WebLink recommends using YouTube for uploading your videos that you would like hosted on your site. There are a number of reasons why we recommend using a public service like this with the most important one being that YouTube’s embedded player is the easiest to work with for your members.
The first step to upload a video is to register for a YouTube account. This is a simple process and can be started by going to http://www.youtube.com/create_account. Fill out the required information and then click I accept to agree to YouTube’s (Google’s) Terms of Service Agreement. Once you have your account registered, sign in to it using the sign in link (located at the top right of any YouTube page).
Once signed in, load the user menu seen here. Move your mouse to where your username appears.
Choose My Videos from the drop down menu - it will be the first option. You will be taken to your videos where you can submit a video. On the screen that comes up, look in the middle of the page for this link:
Click the link pictured and you will be taken to the upload page. On this page the upload video button is pretty obvious so click that and navigate the select file window to wherever you have the video saved on your local machine. Once you have selected the file the window will change to this:
Fill in your video title, description, any tags you would associate with the video, select the category, and finally select its privacy. Note: a private video can only be viewed by 25 additional people, and approval must be given to those people.
Click Save Changes.
Return to My Videos. Your new video is displayed like this:
Click on the name of the video. It will link you to the page for viewing the video.
The box on the right of the video offers you two code options for presenting the information on your website. The If you want to direct your members to YouTube’s site, you would copy the code in the URL box and insert it on your page in a hyperlink. If you want to have the video viewable directly on your website, copy the code in the Embed box and insert on the page where you want the video.
WebLink Support should be able to answer most of the basic questions you might have.
1.2. WebLink Support HTML Reference Guide
One of the most frequently encountered issues in Support here at WebLink is how to use HTML code. To that end we have created this guide to provide our members with some basic HTML information and tools.
If you wanted to center some red, bold text in a mass communications, you would use the following code:
And this is just the tip of what is possible with HTML formatting. The code is robust enough to allow for all sorts of formatting such as inserting tables, links, images, etc. To that end WebLink would like to recommend a few resources for chambers that can be used to learn both the basics and the more advanced intricacies of HTML coding:
Of course, WebLink Support is always available to help with any HTML issues you may encounter and would be happy to help with problems you have.
1.3. Recommended Reading
Learning Web Design: A Beginner's Guide to (X)HTML, StyleSheets, and Web Graphics
HTML & XHTML: The Definitive Guide (6th Edition)
HTML, XHTML, and CSS All-in-One Desk Reference For Dummies
1.4. Find and Replace Text
You can access a find / replace feature from any text box in WebLinkConnect via a right click in that text box.
After you right click, the follow graphic will appear:
Select Find/Replace. The follow graphic will appear:
Enter the text/word you would like to find and click "Find." You can then enter the word/text you would like to use to replace the found text. To replace the text, click "Replace" to replace one instance of the text at a time or "Replace All" to replace all instances of the text.
1.5. Spell Check
You can access a spell check feature from any text box in WebLinkConnect via a right click in that text box.
After you right click, the follow graphic will appear:
Click on Spell Check.
The spell checker will highlight words for you to replace or edit.
You can choose to Ignore Once, Ignore All, Add to Dictionary, Change (it will offer suggestions), Change All or Auto Correct.
Once you've corrected or ignored all words found by the spell check, you will see a message stating that spell check is complete. At this point, your corrected text is automatically brought back into the text box you were working in.
Note: The spell check feature will only work if you have Microsoft Word installed on your computer. The spell check uses the MS Word engine to check your text.
1.6. Installation Error Messages
In the WebLinkCONNECT program files folder, there should be a file called DundasWinChart.dll. If you are experiencing problems and are receiving error messages; it may be missing or corrupted somehow. See Figure 1 below. Try to replace it with the link provided below:
1.Click on DundasWinChart Error Fix (.dll File < 1 MB). There will be a box that will open and ask what you'd like to do. See Figure 2 below
2.Save it to c:\Program Files\WebLinkCONNECT folder,but rename it DundasWinChart.dll. Note: It will probably tell you the file already exist, choose to overwrite it.
3. If you already have WebLinkCONNECT o
pen, close and re-open
it. Otherwise just open WebLinkCONNECT.
You should no longer have problems and/or get error messages. If you still have problems, please contact support.
1.7. WebLink Terminology
Page currently under contstruction
Accounts: In WebLinkCONNECT™ an account is a category of transactions related to a specific type of income.
(Note: You would utilize your regular General accounting system to manage your asset, liability, equity and expense accounts)
To understand and report information
about your organization, you classify transactions by accounts, which
are also known as general ledger accounts or distribution accounts. You
assign different accounts to classify your specific transactions.
Affiliation Codes: Simply put,
an Affiliation is nothing more than a group of profiles that you want to
keep track of. For example, if a specific Profile wanted to receive
press releases on a regular basis you would add that affiliation to that
Affiliation Codes are created by your organization's Administrator,
and can help to track the profiles down to the exact type of profile
necessary. For example, if your organization decides to start a weekly
newsletter, the administrator would then create an affiliation called
weekly newsletter and subscribe only the profiles interested. Now by
doing this, you allow profiles to narrow down their search and find only
profiles that subscribe to the newsletter.
You may add as many Affiliation codes as needed. Each Affiliation code will be attached to an Affiliation Type. These Affiliation Types will allow you to keep track of what kind of Affiliations are in the system.
Two of the affiliations that WebLinkCONNECT™ provides
are "All" and "Members". These are called Managed Affiliations. Managed
Affiliations allow you to group your profiles easily. When a Profile is
created it is automatically given the "All" affiliation, and when that
Profile becomes a member it is automatically given the "Member"
affiliation. If a membership is cancelled it will be automatically
removed from the "member" affiliation. And all of this is done by WebLinkCONNECT™
You may add as many affiliations to your list that you feel necessary.
Before creating Affiliation codes it is best to create Affiliation Types first.
When creating Affiliations for Committees, it is best to use a naming convention such as ComBOD2003 this
code would be for Board of Directors 2003. This will keep your
committee affiliation codes together in the list and allow you to manage
Affiliation Types: Affiliation Types are a way to group your
Affiliations so that you may better manage them. By assigning types to
Affiliations, it will be easy to find and assign Affiliations
offers some default Affiliation types such as, Events Department and
Membership Department. These are just examples of how you may use
Affiliation Types. Another example would be Committees and Newsletters.
An additional feature in WebLinkCONNECT™
is the ability to assign Affiliation Types to Users. There is a good
chance that, as time goes on, there are going to be many different
affiliations. It will become more and more difficult to manage these
affiliations well. By assigning an Affiliation Type to a particular user
you are making them responsible for assigning, creating and managing
that affiliation type.
For example, if you assign the Membership Director the Membership
Depatment Affiliation types, then they will be the only user allowed to
manage that affiliation type. This not only makes a user responsible for
managing an affiliation type but also helps by splitting up the task of
managing a large amount of affiliations.
Create Affiliation Types before creating Affiliations.
Attendees: Additional registrants attending an event
Association: Refers to
individuals, businesses or organizations who voluntarily enter into an
agreement to accomplish a purpose. Examples include: alumni
associations, business associations, non-profit associations, etc.
Associations may offer services, such as producing conferences,
networking or charitable events, or offering classes or educational
materials. Many associations are governed by bylaws and directed by
officers who are also members. An industry trade group, business
association or sector association, is an organization founded and funded
by businesses that operate in a specific industry. This type of
association often participates in public relations activities such as
advertising, education, lobbying and publishing as well as collaboration
and standardization between companies.
Chamber of Commerce: a form of
business network, e.g. a local organization of businesses whose goal is
to further the interests of businesses. Business owners in towns and
cities form these local societies to advocate on behalf of the business
community. Local businesses are members, and they elect a board of
directors to set policy for the Chamber.
Committee is a group of people officially delegated to perform a
function, such as investigating, considering, reporting, or acting on a
matter. Much like affiliations, Committees will put your Profiles in
groups and allow granular reporting. Unlike affiliations, however,
Committees are active groups that meet and discuss matters that they are
concerned with. For example a Committee that is directed at
environmental issues may have a meeting to discuss what to do about
local lake pollution.
There are many types of Committees with many goals, most of which are business oriented to help the business operate better. WebLinkCONNECT™ allows you to connect your Committees to Affiliation Codes
making it easy to group your Profiles. When a Profile joins a
Committee, you just assign that Affiliation to the joining Profile.
Contacts: Due to past industry trends, most people think of an individual as a Contact, however, within WebLinkCONNECT™
a contact is a point of interaction between you and a Profile. To us,
calling a person a "contact" is like calling a person a "junction".
Beside, how would you describe an interaction with a person or
organization? Would you say " The other day, I had a contact with a
Criteria: Information that is all or part of what you are searching for
Database Fields: In Report
Writer, select this to open Profile_Views with information such as name,
address, phone number, etc. to add to a report.
Database normalization, or data normalization: A
technique that we use to organize the contents of your existing data
tables for our transactional database. When we normalize your database,
we have two goals: Eliminate redundant data (for example, storing the
same data in more than one table) and ensure data dependencies make
sense (only storing related data in a table). Both of these are worthy
goals as they reduce the amount of space a database consumes and ensure
that your data is logically stored. Without normalization, database
systems can be inaccurate, slow, and inefficient, and they might not
produce the data you expect.
are the fields in which your lists of information will appear. However
they are more than just static lists that just display information.
Datagrids are capable of displaying your information how you need it.
Whether you are searching for Profiles or viewing tasks Datagrids
generally work the same way.
Dataset: When you ask a question
of your data, like show me all Profiles on Main street that are up for
renewal in the next 30 days, you are presented with sets of data values
(called Datasets) that match your criteria. Simply put, a Dataset is
nothing more than a collection of information that is returned from you
Parameters: In Report Writer, this term is used to describe date ranges,
Profiles: In WebLinkCONNECT™, a Profile (Record) contains all of the information about a particular organization or individual that you want to manage. Everyone that you commonly interact with will need a Profile Record, including your Members, Prospects, Vendors, Employees and so forth.
Related Profiles: Relating profiles
enables you to better manage members, employees, and any other
Profiles. Related Profiles will allow you to quickly view and/or modify
an organization and all other profiles "tied" or related to it.
There are many reasons to relate Profiles to one another. For
instance, you may want to relate an Organization's employees Profiles to
the organization, allowing easy access to their employee’s Profile
information. This way, you can look at an organization's Related
Profiles and instantly see a list of all their employees.
is designed to enable you to “surf” through your relations (related
profiles) effortlessly. As things change and people come and go, you can
also delete and modify these relations as needed. For example, when a
Member's employee leaves or get promoted etc. you can easily make the
You will find that, as your staff defines more and more Related
Profiles, you will be able to see inter-Profile relationships form based
off of your staff's collective knowledge that may have otherwise gone
Role: A role is a set of permissions that lets employees access specific areas of your data. You assign roles to your User Accounts.
User: A user is an employee who has been granted access to the data in your WebLinkCONNECT™ application. The level of access depends on the type of user and the role you assign to the user.
1.8. Problems with Email-Email and "Blacklist" services
WebLink and Email Blacklists
Dealing with email spam is a difficult process. But sometimes, the cure can be worse than the problem. Email blacklists provide an example of this. Once in a while WebLink’s email gateways get placed on an Internet spam blacklist. When this happens, email sent from WebLink’s mail servers gets bounced back to its sender, even when the message is perfectly legitimate (non-spam) email. Why does this happen? Can WebLink do anything about it? This document explains the problem and discusses some possible solutions.
What is an email blacklist?
When spammers send unsolicited bulk mail they rarely send it from their own machine: they hack into someone else's machine, usually from afar, and send all their spam from there. Anti-spam services gather reports about spam coming from certain machines and publish the names of those machines on a "blacklist." People who run email systems configure their systems to filter, reject, drop or tag any email that comes from a computer that has been blacklisted. By doing so, they hope to keep their own systems free of spam.
Why would WebLink’s email gateways (such as mail.wliinc.com) get placed on a spam blacklist?
Every day, tens of thousands of emails are sent through our gateways to thousands of external ISP’s, such as AOL, Yahoo, Hotmail, etc. When people receive forwarded spam at their email accounts, many have the option to report it to their blacklist service provider as Spam. Blacklist services providers look at the email header and notes where the message came from. Since the email was forwarded from WebLink’s servers, blacklist service providers assume WebLink’s mail gateway server is being used to send out spam. The blacklist service provider therefore places the IP address of our servers on its blacklist.
Why does blacklisting cause my email to bounce back to me?
If one of WebLink 's email servers has been blacklisted, and you send a message to someone whose email system uses these blacklists to block mail (instead of filtering it), your email gets bounced back to you without being delivered. This can happen to email forwarded from ANY email server. Most of the time, blacklist entries expire in a few hours, so people never notice. Other times WebLink’s SMTP servers can be blacklisted by Blacklist service providers for several days in a row.
Why is rejecting mail that comes from a blacklisted machine bad?
Blacklisting causes problems when the administrator of an email system decides to simply block all messages coming from a machine on a blacklist. Blacklists are not intended to be used this way. Email service providers usually filter spam, employing methods that consider multiple factors before deciding whether an email message is spam or not. Most email administrators don't reject mail just because an email server is on a blacklist, but will tag or quarantine suspicious messages and provide the intended recipient with ways to view the message safely.
Still, there are some service providers who simply reject messages based on blacklists. This is bad because it prevents people from getting perfectly good email. Using blacklists alone against spam is basically a cost-shifting exercise: instead of spending the necessary time and money to configure an email system correctly, the service provider pushes all the work for dealing with spam onto the administrators of remote email systems like WebLink’s.
Is there something WebLink can do on its end?
There are things WebLink’s system administrators can do, and we do them all the time. If there are virus or configuration problems on our systems, or reasons to believe we're having a one-time difficulty with a blacklisting service that we can work through, then WebLink does its share to resolve the problem. And there are times when, having found our system on a blacklist, we have taken the server on the blacklist out of service and/or changed the server's IP address. We then jump through hoops on the blacklist maintainer's website in order to have the blacklisted server de-listed and so forth. These actions must be taken whenever an aggressive blacklist service decides to blacklist our servers.
Unfortunately, these actions cost a LOT of time and money and ultimately, none of these actions address the real problem. People forward their spam, it looks like it's coming from WebLink, blacklisting services put WebLink on their lists, system providers block mail, and we're back where we started. Over time, it makes for more and more meaningless work, email service providers like WebLink keep getting blocked, and your message delivery is interrupted with certain providers.
In other words, taking action on our end doesn't prevent the problem from happening again and involve a significant amount of resources and costs that WebLink doesn’t want to pass on to our Clients.
Given the above, WebLink‘s best course of action is to push the burden of dealing with spam blacklists back onto the blacklisting services themselves. The better the service, the less often these problems occur.
Can’t you request that a WebLink IP address be removed from a blacklist?
Unfortunately, it’s not that easy. If you go to your SPAM blacklist service provider’s website, you will probably see that the only option available to us (or any other mail service provider), is to promise on the page that our servers will never be guilty of producing any further spam reports ever. Given that WebLink’s systems are utilized by hundreds of organizations, sending thousands of emails every day, AND the fact that any email recipient ultimately judges whether or not a message received by your organization is SPAM, there is no logistical means to achieve this promise. No system can.
Reports received by Blacklist service providers are usually reports from people who forward mail received from your organization to some third-party recipient; when they receive email, these people may report it to a Blacklist service provider. Most blacklisting services are computer-based: their systems are not smart enough to understand that WebLink is not the source of the spam, that WebLink’s systems are just dutifully forwarding email. These particular automated Spam Blacklist providers run nearly without human intervention, and is based on reports from untrained users hence; email service providers like WebLink can be blacklisted for all sorts of innocuous reasons.
Accordingly, blacklist service providers will continue to receive complaints about WebLink being a spammer, and will blacklist WebLink. Destination email servers configured to use blacklists as a means of blocking mail will therefore occasionally block mail from WebLink. They will block mail many other email service providers as well.
How can I deal with this blacklist problem?
You can always attempt to contact the administrators of the system to which you were trying to send email. Usually, however, it's better to contact the actual person to whom you were trying to send mail (through other means, such as telephone, of course) and urge this person to contact their system administrator. This works better because system administrators listen to their own users better than they listen to strangers. In either case, tell your blocked recipients to make sure the system administrators understand that your legitimate email was rejected by their system.
Ask them not to use any provider’s blacklist as the only factor involved when rejecting email. Many providers have the option to operate blacklists in a "tag only" mode, which is preferable in many situations. In this mode, suspect email is tagged as spam and delivered to the recipients, rather than blocked outright. You can also have recipients ask their providers to Whitelist any email coming from a WebLink email server.
As an alternate approach, every client has the option of sending mail through a local SMTP server. This option gives you much more control of how your messages are sent and gives you the ability to minimize the negative effects of blacklisting locally. If interested, please contact support for details.
Lastly, here is a list of troubleshooting questions that your email recipients can ask of their company and/or their Email provider:
Who is your company’s email administrator?
Does your company use whitelists or blacklists?
How are email addresses added to a whitelist?
Does your company allow email from people not on a whitelist?
Where do the blacklisted entries go?
Could your company’s spam rules or lists be influencing your prospects or customers?
Does your company have a central spam folder or does each employee have their own?
Do you know how to access your spam folder? Does your company allow multiple attachments on an email?
Is there a file size restriction?
Is the file size restriction just for the attachment or the entire email message?
What error message does the sender see if they exceed that file restriction?
Does your company put a limit on the size of your mailbox?
What happens if your mailbox is full?
Which file extensions does your company allow?
What error message would a sender see if they sent an unacceptable file attachment?
Does your company have a spam rule for blank subject: lines?
Does your company have a spam rule based on the number of recipients?
While these questions may seem burdensome, knowing the answers can prevent frustrations for you and your constituents. Email isn’t going away so it’s best for all to learn the basics of their email systems as it can improve the deliverability of their email. The information they gain may not solve all your delivery issues, but it can help to troubleshoot problems with them, if you wish. You may also find that some of the answers you get will lead to more questions and a deeper appreciation of email administrators.
1.9. Technical Support
1.9.1. Diagnosing Connection Errors
22.214.171.124. Common Connection / Performance Issues
This section describes troubleshooting steps you might use in diagnosing a WeblinkCONNECT™ TCP/IP connection problem.
An Internet connection is just another type of network connection. The Internet uses TCP/IP, a fast, powerful protocol that transports information between computers on a network. The Internet is really a world-wide TCP/IP network. Using WeblinkCONNECT™ over the Internet requires that the TCP/IP network protocol be installed on all computers involved in the session. If you already have a connection to the Internet, then TCP/IP was already set up for you by your Internet Service Provider (ISP). If you are not connected to the Internet, you will need to contact a local ISP.
General troubleshooting steps There are a few variable points that can interfere with your ability to connect to the WeblinkCONNECT™ Data Center as illustrated below:
The following list includes some of the more common problems and fixes.
Windows XP Internet Connection Firewall If you use a Windows XP Internet Connection Firewall (ICF) on your computer, by default, you should be able to connect the WeblinkCONNECT™ Data Center. If not, you will need to either configure the ICF to allow WeblinkCONNECT connections, or disable it. For additional information, read the section: Windows XP Internet Connection Firewall prevents WeblinkCONNECT TCP/IP connection.
Dial-up adapters If you use a Dial-Up Adapter, make sure that the serial port rate is 38.4 K or less. Even with a 16550 serial port UART and a fast Pentium® 3 or Pentium 4 processor, it is possible to drop data off of the serial port. Once the connection is working, then raise the serial port data rate.
The next step is to use Window’s built-in TCP/IP utility programs to see whether you have a good communication channel between your computer and the WeblinkCONNECT Data Center.
Run the Ping and Tracert utilities from the MS-DOS command prompt. You can get to the MS-DOS command prompt in Windows by clicking Start > Run and then typing: CMD
To ping the WeblinkCONNECT Data Center, type:
Ping sends 32 bytes of information to the client four times.
To trace the route (tracert) that you are taking over the Internet to get to the WeblinkCONNECT data center, go to the Help menu and select: Tracert Troubleshooter
Tracert shows the amount of time and the route the packet travels between the client and the WeblinkCONNECT Data Center.
Together, these two utilities can provide very valuable information about the TCP/IP connection. To get a good picture of the network connection between your computer and the WeblinkCONNECT Data Center, you may need to run these utilities multiple times. You may see some of the following results:
Ping returns four "Request timed out" packets This indicates that there are TCP/IP communication problems between your computer and the WeblinkCONNECT Data Center.. Check that you have typed in the correct TCP/IP address.
Ping returns a few "Request timed out" packets or Tracert returns a few "*"s This indicates that you are losing packets. If lost packets are combined with high Ping times, then you will likely have difficulties with WeblinkCONNECT connections.
High Ping times Compare the Ping times with this list:
Okay, but will experience occasional pauses when sending or receiving data
Poor, will experience significant pauses, some connection errors.
Very Poor, will experience timeouts and possibly disconnected sessions
The higher the Ping times are, and the more packets that are lost, the more likely you are to see various connection difficulties. These show up in WeblinkCONNECT as:
Slow Application response / increased wait times.
Error messages stating that your connection to WeblinkCONNECT servers is broken.
High Ping times and lost packets can be caused by your Internet Service Provider (ISP). You may need to contact your ISP for assistance, or use a different ISP.
Tracert can help pinpoint where the traffic problems are. If Tracert shows high initial trace times and only a small increase with each hop, then the ISP is most likely your source of the problem. If the initial trace times are good, and get worse at a certain hop, then it could be the client's ISP, or a router in between.
Ping and Tracert indicate a good communication path
** Please note – there is a Hop in the routing path to the WeblinkCONNECT Data servers in Atlanta, GA that will time out by design. This is a preventive measure on our network’s edge routers to help protect our infrastructure from automatic port sniffers and other malicious ICMP activity
126.96.36.199. How to verify if a Router's SQL Ports are Open
You need to check to see if your router's SQL ports are open.
To verify that a router's ports are open, use the Telnet command:
1. Open a MS-DOS window.
2. Type "telnet BLKDB01.weblinkconnect.com 1433" <-- With Space
3. If you see a blank screen with a blinking cursor, then port 1433 is open. We refuse telnet connections, so a blank screen means that your port communication has made it through to the WeblinkCONNECT Data Center.
4. If you see an error message, including "Connection to client lost", there is hardware or software that is blocking the WeblinkCONNECT SQL port.
Situation: You cannot connect to the WeblinkCONNECT Data Center through a router. This document describes some common issues you might experience when attempting to communicate with the WeblinkCONNECT Data Center over a router. This information is most useful, however, to a LAN administrator for troubleshooting.
Before you begin: Weblink International technical support does not provide support on the configuration of routers. For information and support on the configuration of a router, consult the router manufacturer. ________________________________________
In order to connect to the WeblinkCONNECT Data Center from behind a router, you need to ensure that the required ports are open. For more information, please see the section on Firewall/Port Requirements.
When using WeblinkCONNECT on a network, the standard troubleshooting procedures apply. Find out whether you can do the following: • Can users at other Computers connect the WeblinkCONNECT Data Center? • Can you connect the WeblinkCONNECT Data Center without going over a router? • Can users at other locations connect the WeblinkCONNECT Data Center?
If you cannot do any of the above, correct the problem before trying to use a router.
If not, check the following:
• Is there excessive information flowing over the bridge or router (a possible congestion problem)? • Are you trying to connect through multiple bridges or routers?
Congestion Disconnects and timeouts related to congestion are often related to the time WeblinkCONNECT waits to receive a response from the client or remote. If the bridge or router you use is extremely busy (serving a large network), you could experience transaction Roll Backs because of timeouts. To test for this, connect when the network is not very busy. Trying a different bridge might help.
Multiple bridges or routers Multiple bridges and routers can cause a delay that might disrupt a connection.
For additional information, refer to the following documents: • WeblinkCONNECT IP port usage • Cannot connect to a WeblinkCONNECT client through a router • How to remotely verify if a router's ports are open • How to configure multiple WeblinkCONNECT clients behind a router
To test the ports to verify that they are open, read the document How to remotely verify if a router's ports are open.
If opening the required ports does not resolve the problem, you may need to update your router's firmware. Refer to the router manufacturer's Web site for information about possible firmware updates.
You may be trying to connect across a firewall or proxy server. If so, open the correct ports for WeblinkCONNECT. For more information, please see the section on Firewall/Port Requirements.
You may also be running into what is called a "Black Hole" router. Black Hole routing happens when a router is routing between dissimilar packet sizes (also called maximum transfer unit (MTU)). Instead of sending a message back to the sender, the router dumps the data. Sometimes, only small amounts of data will be routed, and large amounts of data are dumped. Try the registry changes below to make Windows better able to handle Black Hole routers. However, TCP/IP throughput will be lower than expected because the data is traveling in smaller packets over the network.
WARNING: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Weblink International cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.
Windows 98/NT/Me/2000/XP If you have Windows 98/NT/Me/2000/XP, follow these steps to change Black Hole router behavior: 1. Go to the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\tcpip\parameters
2. Add the DWORD value: EnablePMTUBHDetect 3. Add a data value of 1 for the new EnablePMTUBHDetect DWORD value.
4. If you continue to experience "Black Hole" router problems, go to the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\tcpip\parameters
5. Add the DWORD value EnablePMTUDiscovery 6. Add a data value of 0 for the new EnablePMTUDiscovery DWORD value. ________________________________________ Note: Setting EnablePMTUDiscovery to 0 will significantly affect TCP/IP performance over all connections. ________________________________________ Windows 95 If you have Windows 95, follow these steps to change Black Hole router behavior: 7. Go to the following registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP 8. Add the DWORD value: PMTUBlackHoleDetect 9. Add a data value of 1 for the new PMTUBlackHoleDetect DWORD value.
10. If you continue to experience "Black Hole" router problems, go to the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP
11. Add the DWORD value: PMTUDiscovery 12. Add a data value of 1 for the new PMTUDiscovery DWORD value. ________________________________________ Note: Setting PMTUDiscovery to 1 will significantly affect TCP/IP performance over all connections. ________________________________________
Situation: You want to know if WeblinkCONNECT works with a proxy server.
Solution: PLEASE NOTE: The ability of a user to access a WeblinkCONNECT through a proxy is totally dependent on the configuration of the proxy server. WeblinkCONNECT Technical Support cannot assist in configuring any proxy server to allow WeblinkCONNECT connections. You must contact the vendor of the proxy software for that information.
Unless your proxy server is properly configured, the WeblinkCONNECT data center can only reach the IP address of the proxy server itself when returning data. It has no knowledge of the address of any WeblinkCONNECT client waiting behind the proxy. The WeblinkCONNECT data center's ability to connect to a WeblinkCONNECT client waiting behind the proxy server is totally dependent on the design and correct configuration of the proxy server itself. When configuring a proxy server, you will need to ensure that the WeblinkCONNECT Data port numbers are open.
Some Internet Service Providers (ISP’s) use Transparent Proxy Servers. They are software packages designed to help speed up Internet connections, save bandwidth and to provide certain types of security. In general, proxy servers have access to a huge database of files that users have recently requested. If any user re-requests this information it can be retrieved from the database very quickly rather then re-requesting it from the Internet.
What is an ISP to do? They need to save bandwidth, but they do not want to force people to enter their proxy settings and if they give people the option they probably will not do it anyway. An ISP can compromise by running a transparent proxy server. A transparent proxy server is a proxy server that requires no modifications to the user's computer or browser settings yet it provides all of the benefits to the ISP of a normal proxy. In theory, users should not even know they are behind a transparent proxy server.
In principle transparent proxy servers are great things so long as they are configured correctly. From our experience with WeblinkCONNECT™ we have learned that some transparent proxy servers have taken upon themselves that not only are they to provide the normal functionality of a proxy server but they have become HTTP protocol Police. Any traffic that does not appear to be 'normal' is terminated.
ISPs generally love proxy servers since it reduces the amount of traffic that they need to send to the Internet. However, from a user's point of view, proxy servers are often problematic and can be a source of frustration to both Web-based software designers and application users.
If you are having unexplained drops in your connection, we highly reccomend that you check with your ISP to see if you are behind a transparent proxy server.
188.8.131.52. Microsoft ISA Server Setup
Here are instructions on setting up Microsoft Internet Security and Acceleration Server 2000 to access WeblinkCONNECT:
First, create a Destination Set for the Weblink domain:
Find and expand the Policy Elements group under your ISA server name.
Right-click the Destination Set folder and select New > Set...
Give the set a name and description.
Click the Add... button, and add the destination *.weblinkconnect.com and click OK.
Now, create a Site and Content Rule to allow requests to the destination set:
Find and expand the Access Policy group under your ISA server name.
Select the Site and Content Rules folder. Right-click the folder and select New > Rule...
Name the rule, and click Next
Select the Allow ratio button under "Response to client requests for access:" Click Next.
Leave Allow access based on destination selected. Click Next.
In the "Apply this rule to:" drop-down, select Specified destination set. Select the destination set you just created from the "Name:" drop-down.
Click Next and Finish. You should see your new rule in the right hand pane.
184.108.40.206. Norton AntiVirus Issues
How to unblock WeblinkCONNECT in Norton Internet Security after selecting block and checking "Always use this action"
Situation: You blocked a WeblinkCONNECT's access to the Internet by selecting block and checking "Always use this action" in a Norton Internet Security (NIS) or Norton Personal Firewall (NPF) alert message.
Solution: You must remove this program from the blocked list to give it access to the Internet.
To remove a program from the blocked list
Double-click the NIS icon. Double-click Personal Firewall. On the Programs tab, select the program that you wish to unblock in the Manual Program Control window. Click Remove. Click OK to any warning messages. If there are other components of the program that appear in the list, remove them as well. Click OK to close the Program Control window. Close NIS.
You have unblocked the program. The next time that WeblinkCONNECT tries to access the Internet, the alert should appear. Then you can choose the access privileges that you want for the program.
220.127.116.11. General Network Error
Situation: When you try to connect to the client by launching the remote, request or update data, you see the error message "Unable to attach to specified device" or connection related Transaction Rollback messages.
Solution: This error means that WeblinkCONNECT could not make a connection to the client. There are several steps to troubleshooting this issue. The troubleshooting steps are broken down by cause. If a particular step does not apply to your situation, such as if you aren't behind a router, you can skip those sections:
Problems at the client / Third party conflicts • If you are running McAfee ViruScan, Norton Anti Virus or Computer Associates' InoculateIT! see the products documentation to learn how to properly configure the antivirus package to allow WeblinkCONNECT to operate correctly.
18.104.22.168. Issues Downloading Reports
Symptoms: Upon initiating the reports download, download will start but then randomly stop with one of the following
“FTP protocol error. 425 Can’t open data connection" OR “An existing connection was forcibly closed by the remote host"
Cause: These errors may occur when multiple end users simultaneously access the same FTP server using an FTP clients set in Active mode.
Explanation: Your computer supports two FTP modes. These modes are called Standard (or Active) and Passive (or "PASV").
The Active mode FTP client sends PORT commands to the FTP server. The Passive mode client sends PASV commands to the FTP Server. These commands are sent over the FTP command channel.
In Active mode, once the client logs in and prepares to transfer data it tells the server a port number (somewhere in the temporary range 1024-5000) to use for the data connection back to the client. So, the server is using port 20, but the client is using a temporary port 1024 or above.
For Example: Control Channel..... Client port 1026 -> Server port 21 Data Connection..... Client port 1027 <- Server port 20
In Passive mode, once the client logs in, the FTP server tells the client what port to use to connect to the server for the data connection (this will be a port in a range, 1024-5000). The client will connect back from a temporary port to the FTP server on that port to open the data connection. Now, the server is using a port 1024 or above and not 20.
For Example: Control Channel..... Client port 1026 -> Server port 21 Data Connection..... Client port 1027 -> Server port 3345 (or any port in the 1024-5000 range)
Clients using Active mode FTP first establish a connection to TCP port 21 on the FTP server. This connection establishes the FTP command channel. The client sends a PORT command over the FTP command channel when the FTP client needs to receive data, such as a folder list or file. The PORT command contains information about on which port the FTP client receives the data. In PORT Mode, the FTP server always sends data from TCP port 20. The FTP server must open a new connection to the client when it sends data.
Passive mode FTP clients also start by establishing a connection to TCP port 21 on the FTP server to create the control channel. When the client sends a PASV command over the command channel, the FTP server opens an ephemeral (high) port (between 1024 and 5000) and informs the FTP client to request data transfer from that port. The FTP server responds to the request by using the ephemeral port as the source port for data transfer. When this occurs, the FTP server does not need to establish a new inbound connection to the FTP client.
Solution: You may need to change the mode that is used by your Router, Firewall and/or your FTP client, depending on your network configuration.. Although Microsoft Internet Explorer 5 and later (which controls your computers Internet connection properties) support both Standard mode and Passive mode, by default, your FTP client is set to Active mode..
How to Change the Internet Explorer FTP Client Mode
Start Internet Explorer.
Click Internet Options on the Tools menu.
Click the Advanced tab.
Click Enable Folder View for FTP sites. Internet Explorer is an Active mode FTP client when you select the Enable Folder View for FTP sites option (no matter what the Use Passive FTP Option says).
Internet Explorer can be enabled for a passive mode FTP client when you clear this option.
1.9.2. WeblinkCONNECT Security/Infrastructure
22.214.171.124. Operational overview
It helps to have a basic understanding of how WeblinkCONNECT negotiates a TCP/IP connection.
When a user click on the WeblinkCONNECT Icon and launches the Smart Client, Your computer attempts to communicate with your particular Web Application Server at the WeblinkCONNECT data center to:
Send your SSL encrypted security License Key to validate that your computer is authorized to establish a secure communication channel to the WeblinkCONNECT data center and
Retrieve your Association Name for the login form. If you can see your Association name, that means you are able to securely communicate over SQL Port 1433
Once you submit your username and password, you credentials are validated against your particular Microsoft SQL Server.
If successfull, the.NET Framework class libraries check to see if you have to latest WeblinkCONNECT version downloaded to the assembly download cache on your computer and, if so, loads it for use. Going forward, if WeblinkCONNECT is already on the client computer and the version on the Web server has not changed, the local copy will be loaded. If the version on the Web server has been updated, that new version will be downloaded and executed. Thus, updates are automatically propagated to the client, but your network is not flooded with redundant downloads.
From this point forward, WeblinkCONNECT does not consume ANY badwidth at all when idle, only a small amount when you request or update data.
126.96.36.199. Infrastructure Whitepaper
Security in the online world of data management is a critical issue that must be addressed when moving critical business processes and data to an Internet Application. Weblink understands this importance and the great responsibility that comes with it.
There are several availability and security issues that must be addressed when using ANY Internet Application. These include:
Backup / Disaster Recovery
Unauthorized Data Interceptions
Hacking Intrusions/Denial of Service
Physical Site Protection
Network Reliability Weblink has committed the necessary resources to ensure your data is safe, secure and highly available. To this end, we have partnered with NTT/VERIO Inc., having one of the largest server hosting facilities in the world. NTT/VERIO brings a level of security unmatched by anyone in their field. They are well known to have the most secure, redundant hosting facility available today.
The NTT/VERIO Global Tier One Network = Fast, Efficient, and Accurate Data Transport. NTT/VERIO provides fully redundant network architecture with high-speed connections. Uninterruptible power supplies at data centers ensure that power is never interrupted.
With more direct paths, routing options, and private peering points, NTT/VERIO speeds your data to its destination with fewer hops, less packet loss and fewer delays. You get high performance, plus 24/7/365 network monitoring by the state-of-the-art Network Operations Center (NOC) - all backed by the strength of a trusted and stable industry leader.
The network features OC3, OC12, and OC48 circuits as well as Cisco and Juniper Networks router technology. So, whether you're a small part-time organization or a large multi-site organization, you'll have the performance and reliability you need to keep your business moving.
Built-in Redundancies The NTT/VERIO Global Tier One Network is your seamless connection to the world. The Network features densely meshed paths between most major network points, both domestically and internationally.
From the beginning, NTT/VERIO took redundancy very seriously, building at least two connections, each from a different carrier, at many of the major points in the network. Because NTT/VERIO works with a diverse portfolio of carriers, the network is not reliant on one vendor in the event of an outage. These geographic and carrier redundancies ensure that your data will keep moving, even if a link fails.
The Global Tier One Network has multiple, highly secure carrier-class Points Of Presence. Plus, private peering relationships provide multiple routing paths for continuous, uninterrupted transport - data is able to bypass the congestion of the public Internet and get to its destination fast.
Superior Network Support NTT/VERIO has 24/7/365 network monitoring at its state-of-the-art Network Operations Center (NOC) which provides real-time alarming, forecasting, traffic management, event notification, upgrades and service level agreements. The NOC also furnishes real-time network status reports to NTT/VERIO Customer Care, enabling fast, highly responsive, single point-of-contact problem resolution.
Backup / Disaster Recovery The events of 9/11 revealed the devastation that can be caused by a single, malicious event. However, most catastrophic events that threaten hosted Web applications are from nature - floods, fire, and earthquakes can be devastating in the damage they can inflict on facilities and equipment. WeblinkCONNECT™ provides the backup and disaster recovery options to ensure maximum availability and integrity of the application data.
Automatic Backups WeblinkCONNECT™ provides daily full disk backups of all data. Full database backups are encrypted and transferred periodically to multiple locations throughout the United States as an added means of recovery should it be needed. Production servers have Hardware RAID protection and contain multiple power/cooling modules and peripheral power supplies. CPU, memory, I/O boards, and hard drives are all hot swappable, eliminating downtime. On-call support staff is available 24 hours a day, 7 days a week, 365 days a year at NTT/VERIO to ensure any service problems are handled promptly. Weblink also has a comprehensive disaster recovery plan in place should our primary physical site become inoperable.
Unauthorized Data Interceptions ALL WeblinkCONNECT™ Smart Client traffic is natively encrypted (scrambled) via 1024 bit Secure Sockets Layer (SSL) encryption. 1024 bit SSL encryption is the highest grade commercially available encryption (only the Military and the CIA uses stronger encryption methods) providing you with the best level of security and privacy. The SSL protocol ensures that your transactions are not subject to "sniffing" by a third party. Only your users, with the right combination of a WeblinkCONNECT™ ID and Password, can access your data.
We also employ the use of Digital certificates across our Production Infrastructure. Digital Certificates are installed on all data servers to give you the assurance that your access to WeblinkCONNECT™ is legitimately yours and not that of an impostor. It contains information about who owns the certificate (company name, domain name, contact address, etc.), as well as information about the issuing Certificate Authority.
Hacking Intrusions/Denial of Service Intrusions usually take one of two forms. One form can be an attempt to gain unauthorized access to data or the application. Another form can be an attempt to deny service to other users by tying up server resources or disabling the server.
Unauthorized Access - Authentication via username and password provides assurance that a client requesting information is the entity it claims to be. In WeblinkCONNECT™, you control the ID’s and passwords for your organization. Access control settings limit the functionality available and types of information that users can access after being identified as an authorized user on the system. This allows you to set up users that can only access certain areas of the application. For example, the system administrator has rights to all areas, while a volunteer may have read-only access to volunteer information.
Database activity logs record information about the username, time of login and logout, the user’s IP address, and transactions submitted. This data can be used for auditing purposes and to provide admissible evidence in court proceedings.
The WeblinkCONNECT™ application also has native defenses built in to protect against Command Injection Gaps, better known as SQL Injection attacks. SQL Injection is simply a term describing the act of passing SQL code into an application that was not intended by the developer
Denial of Service - Monitoring of the WeblinkCONNECT™ application and the hosting equipment is performed 24 hours per day. This, combined with the latest technologies in detecting and thwarting denial of service attacks, ensures that you will have uninterrupted service. Physical Site Protection The WeblinkCONNECT™ Data Center is physically secured to keep your organization's information safe. Facilities have keycard and biometric entry, video surveillance and are staffed by technical support people 24 hours a day, 7 days a week. The physical servers are located in a temperature-controlled locked cabinet that can only be accessed by technicians for authorized maintenance.
Conclusion Moving critical applications to the Internet requires a known, trusted partner. For over 6 years, Weblink has provided our clients the stability and security that they need. WeblinkCONNECT™ continues this legacy and is committed to earning your trust and keeping that trust with our staff’s expertise and our powerful relationship with NTT/VERIO to keep your data safe and secure. By allowing us to secure your data, you can focus on your core organization's needs, continually growing your organization's success.
188.8.131.52. SAS(70) Status
While we are confident that this expensive external audit would find that we have adequate controls and safeguards at our Data Center that would meet the criteria of such a mature formalized third party evaluation, we have opted not to forego a costly SAS70 Type 1 or 2 audit at this time for several reasons.
The main reasons are:
Chambers of Commerce and other business associations are generally classified as 501(c)3 not-for-profit organizations. 501(c)3’s are subject to federal requirements regarding public disclosure of information upon request, therefore, there is a general presumption in favor of public information disclosure in this industry. A SAS70 report focuses on the processing of transactions by service organizations as it relates to an audit of financial statements. I believe that Financial Accounting Standards Board (FASB) 117 "Financial Statement of Not-For-Profit Organization" dictates that not-for-profits maintain a complete set of financial statements for public disclosure. While safeguarding client data is the lifeblood of our organization, we find pricey third party audits to be out of scope for the market we serve.
Due to 501(c)3s Public nature, they are generally not subject to Privacy legislation such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Gramm-Leach-Bliley (GLB) Act of 1999, or Sarbanes-Oxley Act of 2002, unlike the Financial or Medical industries We have consciously engineered our latest applications from the ground up to meet stringent security guidelines dictated by commercially accepted standards and security practices.
Process Redundancy - WebLink already assesses its network configurations regularly in the following areas:
Facility and Physical Building Access & Security
Access points to the building and restricted areas
Video camera placements, monitoring and handling procedures
Physical access by employees and non-employees to both building and restricted areas
Power backup capabilities
Disaster prevention and recovery both physical and electronic
Process and procedures for electronic and physical access
ID authentication, monitoring, maintenance and auditing of both physical and electronic access
Infrastructure, Systems & Technology
Anti-virus, firewalls, intrusion detection systems and operating systems
Information classification, authorization, monitoring and auditing
Upgrades, hotfixes and patch management
Data transfer and encryption
Information security incident detection and handling
Change control management, monitoring and auditing
People, Policy, Procedures, Compliance & Audit
Duties and responsibilities of key personnel
Audit information such as frequency, findings, corrective actions or plans, risk acceptances, etc.
Duties and responsibilities of employees and non-employees (ie. consultants)
Any documented procedures, policies, or practices related to any of the topics above
Assessment of the data available via the Web Application servers
Weblink Application architecture.
Method of authentication
Intrusion detection systems
Having an enhanced awareness of security, we already have mature policies and procedures in place including internally documented Security Standards, Change Management Procedures and a Continuity of Business Plan.
For these key reasons, we are unable to justify the time and cost factors involved in a third-party audit and thus, have chosen NOT to pass the high costs onto our customers.
The Infrastructure Whitepaper provides additional assurance that your data is being treated with adequate controls and that reasonable security measures are in place to protect your information assets.
1.9.3. Reporting Issues
You may report issues by sending an email to us at the following address:
WebLinkCONNECT safely stores all your data on secure Tier 3 and 4 Servers, giving your organization assurance that your data will be there, even if a catastrophe strikes your facility. However, WebLinkCONNECT also allows and encourages you to back-up your data locally, as well.
Downloading your data provides you with an XML document containing every table from the WebLinkCONNECT database. XML is an industry standard file format, ensuring that your data is always recoverable. For more information on XML, click here.
As a policy, WebLink recommends that each client download and store their core data on a regular basis. The resulting XML file can range from 20-600 MB, depending on your database. An easy and secure way to store this document is on a CD or DVD. Follow these steps to Download your Core Data.
Go to Admin > Download Core Data. The following screen appears.
In the Specify an XML file name text field, a file name will appear by default that places the file in your WebLinkCONNECT application folder and names it WebLinkConnectData_today's date.xml. If you want to change the file name or the location, do it here.
By default, every table in the database will be checked for download. If you want to backup only specific tables, uncheck the tables you do not want.
Click Get Data. Your data will now begin downloading. When finished, WebLinkCONNECT will prompt you that your data has been downloaded successfully. To view or copy it, browse to the file location identified in the Specify an XML file name text field.
Note: If your internet connection is not stable or you receive a time-out error when downloading, try downloading less tables at one time. Make sure you edit the resulting file name appropriately (e.g., Part_1 and Part_2, etc).
1.10. Managing Windows
If you are in the system and you feel like you are lost and you don't know where that last window went. Or maybe you open the Profile Selector more than once and now you notice you have five different Profile Selectors open at once. There is a way to better navigate your way around.
WebLinkCONNECT™ gives you a way to manage your windows easily and efficiently. On the main menu there is a handy way to see exactly what windows are open. Unlike most web applications, this one has the advantage of hotkeys. You can get a full list of all of our hotkeys in the Hotkey Reference Guide. There is are a few ways to look at, open, and navigate your windows. Here's a breakdown of each option:
View My Dashboard (Hotkey: F10) The first option in the menu is View My Dashboard. This is a quick way to pull up your dashboard when you need it. Unlike most web applications, this option also has a hotkey for even quicker access. Your personal dashboard is going to be one of your most important windows and that is why it is first, so that you can access that information quickly.
Close All Windows This is a simple one. When you are busy and flying around the system, it is very easy to stack up a lot of windows that you do not plan on going back to. This option will allow you to close all of your windows and clear the list.
Window Layout This option includes three choices of layouts to view your windows. This will allow you to see more than one window at a time. Here is an explanation of each one:
Cascade (Hotkey: Ctrl+Shift+C) - This option will stack all of your open windows in a cascading style.
Tile Horizontal (Hotkey: Ctrl+Shift+H) - This will stack your windows one on top of the other and allow you to view all windows even when working on one. For example, you may look at one windows information while working in another.
Tile Vertically (Hotkey: Ctrl+Shift+V) - This will also allow you to view your windows individually. These will the difference is that they will stack side-by-side.
Window List This is a list of open windows and allows you to select a window to view. For example, if you have already used the Profile selector once and need to use it again, just go to the list and click on the Profile selector. This will avoid you opening too many windows as well as speed up the application as the code for the window does not have to reload.
Ctrl+Tab If you would like to navigate from window to window, simply Hold the Ctrl(control) key down while clicking the Tab key. This will cycle you through all the windows you have open.
1.11. Hotkey Reference Guide
Unlike most web applications, WebLinkCONNECT™ allows you to use Hotkeys. There are two different types of hotkeys in WebLinkCONNECT™. There are standard Microsoft hotkeys and WebLinkCONNECT™ hotkeys.
Here is a list of Hotkeys that you can use in WebLinkCONNECT™:
Select Profiles = F2 Create a Profile = Ctrl+F2
Select Contacts = F3 Create a Contact = Ctrl+F3
Select Tasks = F4 Create a Task = Ctrl+F4
Select Events = F5 Create an Event = Ctrl+F5
Select Invoices = F6 Create an Invoice = Ctrl+ F6
Custom Reports = F7
Association info = F9
View Dashboard = F10
Cascade Wndows = Ctrl+Shift+C Tile Vertically = Ctrl+Shift+V Tile Horizontally = Ctrl+Shift+H Toggle through all open windows = Ctrl+Tab
Weblink Help System = F1 (See Tips Below)
Profile Browser Shortcuts
Create New Profile = CTRL+N Save All Profile Changes = CTRL+S Delete Current Profile = CTRL+D
Standard Windows Hotkeys
Select All = Ctrl+A
Cut = Ctrl+X Copy = Ctrl+C Paste = Ctrl+V
Undo Last Edit = Ctrl+Z
Scroll Down = Down Arrow Scroll Up = Up Arrow Scroll Left = Left Arrow Scroll Right = Right Arrow
F1 may be used throughout the entire system and depending on where you are working, will automatically bring you to the section of the help system that is directly related to that section.
1.12. Changing Your Password
When your Administrator sets up your user account they will probably give you a general password. Most people like to use their own unique password that they use frequently. You may change your password after your user account has been set up.
1. Go to Help > Change Your Password 2. A small window will appear asking for your old password. Type it in the first box. 3. Then Type in your new password. 4. Type it again to confirm it. 5. Click the button and confirm.
1.13. Viewing your database size statistics
WebLinkCONNECT allows you to check the size and statistics of your own database. This tool allows you to see the number of rows (or items) in each table and the relative size of the data in the database. It will also show you the total size of your WebLinkCONNECT database. Follow these steps to see your database size statistics.
Go to Admin > Database Statistics. The following screen appears.
The Data File Size line displayes the total number of Kilobytes of data within your Data File.
The Log File Size displays the total number of Kilobytes of data within your Log File.
The Total line displays the total amount of Kilobytes of Database.
The Common Database Tables Datagrid identifies each table within the database and the number of rows, database space and index space.
When you are done, close the window.
1.14. Non Dues Revenue Ideas
WebLinkCONNECT provides you with several tools for generating significant amounts of non-dues revenue. The following is a list of features that can be used by your staff to generate these revenues:
Enhanced Directory Listings
Job Bank, Room Availability Listings, Member Rosters and Labels
Note: These numbers are examples only and all depend on your local market supporting this and your team selling the ads. Plus, you must have a web site that is organized to maximize value to your clients and is integrated properly with WebLinkCONNECT.
How much you can charge for your advertising really depends on your business climate and how popular your web site is. That said, because WebLinkCONNECT allows you to manage your ads in house (you can place ads, determine how long they run and keep complete statistics on how often they are viewed and clicked), you can maximize whatever your local market will bare.
Home Page $1,000-$5,000 each for six sponsors (limiting the number of spots increases the value)
Top Level Pages (Relocation, Visitor Info, Economic Development, Members Only, etc.) $500-$2,500 each for up to six sponsors
Business Directory You can select which main category you sell, like Health Care, Lodging, Real Estate, Banking, etc. $800-$1,500 for each category
Enhanced or Additional Listings
Other non-dues revenue opportunities that WebLinkCONNECT helps you manage are enhanced or additional listings in your directory. All of these should be sold for the same time period as their membership and should be relatively cheap (i.e. $10-$50 each) so as to increase sales:
Top listing regardless of alphabetical listing
Colors and borders
2nd, 3rd and 4th listings
WebLinkCONNECT’s Event Calendars encourage your members and business community to register and pay for events online, meaning the traffic on your Event Pages is significant. Within each Event Record is the ability to create and manage Sponsors. Each sponsor can have a logo and sponsor message that gets counted every times they are displayed or clicked on by a visitor. Because their visibility is tracked, Sponsors can see the value of being associated with your events and will be more likely to renew this sponsorship.
Within the WebLinkCONNECT Members Only section is a tool for members to create their own Coupons. These coupons are then displayed and accessed on that members Directory Listings. While some organizations choose to make coupons a free benefit of membership, others choose to charge for them. If you do charge, these coupons become a significant amount of additional revenue and their visibility is tracked by WebLinkCONNECT so members can see how effective they have been.
Job Bank, Room Availability Listings, Member Rosters and Labels
Some of WebLinkCONNECT’s add-on features can be non-dues revenue generators, as well. Through the use of Web Input Forms, eCommerce Modules and other tools, WebLinkCONNECTcan easily provide additional benefits to members that are fee-based and therefore significant sources of revenue. Contact a WebLink sales consultant to learn more about these options.
Job Bank – Allows your members to post open positions and allows job seekers to post resumes and contact information.
eCommerce Store – The WebLinkCONNECT eCommerce store can sell reports from your database, meaning buyers can easily purchase and receive real-time reports for Member Rosters or Labels, or other information you manage through WebLinkCONNECT
Room Availability Listings – WebLinkCONNECT’s web input forms can be used to allow lodging-based members to display room availability on your web site.
1.15. Configure Outlook for Hosted Email
To complete the setup of your email client, you will need to obtain the following information from your Internet Service Provider (ISP):
Determine who your ISP is. (E.g. Comcast, Verizon, AT&T, etc.)
What is the name of the ISP’s Outgoing Mail Server?
What port number is used for SMTP? (Most ISPs use port 25)
Outlook Account Setup
You must correctly configure the Outlook account settings to send and receive messages with email. To do this, you should have been supplied with the following Weblink specific information about your e-mail account:
Your full email address
Your new password
Outlook 2007 & 2003
Use the following method to configure your Outlook account:
On the Tools menu along the top of the window, select Account Settings.
On the E-mail tab, select your existing account and click Change.
In the User Information section, ensure your name is correct and the e-mail address matches the one supplied by Weblink.
In the Server Information section, switch the Account Type to POP3 if not already set.
For Incoming mail server, type: mail.wliinc.com
For Outgoing mail server (SMTP), enter the information provided by your local ISP.
In the Logon Information section, change User Name to your full email address provided by Weblink (e.g. firstname.lastname@example.org).
Enter the password issued to you in the provided Password location. Ensure the Remember password box is checked.