In this page I want to share some information for beginners on how to make money blogging. For a very quick and broad visual intro – check out this Make Money Blogging MindMap which visualizes just SOME of the ways bloggers make money blogging.
Firstly – lets get our expectations right. Not everyone who tries to make money blogging becomes rich. In fact those who do well from blogging are in the minority. I’m sorry if this disappoints you – but I’m not here to hype this up or make any promises. It is possible to make money blogging – but it takes time and a lot of hard work – and it doesn’t happen for everyone!
For a picture of how realistic it is check out my post – Can You Really Make Money Blogging: 7 Things I know about Making Money from Blogging.
Secondly – let me start by sharing my own top Money Making Methods but below that point you to some great resources and teaching on how to increase your income from blogging.
How I Make Money BloggingWhat follows is a quick summary of my main income streams from blogging. Before you read it though – keep in mind that every blog is unique in how it can make money. Some of the following income streams will work on some blogs a lot better than others – the key is to experiment with as many as possible and see what works best for you.
The following income streams (from a number of blogs) have helped me to earn a six figure income each year for the last 5 years from blogging. I’ve ranked them from highest to lowest.
I hope you find it useful to see the mix and variety of ways that I earn a living from blogging.
1. AdSense
Firstly – lets get our expectations right. Not everyone who tries to make money blogging becomes rich. In fact those who do well from blogging are in the minority. I’m sorry if this disappoints you – but I’m not here to hype this up or make any promises. It is possible to make money blogging – but it takes time and a lot of hard work – and it doesn’t happen for everyone!
For a picture of how realistic it is check out my post – Can You Really Make Money Blogging: 7 Things I know about Making Money from Blogging.
Secondly – let me start by sharing my own top Money Making Methods but below that point you to some great resources and teaching on how to increase your income from blogging.
How I Make Money BloggingWhat follows is a quick summary of my main income streams from blogging. Before you read it though – keep in mind that every blog is unique in how it can make money. Some of the following income streams will work on some blogs a lot better than others – the key is to experiment with as many as possible and see what works best for you.
The following income streams (from a number of blogs) have helped me to earn a six figure income each year for the last 5 years from blogging. I’ve ranked them from highest to lowest.
I hope you find it useful to see the mix and variety of ways that I earn a living from blogging.
1. AdSense
AdsenseDespite not using it here at ProBlogger any more (here’s why) I continue to use AdSense with amazing effect on my other blogs. I have them all set to show image and text based ads and find that 250×300 pixel ads work best (usually with a blended design). I don’t have much luck with their ‘referrals’ program but their normal ads work a treat and continue to be the biggest earner for me.
2. Affiliate Programs
miscellaneous affiliate programsI run a variety of affiliate programs on my blogs – most of which bring in smaller amounts of money that don’t really justify a category of their own (but which certainly add up).
These include recommending quality products like these here on ProBlogger: Thesis WordPress theme, Yaro’s Blog Mastermind Coaching Program and How to Launch the F*** out of your E-Book (and others) as well as some great products on my photography blog including 123 of Digital Imaging, David DuChemin’s amazing Photography E-Books and Mitchell Kanashkevich’s great ebooks.
The great thing about many of these programs is that they are of such high quality that they sell themselves and I am being emailed from readers who sign up to them thanking me for the recommendation!
3. E-Book Sales
These include recommending quality products like these here on ProBlogger: Thesis WordPress theme, Yaro’s Blog Mastermind Coaching Program and How to Launch the F*** out of your E-Book (and others) as well as some great products on my photography blog including 123 of Digital Imaging, David DuChemin’s amazing Photography E-Books and Mitchell Kanashkevich’s great ebooks.
The great thing about many of these programs is that they are of such high quality that they sell themselves and I am being emailed from readers who sign up to them thanking me for the recommendation!
3. E-Book Sales
make-money-blogging-ebooks.jpgLast time I did a wrap up of how I make money blogging this category did not exist for me – I didn’t really have any of my own products to sell at all. However in the last year or so I’ve released 3 E-books – 31 Days to Build a Better Blog, The Essential Guide to Portrait Photography and Photo Nuts and Bolts: Know Your Camera and Take Better Photos. While these products all only sell for under $20 they certainly add up and some months this has been my biggest category of income. The reason they were only ranking at #3 in the last month was that I didn’t do a product launch (I wrote about one launch which brought in $72,000 in a week here). This is an income stream I see growing as I add more E-books to my range (expect 3 in the coming few months).
4. Continuity Programs
4. Continuity Programs
make-money-blogging-continuity.jpgThis is another newer category for me but one that continues to grow.
A continuity program is a site where you earn a recurring income from people who subscribe to a service you offer.
For me this includes two sites – ProBlogger.com and Third Tribe Marketing. Both programs are membership sites and generate monthly income from the thousands of members that they have as a part of them.
5. Private Ad Sales/Sponsorships
A continuity program is a site where you earn a recurring income from people who subscribe to a service you offer.
For me this includes two sites – ProBlogger.com and Third Tribe Marketing. Both programs are membership sites and generate monthly income from the thousands of members that they have as a part of them.
5. Private Ad Sales/Sponsorships
private-ad-salesPrivate ad sales directly to advertisers have fallen for me in the last year (they previously ranked #3 on this list). This is partly due to a change in my own focus but also partly due to the economy as it is. I should note that this area does vary a little from month to month depending upon the campaigns we’re asked to run – we’ve had a couple of months where it actually ranked #2 in the last year.
This includes ad sales of the 125 x 125 ads here at ProBlogger as well as a campaign or two at Digital Photography School.
6. Chitika
ChitikaChitka continues to be a great performer for me on my blogs. They traditionally have worked best on product related blogs although their Premium ad units now convert well on a larger range of blogs.
While I’ve focused a little less on Chitika in the last 6 months (mainly as I’ve released my own products and moved a little away from advertising) they do continue to perform well where I use them and over the time I’ve been using Chitika they’ve now earned me over a quarter of a million dollars – as a result I can’t recommend them enough!
7. Amazon Associates
While I’ve focused a little less on Chitika in the last 6 months (mainly as I’ve released my own products and moved a little away from advertising) they do continue to perform well where I use them and over the time I’ve been using Chitika they’ve now earned me over a quarter of a million dollars – as a result I can’t recommend them enough!
7. Amazon Associates
Amazon’s affiliate program has been one of my big movers in the last 12 months. I used to make a few odd dollars from it – however in recent times it has become a significant earner for me (in fact it’s now earned me over $100,000 since I started using it). Christmas time (and the lead up to it) is a particularly good time for Amazon – last December it would have ranked #2 on this list.
8. ProBlogger Job Boards
make-money-blogging-job-board The job boards here at ProBlogger continue to grow each month in the number of advertisements that are being bought. This enabled me to invest most of the money that they’d earned a while back into getting a new back end for the boards and to redesign them. These job boards now bring in over $1000 a month in revenue which is pretty nice considering that they are so low maintenance to run. They also offer a service to readers and add value to the overall blog.
The only problem that I face with the job boards is that there are so many bloggers looking for work that the demand for jobs far exceeds the supply. On the good side of things is that advertisers are reporting getting amazing quality of applications.
make-money-blogging-job-board The job boards here at ProBlogger continue to grow each month in the number of advertisements that are being bought. This enabled me to invest most of the money that they’d earned a while back into getting a new back end for the boards and to redesign them. These job boards now bring in over $1000 a month in revenue which is pretty nice considering that they are so low maintenance to run. They also offer a service to readers and add value to the overall blog.
The only problem that I face with the job boards is that there are so many bloggers looking for work that the demand for jobs far exceeds the supply. On the good side of things is that advertisers are reporting getting amazing quality of applications.
9. Speaking Fees
I get asked to do a lot of speaking and increasingly they are paid opportunities. I’m not able to do as many as I would like (mainly because I live in Australia and most of what I’m asked to do is overseas and I only travel 2-3 times a year) – however in April I did a couple of events and the income was enough to include in this list.
Other Income
In addition to all of the above there are many smaller incomes. Many of these are from smaller advertising programs that I test but none are big enough to really rate a mention here.
The other income stream that there was no actual money from in April was book royalties from the ProBlogger Book. These are only paid every 6 or so months (not in April). It’s probably also worth mentioning that authors don’t tend to make a whole lot of money on book royalties – you don’t write books to get rich (unless you sell a lot of them).
I get asked to do a lot of speaking and increasingly they are paid opportunities. I’m not able to do as many as I would like (mainly because I live in Australia and most of what I’m asked to do is overseas and I only travel 2-3 times a year) – however in April I did a couple of events and the income was enough to include in this list.
Other Income
In addition to all of the above there are many smaller incomes. Many of these are from smaller advertising programs that I test but none are big enough to really rate a mention here.
The other income stream that there was no actual money from in April was book royalties from the ProBlogger Book. These are only paid every 6 or so months (not in April). It’s probably also worth mentioning that authors don’t tend to make a whole lot of money on book royalties – you don’t write books to get rich (unless you sell a lot of them).
Computer Viruses:
Protecting Your Computer from Unwelcome Intruders.
Protecting Your Computer from Unwelcome Intruders.
When you’re online, you expose your vulnerability to malicious virus that have been growing in virulence and ferocity over the last few years. These program codes have gone beyond mere annoyances with the worst kinds disabling your PC, but they have become portals for remotely perpetuating more sinister activity that can clandestinely hack into sites, mount denial of services or steal confidential and personal data for fraudulent financial gain at your expense.
Are these virus serious enough to cause losses? Among home PC users, you may think having to reinstall your OS after a virus or malware has brought it down is not really expensive as you lose just a day or two to reinstall your programs and rebuilding files, consider that in a business, you could actually lose millions. Just ask ChoicePoint when it took a $6 million charge in 2005 after cyber criminals hacked into their systems and stole sensitive data from thousands of customers. Or the credit card processor CardSystems Solutions which may yet go out of business from major security breach at the company's Tucson, Arizona, operations center. In a recent consumer survey among security breach victims, people don't take lightly the loss of their data. More than 60% of respondents indicated their plans to terminate business relationships with a company that lost the data they entrusted to them.
In 2004, rootkits were a relatively obscure form of Trojans meant to infect Unix computers. But by 2005, rootkits have become a mainstream security threat after Sony BMG Music Entertainment shipped a few million CDs that contained a rootkit among its copy protection scheme. Within a few months, Sony recalled the CDs, but it was too late, According to security experts, rootkits attacking Windows PC were here to stay.
The 2011 Norton Cybercrime Report reveals that there were 431 million global cybercrime victims who lost $388 billion in real money losses and computer time. This is a lot more compared to the estimated $288 billion in revenues from the black markets for cocaine, heroin and illegal drug trades combined. For sure, not all of these losses were incurred due to Trojans, worms, viruses, rootkits and malware. But when you consider that roughly 4.3% of cybercrimes involve damages to PC resulting from online downloads of infected content over the internet, you are looking at a computed $17 billion in annual losses due to malware and virus infection.
What can I do to protect myself from computer viruses and Trojans?
These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system.
A computer virus is the most subtle of computer problems. It usually loads itself into your computer system when you run a program to which it has attached itself. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive. What it does then depends on the malevolence of its creator. Some viruses are nothing more than a practical joke. They may bring up a message like "Merry Xmas" or melt your display. Most of them though, either start destroying your system or your files immediately or on a date specified by their creators—like the much-publicized Michelangelo virus, which erases important pieces of your system on March 6. "Trojan horse" programs are similar to viruses in their effect on your system, but they can't reproduce themselves. They're usually a program disguised as something you might want to download onto your computer—for instance, a rogue, modified version of PKWare's PKZIP utility. But when you run the new program you just found, it can do anything from popping up a message to erasing your hard disk, as the rogue PKZIP utility really did.
In either case, you have to actually launch the infected program or the trojan horse for it to infiltrate your system. Though hoax e-mails, like the one about the "Good Times" virus try to make you believe otherwise, neither a virus nor a trojan horse program can do anything if you simply leave the malevolent file sitting on your hard drive.
Finding out that you copied a trojan horse onto your computer is remarkably easy. You launch the program, and the next thing you know, something completely unexpected happens—maybe your system is gone or your computer is laughing maniacally at you. But unless you notice your computer acting oddly before the virus has done its worst damage, you may very well not know you have it until it's too late.
Protect Yourself
There are a few basic rules that computer users should follow to short-circuit viruses. The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble.
Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software.Unfortunately, 'keeping it current' means updating it weekly, at least but most products today allow one to automate this process, but file downloads can be large and slow.
Factors to consider when buying an anti-virus package include cost, quality of tech support, how frequently the package self-updates and the platforms supported by the program.
Common sense is another good weapon in the fight against viruses. Be wary of opening any email attachments, even from your firends , especially if it has been forwarded to them.Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments.
If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later.If you don't keep it updated, you might was well be completely unprotected.
Prevention
Like sexually transmitted diseases (STDs), computer viruses existed prior to the popularity of the Internet, but as with the sexual revolution of the '70s, viruses have flourished with the widespread sharing of information. And, much like the efforts to control STDs, controlling computer viruses is to be done through education and practicing safe hex (a play on words which means to perform certain measures to protect your computer).
1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Not to mention the grief a current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.
2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updateable. New viruses are produced daily, so it's important to have software that can detect the latest threat.
Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly. Also, consider buying and using two different brands to be doubly protected. See our review of anti-virus programs.
3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).
4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.
If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.
5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs
6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.
7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.
8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses.
9. Be aware of hoaxes. To increase mass hysteria, there have been many stories conjured up and spread by unknowledgeable users. For a list of known hoaxes check out the following site: http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jsp
Viruses are not the only type of programs that are written solely to cripple computer systems or to use a computer in an unauthorized way. Other malicious programs are Logic Bombs, Trojan Horses, and Worms.
Help on the Web
The Virus Bulletin (www.virusbtn.com) offers a list of viruses that are floating through the computer world at present. The site also offers the opportunity to report viruses, should you be unfortunate enough to encounter a new one firsthand.
If your computer is not on a network, and you never, ever install new programs or download files from the Internet or open email enclosures, you don't have to worry about viruses. But that's like living in a sealed bubble. Most of us have to go out into public every day, where we're subject to the germs carried by others (though natural immunities will usually protect us from most of them.) Likewise, most people also have to update their software and are interested in communication and information from others. Luckily, there are some preventions and cures for even the nastiest of viruses.
Are these virus serious enough to cause losses? Among home PC users, you may think having to reinstall your OS after a virus or malware has brought it down is not really expensive as you lose just a day or two to reinstall your programs and rebuilding files, consider that in a business, you could actually lose millions. Just ask ChoicePoint when it took a $6 million charge in 2005 after cyber criminals hacked into their systems and stole sensitive data from thousands of customers. Or the credit card processor CardSystems Solutions which may yet go out of business from major security breach at the company's Tucson, Arizona, operations center. In a recent consumer survey among security breach victims, people don't take lightly the loss of their data. More than 60% of respondents indicated their plans to terminate business relationships with a company that lost the data they entrusted to them.
In 2004, rootkits were a relatively obscure form of Trojans meant to infect Unix computers. But by 2005, rootkits have become a mainstream security threat after Sony BMG Music Entertainment shipped a few million CDs that contained a rootkit among its copy protection scheme. Within a few months, Sony recalled the CDs, but it was too late, According to security experts, rootkits attacking Windows PC were here to stay.
The 2011 Norton Cybercrime Report reveals that there were 431 million global cybercrime victims who lost $388 billion in real money losses and computer time. This is a lot more compared to the estimated $288 billion in revenues from the black markets for cocaine, heroin and illegal drug trades combined. For sure, not all of these losses were incurred due to Trojans, worms, viruses, rootkits and malware. But when you consider that roughly 4.3% of cybercrimes involve damages to PC resulting from online downloads of infected content over the internet, you are looking at a computed $17 billion in annual losses due to malware and virus infection.
What can I do to protect myself from computer viruses and Trojans?
These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system.
A computer virus is the most subtle of computer problems. It usually loads itself into your computer system when you run a program to which it has attached itself. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive. What it does then depends on the malevolence of its creator. Some viruses are nothing more than a practical joke. They may bring up a message like "Merry Xmas" or melt your display. Most of them though, either start destroying your system or your files immediately or on a date specified by their creators—like the much-publicized Michelangelo virus, which erases important pieces of your system on March 6. "Trojan horse" programs are similar to viruses in their effect on your system, but they can't reproduce themselves. They're usually a program disguised as something you might want to download onto your computer—for instance, a rogue, modified version of PKWare's PKZIP utility. But when you run the new program you just found, it can do anything from popping up a message to erasing your hard disk, as the rogue PKZIP utility really did.
In either case, you have to actually launch the infected program or the trojan horse for it to infiltrate your system. Though hoax e-mails, like the one about the "Good Times" virus try to make you believe otherwise, neither a virus nor a trojan horse program can do anything if you simply leave the malevolent file sitting on your hard drive.
Finding out that you copied a trojan horse onto your computer is remarkably easy. You launch the program, and the next thing you know, something completely unexpected happens—maybe your system is gone or your computer is laughing maniacally at you. But unless you notice your computer acting oddly before the virus has done its worst damage, you may very well not know you have it until it's too late.
Protect Yourself
There are a few basic rules that computer users should follow to short-circuit viruses. The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble.
Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software.Unfortunately, 'keeping it current' means updating it weekly, at least but most products today allow one to automate this process, but file downloads can be large and slow.
Factors to consider when buying an anti-virus package include cost, quality of tech support, how frequently the package self-updates and the platforms supported by the program.
Common sense is another good weapon in the fight against viruses. Be wary of opening any email attachments, even from your firends , especially if it has been forwarded to them.Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments.
If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later.If you don't keep it updated, you might was well be completely unprotected.
Prevention
Like sexually transmitted diseases (STDs), computer viruses existed prior to the popularity of the Internet, but as with the sexual revolution of the '70s, viruses have flourished with the widespread sharing of information. And, much like the efforts to control STDs, controlling computer viruses is to be done through education and practicing safe hex (a play on words which means to perform certain measures to protect your computer).
1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Not to mention the grief a current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.
2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updateable. New viruses are produced daily, so it's important to have software that can detect the latest threat.
Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly. Also, consider buying and using two different brands to be doubly protected. See our review of anti-virus programs.
3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).
4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.
If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.
5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs
6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.
7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.
8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses.
9. Be aware of hoaxes. To increase mass hysteria, there have been many stories conjured up and spread by unknowledgeable users. For a list of known hoaxes check out the following site: http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jsp
Viruses are not the only type of programs that are written solely to cripple computer systems or to use a computer in an unauthorized way. Other malicious programs are Logic Bombs, Trojan Horses, and Worms.
Help on the Web
The Virus Bulletin (www.virusbtn.com) offers a list of viruses that are floating through the computer world at present. The site also offers the opportunity to report viruses, should you be unfortunate enough to encounter a new one firsthand.
If your computer is not on a network, and you never, ever install new programs or download files from the Internet or open email enclosures, you don't have to worry about viruses. But that's like living in a sealed bubble. Most of us have to go out into public every day, where we're subject to the germs carried by others (though natural immunities will usually protect us from most of them.) Likewise, most people also have to update their software and are interested in communication and information from others. Luckily, there are some preventions and cures for even the nastiest of viruses.