Side Money From Blogging? Here’s How

Charles Bailey

If you’re looking for something fun and interesting to do as a side job and hobby that will also effortlessly earn you some extra money, then blogging might be something to look into.  Blogging as a pasttime kind of has the stigma of a mom at home writing about how she does arts and crafts with her kids, or writing about recipes.  However, blogging can be about anything under the sun, and it is much wider than simply writing a few cute posts.

Your website can be about anything you want.  Ride motorcycles?  Make it a community about that, offering your best tips and information.  Or it could be about woodworking, showcasing your latest projects.  It could even be about how you have been landscaping your yard.  Blogging is just as much for dudes as it is for ladies.  And it’s no longer considered the realm of nerds or geeks.  Creating a blog is so easy these days that most anyone can do it.

The best kept secret is that since so many people are on the internet buying stuff that it’s becoming even easier than ever to make money by pursuing a passion project.  Affiliate programs are everywhere, and Google adsense is another great avenue to make some extra cash.

So how can you get started with this side project?  The first step is to learn the basics.  I wrote a post all about how to start a blog over at my first ever money site, Surfing Handbook.  That was the first site I ever made to try to make money and it’s still going strong almost 10 years later.  I make about $300-$400 bucks a month from this site, and I barely do anything.  I just wrote a bunch of great content early on, got some links, and then monetized it with some adsense and Amazon affiliate links.  When I first started this site Amazon only had a handful of surfing related items for sale, but now it’s a veritable surf shop so my monetization options are much bigger with Amazon.

The cool thing about Surfing Handbook is that I had a lot of fun doing it.  It really didn’t feel like I was working because I love surfing and I really liked writing about it.  I was able to score some free items and write reviews of them.  There’s nothing more fun than getting free product and then testing it out and writing up a review.  It’s like being sponsored, despite the fact that I’ll never be a professional surfer.

If you do decide to start up a blog then I encourage you not to expect instant results and instant riches.  It takes some time to build up some content and momentum.  However if you make sure it’s quality then you’ll have a lot more success.  You can also follow some full time bloggers that also make great money such as Neil Patel and others.  They have a ton of free content that will get you started down the road to a great side income that could eventually become a full time income.

Basic Computer Viruses

Charles Bailey

computersafetyComputer viruses used to be something users only read about in science fiction novels. But today, users need to understand the techniques of software sabotage that can be destructive and untraceable when used with a virus program.

Four basic types of malicious software may be part of a computer virus:

* A trapdoor is a set of special instructions embedded in the operating system, enabling anyone who knows about it to bypass normal security procedures and gain access to computer files.

A trapdoor is set legitimately during creation of the operating system, usually for debugging purposes. Programmers who develop large applications and operating systems often insert debugging aids that provide breaks in the code for later insertion of new code.

Operating systems and applications should be designed to prevent accessing or changing the code.

However, during software development, built-in safeguards are bypassed for efficiency’s sake. Trapdoors usually are eliminated in the final stage of product development but can be overlooked intentionally or unintentionally.

* A logic bomb is a computer program or part of a program executed at a certain time to facilitate an unauthorized or malicious act. The most common type is the time bomb, set to go off at a specific future time after the perpetrator has left the organization.

For example, a logic bomb might check the system date every day until it encounters the date it is programmed to go off. At that time it carries out its mission.

* A worm program is similar to an Autoexec file because it runs every time the system is booted up. Worms originally were developed by systems programmers who needed extra memory to run large programs and wanted to tap unused resources on a network.

The worm program searches the computer and network for idle machines, using them to execute the large program in small segments.

Underlying worm maintenance mechanisms are responsible for maintaining the worm, finding free machines when needed and replicating the program for each additional segment.

* In a Trojan horse attack, new instructions or logic are added to a computer program or circuit before it is used. During processing, the unauthorized, changed or new functions are performed along with normal activity. The Trojan horse is the most common method of program-based fraud and sabotage.

Instructions may be placed in production programs so they will execute in the protected or restricted domain of the program, with access to all the data files assigned for exclusive use of the program. Most programs are constructed loosely enough for space to be found or created to insert these instructions.

Rivera, Angel L. “Computer viruses can infect entire organizations.” Government Computer News 29 Apr. 1988: 37.

So how does one protect against this kind of stuff these days anyway?  There are thankfully a plethora of different software programs that can help to prevent and also remove malware and viruses.  Some, such as Spyhunter 4, work to actively protect the user’s computer.  Others, such as SpeedyPC Pro (check out this Speedy PC Pro review) work to remove the malware after the attack.  Of course it’s a good idea to prevent malware in the first place, and so we highly recommend Spyhunter 4 type programs with active protection.