypt started to decline and disappeared, and the last trace of the culture ceased to exist in the year 391 AD, when the Byzantine Emperor Theodosius I closed all pagan temples throughout the Roman Empire. It was during the invasion of Egypt by Napoleon that Europe got to see the wonderful artifacts of the Egypt, when the long lost culture started to be awakened.

During the yearly flooding of the Nile, the water enriched the soil on the banks of the river that brought in good harvests and wealth to the land. The daily life in ancient Egypt revolved around this fertile land. The people of ancient Egypt built mud-brick homes for themselves in the villages of the country and grew some of their own food and traded the rest in the villages for food and other goods which they could not produce. Most of these people worked in the fields as farmers and many of them worked as craftsmen and scribes. A small handful of people were nobles and together, they formed the inhabitants of ancient Egypt.

The ruler of the ancient Egyptian Kingdom, in the pre-Christian and pre-Islamic period are is referred to as a Pharaoh. Such rulers were believed to be the re-incarnation of Horus, who is an ancient God of the ancient Egyptian religion, whose cult survived long enough for him to evolve and gain many names over time. The Pharaoh was the most powerful person in Egypt and was the political leader and religious head of the Egyptian people and held the name of ‘Lord of the Two Lands’. He was the head priest of every Temple in Egypt, and represented the Gods on Earth and would build the temples all over the country to honour the Gods. He would also perform rituals for the well being of his country. He owned all of the land, made laws, collected taxes, and defended Egypt against foreigners.

At first, the word Pharaoh referred to the house where the King of Egypt resided and this translated to the ‘great house’. With time the king himself came to be known as the Pharaoh. The interesting point is that the King was never officially referred to by this name and the official designation of the King for ancient Egypt was ‘nesw-bit’, which combined the two dimensions of the King. While ‘nesw’ referred to the divine dimension that he had, ‘bit’ referred to the King as an individual that he is. As considered to be the son of God Osiris, as Horus, the Pharaoh was himself the divine being. He was considered to be an institution rather than an individual and was the protector of maat, the universal ethical principle. The consideration of the King to be an institution, changed with time.

At the time when pharaohs rules the Ancient Egypt, the people build Pyramids as tombs for theit Kings and their Queens, in which the pharaohs were buried. These pyramids came in various shapes and sizes and were built during the time from the beginning of the Old Kingdom to the end of the Middle Kingdom. Today we know 80 such existing pyramids, out of which, the three largest and best preserved pyramids have been found in Giza, with the well-known pyramid being that of the Pharaoh Khufu, known as the ‘Great Pyramid’.

This pyramid was built by pharaoh Khufu, an Egyptian King of the fourth dynasty, who existed around the year 2560 B.C. This he built to serve as his resting place after his death. It is said that this pyramid took 20 years to be built and there are modern theories as to how the construction proceeded.

The wonders of these pyramids have always stimulated the human interest, which they refer to as ‘The Mountains of Pharaoh’. When Napoleon invaded and conquered Egypt, he was supposed to have said that he can see 40 centuries from the top of the pyramid. Today the ‘Great Pyramid’ is enclosed, together with other pyramids along with the Sphinx. The famous ‘Sun Boat’ was discovered in 1954 and historians say that this was the boat which carried King Khufu in his last journey on earth before being buried inside the pyramid. According to the ancient Egyptian beliefs, the boat could have been placed there to serve him as a means of transportation to life after death.

The ancient Egyptians believed that the temples were the places where God and Goddesses lived, and as such, every temple that was built at that time was dedicated to a God or Goddess, who were worshipped by the High Priest and the Pharaoh himself. Temples were built with stone, especially the large ones, which had the walls curved with paintings of scenes from that period. It also contained curved inscriptions of the ancient Egypt and has been a subject of interest to the Egyptologists and tourists. In those days, entry to these Temples was restricted and today, when you visit one of them, you could visualise the wonders of the civilisation that existed in that period.

When you visit one of these temples, you should be beginning your journey in front of the Temple, which, the ancient Egyptians built to look impressive, considering that a Temple is where the Gods reside. When you enter the doorway into the courtyard, you would look straight ahead to find the door ways to the different rooms, beyond the courtyard. These rooms are more sacred than the ones before. Beyond this courtyard, an ordinary Egyptian was not allowed to proceed and that, he was allowed in here only on special festivities. When you enter the next room, through a high vertical tower, you will notice the sun light streaming inside the room through the windows cut into the roof. The high columns in this room are shaped to look like the papyrus plants and the ones at the center, where the light shines appear to be blooming and the ones at the dark corners are yet to bloom.

When you visit Egypt, you would have your mobile phone with you. During the time you went abroad in the days when mobile telephony did not exist, you had to use the telephone in your hotel rooms to talk to your associates, friends and to your family back home. It came out to be expensive. With the advent of mobile phones, you availed the roaming facility to take your phone with you when-ever you went outside the United States. This roaming feature, provided by your service provider back home, enabled you to be in touch with the world and also allowed you to be available to the people who wanted to get in touch with you. You had made and received calls, for which you had paid dearly. Every call that you made was charged in consideration that you are on roaming and you had paid for your incoming calls too, at roaming charges. The bill that you had received at the end of the month was way out of your budget that you had set. The bill amount was possibly more than the bill you had paid for using the telephone in your hotel room. You would like to economise.

A pre-paid SIM card for Egypt will provide you up to 80% of savings on your airtime usage of you mobile phone. When you buy a pre-paid SIM card for Egypt, you would be getting a local number and your outgoing calls will be charged at local rate. Further, all your incoming calls will be free, no matter where it generates from, and you would not be paying any roaming charges. More-over, since you pre-pay for your calls, you know exactly how much you are spending on your mobile calls. The pre-paid SIM card for Egypt gives you a certain talk time credit, and you can start making calls right away. You can buy recharge coupons from practically any shop in the Egyptian cities to replenish your talk time credit. These coupons are available in many different denominations and you can choose the value of the talk time credit that you would want. In this way, by pre-paying for your calls, you are aware of what you are spending for your phone calls. This helps you to maintain the budget that you have set for the purpose. More-over, you do not receive any of those ‘end of the month’ bills and you do not have to enter into any contract what-so-ever. To find out more regarding the pre-paid SIM card for Egypt and the prices, visit http://www.planetomni.com/FAQ_sim.shtml

A Subscriber Identity Module (SIM) card is a smart card, which is the intelligent module in your mobile phone, enabling you to make and receive calls, including sending and receiving SMS. The SIM card is of a size little smaller than a postage stamp and it goes in a slot at the back of your mobile phone, as you open the back cover. The SIM card holds unique information regarding your calling plan, your SIM card number, the International Mobile Subscriber Identity (IMSI) of your mobile phone and other security details. As you switch on your phone, the information is transmitted to the nearest network tower available in the city in Egypt that you are visiting. This information is checked and after security verification, the network logs you in. You are now ready to use your phone and start sending SMS and make and receive calls. The SIM card also holds your address book, where you store the name and the respective phone numbers of the people who you call frequently. The phone calls that you receive and make are also logged by the SIM card, including the incoming calls that you fail to answer. These are logged by their numbers, along with the respective date and time.

When you buy a pre-paid SIM card for Egypt, you will need a GSM mobile phone to use it. If you possess a GSM phone, it is unlikely that it will work in Egypt. The mobile networks in North America, Canada and few other neighbouring countries, operate on a different GSM frequency band as compared to the rest of the world. The networks in Egypt operate on 900MHz while North America, Canada and few other countries in that region operate on 850MHz and 1900MHz frequency bands. The difference in this operating frequency bands makes your GSM phone incompatible for use in Egypt. Under the circumstances, if you are a frequent traveller visiting different countries abroad, it is desirable that you consider buying a mobile phone, compatible with the frequency bands of the countries that you visit. If you are not much of a frequent traveller, it is economical for you to consider renting such a GSM phone, which may be used with your pre-paid SIM card for Egypt. For more information on buying or renting a phone, you may visit http://www.planetomni.com/FAQ_gsm.shtml for more information.

Global System for Mobile Communication (GSM) is the second generation (2G) of mobile telephony and replaces the first generation (1G) old analog system. It is the first open structured digital mobile communication technology, developed in Europe and is being used in over 214 countries. GSM has over 80% of subscribers out of the total mobile users in the world. It operates on 4 sets of frequency bands, distributed to the different regions of the world, with a few regions having some common set of frequencies. GSM operates on 850 MHz, 900 MHz, 1800 MHz and 1900 MHz bands, with the networks in North America, Canada and few other neighbouring counties including the countries in the Americas operating on 850MHz and 1900MHz frequency bands. As far as the rest of the countries in the world, majority of the countries use different bandwidths, and this makes your GSM mobile phone incompatible with the networks of those countries.

It is very important for you to know that the GSM phone that you are taking along with you on your visit to Egypt, needs to be SIM unlocked. This would necessarily mean that the GSM phone must be able to work with any SIM card, including the pre-paid SIM card for Egypt. If your phone is SIM locked, it would not work with any other SIM card other than the one which it is meant for. To site an example, when you sign a contract with a service provider, you might have noticed a clause stipulated in the terms of the contract, which said that you must use the services of the provider for a definite period of time, which is typically one year. After you have signed the contract, you would receive a mobile phone, free of cost to you, and the SIM card. This phone is SIM locked and would work only with the SIM provided. This has been done to ensure that you use only the SIM provided by your service provider till the end of the contract. Upon completion of the contract period the service provider assists you in unlocking your phone, when you can use any SIM card of your choice. Therefore, whether you take your GSM phone, buy or rent one, it is essential that you ensure that the phone is not SIM locked. For more information, visit http://www.planetomni.com/FAQ_gsm.shtml

A pre-paid SIM card for Egypt is affordable and a great saving as well. You pay for your calls as the locals do and all your incoming calls are free. You do not pay for any roaming charges. Being pre-paid you can keep a tab on the money that you are spending to make calls from your GSM phone. You do not enter into any service contracts what-so-ever and you do not receive any bill at the end of the month.



Source by John Dulaney

THe Difference Between Digital Marketing and Social Media Marketing

It utilizes an assortment of digital channels like SEO (search engine optimization), social media and PPC (pay per click) to entice audiences towards a prospective brand. Digital marketing uses internet as the core medium of promotion which can be accessed using electronic gadgets like computers, laptops, tablets and smartphones.

Internet marketing techniques such as search engine marketing (SEM), e-mails form an integral part of digital marketing. Moreover, it also includes non-internet channels like short messaging service (SMS) and multimedia messaging service (MMS), callbacks, etc. All these different channels form an integrated part of digital marketing. Digital marketing is considered a BTL Below-The-Line marketing as it targets a smaller and more concentrated group and works on forming loyal customers and creating conversions.

SMO or (SMM), on the other hand, is a branch or subset of digital marketing that excels at promotion using social media platforms like Facebook, Twitter, LinkedIn, YouTube and so forth. It makes the use of social media for the purpose of marketing. Social media relies heavily on the interaction of the users, sharing information and forming a community of sorts and hence has a ‘social’ element to it. It utilizes the creation of artistic content which is presented accordingly to lure the audience towards your products or services and create a brand following.

According to Zephoria Digital Marketing Consultants, there are over 1.71 billion monthly active Facebook users worldwide. This means that statistically Facebook is too big to ignore and hence, should be a vital part of your social media marketing strategies. Online video consumption on such platforms has been on a steady rise and is the next big thing in terms of marketing strategies. SMM is also a BTL Below-The-Line marketing as it relates to segregated groups formed over common interests on social media platforms.

Companies looking to address their marketing needs need to choose between a digital marketing agency or a specialist agency. If you are looking for someone to plan out your entire marketing strategy, then a digital marketing agency would be a good choice. However, if you are looking for someone to only handle the social media aspect of your strategy, then you are better off working with a specialist agency.

With the extreme popularity of digital media, people are more willing to incorporate digital marketing into their everyday lifestyle. As per the Interactive Advertising Bureau (IAB) report, Internet ad revenues in the United States reached a staggering $27.5 billion in the first half of 2015.This has opened up several job opportunities world over. There is a high demand; however, we experience a dearth in the skilled workforce as people are still coming to terms with the rapid evolution of digital media.

To meet the increasing demands of talented individuals, there are several online courses in digital marketing available. A quick Google search on this topic will enlist a host of institutes that offer the mentioned lessons. The courses run for a number of days where all the related topics under the umbrella of digital marketing are addressed. Students gain valuable insights into the subject that enables them to carve a niche for themselves.

The digital marketing course includes basic understanding of marketing and advertising concepts and fundamental knowledge of statistical and analytical tools. They are also given comprehensive information about email marketing, SEO/SEM, pay per click, mobile marketing, online video among others.

Social media marketing courses include an in-depth understanding of the principles of social media, major social media sites, social media strategy and measuring social media. It offers a look into the strengths and weaknesses of the social media platforms like Facebook, Twitter, etc. and delves deeper into the newest trends surfacing on social media.Social media is an indispensable part of digital media strategy. SM platforms are leveraged for the purpose of branding of a product or service as it provides a more interactive medium open for a two-way conversation. Digital marketing is more relevant in terms of creating brand awareness, marketing or reputation management. Although they have different online applications, they serve the larger purpose of brand advancement and customer conversion into leads and sales. Consumers have become more brand conscious with active participation and most spoilt for choice with the plethora of options available online. Their share in the overall marketing strategy has grown manifold rendering traditional strategy techniques obsolete. The rate at which digital media is advancing, it won’t be far fetched to imagine a future where virtual reality has transpired to every aspect of our existence.



Source by Rahul Rakesh Roa

Is SMS and Bluetooth Marketing Legal?

A lot of people today wonder about whether Bluetooth Marketing, and proximity marketing in general is legal, as people claim it can be considered as SPAM and annoying.

On the one hand, we must first see whether these marketing approaches are legal. Obviously, if they are not, there is no point discussing it any further, we can simply dismiss the discussion and file a law suit against anyone running such campaigns. The legal framework is different in every country around the world, and in some cases dramatically (take for example the death penalty). However, the European Union, now has some common guidelines across all its member countries, and so do the United States, for each state. Therefore, each country might have its own laws and I would be interested if any of you out there live in a country that has any specific laws about proximity or text marketing, I would be very interested to find out. Please leave a comment by clicking the yellow post-it note.

I am only aware of E.U. regulations by the European Commission, and I also came across this article, by Victoria Southern, a solicitor with Pinsent Masons, discussing the legal framework regarding SMS and Proximity marketing, in the U.K. She concluded that proximity and text marketing are both legal, as long as specific guidelines are adhered to, such as the ability to opt-out for the consumer in SMS marketing, and obtaining the consumer consent before sending them any content.

Even with the legality of the approach established, however, we all know (too well sometimes) that some marketing approaches, though legal, can be extremely annoying. In the case of proximity marketing especially, where the consumer is required to opt-in, we must take special care to ensure they have good reason too, otherwise the campaign is destined to fail miserably. I have written a separate article with some advice and tips on running a successful proximity marketing campaign, but the most important thing is not to pass your service on as spam. Proximity marketing is not just about broadcasting an image on to the passers-by mobile phones. It has a lot to do about the content of the message (be it video, image, audio, etc.) and the value the recipient of your message gets from receiving your message. For example, just sending out your logo via Bluetooth to anyone passing by your shop, might seem like a good way to increase awareness and brand recognition, but things are not always like that.

The first time an end user experiences proximity marketing and receives your message there’s a sense of novelty, and interest about the new way in which the message is received, but the user quickly gets accustomed to this, and sees the message for what it really is. When proximity marketing has become more common though, (which, incidentally, is not too far into the future) messages such as these will be considered spam. What you need is to provide some true value-added services to your customers. Give them some reason to want to use your proximity marketing service.

Among the available online resources is also the Mobile Marketing Association website, which contains a code of conduct for mobile marketers, and also provides a number of other resources such as mobile advertising guidelines, etc. These can be useful tools if you are looking to run a successful campaign, and want to avoid common pitfalls, and it’s a good place to start.

In general, I would say the legal issues are easily overcome. What is more difficult, and also of more value and to the point, is picking the right one out of all the proximity marketing services you can offer to your audience, and run a campaign which benefits everyone: the marketer, the end-user, and the service provider. Happy mobile marketing!



Source by Giorgos Saslis

Marriage Compatibility of Scorpio With Sagittarius

Compatibility of the bride and groom plays an eminent role in strengthening the marriage bond between them. It’s not only the horoscope compatibility, but the personality and the nature of the person should also match. It is very important, that the couple tying the bond of marriage should have some things in common, which would help them, bond better. Indian marriages have always been based on the principles of life long relationship and commitment, which needs to be served by the both the bride and groom. The sanctity of Indian marriages lies in the fact, that god has blessed the couple with each other’s togetherness for lifetime and they are supposed to keep the bond alive for all their seven lives. To match the compatibility of the bride and groom, Indian parents from ages have been following the process of matching the horoscope of the bride and groom. This forms the first step, towards the confirmation that the bride and groom can spend their lives together or not. Hindu marriages in India are highly dependent on the horoscope matching practice, which decides the future of the marriage between the couple. The predictions made by the priests in Hindu culture are then considered to make the decision of matrimony between the respective bride and groom.

The importance of horoscope matching is becoming all the more important, because of the sacredness of marriages going down in India. Keeping the importance of matching horoscopes in Indian marriages, the article writing on the same, got started. Moving further, with the series of articles, now comes the turn of matching the horoscope of Scorpio and Sagittarius. These two sun- signs are said to be totally opposite from each other, as one is a fire sign and other is water. Sagittarius is very cool and remains light hearted for most of the things in his life, and intensity are the words, which totally oppose his personality. The Scorpio on the other hand is very passionate about things in his life and takes things very seriously to make sure that whichever task he is being assigned gets completed with perfection. The couple needs to understand each other’s requirements and desires in life, to be able to bring smoothness in their married life.

The Sagittarius loves to interact with different people and have a large social circle, but on the other hand, a Scorpio is an introvert person and loves to confine himself within a close group of family and friends. Scorpions are very emotional and they love being in long relationships, due to which their commitment level for marriage is also very promising. The Sagittarius is into a lot many things, and is also very flirtatious by nature. The flirty nature of Sagittarius can land the marriage bond of Scorpio and Sagittarius into trouble, because Scorpio as a life partner would demand more of intensity in their relation. The contrasting nature and demands of both of them from their relationships and married life can create differences in their marriage.

A marriage needs lots of understanding and common consent for many things, to keep their life rolling. There are many situations, where the bride and groom might have different view points, but they have to look for a mid- way, so that their marriage does not suffer due to their different view- points. They need to make sure that any of the steps they take, does not hurt the emotions or values of their life partner. Adjustments and compromises in life are definitely required by the bride and groom having Scorpio and Sagittarius sun signs, to give life to their complicated relationship.



Source by Ankush S