Ever Create a Password Protected Post on Your Blog?

Password protected posts allow you to create content that is visible to the world if they know the password you gave the post.

So How Do You Password Protect Your Blog Post?

  • You can locate the option to change the VISIBILITY of your blog post within the PUBLISH box on your dashboard
  • Click on the  EDIT option to change the post to Password Protect or Private
  • Choose Password Protect (Private means that only Administrators or Editors on your blog team can see posts)
  • Key in a password
  • Congratulations! You have now created a Password Protected Blog Post.

What Can You Do With a Password Protected Blog Post?

I often use password protected blog posts to host PowerPoint slide shows for trainings. Now I challenge you to allow your imagination to expand. Think about a contest, or something else that your readers can enjoy.

Click Here to see an example of a password protected blog post. Oh, the password is lead

Have You Ever Been to a Blog Carnival? Here is a Challenge

When I first started blogging I saw mentions about Blog Carnivals and wanted to host or attend one. What I did not know was how powerful these Blog Carnivals were for networking and learning.   You visit the blogs on the host blog and read the posts. Then you comment.

Now I don’t have to tell you how powerful blog comments are on your blog and the links that connect with tblog carnivals, he bloggers blog. That will produce some good link action. Plus you can read about the powerfully insightful and diverse bloggers You can also study how their blogs are designed and how they monetize their sites.

So here is my challenge to you. I am going to post a link to a current Blog Carnival. Please consider doing the following:

  • Visit this host site for the current Blog Carnival
  • Stop and look at this very well designed site hosting the Blog Carnival. Make a comment
  • Visit at least 3 other blog sites in the Blog Carnival
  • Think about contacting the host of the Blog Carnival and see how you can have the next party.
  • Finally, connect via RSS feed to sites you  want to keep in touch with.

Let me know how you enjoyed the party!

What Makes This Blog Post Good? What Makes it Bad?

I came across this blog post this morning because of my Google Alert on baby boomers. (Hope you set up your alerts also) I clicked on the link and read it with particular interest.  But rather than share my insights thought it would be helpful to hear from you.

Please read this blog post and tell me what you think?

One thing I will say is that there is NO ABOUT page. This is always one of my biggest issues with blogs. It makes me feel that the blogger is under cover.

Does Your Blog Brand You Effectively? Do You Want to Know How to Use Social Media With Your Blog?

If you live in New York,  St. Louis, Albany Ga, Los Angeles, CA. Baltimore, MD, or Dallas TX let Leathia Owens help you during her 7 City Tour.Lethia Owens is a personal branding and social media strategist that can help you pump up your personal branding and marketing efforts. She is doing a 7-City Tour called “Your IRRESISTIBLE Brand!

Lethia’s goal is to help hundreds of business owners and entrepreneurs shift their business into high gear and become an IRRESISTIBLE magnet for new clients and patients by teaching them the Personal Branding and Social Media Marketing strategies they need to truly turn their passion into a profit. If you are, or know someone who is ready to play bigger and make more money,

I invite you to join Lethia on this amazing tour.

So, if you can check out what this dynamic and authentic woman has to offer.

What is Vishing?

I came across an excellent post warning about the practice of “vishing”. It is a serious scam. As bloggers we can get almost too comfortable online. We may think we have a lot of awareness and never ever get caught in a scam. That is not true.

Yet, if you are a non-baby boomer blogger or even know someone who is still  afriad to do more than play solitary online, this is just the kind of information used as the meat for that statement, “See I told you to keep off that computer”

I just want to add that I found the article that informed me about “vishing” on a blog! Ha So here are a few definitions direct from good old Google definitions. And after the definitions you will see a link to the blog post on “vishing”. Please print it out and share with those who ONLY do emailing.

Definitions of Vishing on the Web:

Vishing is the criminal practice of using social engineering over the telephone system, most often using features facilitated by Voice over IP …
en.wikipedia.org/wiki/Vishing

Vish – In the game of Vish (short for vicious circle), players compete to find circularity in dictionary definitions. …
en.wikipedia.org/wiki/Vish_(game)

is the practice of leveraging Voice over Internet Protocol (VoIP) technology to trick private personal and financial information from the public …
atlantean.wordpress.com/computerinternet-terms/

Vishing is a type of phishing attack that targeted VoIP. It can be used by the attacker to steal the identities or money of the victim.
www.cuhk.edu.hk/itsc/security/isglosry/index.html

Read this insightful blog post on ‘”vishing.”