Using Google Alerts to Fight E-mail Spam

I was recently reminded of the existence of a particular Google service, one which I had completely forgotten. To my surprise, it turned out to be a significant discovery, as the product can be used to improve one’s privacy on the web, while reducing spam. The service, Google Alerts, allows users to choose specific search queries that they’d like to monitor. When new results appear in one of these queries, the user can be automatically notified by e-mail. Here are some suggested uses, according to Google:

  • monitoring a developing news story
  • keeping current on a competitor or industry
  • getting the latest on a celebrity or event
  • keeping tabs on your favorite sports teams

All very interesting, sure – but what does it have to do with privacy, or spam? Well, what if you were to put your e-mail address in there? If your e-mail address shows up on Google, or any other search engine, it’s vulnerable to spam bots. With Google Alerts, you can get notified when new search results appear for your e-mail, and that can give you a chance to do something about it. Whether the e-mail was added via a malicious act by another individual, or an honest personal mistake – you will be alerted. Such a notification can help reduce the amount of spam you receive, but also prevent your e-mail from being public knowledge.

As an example, here’s how I would add an alert using Bill Gates‘ address:

Adding an alert is fairly straight-forward, and intuitive. To help visualize what the alert will do, Google offers a preview of the search on the right-hand side.

It’s really that simple – once created, Google will do all the work, and notify you when new results appear.

Keep in mind, however, that there are other uses beyond simply monitoring an e-mail address. It’s also possible to create alerts using other information, such as your name, or domain. These types of alerts can be useful in keeping tabs on your online reputation, which often spans multiple websites. If interested, watch below as Googler Matt Cutts explains how the product can be used to monitor a person’s name.

It’s Against the Law

While I was in Atlanta for Dragon*Con 2011, I found myself using their metro system on a fairly regular basis. Over there, they call it the MARTA, which stands for “Metropolitan Atlanta Rapid Transit Authority” – it happens to be the 9th largest metro system in the United States. Unlike Montreal, their trains use a combination of underground and outdoor rails, the latter made possible by the subtropical climate.

On one particular day, I found myself waiting for a lift at a MARTA station. Since I had nothing else to do, I began reading a sign that described some of the rules and regulations behind the MARTA. I was particularly curious about whether they allowed eating or drinking on the trains – it clarified this, by saying it was “against the law” to do so. It also went on to list additional items that were against the law, and in general, they were informative.

But… wait a second, what’s that in the bottom right corner?

It against the law to: Assault MARTA Employees

Upon reading that, I realized my plan to punch a MARTA employee could never be brought to fruition. Way to ruin my plans, MARTA.

In all seriousness, though, I always enjoy seeing unnecessary warnings in the United States – they just seem so silly to me. Don’t get me wrong – I’m a fan of the States, but here in Canada, law suits are fairly rare. As a result, warnings are usually present when they are not immediately obvious. In the States, this is usually not the case – it’s like they want to cover all their bases, regardless of how self-evident the warnings may be. For the sake of humanity, I would hope that they didn’t have to add that particular entry after someone assaulted a MARTA employee, and tried to argue that it was a legal to do so.

Learning All The Things

Someone taking notes on a white board

Over the past month, I’ve been working with Joseph Pereira to create a web-based review show. Primarily intended for YouTube, the show is titled “All Too Convenient”, and will start with us reviewing the first season of a particular TV series. At this moment, we have one episode completed; however, due to the comments we have received, we decided to return to the drawing board, and start anew. It was a tough decision to make, mainly because it took us a month to get one episode fully edited and ready to go. This delay was largely due to Joseph’s hectic schedule, as it interfered with his ability to edit the video. His job was further complicated by the fact that the episode was scripted, and thus, had multiple scenes, and multiple takes. The camera also caused problems, but I won’t get into those details here.<?p>

Despite the fact that we decided to scrap the episode, and start over – we felt that our experiences could be valuable for others. With that idea in mind, we created a YouTube channel called “Learn All The Things” (a Hyperbole and Half reference), and proceeded to film ourselves talking about what we learned from our failed attempts at creating a web series. We also went on to discuss what we’re going to do next, which mainly involves successfully producing the first episode of All Too Convenient. The video is roughly 30 minutes long, and covers a large variety of topics: writing, filming, editing (video and audio), and some acting as well. Although certain topics we covered were somewhat technical, we’re still confident at least some people might find our experiences useful. Regardless, we had fun making it, and it only further prepared us for the work ahead.

If you think such a video would interest you, feel free to play it below.

In the future, we plan to use the channel for more content of this nature, without it necessarily having to be related to creating a web series. The “Learn All The Things” name was chosen partly for that reason – it is generic enough that we can post anything we want, provided it is somewhat informative.<?p>

As a sidenote, I’m happy to announce that this is my 100th blog post (excluding the 16 solution posts I currently have). I started this blog in January of 2009, all with the intention of sharing my knowledge of Windows, the web, and Computer Science in general. It has served that purpose, and yet has grown to cover other topics as well. It’s been a pleasure writing for this blog, and I intend to continue doing so for a long time. It also feels appropriate that post 100 just-so-happens to be about sharing knowledge.

Thanks to Joseph Pereira.

Photo credit

Photo by Kate Sumbler.

Dragon*Con 2011: Top 10 Costumes

Earlier this month, I attended Dragon*Con 2011 – in full compliance with a personal ritual of mine. It was my sister who initially suggested we attend Dragon*Con for the first time, and that was last year. I knew after attending that I wanted it to be repeated on a yearly basis. It was a great excuse to spend time with my sister, and at the same time, it was a lot of fun. It also resulted in three blog posts, and that means the experience was significant enough that I felt it was worth sharing. That is a powerful statement, given my own obsession with posting only the non-mundane. One of those blog posts listed my Top 5 favorite costumes, and I really enjoyed sharing my selection. It became clear to me that I would easily be able to produce at least that one type of post, with every year I attended. That said, this blog post contains my Top 10 favorite costumes for Dragon*Con 2011. Before you start with the list, here’s an explanation of what I consider when evaluating a costume:

First, the more realistic the costume looks, the more I like it. If I get a feeling the character being portrayed might actually exist, then that’s a success. To give you an example, I never really liked the Batman movies until I saw Batman Begins. To me, that’s when the character really became respectable and interesting to watch.

Second, the more specific the reference, the less people will recognize it – but the more value it has to those that do. Sure, people might appreciate how cool a costume looks, but will they understand very subtle references? In my mind, I see subtle references as a gamble – those that understand it will have a greater payoff.

And now, the list:

10 Horseman

To start us off, I have a costume that is completely original – I asked the guy to be sure. I’m not certain what compelled him to dress up like a horse, but I can nonetheless appreciate the creativity that went into the costume. Not to mention, the effort it likely took to make it look that good.

A man dressed in a brown horse suit, complete with hooves instead of hands.

9 Darth Rooster

Most people can identify a Darth Vader costume with ease, even if they haven’t seen the Star Wars saga. I, for example, have only recently gotten around to watching the first Star Wars movie, A New Hope. Shocking? Yes, people tend to react like that. Yet, I have known about Vader for a very, very long time. Despite my current appreciation for the Star Wars universe, I can’t help but be slightly disappointed by seeing exactly how common the related costumes are.

Considering the above, I was pleasantly surprised when I spotted a unique variation of a Vader costume. For some reason, this guy decided to modify a Darth Vader suit, and made him look like a dark, evil rooster. I really found that funny, and knew he would be in my Top 10 for putting a lot of work into that comedic twist.

A unique variation on an otherwise common costume - Darth Vader, in the form of a chicken.

8 Fawkes the Phoenix

Though I don’t know much about the Harry Potter universe, I had to include this costume in my list. According to the google searches I ran, it seems she’s portraying a character known as Fawkes the Phoenix. Despite my lack of knowledge, I found that the costume had a great combination of vibrant colors, and a clever design.

A girl in a phoenix costume stands with her arms raised, allowing her wings to hang. The costume is a vibrant mix of yellow, orange, and red plummage. A smaller phoenix can be found on her chest, with its wings extended.

7 Batman

Some costumes are so common at conventions that you can grow tired of seeing them. Batman seems to be a popular choice, so I have a tendency to only take pictures of the best ones I encounter. One particular Batman costume really stood out, and was so high in quality that I felt he could potentially be real. The design reminds me of Batman Begins – granted, it’s more cloth-based than the one in the movies, but still struck me as being particularly realistic.

Batman stands with his arms up, showing off his armor and cape.

6 Alan from The Hangover

That’s right, folks – a Zach Galifianakis look-a-like. Galifianakis gained a huge amount of popularity from playing Alan in the films The Hangover, and The Hangover Part II. At Dragon*Con 2010, I saw an imitation of him, and listed him as a runner-up for my Top 5 Costumes list. It wasn’t just about his costume, I also enjoyed a comment he made after I took a picture of him.

Remember, tigers like pepper.

This year’s Alan didn’t make a comment, but seemed a better fit for the character. As I’m saying it, I realize that might not be a compliment, given as the character being portrayed looks like a fat, possibly homeless man. The humour behind his character also lies in the fact that he has a very strange behaviour, so that’s not very positive either. In any case, this year’s Alan seemed to be the best natural fit for the character, and jokes aside, I think he did a good job with his behaviour and costume as well.

A guy dressed as Alan from the Hangover, wearing what appears to be a king's crown.

5 Hancock

I’ve been to Dragon*Con for two years in a row now, and there were only two moments where I had to question whether I was actually looking at a celebrity, rather than a person in a costume. Last year, it was a Zach Galifianakis look-a-like. This year, I thought I saw Will Smith… as John Hancock, from the movie Hancock. While I never actually saw the movie, I remembered seeing plenty of pictures of Will Smith’s character – so when I saw this guy in his costume, I was really impressed.

4 Solomon Grundy

When I originally spotted this guy, I didn’t know what character he was dressed up as. He looked like a white version of Hulk, though less muscular, and quite tall. So tall, in fact, that it gave him a towering presence – it lead me to question whether it was natural, or he was wearing platform shoes. Either way, it certainly made the character feel realistic, and possibly a threat.

I stayed a few minutes, observed his behaviour, and realized that he had a tendency to attack men, and yet, was extremely friendly towards women. I’m not sure if he kept that up all the time, it could have been just a coincidence – but I really enjoyed seeing this unique behaviour.

As it turns out, the character being portrayed is known as Solomon Grundy, a villain from the DC Comics universe. According to Wikipedia:

Named after the 19th century children’s nursery rhyme, Grundy was introduced as an enemy of the Golden Age Green Lantern (Alan Scott), but has since become a prominent enemy for a number of superheroes, such as Batman and Superman

Upon reading this, I also realized that I even had a picture of him fighting with Superman. It was probably a coincidence, mind you, but a great one at that.

Solomon Grundy stands tall. Solomon Grundy attacks a bald man with glasses. Solomon Grundy gently caresses the face of a random girl, rather than punching it. Solomon Grundy fights Superman.

Credit: Ruby Rinekso as Solomon Grundy.
3 Squirrel Girl vs. Doctor Doom

As I was taking a break from taking pictures, a girl dressed as a squirrel wandered into my general vicinity. I was particularly amused when I noticed that there were also plush squirrels attached to her belt. She was accompanied by what appeared to be a guy in a regular Doctor Doom costume. When I approached, I realized that this particular Doctor Doom was actually covered in squirrels, as if they had been attacking him. I enjoyed the humor behind the costumes, but wondered whether it was an original idea, or a reference to something.

Surprisingly, when I asked, they mentioned that Squirrel Girl was an existing super hero in the Marvel universe. Not only that, they were depicting a very specific scene from her comic books, one where she manages to defeat Doctor Doom with the help of her squirrel minions. They even pointed out that there was a picture of the scene on Squirrel Girl’s Wikipedia page. I always appreciate specific references, and this was a great example of one. Not only that, but even if you didn’t know who Squirrel Girl was, the combination of costumes was excellent – both very well made, and amusing.

Squirrel Girl stands with Dr. Doom Squirrel Girl faces off with Doctor Doom, who is covered in squirrels.

Credit: Andy Floyd as Doctor Doom, and Becky Montgomery as Squirrel Girl.

The only downside, of course, is that I must now live in fear of squirrels – I never realized they had such destructive potential.

2 Women of Mass Effect 2

I am a huge fan of the Mass Effect series, and was thrilled to see a group of women dressed up as characters from the game. Specifically, the characters portrayed were Jack, Samara, Miranda Lawson, and Tali’Zorah nar Rayya. The costumes themselves were very impressive when it came to quality, and accuracy. I can only imagine the work that went into creating some of those costumes – particularly for Samara and Tali. While the Jack and Miranda costumes may seem like they might have been easier to make, I must mention that the women were doing a great job at reflecting the character’s personalities. Together, they made for one amazing photo opportunity – I really appreciated that.

Jack, Samara, Miranda, and Tali from Mass Effect 2.

1 Maurice Moss from The IT Crowd

Many years ago, I discovered a British show named The IT Crowd, and I found it an excellent comedy that also was related to my line of work. Here’s a quick description from Wikipedia:

Set in the London offices of the fictional corporation Reynholm Industries, the show revolves around the three staff members of its IT department, comprising two geeky technicians, a genius named Maurice Moss and the workshy Roy Trenneman, headed by Jen Barber, the department’s ‘Relationship Manager’ who knows nothing about IT. The show also focuses on the bosses of Reynholm Industries: Denholm Reynholm and his son Douglas.

Given that it is a British show, and that few people I now have seen it, I never thought I’d see a reference to it at Dragon*Con. Yet, there I was sitting outside one of the hotels with my sister, when Maurice Moss walked by. Not the real Moss, of course, but he was an extremely good imitation, on multiple fronts. Before I dive into the details, I suggest checking Google Images to see what the character normally looks like.

Maurice Moss from The IT Crowd, holding his famous cup. The wedge in his hair is clearly visible. Maurice Moss from The IT Crowd, holding his famous cup.

Credit: Lucien Freeman as Maurice Moss.

The fake Moss was a success due to a few factors:

  1. He was dressed pretty much exactly like the character.
  2. His hair was parted just like the real character, though it may have been on the wrong side of his head.
  3. He spoke just like character, and though I believe it was a fake accent, I couldn’t figure out for sure – and that’s great.
  4. He was holding a cup that had a picture of the actual Moss character pasted underneath it.

Points 1 to 3 were all contributing factors towards my choosing him as the best costume. However, it was really #4 that sealed the deal – it is a very specific reference to a particular episode in the series. In the episode, Moss claims to have acquired a cup that features his face underneath it, all to ensure he can tell it apart from the others. To better showcase the humor behind the cup, I’ve found a YouTube clip where Moss first introduces it. It appears at the 45 second mark, and while it does get some attention in the clip, there are numerous other references in the episode that make for quite a funny episode.

The episode actually ends with a frustrated Moss attempting to locate his cup among multiple seemingly identical cups. The flawed strategy of putting his face on the bottom is what lead to all this, as the cups all look like duplicates of each other until they are flipped. Naturally, when I saw the cup he was holding at Dragon*Con, I had to say “Hey, you finally found it!”

That concludes my Top 10 costumes for Dragon*Con 2011. If you’re mentioned in my post, and would like me to credit you by name, please feel free to e-mail me at mref@gmail.com. You can also post a comment below, I always enjoy hearing from Dragon*Con attendees and cosplayers.

If you’re interested in seeing my previous Dragon*Con related posts:

Beyond blog posts, I’ve also made my full set of convention photos available on Flickr, using a Creative Commons license. At the moment, I require attribution, as well as non-commercial use – but if that ever changes, it’ll be reflected on Flickr. To view my convention photos, visit any of the albums below:

An Analysis of SteamGifts.com

A little over three weeks ago, I discovered a user on Reddit who was giving away invites to a site called SteamGifts. I had never heard of it, but the idea of a site that focused on giving away games appealed to me. I remembered that I had a few extra game copies on my Steam account, and figured it’d be a good way to make sure they were put to use. After all, sending a gift using Steam is quite simple, since it exists purely as a digital credit of sorts – no files have to be sent around. With a use for the site, I requested an invitation code on Reddit, and received it shortly thereafter.

Once logged in, I began to poke around in an attempt to figure out exactly how the service worked. Creating a giveaway was pretty straight-forward – I simply had to choose the game, select the number of copies, and define how long it would be open. When a giveaway closes, one winner is selected from all the people that entered, and it’s up to the person who created the giveaway to send the game manually through Steam. As for entering giveaways, there’s a little extra mechanism that needs to be understood: in an effort to prevent people from entering every single giveaway, the site grants points over time. Reaching a maximum of 300, these points can be used towards entering giveaways – the more expensive the game, the more points needed to enter. Inviting friends to the site also uses a chunk of points, so it helps control how quickly the site will become populated.

Overall, I’d say the service is decently made, but currently suffers from some flaws – which I assume will get resolved in the long term:

  1. There is no search feature – so if you’re looking for a particular game, good luck. I simply found myself paging through the public giveaways, hoping to find any game that was interesting to me, rather than the game I was looking for.
  2. The site is often slow to respond to requests – extending the time it takes to find what you want.
  3. No e-mails notifications are sent out when your giveaway is complete. In my case, I one day realized that one of my giveaways was likely complete – but had forgotten about it. When I logged in, I saw that it had, in fact, been closed 1 day ago. Not a big deal, but the winner had not received anything yet, and I didn’t want him to worry, and others to question the legitimacy of my offer.

Now, the flaws I mentioned are all in the functionality, or lack thereof – but they’re forgiveable given that the site is a free service, especially one which currently does not yet feature numerous advertisements. I expect these things to be resolved as time progresses; however, I am concerned about how this site approaches giveaways. To better illustrate my concerns, I’d like to start by examining the experience for users that enter existing giveaways. As an example, here’s one of the posts I created:

It was configured to end in 5 days, and during that time, it managed to receive 55 comments, and 492 entries. Let me just clarify that last part – 492 people entered the contest, and one person won.

Is it just me, or is that a lot of disappointed people? Sure, they knew what they were getting into, but I can’t help but think that maybe there is a better way. Out of curiosity, I glanced at the winner’s profile – and here’s what I saw:

A total of 3 gifts won, despite having 340 entries. That’s roughly 113 entries per game. Considering the flaws I mentioned earlier, entering all of those contests could have been a rough experience for the user. Is the time investment worth it, considering the low chance of winning, and the flaws in the website? Keep in mind, also, that the chance of winning will decrease as the site gets more popular – as there will be more users, and thus, more competition. To help offset the low chances of winning, users seem to be encouraged to enter multiple contests, just in the hope that they will receive something free. I originally found myself doing this, as it simply felt logical – my time is valuable, so why would I spend it struggling to find only the games that I really wanted? It was simpler to enter any contests that were the slightest bit interesting, rather than making calculated decisions. Of course, I quickly realized that this wasn’t the most ethical approach, so it lead to some self-reflection.

First of all, I wondered: was it even necessary to have more than one entry per giveaway? What if you could create a giveaway that closes immediately after one person enters it? If that could happen, only two people would be involved: the person giving the game away, and the recipient of that game. The giveaway wouldn’t gather much attention from the public, but it will have served its purpose – giving away a game to a person that wanted it. As a bonus, there is a low probability of people being disappointed. Interestingly, SteamGifts isn’t too far off from offering this functionality. It is currently possible to configure a giveaway so it closes in one hour, but no less than that.

While the above would help reduce the number of disappointed users, another key factor must be considered – exposure. I originally didn’t feel like I needed recognition for giving the games away – I honestly did it because I realized they were gathering e-dust. Yet, I received 55 comments for giving away just one of game. After the contest had ended, I realized that it may have been beneficial to leave my post up for multiple days – for one primary reason: my Steam profile contained a link back to my blog. Now, as true as this was, I didn’t feel like adding to the number of disappointed users, solely for a chance at additional traffic.

Ultimately, I decided it would be best for giveaways to strike a balance between getting exposure, and preventing entries from reaching extremes. I felt that one day was probably a good maximum time-frame, but of course, that maximum was closely bound to the popularity of the site. Early on, one day might bring in hundreds of entries – but in the future, maybe thousands. The more entries, the less chance of winning – which encourages people to enter any and all contests. What if you could have those statistics handy when creating a giveaway? By knowing how many entries are projected, would the decision be easier to make? I think so, but still feel like there’s something missing to make the service work properly. As it is stands, I feel that users are too likely to entry-spam – all to improve the chances of them winning something. It’s a pretty unique challenge, and I hope they manage to find a solution. In the meantime, I find myself less inclined to use the service as a means of receiving gifts – sending gifts, on the other hand, can work well, especially with the above ideas considered.

If you’d like to try out SteamGifts, I’d be happy to provide invitations – simply contact me at mref@gmail.com. Even though I had some issues with the site, it’s still worth checking out. My interactions within the community have mostly all been positive – users are quick to thank the guys creating the giveaways, and are also instrumental in warning their peers about fake posts.

UPDATE: I announced this blog post on the SteamGifts forum, and interesting comments were posted. One particular commenter was an administrator of SteamGifts, and he pointed out that they were working on improvements, some of which were particularly tricky. The administrator (named “cg”) also called me out on a logical error that was present in my post. He made a reference to particular part of my post: 

“Keep in mind, also, that the chance of winning will decrease as the site gets more popular – as there will be more users, and thus, more competition.”

And replied with the following:

“Not true. Entries will increase, but you’re missing the fact that the number of giveaways will also increase. If new users are as generous as the last, odds of winning stay equal. Right now we have 25k members and 8k gifts. We’ve been floating around that 3:1 ratio for a long period of time. Those are the numbers you should be keeping an eye on, not the total number of entries.”

He was, of course, entirely correct. 

Google AdSense: Banned for Life?

Back when I was a 19 year-old college student and still living with my parents, I was really enthusiastic about video games. So much, in fact, that I felt the need to create a clan, website and all. At the time, we went by the name “Infamous Butchers”, also known as Team IB. Yeah, I was pretty serious about it… it all seems somewhat silly today.

After a while, I decided I would put advertisements on the website, in an effort to support the team. Naturally, I looked to the most recommended service, AdSense, as offered by Google. I signed up, and despite how small the site was, I received a confirmation e-mail a couple days later. Shortly thereafter, I had the advertisements working as expected, and for a while, all was well.

At a certain point, a teammate decided to start paying for a game server that the team could use to practice regularly, and was doing so out of his own pocket. In an effort to support him, I told my fellow teammates to click on the ads, as this would help generate revenue. Now, in case you’re not aware, this is known as click fraud, and is a very serious breach of the AdSense Terms and Conditions. When instructing my teammates to do this, I never really stopped to think about the legality or ethics of my request. My friends just went along and said they’d click every now and then, and none of them questioned my approach.

In addition to telling friends to click, I also violated another core AdSense rule – never click on your own ads. While I originally was in compliance of this rule, I did find myself in one specific situation where I reasoned that yes, the content being displayed in the ad was indeed relevant to me. I was looking for an alternate company to host our game server, and sure enough, the ad was talking about just that. I only did this once, as far as I can remember.

Approximately two weeks later, my earnings had reached a ludicrous sum of 100$, but still I failed to grasp that I was doing something very, very wrong. I remember at least two distinct moments where my friends told me they had been clicking, but I do not recall when, or how many times they clicked. It wasn’t long until I received an e-mail from Google, letting me know that I had been banned from AdSense. My initial feeling was that I let my team down, to a significant degree. As an extension of the shame I felt, I tried to reply to Google in an effort to salvage the account, and in turn, retain the possibility of earning legitimate clicks. I obviously wasn’t thinking clearly, because what I had done was a very serious offense… I was just blind to it at that moment, obsessed with my team, and how I failed to support them.

Despite my replies, the Google AdSense team informed that they were sure of their decision, eventually leading me to accept the truth. Their words had shaken some sense into me, and I began to feel greater shame towards what I had done with my AdSense account. Not only was I extremely wrong in doing what I did, I also managed to destroy a potential business relationship with Google, very early on, and on my primary Google account no-less. As a long time fan and supporter of Google, I was left with a shame so poignant that it stuck with me through the years – a dark cloud, always reminding me of that time where I really screwed up.

Years later, after having worked as a software developer for three years, I tried signing up to Google AdSense using another one of my Google accounts. To my surprise, they accepted my application, regardless of the fact that I had the same name as before. I was able to successfully place Google AdSense ads on my page, but then started to doubt whether this was in respect of Google’s rules. Sure enough, after reading their documentation – it became clear that if I was banned before, I should never try to apply again. It wasn’t just my account that was banned, it was me – and anything associated to me – as brutal as that sounds. Creating another account might work – but as long as I’m the same publisher as before, they could ban the account if they figured that out. To respect their rules, I quickly removed all ads from my site, and decided it might be time to contact Google. After all, I made the mistakes in my youth, and hoped this would factor into my appeal. I explained the tale to the best of my recollection; however, I still could not bring myself to admit that I had, in fact, been the root cause of the whole disaster. It was my words that lead at least two of my friends to click on my ads, and though I regretted my part deeply, I felt too embarrassed to admit it. Despite my appeal, Google still stuck to their response that they needed to protect their advertisers, and I would be a threat.

Though disappointed, I agreed with the reasoning behind their refusal. Why would they take the risk of allowing a banned user when the potential for income is probably far less than the monitoring fees? I could relate to them, and despite all my self-directed anger, I was once more convinced that I would need to live without Google AdSense, as much as that bothered me. That was roughly two years ago, and today, with more than five years of software development experience, I still feel like I shot myself in the foot very early on. Google AdSense seems to be the best pay-per-click advertising solution, one which allows even the smallest independent publisher to earn some profit back from their content. While I managed to find decent alternatives for websites, I still have difficulty digesting that I can never work with Google.

The whole experience has left me paranoid about pay-per-click advertising. For example, with one provider, I once accidentally clicked an ad on my blog, while I was browsing on my phone. I immediately figured out what my IP was, sent it to their the support team, explaining that I accidentally clicked, and they should not include the click towards my profit. They thanked me for being proactive, but warned that if it happened too many times, they would not be able to serve ads on my site. It’s unfortunate that I had to get banned by Google to understand the severity of click fraud, which, it turns out, is quite clearly explained in Google’s documentation:

Invalid Clicks and Impressions

Publishers may not click their own ads or use any means to inflate impressions and/or clicks artificially, including manual methods.

Encouraging Clicks

Publishers may not ask others to click their ads or use deceptive implementation methods to obtain clicks. This includes, but is not limited to, offering compensation to users for viewing ads or performing searches, promising to raise money for third parties for such behaviour or placing images next to individual ads.

So, was I blind? Was my young mind so obsessed with games that it even failed to understand the importance of the legal agreement that had taken place? Yes, I believe so. Today, I still agree completely with the reasoning behind why Google banned me – I just have one question that I’d like to ask in the open, right here. How long must I pay for a mistake that I made in my youth? Youth, mind you, is not always as simple as above or below 18. When I was banned, I was 19, and though I was mature in many ways, my behavior towards AdSense was quite the opposite. Am I really so evil that I must never be allowed anywhere near Google AdSense, even when I’m 30, 40, or 50? Does additional life experience mean nothing once you’ve made such mistakes? It’s not like I shot a man and tried to get away with it – how could this ban truly be for life, when even a murderer might get to walk after enough years of jail time?

The way Google crafted their agreement, it is entirely possible that I will never be forgiven – they have reserved that possibility. I’ve come to a certain peace about this – I’ve had ads from another company for over a year, and I remain in good standing with them. Still, I can’t help but think back to how great Google AdSense was… and, at this point, all I want is to be put out of my misery. If I’m banned until the day of my death, with absolutely zero chance of getting my account back, fine. I’ll learn to live with that, I just really need it confirmed so I can move on. Otherwise, what can I do? Would Google be willing to grant me a probationary period, during which I could prove myself worthy of reinstatement? I would gladly cover any administrative fees related to monitoring my account, if that is a concern. In any case, with this last appeal, I hope to arrive at a conclusion: either the dark cloud is here to stay, or it will eventually give way to sunlight.

Thanks to: Elisa and Joe.

Photo credit

First photo by Pål Berge.

Second photo by Jason Cheung.

Third photo by Dan DeLuca.

Fourth photo by Luigi Caterino.

UPDATE 06/25/2012: Reading this today, I find myself tempted to make a few edits. I sound as though I’m apologizing for something much worse than clicking on ads, and I feel it could be toned down. Though my fraud was born out of youth, and associated stupidity, it was fraud nonetheless – and that is unacceptable according my own moral code – let alone Google’s terms. So to preserve the genuine guilt and frustration that went into writing the post, I’ve decided to leave it unaltered.

Will the Real Matt Refghi Please Stand Up?

Back in mid 2009, I discovered an unexpected shipping confirmation in my e-mail inbox. It was sent from my cellphone service provider, and was letting me know that the iPhone I ordered had been sent out to me. Thing is, I never ordered an iPhone, and though the confirmation showed my name, it was being shipped to another address, and was associated with another phone number. It didn’t take long for me to realize that this was identity theft.

I immediately called my provider, and realized that I would likely have problems authenticating with them. You see, the provider usually asked for two key items whenever I called: birth date, and postal code. Anticipating this, I first told the agent the situation, and he confirmed that the address and contact information on my account had been changed. Since I had the thief’s information as well, I was able to prove that I was legitimate, and the agent told me I’d have to call the fraud department, which was currently closed.

As a next step, I returned to the confirmation e-mail, and took note of the shipping information in there. It was being shipped by one specific package delivery company, and I had a tracking number. Seeing as it was late, I couldn’t call their hotline for help. Instead, I went ahead and sent an e-mail to their support, warning them that the package should not be delivered, as it was fraudulent. I realized that I would likely not hear back from them that night, but at least I knew I did something while waiting for the hotline to open the next morning.

The next day, I called my cell phone provider first, and spoke with their fraud department. From what they could tell, the thief simply managed to authenticate as me, providing my birth date and postal code. He then had them change the address and phone number on my account, likely after telling them he had moved. As a means of protecting my account from further break-ins, the provider offered to set up a password. I naturally agreed to this, but wondered why it wasn’t active by default.

Next in line was the delivery company, which I managed to reach by phone. The agent mentioned that the package was already in transit, and that she would notify the driver to abort the delivery. She seemed fairly confident that this would occur, so I was in a good position by the end of the call. Keep in mind, though, that I probably didn’t need to worry about the delivery, as the provider likely had insurance for such situations. My pursuit, at that point, was mainly for personal reasons – if I could stop the thief from succeeding, I would be much more satisfied.

Soon after completing the calls, I arrived at work, and told my boss the story. He naturally allowed me to deal with it from the office, rather than work. Since I had spoken to the delivery company and my cell phone provider, the next step was to call the police. I explained my story, and the officer told me someone would call me back to discuss it further. In the meantime, her advice was that I should activate a fraud alert on my credit line, which I went ahead and did immediately after the call. The alert would prevent anything from being charged to my name, effectively making a social security number a requirement in all large credit purchases. After activating the alerts, I went back to my desk, and tried to piece together how exactly I had been compromised. Within a few minutes, I had my answer.

To find my postal code, the thief probably just ran a WHOIS against my domain. At the time, I had multiple domains, and each one had been registered using my full name, address, and phone number. Domain registrations are public records, and though it’s a security concern, the contact information is needed to prove ownership. While this isn’t immediately visible to everyone, with the right tools, one can access that information. As an example, visit this website, and enter “microsoft.com” in the WHOIS box. Press “WHOIS >>” when ready, and then scroll down to see the registration information. There are hosts that offer private registration, usually for an additional fee, but at the time, my host didn’t have the option.

Now, on the other hand, my birth date was a little less straight-forward. It was a coworker who initially found that my Amazon wishlist was available to the public, and it revealed my birth day and month. While the year wasn’t actually revealed, there are many sites where my current age is displayed. With that, the year can be deduced, and there you have it – the date of my birth, cracked.

With the security holes revealed, I decided to correct the easiest one – I disabled my Amazon wishlist. The domain problem would have to be addressed later, as it would likely require changing hosts, which was not a quick task. My next goal was to find out as much as I could about the thief, as I had his address and phone number. After some googling, I located the Facebook profile of the supposed culprit, which of course included his name. Unfortunately, I couldn’t determine if he was the actual thief, or a scapegoat, so I couldn’t act on this knowledge. The actual thief could simply have given that address with the intention of being there just in time to grab the delivery. So, instead of acting on it, I took notes, and awaited the police phone call.

A few minutes later, I got word from the delivery company – they had successfully blocked the package, and it was being returned to the sender. With this news, I knew that I had blocked the thief – it was now simply a matter of bringing down the hammer of justice. Soon after, the police called back, and I explained my story once more. To my surprise, I was told that there was nothing they could do to locate the individual, despite the information I had collected. Apparently, the scam was fairly common, and the person doing it was most likely not the one at the address. The officer then explained that it would have been a different story if I hadn’t successfully blocked the delivery. Even then, I was told it would have taken the police department ONE YEAR to investigate such a theft. I left the call feeling less respect for the police, and seriously considered taking a vigilante approach.

Despite my disappointment in the police, the problem had been mostly resolved. I successfully prevented the thief from getting anything, and my accounts were now all protected. I had called all companies I did business with, and had them activate all optional security measures.

Two weeks after the incident, I received yet another e-mail, notifying me that my password had been reset on my account. I once again called my cellphone provider’s fraud department, and they helped me piece together what happened. The thief probably noticed he hadn’t received the iPhone, and tried to get that corrected by going to a store in person. When he couldn’t figure out the password that was being asked of him, he likely claimed he had forgotten it, and had the agent reset it. Since my account had the correct contact information, the new password was sent to my e-mail address. Since he couldn’t get into the account, and couldn’t check my e-mail, he was officially stuck, and the conflict finally came to an end…. I had won.

However stressful, the whole experience proved instrumental in improving my security on the web. No longer could I just casually open accounts everywhere, worry-free. I now had to be very conscious of how websites intended to use my data, otherwise, I could be leaving bits of information for thieves to exploit. I once wrote an article that explains how I would google my own e-mail address to see if it was visible to spammers. Well, the same approach can be used for other things – you can google your name, address, phone number, and see if it is exposed anywhere. Keeping in mind, of course, that after searching for anything sensitive, you should probably wipe your browser history, as well as your Google Web History, if you have that activated.

Beyond making sure that websites don’t expose too much information about me, I also try to avoid being specific in my posts. You likely noticed that I never mentioned who my cellphone provider was, and who the package delivery company was. I do this to make sure I’m not giving away details that can be used against me. I also exclude certain facts from my posts so that if my identity is ever in question, I have unique information that can set me apart from the thief. I do something similar with the images that I upload to this blog – if I spot anything even remotely sensitive, I’ll cover it up.

So, that’s my story, folks – hopefully my experience will prove useful in preventing similar attempts on others.

Photo credit

First photo by Ken Banks, kiwanja.net.

Second photo by KDavidClark.

Third photo by Tim Pierce.

Detained While Reporting Spam in Livemocha

Ah, yes, Livemocha. If you haven’t heard, Livemocha is a site that allows you to learn languages with the help of a community. While it does offer exercises and quizzes that are similar to Rosetta Stone, the most powerful feature is the fact that other users review your submissions. That alone is worthy of a recommendation, so check it out if you haven’t already. The community support goes a long way towards motivating a person, and also ensures only native speakers of a language are the ones reviewing. This idea is a very powerful one, but unfortunately, the interface that they offer – the website – is flawed in many ways. Today, I’d like to share my experiences with one of these flaws, which, in my opinion, is a major usability issue.

Consider this Livemocha e-mail notification:

A notification from Livemocha letting me know that I received a message on the site.

Alright, so “maxwevictor96” sent me a message. The name is a bit weird, so I’m pretty sure it is spam – but there’s no way for me to read the message content from the inbox. If I click on the link, I’m forced to log into Livemocha before I’m allowed to see the content. Seeing as Livemocha also offers paid learning services, I can see why they might want us to log in as often as possible. After all, the more time we spend on the site, the more time we have to consider paying for advanced services. Of course, I’m just speculating – it’s possible they didn’t intentionally design it with that in mind.

Anyway, provided I do log in, I’m brought to the message:

A message as seen through Livemocha, with two main reporting features on the left: Report abuse, Block user.

So, yeah, definitely spam, and it’s up to me to either flag it, or ignore it completely. In an effort to improve the services that I use, I usually go out of my way to flag spam. Notice the Report abuse button on the left? Seems clear enough, so let’s click that.

A dialog appears while the rest of the website is grayed out, showing the reporting controls.

A gray overlay appears over the site, and after about 2 seconds of loading, the above dialog appears. So far, I can’t really complain – apart from the long load time. The form seems pretty standard, so I select Spam from the Category dropdown, and click Submit.

When I try to report spam, a red error message appears telling me that I need to specify a comment.

Instead of the dialog disappearing, an error message appears, telling me that the “Message cannot be blank“. Apparently, saying the e-mail is spam is not enough. I actually have to type something in the comments box… but what do they want me to enter at this point? The first few times, I wrote “This is spam”, what else do they expect? Seems to me that the form should not require comments if you’re simply flagging spam. After doing this on many separate occasions, and cursing at the unknown designer that came up with this process, I actually caught myself adding random characters to the Comments textbox, just so I could submit quickly. In other words, I spammed the report spam feature, to save time – all because of this bizarre design choice. It reminds me of the Windows Server 2003 dialog that appears whenever you boot, where you have to explain why the machine was taken offline. Sure, it can be useful in specific environments, but for a simple test machine – I really don’t care when it goes offline, so I learned to enter random garbage into that textbox just to get past it. Funny how design choices can turn well-intentioned users into annoyed pseudo-spammers.

Anyway, provided you spend time entering something in the comments box, you can successfully click Submit. Then, this message appears:

The dialog thanks me, and tells me it will disappear in 5 seconds. A close button is available at the top right of the dialog, but is far from where my cursor is positioned.

I get thanked for keeping Livemocha clean, and it tells me my report has been submitted successfully. Okay, fine – then I’m told the dialog will disappear in 5 seconds, so I don’t need to do anything. They offer a small close button, but it’s far enough away from where my mouse cursor is (after clicking Submit) that I never actually felt like it was worth it to try and close the window early. If at least they would count clicks outside the dialog, I could hide it immediately by clicking the gray zone. But no, instead, I’m subject to time-limited target practice – if I can click the little Close button quick enough, I can save maybe 2-3 seconds. That, or sit idly and let the 5 seconds elapse – after all, once you’ve read the message one time, there’s really no value in re-reading it.

So why do you feel the need to waste my time, Livemocha? I lose 2 seconds waiting for the dialog to appear, then I have to select Spam, enter redundant information in the comments box, click Submit, and then wait 5 more seconds. I have a suggestion, guys – how about a Report Spam button with no questions asked?

Update: I posted a feature request on LiveMocha’s feedback site.

No More Canned Responses, Please.

Back in 2007, my MattRefghi.com domain served primarily to power my solo development experiments. Behind the scenes, it was hosted by 1&1 Internet – the price was low, which was necessary at the time. All was well in the world of 1&1 web hosting for a while, until I eventually encountered a problem when uploading PHP files to my server. When I ran the files on MattRefghi.com, they would fail – but on my local development machine, everything was working as expected.

Eventually I called their tech support team to see if something was wrong with their configuration. The agent helped me resolve the problem, but in the process of doing so, he started modifying my PHP files – without even asking me. During the call, I didn’t really think much of it, particularly since the code I had uploaded wasn’t very important to me. Ultimately, the agent’s PHP tampering helped me figure out the problem; however, after the call, I realized that his behavior was a very big concern. Had my source code actually been important, I wouldn’t have wanted anyone to get their eyes on it, let alone edit it. After a while, I contacted 1&1 to report the encounter, and express my concern in their practices. The agent that received my report was sympathetic, and assured me it wouldn’t happen again:

The issue that you reported is actually beyond the rules of 1and1
already and as tech support, we are not allowed to alter anything from
the customer’s files or account. We can assure you that if anything
like this will happen again, we will take further measures. That is
generally the reason why we do not support scripting issues. I would
like to apologize for this issue.

However, it still marked the end of my business with 1&1 – I couldn’t risk my code being comprised. Apology or not, their hiring practices produced at least one agent with insufficient training.

Seeking more stability and a trustworthy host, I went ahead and signed up with Yahoo Web Hosting. It was more expensive, but it had something important – a big name I felt I could trust. Surely, Yahoo would have better practices, and I would be safe to code away as I always had. To be fair, this was the case – I never felt my security was at stake when I was with Yahoo. I instead encountered a different type of problem:  I couldn’t figure out how to map multiple domains in such a way that they all used my MattRefghi.com web hosting, without revealing that to the end-user. After multiple attempts at solving the issue on my own, I decided I would e-mail their support team, and see if they would be able to help.

Below is one of the most frustrating conversations I’ve ever had with a support team, to the point where I felt the need to describe my problem as if it were meant for a child to understand. Before we get started, I want to highlight that there are many long e-mails included in this post – some are offered as text, others as images (to preserve formatting). Typically, whenever I show a Yahoo e-mail, feel free to read the first couple paragraphs, and then skim through the rest. Now that you’ve been warned, here’s the first e-mail I sent to Yahoo:

When I originally signed up for web hosting with Yahoo, I only bought the domain: ‘mattrefghi.com’. At that time, this was all I needed. I now have my blog hosted by Yahoo (WordPress), which is in a ‘blog’ subfolder – I see this when I’m connected via FTP.

To access my blog, I can use the following address:
http://www.mattrefghi.com/

I currently have it set up so that when I type ‘http://www.mattrefghi.com/’, it brings me to a page that says:
‘mattrefghi.com is currently experiencing difficulties – come back later.’ (I added this page just for testing).
Adding ‘blog’ to the URL, and pressing enter, brings me to my blog.

This is great… all working as expected.

Thing is, I have two other domains: ‘.com’ and ‘refghi.org’.

When I forward ‘chameleoncore.com’ to point to ‘mattrefghi.com’ using masking, I get the page I expect:
‘mattrefghi.com is currently experiencing difficulties – come back later.’
…and ‘chameleoncore.com’ is in the address bar. Great.
Now… if I add ‘blog’ to this URL, it throws me back to the same page, but keeps the ‘blog’ in the address bar. Huh?
I can even put some random junk in there and it still keeps it and throws me back to the ‘technical difficulties’ page.
This isn’t what I want.

Ideally, I’d like to be able to do the following:
Create a folder called ‘chameleoncore’ via FTP, such that typing ‘www.chameleoncore.com’ will bring me to the ‘chameleoncore’ folder by default.
If the ‘chameleoncore’ folder has a subfolder (ex: ‘projects’) on the FTP server, I want to be able to access that subfolder via the following URL:
http://www.chameleoncore.com/projects/
…while ALWAYS reflecting the current directory.

I realize this would work fine if I had chameleoncore.com as my main web hosting domain – but how can I accomplish this in my situation. When I signed up, I just bought mattrefghi.com, not knowing what my business name would be. I still don’t have that name, but the ‘chameleoncore.com’ name is somewhat related, so I wanted to try setting up the site using that domain.

Any help in this matter would be appreciated.

– Matt Refghi

As you can see, I provided a wealth of information to assist the support agent. I thought it would help ensure that my problem got solved quickly.

Hello Matt,

Thank you for writing to Yahoo! Web Hosting.

I understand that you want to forward your domain ‘chameleoncore.com’ to
a sub directory in your ‘mattrefghi.com’ account.

Mathieu, I greatly appreciate that you have forwarded your concern to us
and given me a chance to assist you with this matter.

To create a subdomain, you must already have at least one subdirectory
created in your Yahoo! Web Hosting File Manager.

To create a subdirectory:
1. Sign into your Yahoo! Web Hosting account.
2. Click on the “Manage” tab.
3. Click on the “File Manager” link in the “Tools for Managing Your
Site” section.
4. Click on the “Create Subdirectory” link.

To create a subdomain:
1. Sign in to your Yahoo! Web Hosting account.
2. Click on the “Manage” tab.
3. Locate the “Web Hosting Account Details” section.
4. Locate “Subdomains”
5. Click the “Manage” link
6. Click on the “Create Subdomain” button.
7. Type in the subdomain you would like.
8. Select the subdirectory you would like your subdomain to be
associated with, then click the “Submit” button.

Now when you type in your subdomain, the index file inside of the
associated subdirectory will be automatically loaded into your browser.

For more information on subdomains, please see:

http://help.yahoo.com/help/us/webhosting/subdomains/

You can set up domain forwarding from the Domain Control Panel.

1. Log into your Yahoo! Domains account with your Yahoo! ID and password
by clicking on the “Sign In” link at the the top of the page:

http://smallbusiness.yahoo.com/domains/

2. Click the “My Services” tab, then click on the Domain Control Panel
for the account you wish to edit.

3. Click the “Forward your Domain” link.

4. Click the “Create Forward” button.

To set up masked domain forwarding to any URL:

5. Select the “the web site at” option.

6. Enter the URL of the site to which you wish to forward your domain.
Select the masked forwarding option and click the “Submit” button.

7. Do one of the following:
* Select the option to include keywords and enter your keywords
separated by commas in the field provided.

* Select the option to not include keywords. (You can always come back
and add them later.

8. Click the “Continue” or “Submit” button.

9. Click the “Return to Domain Forward Page” button.

Regardless of which option you choose, your domain forward will appear
listed along with the details. Keep in mind that it may take up to 30
minutes for your domain forwarding to take effect during which visitors
will see the original domain and not be forwarded.

We believe this solution should resolve your issue, if it still
persists, please call us at 1-866-800-8092.

Please do not hesitate to reply if you need further assistance.

Regards,

Bradley

Yahoo! Customer Care

For assistance with all Yahoo! services please visit:

http://help.yahoo.com/

Their initial response started with an assumption – the agent, Bradley, felt he understood my problem, and provided me with lots of information about the solution. I have to admit, the instructions provided were very clear, but the e-mail, as a whole, felt like a giant form letter – and more importantly, his assumption was incorrect.  He did not correctly understand my problem, and I didn’t blame him for that – it was a tricky problem to describe. In response to this, I decided I’d write my reply as clearly as possible, while illustrating how his solution didn’t work.

After writing that e-mail, I was pretty confident they would understand what I was saying. I spent a lot of time on the formatting, making it clear beyond a doubt, and then even added color coding and smileys to convey what worked, and what didn’t. The smiley part made me laugh, but I figured if was going for clarity – I might as well crank it up to 11.

Hello Mathieu,

Thank you for writing to Yahoo! Web Hosting.

I understand that wish to hide your Yahoo! Web Hosting account domain
name “mattrefghi.com” from your website URLs.

I greatly appreciate that you not only forwarded your concern but also
shared your thoughts about the feature you’re requesting.

Mathieu, I regret that this feature is not available through Yahoo! Web
Hosting. Also, we do not have an estimated date as to when it will be
available. Currently, the feature which you wish to have is available
through URL rewrite function, unfortunately  not supported by Yahoo! Web
Hosting.

We are always looking for ways to make Yahoo! Web Hosting more useful to
our users and continually receive lot of great feedback. It is through
these comments and suggestions that we are able to make improvements.

We will be sure to keep your concern in mind to improve our service.
Moreover, I’ve also passed your comments on to our development team for
further consideration. We always have something on the drawing board,
and many of our best new features have been suggested directly by users
like you.

You can also forward your precious suggestions to us at the following
address:

hosting-suggestions@cc.yahoo-inc.com

Your cooperation and patience will be highly appreciated in this regard.
We value you as a customer and look forward to serving you for years to
come.

Please do not hesitate to reply if you need further assistance.

Have a nice day!

Regards,

Maggy

Yahoo! Customer Care

For assistance with all Yahoo! services please visit:

http://help.yahoo.com/

Despite the clear formatting, color-coding, and smileys – another Yahoo agent (Maggy) replied, wielding her own incorrect assumption. Now, it’s the approach I have a problem with – I wouldn’t mind her being wrong if she expressed her uncertainty somewhere in the e-mail. If you, the support agent, are not entirely sure that you are providing me with THE solution, don’t act like you are. Instead, she behaves as if it will solve my problem, and leaves it to the form letter to tell me I can reply, if I need further assistance.

So I reply again, and you can tell my patience is low by the last words in the e-mail:

No more canned responses, please. I’m a developer – I’m not clueless.

Then, another reply:

Hello Matt,

Thank you for writing to Yahoo! Web Hosting.

I would be pleased to assist you further.

Matt, it is not possible to switch Yahoo! Web Hosting for one domain to
another. Let me clarify the reason and basic difference between Yahoo!
Domain and Yahoo! Web Hosting.

With Yahoo! Domains plan, you register a domain which is your web
presence. You cannot host webpages under Domains plan but you can always
forward this domain to any URL.

Under Yahoo! Web Hosting plan, you get your own webspace to host
webpages. Once your Web Hosting order has been placed with a particular
domain name, it is not possible to make changes to your domain name.
During the sign-up process, we make sure to confirm your selected domain
name several times to ensure that the correct domain name will be
registered and then DNS information is propagated across all servers in
world.

Matt, you cannot transfer the hosting services from one domain to
another but you can always upgrade your Yahoo! Domains plan to Yahoo!
Web Hosting.

Steps to upgrade your Yahoo! Domains account:
———————————————–

1. Log into your Yahoo! Domains account with your Yahoo! ID and password
by clicking on the “Sign In” link at the the top of the page:

http://smallbusiness.yahoo.com/domains/

2. Click the “My Services” tab
3. Click the “Change Plan” link for the account you wish to upgrade.
4. Select from the upgrade options displayed by clicking the “Choose”
button or click the “Add New Service” link to get more information about
all of the Yahoo! Small Business products.
5. Decide upon a product upgrade and complete the order process.

NOTE: If you do not wish to keep the website with domain name
“mattrefghi.com” or do not want to host website under this name, you can
downgrade the service to Yahoo! Domains plan, free of cost.

To downgrade your Yahoo! Web Hosting account, follow these easy steps:

1. Log into your Yahoo! Web Hosting account with your Yahoo! ID and
password at:

http://smallbusiness.yahoo.com/services

2. Click on the “Change Plan” link for the domain in which you wish to
change.

3. Enter your Yahoo! ID password

4. Click in the “Choose” button of the plan on which you wish to
downgrade. or click on the “View all of our plans.” link to view more
services that are available to you.

5. Proceed through the remainder of the checkout process to switch
services.

Note: Please be aware that you are actually switching your existing
service plan. Some services that you currently enjoy may be unavailable
to you depending on the service plan selected. Please make sure to
carefully read the plan descriptions for each service option.

Matt, I hope this email will assist you in right direction.

Please do not hesitate to reply if you need further assistance.

Regards,

Shelby

Yahoo! Customer Care

For assistance with all Yahoo! services please visit:

http://help.yahoo.com/

Shelby? Alright… for the first two e-mails, I didn’t question the fact that there were two different agents. But, three? That’s getting excessive – seems like e-mails are just being randomly assigned to an owner each time I contact. It’s almost like they want their agents to “take a shot” at a solution, without opening a dialogue to ensure it is correct. After all, if their guess is right – they don’t need to have more communication with the client. Of course, if multiple e-mails are sent, each agent must read the whole history to see what didn’t work, so it’s an approach that taxes Yahoo over time.

Furthermore, this conversation was a strange case where even if I spent time making my e-mails abundantly clear, it didn’t seem to improve the experience. The agents still continued to take shots at my problem, most of which proved incorrect. In fact, because of this, I wouldn’t be completely surprised if you told me that Yahoo’s support system was fully automated, where the software actually replies to client e-mails. The only clear proof against this, to me, seems to be the Shelby e-mail, where the fist few paragraphs seem pretty human.

In the end, Shelby’s e-mail provided me with the confirmation that I needed – Yahoo requires that you buy web hosting per domain that you purchase. Can you guess what my next reply was?

I would like to cancel my web hosting plan, but still keep my domain registrations with you.

How would I go about doing that?

Two Quick Shortcuts to Show File Properties In Windows

Transcript:

Hi guys. In this video I have two tips I’d like to share with you, and they’re dealing specifically with how to make the properties dialog appear faster in Windows. You’re probably all familiar with right-clicking files in Windows and selecting Properties. What I’d like to show you is a quicker way of doing that – two quicker ways of doing that, actually.

The first way involves hovering your mouse over any file on the desktop or anywhere else in Windows, and simply holding ALT and double-clicking the file of your choosing. That will make the properties appear.

The other way involves clicking on the file, actually selecting it – not just hovering over it – and then simply pressing ALT+ENTER. Now, I prefer this ALT+ENTER method because it allows me to step through files using the arrow keys, and then when I get to the file I want to see, I just press ALT+ENTER.

And, as always guys, if you have any comments or questions, please feel free to leave them below – I’ll be happy to answer them.

Credit

Thanks to Marc K. for bringing the ALT double-click trick to my attention.