Sunday, July 13, 2008

Hancock TS READ NFO XVID-PreVail

Release Date: July.05.2008
Audio: Line.44100 [original bitrate]
Type: Telesync XviD
IMDB Rating: 6.8/10 (5,202 votes)
URL: http://www.imdb.com/title/tt0448157/
Genre: Action | Comedy | Drama | Fantasy
Notes: Same silver video thats been circulated, With ntsc silvers you get dupe frames. Audio is our nice line.

Sample:
http://rapidshare.com/files/127426386/prevail.hancock.sample.avi

Download:
http://rapidshare.com/files/127425104/prevail.hancock.part1.rar
http://rapidshare.com/files/127425703/prevail.hancock.part2.rar
http://rapidshare.com/files/127426285/prevail.hancock.part3.rar
http://rapidshare.com/files/127426834/prevail.hancock.part4.rar
http://rapidshare.com/files/127425127/prevail.hancock.part5.rar
http://rapidshare.com/files/127425677/prevail.hancock.part6.rar
http://rapidshare.com/files/127426189/prevail.hancock.part7.rar

OR

http://www.filefactory.com/file/59de59/n/prevail_hancock_part1_rar
http://www.filefactory.com/file/ae6c98/n/prevail_hancock_part2_rar
http://www.filefactory.com/file/0ed1b3/n/prevail_hancock_part3_rar
http://www.filefactory.com/file/ce579d/n/prevail_hancock_part4_rar
http://www.filefactory.com/file/d12739/n/prevail_hancock_part5_rar
http://www.filefactory.com/file/c30d10/n/prevail_hancock_part6_rar
http://www.filefactory.com/file/620c04/n/prevail_hancock_part7_rar

OR

http://netload.in/dateiaac55a6353d5be00cd698c6961bb87a3/prevail.hancock.part1.rar.htm
http://netload.in/datei59b465a3306d11225f662f769992fb4c/prevail.hancock.part2.rar.htm


PASS:
http://irfree.com

Thursday, June 19, 2008

Don't Get Tricked By Email Virus Hoaxes

If you have an email account, perhaps it is not new for you to have seen or received alerts as attachments from just about anyone who you know or don't know.
It could be your friend, a coworker, a relative or even anyone for that matter, who has sent it to you. It does not mean that you should believe mails from someone you know. They are innocent and made to believe that they must forward it to as many persons as they can and victimized thus, then you also a victim. If you thought for a while, this is the basic characteristic of any chain letter. Be it for a hoax virus or for an email virus hoax. The best way not to get tricked by a virus hoax or hoax viruses is to plainly ignore them. Here are some more tips for you.

Tips To Avoid Tricks by Viruses and Hoaxes

Your best defense against a computer virus hoax is not to fall for computer virus myths and hoaxes in the first place. Don't fall for stories, not in the least for even what the main message body of that particular mail tells you. The following tips might embolden you against virus hoaxes.
Rate this Article
Excellent

Good

Average

Bad

Terrible

rate

Current Rating
  • Don't be complacent, use a rational line of thinking as to why would anyone who you don't know warn you of a catastrophe or offer you flowers on Valentine's Day?
  • Don't go by who sent you the mail. This is the worst thing that is being targeted by pranksters to vulnerable and unsuspecting persons. Realize that ignoring a hoax mail from your sister doesn't constitute to ignoring her.
  • Is it urging you to forward the chain to all you know? Now immediately you know what to do. No. Don't jump to forwarding the mail to all and sundry in your contact list. Just delete the mail and you have done it the right treatment it deserved.
  • Does the mail contain links to outside websites? Most of the times these links are that of malicious web pages and so do not open them.
  • Certain links such as text links and banner links download adwares and spywares unsuspectingly, just upon clicking on them. Still others take you to webpages containing more links which cause adwares to download. Some examples are banners that push free screen savers, smileys and cursors.

Some Popular Hoaxes

  • $800 from Microsoft - This explains why Microsoft would give away $800 to those who continue to spread that mail.
  • Missing child hoax tries to establish credibility by associating itself with McAfee in its message which reads like a heart felt request by the mother of a lost child. It asks to ignore the mail as it is a proven 'milk carton bug' virus which destroys hard disks.
A virus hoax can't be taken lightly. The best thing is to ignore or delete the mail itself. Although not reported yet, virus hoaxes can cause problems if ignored.

THE NEW COMPUTER VIRUSES

THE SURVIVOR VIRUS

Deletes your files one by one over 13 weeks until only the most annoying one remains.



THE DAN QUAYLE VIRUS

Destroys all the files stored on your Etch-a-Sketch.



THE ELIAN VIRUS

You can't decide what to do with it, until the Janet Reno Virus finally kicks in your door and deletes it.



THE JIMINY CRICKET VIRUS

Changes your Zip disk into a Zip-A-Dee-Doo-Dah disk.



THE JENNIFER LOPEZ VIRUS

Adjusts screen so that you see a lot of words, but not the ones you *really* want to see.



THE MIRCROSOFT VIRUS

Renders your computer virtually useless.
Also known by the name "Windows 98."



THE AL GORE VIRUS

Claims that it *IS* the internet.



THE PAT BUCHANAN VIRUS

Splits otherwise healthy drive into two meaningless parts.
Don't worry -- it affects less than 1% of computers and isn't likely to spread at all.



THE TIGER WOODS VIRUS

Beats the holy crap out of you in every computer game you play.



THE WONDERBRA VIRUS

Results in overflow stack.



THE O.J. VIRUS

Every time you try to search for a file, it runs "Pro Golf Tour 2000" instead.



THE BRITNEY SPEARS VIRUS

Your partitions mysteriously quadruple in size overnight.



THE FIRESTONE VIRUS

Leaves chunks of its code all over the information highway.



THE KURT COBAIN VIRUS

Deletes itself before it has a chance to do anything important.



THE I HATE YOU VIRUS

Emits shrill scream from speakers when you refuse to buy the new computer game that "all the other computers at school already have."



THE JOHN ROCKER VIRUS

Re-categorizes everything on your computer into a few simple folders that it can understand.



THE KURSK VIRUS

Crashes your subroutines, then blocks calls to the Help Desk.



THE GEORGE W. VIRUS

Causes your CPU to keep executing and executing and executing....



THE BOULDER POLICE VIRUS

Can't even *find* your computer.

Virus Generation Tools - The Dark Aspects of Programming

Anyone who has ever had to combat malicious code on their computer wonders about the people who make computer viruses. And while most of us don't want to do it, we can't help but wonder about the process,
about how to create a computer virus. The popularity of this questionable activity is such that software exists to allow people to make email viruses or create computer virus code with little or no programming knowledge. The following are examples of such "kits."
VCS (Virus Construction Set)
VCS, published in Germany in 1990, was the first software to be created exclusively for the purpose of creating viruses. It is available in both English and German versions and is responsible for approximately fifteen virus variants.
GenVirus
Originally marketed by a Frenchman as an anti-virus evaluation tool, a cracked version by the virus authoring group NuKE appeared in 1993. Approximately ten viruses produced by GenVirus are known to exist.
VCL (Virus Creation Library)
VCL is one of the better known virus creation tools. It generates source assembler files, OBJ modules, and infected master files. Through a menu selection process a wide variety of options can be incorporated to create viruses that append their code to files, overwrite them, or use companion technology.
PS-MPC (Phalcon-Skism Mass-Produced Code Generator)
Created by the American virus authoring group, Phalcon-Skism, in particular the member Dark Angel, PS-MPC has no user interface but rather operates through an ASCII configuration file. It can create memory-resident viruses to affect both COM and EXE files and provides a versatile encryption layer. PS-MPC is responsible for the creation of hundreds of viruses.
NGVC (Next Generation Virus Construktion Kit)
This kit, the work of SnakeByte, first appeared in the Matrix N3 zine. It infects Win32 PE-Executable files. All viruses created by the package are different in structure and opcode making it impossible to catch all variants with one scan string.
VBSWG Kit
The VBSWG Kit was the first advanced VBS work creation package developed by [K]alamar in Argentina. It was not a highly successful program. The viruses and worms created with it did not work. The kit featured a standard Windows user interface.
NRLG (NuKE's Randomic Life Generator)
Authored by Azrael is a virus creation tool originated in Argentina. To make computer viruses it uses a simple and friendly interface and has been responsible for producing hundreds of viruses, all detectable by modern anti-virus software scanners.

Virus Generation Tools - Easy Ways To Make A Virus

There are different types of computer viruses, which range from subtle to incredibly complex. The most common computer viruses are viruses, worms, Trojan horses, and email viruses
. Although each computer virus has its own features and problem causing agents they basically work in the same way.. Almost a majority of them spread from computer to computer and there are basically three separate major groups of computer viruses which are boot sector viruses, file infectors, and macro viruses.

Boot sector viruses are viruses which attack the vulnerable boot program, which is stored on every single bootable floppy or hard disk. These viruses are most commonly spread through infected floppy disks. File infectors are viruses which directly attack and then modify program files. They usually load themselves to the memory and then wait for a trigger to find and then infect other files and programs. Finally the macro viruses are those viruses which are able to cause as much damage as regular viruses, despite the fact that they are incredibly different.
How And Why Are Viruses Created?
In order to make computer viruses there are only few things that one needs to know. In fac t the question of how to create a computer virus is dramatically easier than most people presume it to be...This includes everything from how to create a computer virus, make e-mail viruses, how to create an email virus, or how to create computer virus...Similiarly it will also guide you to create your own virus. If you are able to create a computer virus or make computer viruses in general it will be helpful. If you want to know how to make computer viruses,, then you must know the different types of viruses. Once you know the different types of viruses you have to learn the basics as the basics are almost one and the same for different viruses. Virus writers have their own reasons for creating them since viruses have been written for different reasons, including pranks, school projects, vandalism, identity theft, spyware, and cryptoviral extortion . These are few of the most commonly used reasons.

The best way to protect from virus is by using and enforcing proper protection and precautionar y methods necessary to keep your computer safe and secure. The most important thing to remember is to be aware whenever you receive emails, even if they are from people whom you know and especially if there are attachments that were sent with it. This is because the majority of computer viruses are spread through email messages especially through attachments sent in emails and so you should be extremely careful in these cases. Particularly you should be cautious if you weren't expecting an email or attachment and the best idea is to simply delete the entire email.

Another incredibly important step in preventing your computer from getting viruses is to constantly check for updates for all your programs, especially if there are any antivirus programs that you have installed on your computer. This is a fundamental step and many people fail to do this. Similarly you must also be sure to check that your antivirus programs are installed correctly as many people don't think to do this and surprisingly lot of computer users don't even have their programs installed properly.
and so they believe these antivirus programs are working to their benefit for the whole time which is not true in all occasions.

Patching and updating your system is also utmost important and you should constantly check for adware and spyware on your computer system even if you use an antivirus software program. There are some good ideas with regards to keeping your computer safe from viruses. .Initially you must keep your original application and system disks locked as this will prevent a virus from being able to spread to your backup disks... If you insert one of your application disks into an unknown computer you should remember to lock it first and unlock your application disk only after you have positively verified that the machine is virus-free. Always obtain public-domain software from reputable sources and be sure to check frequently for newly downloadable software.

For example, if you are to discover that you r system is infected with a virus, you should immediately isolate it from other systems, to prevent the virus from being able to spread further. By following the virus prevention tips, you would have protected your computer from viruses and other malicious forms of software and this is the first step in beginning a life-long protection system for your computer.

Great careers for computer "geeks."

The universal acceptance of computers into our daily lives, both at work and at home, has decreased the image of computer users as being "geeks."



The word geek itself has evolved a bit - going from meaning a socially inept person who gets along better with computers than people, to someone who is an expert with computers, a guru even. In fact, many computer service companies utilize the name geek in their nomenclature because of this new meaning. Not everyone who is proficient in using a computer is a geek, but there are people out there who are so interested in computers and so well versed in them, they wear the title geek with pride. Many of these people may not have had formal training. They've been playing with computer hardware, or software since they were ten years old. So what should you do if you have this kind of computer knowledge? A few years ago, it was very easy to get a well paying computer job, without any post secondary education. Advances in technology, the dot-com implosion and wider acceptance of technology doesn't make it so easy any more. The good news is, you don't need a four year degree to secure a well paying job in the computer field. Even if you're not a self professed computer geek, if you have an interest in a computer career, here are some good fields to study.

Computer Networking

Computer networking jobs entail designing, repairing and maintaining PC networks, usually in a business setting. There is no industry standard for software, but Microsoft dominates, with Novell taking a distant second place. Cisco dominates the category in hardware routers. Courses of study available include A+ (basic computer hardware), MCSE (Microsoft Certified Systems Engineer), MCSA (Microsoft Certified Systems Administrator), Novell Netware and Cisco Certification.

Career positions in this category include network design, network administration and network security. Depending on the employer, a computer networking professional may do all, or some of these duties.

Computer Security

Computer security is another growing field. Many businesses have created networks, websites and become reliant on computer technology, without employing safeguards to protect their data. There are many malevolent computer geeks out there who attack systems, or software for fun, curiosity or profit. Data extortion is now a common organized crime method for the Russian mafia!

Security violations have created new careers in network security and software development. Courses of study are mainly in Microsoft products and software development languages like Visual Basic, C++, .net, compiler and assembly languages.

Career positions in this category include network security, software programming, web design, web development and website administration (server side).

Databases

The acceptance of computers into business has created a great demand for databases. Almost every industry has a need for databases for marketing, client retention and daily operations. Industries such as banking, insurance, hospitals and utilities absolutely rely on them. Terrorism threats have created new laws, like the Patriot Act, that require a database of all foreign nationals who enter the country.

Creation of these databases relies on software, mainly developed by Oracle for large scale databases, Microsoft SQL for web based applications and Microsoft Access for smaller scale and custom applications.

Jobs in the database category include data architects, database administrators and information systems managers.

The information age has created a wealth of career opportunities for computer geeks, elevating their status as knowledgeable professionals and compensating them well financially. If you're a computer geek, or would like to become one, a career in any of these professions can be obtained in less than two years of study.

How Not To Get Hacked

Protect Urself !

Follow These Simple Guidelines n u are done


I am being stalked / spied . now what!!

As email providers give away more and more storage space, more and more personal information is being stored in those accounts. People are increasingly using their email accounts for more than just email - it has become their online document storage area with backup documents such as passwords, bank account numbers, account usernames, scans of correspondence and much more. Even if you don’t use your email for this purpose, you may still be inadvertantly revealing personal information in general conversation emails to family and close friends. A 6GB Gmail account or an unlimited space Yahoo account is potentially an information bonanza source for identity thieves who manage to figure out your email password and then go snooping. But if someone HAS cracked your email password, it may not be apparent to you. A snooper can easily read an email then mark it as unread again. So the best thing to do would be to set up an “electronic tripwire” so if someone breaks into your account, you’ll know about it. Here’s how to do it :
    1. Sign up for a website hit counter at www.onestatfree.com. You can leave a fake name and whatever URL you want (I used Google.com for mine). 2. You will then receive a welcome email from OneStat with a text attachment called OneStatScript.txt. Download this attachment to your computer and then delete the email (you don’t want any email snoopers finding it later). But before deleting the email, write down your OneStat account number as you will need it later.3. Change the name of the text document to something that will make the email snooper salivate such as passwordlist. Also change the file format from a text document to a website page. So make it something like passwordlist.htm .4. Email this newly-renamed file as an attachment to the email account you want to monitor. Make sure the email subject title also lures the snooper in (maybe something like List of Passwords. You get the idea :).5. The trap is now set. Basically if someone opens the email and opens the attachment, OneStat will record a hit. If you then log into your OneStat account say once a day, you will see how many hits you have had to your attachment.onestat.png
The OneStat account page then gives you details on each “visitor” including the date and time they accessed the web document and more importantly their location and IP address! onestatipaddress.png So how does having this information help you? Well first of all, it will alert you to change your password to something stronger. Secondly, if you see the snooper’s location and you only know one or two people there then it narrows down your list of potential suspects. By the way, I recommended signing up for One Stat because the author of the original idea mentioned them. But if you know of any other hit counter services that send text documents to your email address, then please mention them in the comments. I don’t have any financial advantage recommending One Stat so I am perfectly happy to consider alternative companies.

u may even use a return email notifications as read notify!!


_____________________________________________________________________________________________

few more


1. Stop using Internet Explorer and make the switch to Opera, it's more secure, plain and simple.

2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.

3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)

4. Update your anti virus

5. Boot into safe mode and run all three scans

6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.

7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it.

8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.

9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.

10. Make sure your firewall doesn't have strange exceptions.

11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your passwords.

12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.

Good luck!

CYBERTERRORISM

By anonraider In light of the recent focus the United States has placed on security, consider these scenarios * At an international airport, a terrorist uses a modem in his notebook to hack in the wireless LAN of an airlines curbside check-in Service, providing clearance for himself and 10 other conspirators to board flight to the united states under assumed names * A group of servers uses the internet to launch attacks against the computers of dozens of broadcasting companies, exploiting a newly discovered vulnerbilityto gain entrance. The attack scrambles the incoming satellite feed and shuts down the stations' transmissions. Televesion viewers across the country find their services discrupted * A terrorist hacks into the computer networks of hospitals around the country, exploiting security holes to gain access. Once inside these computer systems, the terrorist alters the medical directives for the patients, instructing the systems, which automatically dispense medications, to feed deadly drug combinations into these patients veins. * Hundredes of thousands of servers around the world send a coodinated flood of data packets over the internet to the main routers that handle traffic. This data overload temporarily cripples much of the internet's data flow, including email and voice transmissions. Dozens of telephone networks, which have begun routing some of their calls over the internet, experience connection failures. Only a few years ago, these possible events would only have been scenes from a movie. Today, security experts warn that the possibility exists. Following 09/11 the FBI's NIPC ( national infrastructure protection center ) and the SANS ( system Administration, networking and security ) institute a colation of 156,000 security and technical professionals, released the top 20 security vulnerbilities that crackers could use to damage both the internet and companies it connects. The list is available at http://www.sans.org/top20.htm. Along with the list came a sobering message: THE INTERNET IS AT RISK. "the internet is simply not ready because of these vulnerbilities. We're not ready to withstand a major Attack" , states ALLAN PALLER, the SANS institute director, at at press briefing helf for the release of the FBI/SANS top 20.

Monday, June 2, 2008

Learn in your own style…



by: C. N. Ramya, Counseling Psychologist

You have probably noticed that when anything new to be learned, some say “let’s try it out and see how it works…..”, or others may say “let’s think it through first….”

Everybody will have their own preferred learning style, i.e. the natural way a person gathers and assimilates new information.

Basic Views on Learning Styles:

Ø Some people just run through the information provided but some people get into the details of it.

Ø Each one’s preference of presenting the information also differs, either in the form of text or in the form of pictures etc.

Ø Some learn the theory and some learn through practice sessions.

There is no such thing as “good” or “bad” learning style, it’s the way you prefer to learn new information. The important thing would be your awareness of your unique learning style. Once you know the nature of your learning style i.e. how best you learn, you will be able to capitalize on your strengths by improving your skills and learn more effectively.

Some well known views and expert comments are as follows:

David Kolb: Experiential Learning

David Kolb is one of the leading researchers in learning strategies and learning processes. His model uses the Lewin Cycle of adult learning. Kolb suggests that there are four stages that follow on from each other to complete the cycle of learning:
The first stage is concrete experience where a student has active experience of learning something first hand.
This is then followed by reflective observation on that personal experience.
The next phase of the cycle, abstract conceptualization, focuses on how the experience is applied to known theory and how it can then be modified for future active experimentation.


Source: Kolb, D. (1984) Experiential learning: experience as the source of learning and development. http://ferl.becta.org.uk/display.cfm?resID=7543

Riding and Rayner: Cognitive styles analysis

Riding and Rayner have reviewed and integrated research on style differences in learning behavior and have developed the "cognitive styles analysis" which is designed to provide a method of assessing learning style.
Riding and Rayner suggest taxonomy for learning style models resulting in four broad groupings:
Style Models based on the learning process
Style models grounded in orientation to study
Style models based on instructional preferences
Style models based on cognitive skills development Style models based on cognitive skills development
Source: Riding, R and Rayner, S (1998) Cognitive Styles and Learning Strategies: Understanding Style Differences in Learning and Behavior. David Fulton Publishers.


Here is a chart helps you determine your learning style; read the word in the left column and then answer the questions in the successive three columns to see how you respond to each situation. Your answers may fall into all three columns, but one column will likely contain the most answers. The dominant column indicates your primary learning style.











Adapted from Colin Rose(1987). Accelerated Learning.
Last modified: March 28, 1998 Yannis Grammatis
http://www.chaminade.org/inspire/learnstl.htm

Visual Learners:
You learn the best when information is presented to you visually as a picture or as a design or in a written language format. You prefer using images, colours, maps, flow charts etc. to organize information and even while communicating with others.
Learning strategies:
Ø Use visual representations like diagrams, schematics, sketches, photographs, flow charts etc.
Ø To aid recall, make use of color coding using highlighter pens.
Ø Write out the phrases while summarizing.
Ø Mentally make pictures of information to remember them.
Ø Make use of video tapes or CD-ROM while learning.
Ø Make stick it notes and place them at visible places.

Auditory Learners:
You learn the best when the presented information is in an oral language format. You benefit through listening to others, interacting with people, participating in group discussion etc. Even while recalling something, you can remember the way someone told you or the way you previously repeated it.
Learning Strategies:
Ø Join a study group to exchange ideas/to learn new information.
Ø While learning, read aloud to aid recall.
Ø Create your own audio tapes to record the information which you need to learn, review it when necessary.
Ø Listen to others carefully, you will learn the best through that.
Ø Use audio tapes such as text books / notes on tape.

Kinesthetic & Tactile Learners:
The best of your learning comes out when you are physically engaged in an activity. A situation where in learning happens through experimentation will be beneficial for you. You prefer having hands-on experience and also field work.

Learning strategies:
Ø Take notes while learning new information.
Ø To remember key concepts make a model to illustrate.
Ø Visit museum, historical places etc. to gain the experience.
Ø Using of computer could act as a rein forcer as it aids in learning through sense of touch.

These are a simple and very few descriptions of learning style but generally in practice people will have a combination of all these characteristics where some will be prominent some may not.
While there is nothing like good or a bad learning style, there can be a good or bad way of matching in the way you learn and in the way it is taught, means there may be a mismatch between your learning style and instructional environment. And once you sense that, you can find ways to adapt your style of learning to ensure success. Hence you are developing learning strategies that work for you because they are based on your knowledge of your own learning style.

The Study conducted:
A “learning style inventory” was administered to 220 students. The objective of this is to assess the Students’ learning style which in turn helps them to capitalize on their strengths and improve their skills to learn more effectively. It was seen that out of the total number who took up the inventory on learning style, 180 students are visual learners, 24 are auditory learners and 16 of them fall under the category of kinesthetic learners.

Training Style:
Based on the finding, here are a few tips for the trainers which can be incorporated during their session. A blend of methods and materials has to be provided in such a way that it is flexible enough to learn different learning approaches and does not limit to a narrow range of methods, such as:
Ø Combine both theory and practice while teaching.
Ø Use information in the form of text and pictures.
Ø Provide opportunity to learn through one to one session and also through group activities.
Ø Carry out discussion on teaching styles and learning styles.
Ø Have a healthy combination of formal and informal learning.
Ø Use variety of material and delivering methods.
Ø Usage of more of visual representatives while explaining.
Ø Presentations through PowerPoint, Video tapes, CD-ROM etc.

Conclusion:
Most of us will have elements of more than one learning style, but it will be useful to identify which is our strongest style. By thinking about our preferred and natural learning style, we may find learning much easier and quicker. Knowing our learning style may help us develop coping strategies to compensate for our weaknesses and capitalize on our strengths.

For further reading:
Ø http://www.accelerated-learning-online.com/
Ø ldpride.net
Ø Mumford, A. ( 1997 ) How to manage your learning environment.Peter Honey Publications.
Ø Riding, R and Rayner, S ( 1998 ) Cognitive Styles and Learning Strategies: Understanding Style Differences in Learning and Behaviour. David Fulton Publishers.
Ø Mumford, A. ( 1997 ) How to manage your learning environment. Peter Honey Publications.
Ø Learning Styles Presentation: A Powerpoint presentation from Virginia Havergal of Wiltshire College on the subject of Learning Styles. Includes slides on Multiple Intelligence Theory.
Ø Honey and Mumford Learning styles questionnaire.
Ø Title: Learning styles and strategies: a review of research by Philip adey et al., ion info. London: king’s college London, school of Education. 1999.

Ten Deadly Sales Sins

by: Niall Devitt

Recently a customer of mine asked me to come up with a list of common mistakes made by salespeople so that she could hand it out to their sales team. I decided to keep it simple and limit the list to ten, which I have called The Ten Deadly Sales Sins.
10: Driving all Day
Spend the minimum amount of time travelling and the maximum amount of time prospecting or closing deals. Divide your area into manageable chunks and work each smaller area on a specific day each week. Only deviate from this plan where there is a very good reason such as collecting a certain sale.
9: (Really Cold) Calling
First impressions count big time. Prospect’s care about their business and not yours so have enough research done so that you can talk to them about their business. This will allow you to start to win their trust from the off. You need to stand out from the crowd and convince that your offering will add value to their business and customers
8. Falling Down on Follow Up
Call your customers or drop in to see if there are any more opportunities and that current service is up to scratch. Send out some e-mails informing of latest developments or new products and follow up with a call. Speak to old prospects to see if their circumstances have changed. Selling is about building relationships; relationships are based on communication so make sure you follow up.
7: Painful Presentations and Dull Demonstrations
Let me start by saying the amount of presentations where I have retained information and which were in some way memorable I can count on one hand. There tends to be a general consensus that they are a necessary evil. In my opinion, this is not the case and they are often used as a bad sales prop and contain reams of irrelevant information. Good presentation skills are difficult to master so that average seller should limit time spent presenting and increase time spent selling. When evaluating your presentations and presentations skills ask yourself “ What is the presentation adding to the meeting?” and always ask this question from the point of the person or persons receiving the presentation. If you’re average meeting is one hour and your presentation takes up half, could some of this time be better spend doing something else? How much of the information do people actually want to hear? A simple rule to apply when presenting is far less tell and much more interaction.
6: Stalling Your Sales Engine
Selling is all about the seller managing opportunities so that each action or conversation produces positive forward momentum ending in sales. Set yourself minimum and maximum objectives each time you talk with a prospect and always achieve in between. Ensure next steps and agree timeframes no matter how small. Let stalling be your biggest enemy and attack with all your sales might.
5: Losing Track of Time
Time is your greatest resource, be very greedy with it. Ask the question “ Is this contributing to my sales?” for every action you do and for every conversation you have. If this answer is no, you need to change what you are doing or start having a different conversation.
4: Rejecting Referrals
Referrals are by far one of the easiest ways to get good quality leads. I’m often asked when is a good time to ask for referrals. “Is it when you just made a sale?” “Is it when a prospect is really happy with the quality of back up and after service?” Of course these are all good times to ask but really the very best time to ask for referrals is “now”
3: Running Scared of the Close
The close is a reasonable request at a reasonable time. At best prospects say “yes” and at worst they say “no” and even then you can still change their mind. Ask the question “Can we do business?”
2: Not Getting to Know Each Other
You know why your product is special and can talk about all its valuable features. The prospect knows what makes their business special. To convince a prospect that your product will add value to their business you too need to know what makes their business special. How do you this, you ask lots of questions to find out. Take the time to find out about what’s important to them and what makes their business great. Only then will you be in a position to demonstrate how your product will make their business even better.
1. Alarming Attitudes
With the right attitude and energy nearly everyone can learn the skills required to become a seller and forge a successful and lucrative career for themselves. However even today sales are still viewed in some quarters as a stopgap career move. Some companies too add flames to this fire by tossing away underperforming new hires at rate of knots. Its time these people and organisations woke up to the fact to be successful requires proper training, correct company supports, a varied skill set and most of all a professional attitude on behalf of everybody involved.

The 5 Secrets of Winning Emails

by: Mike Brooks, 'Mr. Inside Sales'
Years ago voicemail was all the rage. There was no e-mail, so people tended to honor and even return their voicemail messages. It was a good time...
But that's history now. Email has changed everything, and people now hit the delete button on their voicemail messages the instant they hear something they don't like -- which is usually when it's a message from an unknown inside sales rep. What to do?
The good news is people still respect email, and I think it’s become the primary mode of communication between business people (and everyone else for that matter). The even better news is that there are 5 secrets that will set your emails apart from the thousands of others your prospects get, and if you use these 5 secrets when constructing your emails, you’ll have the best chance at getting yours read and returned.
Wouldn’t that be refreshing?
Here’s what they are:
Email Secret #1: Use the prospect’s first name in the subject line.
Putting your prospect’s name in the subject line (first name) will automatically distinguish your email from the hundreds of others your prospect gets. In addition, we’re all partial to our own name, and this will draw your prospect’s eyes like a magnet. Good start, huh?
Email Secret #2: Customize the first few lines of your email as much as possible.
Many people preview your emails by reading the first paragraph in Outlook, and the beginning better be short and have immediate value to your prospect. Some like:
"Hi Barbara, Mike Brooks here with HMS software. I've got some ideas about your networking issues for your new office that's opening in Houston next month. We’ve helped a lot of companies in this area, and I think you'll find it useful if we talk.”
Again, keep it short, to their point, and provide immediate value.
Email Secret #3: Keep your email short and easy to read!
Nothing will turn your prospect off more than long, information packed paragraphs. Their eyes will glaze over! Break up your sentences into paragraphs if possible to make them easy to read and accessible. I say no more than 3 sentence paragraphs
Email Secret #4: Ask for a return response – whether they are interested or not. This is a great way to end your email and a good way to get a response. Simply thank them in advance for their consideration and that you’re looking forward to their response on this.
Email Secret #5: Promise to follow up by phone if they don’t respond.
Let them know that you understand they are busy, and that out of consideration if you don’t hear from them you’ll follow up with a call in a day or two. This really increases your response rate and be happy when you get a “not interested” response. These prospects just disqualified themselves and saved you a lot of time and energy.
On the other hand, there will be others who don’t respond and they become your follow up leads!
These are the 5 secrets to emails, and believe me they work! Take a few minutes right now to script out some of the outline of your emails and then fill in the details as you need to per prospect. And then watch your contact, response and success rate skyrocket!


content taken from changing minds.org

12 Lessons to Good First Impressions

by: Niall Devitt

Within the first few seconds of any encounter you are evaluated by the prospect. Your appearance, demeanour and body language all contribute to quickly create a first impression. This judgement happens primarily on a subconscious level and once made is extremely difficult to reverse. The prospect’s subconscious is asking the question “can I trust this person”. Follow these twelve key lessons and learn to influence this judgement in a positive way helping you to make a great first impression.
Lesson Number 1: Do your research
Do your homework, who are the key people? What are the products? Who are their customers? Are there any big plans for the future? Today you can use the Internet to get lots of information about the prospect but its also always worth ringing ahead a few days in advance to gather any relevant insight.
Lesson Number 2: Get focused
So the baby was sick and traffic is awful. Take a deep breath, leave your troubles behind and ensure that your focus is entirely set on the meeting.
Lesson Number 3: Good time keeping
Plan for unforeseen events like traffic etc and aim to get there with time to spare. Lateness is one sure fire way of killing off any chance of a good first impression.
Lesson Number 4: Be Confident
Expect to do business and your words, tone and body language will send out all the right signals. Successful people give off a successful image so even when you are having a bad month, approach every new business encounter in an open and confidant manner.
Lesson Number 5: Dress to Impress
This is the first visual clue that the prospect gets and making an extra effort will pay dividends. As far as the prospect is concerned If you look sharper than the competition changes are you are sharper then the competition.
Lesson Number 6: Keep an open stance
Ensure that your stance is open particularly during introductions. Try to be aware of giving any negative of defensive subconscious gestures such as folding of arms, putting point of sale materials in front of your torso etc.
Lesson Number 7: Smile, smile, smile
The most powerful subconscious tool you have at your disposal is your smile so use it. When you smile at someone, they will smile back and start to relax in your company. Remember, smiling is infectious.
Lesson Number 8: Always offer a firm handshake
A firm handshake helps to imply that you are a confidence and honest person. A loose weak handshake says don’t trust me, I got something to hide.
Lesson Number 9: Keep good eye contact
Ensure that you keep eye contact when addressing someone and when they are talking to you. Good eye contact says, you can trust me, I’m interested in what you have say because its also important to me.
Lesson Number 10: Slow down introductions
When you are introduced, slow down the process taking time to remember the names and positions of the people that are been introduced. We generally tend to rush through introductions and later find we cant remember the names and positions of the people we have just been introduced to.
Lesson Number 11: Use first names.
Once the introductions are over, use people’s first names when addressing your audience or asking questions. This helps to quickly build trust with prospects.
Lesson Number 12: Be an obvious listener
Good listening skills require concentration, focus and effort. Let them see that your attention is directly focused on him or her through use of eye contact, nodding and by avoiding any mental distractions.

The ability to create a good first impression is a potent skill in any business encounter but unfortunately is often not considered important. As with any skill worth mastering, it requires planning, practice and thought and while a good first impression can help overcome later difficulties or objections, a bad first impression is virtually impossible to reverse which effectively means you lose any opportunity to do business before you even start the business meeting.

content taken from changingminds.org

Life skills for adults - Shaping their personality

by: Sujatha Venkatesh, Counseling Psychologist

Youth development is a process of mental, physical, social and emotional growth during which young people prepare to live a productive and satisfying life within the customs and regulations of their society. It is a very important period in one’s life which if properly nurtured will determine a bright future ahead. Therefore it is the responsibility of teachers, parents, counselors, educators etc. to help bring in effective changes if necessary in the individual through systematic training and guidance so that the individual becomes a well rounded personality and also successful in life. Here life skills play an important role in molding the individual.

What are life skills?
The World Health Organization has defined life skills as “the abilities for adaptive and positive behavior that enable individuals to deal effectively with the demands and challenges of everyday life”.
UNICEF defines life skills as “ a behavior change or behavior development approach designed to address a balance of three areas: Knowledge, attitude and skills”.
Thus in short, life skills are essentially those abilities that help promote mental well being and competence in young people as they face the realities of life.

Core Life skills strategies and techniques
UNICEF, UNESCO and WHO lists the ten core life skill strategies and techniques as:
Problem solving
Critical thinking
Effective communication skills
Decision making
Creative thinking
Interpersonal relationship skills
Self awareness building skills
Empathy
Coping with stress and emotions

The WHO categorized these core life skill strategies into three main components as:
Critical thinking skills/Decision making skills
Interpersonal/Communication skills
Coping and Self management skills
Criteria for using Life skills
Life skills education should be more practical oriented where students are made to do or work out through exercises, training modules etc. It should not only be theory based lecture method.
It works best only when it is being repeated continuously as one taught will be soon forgotten. Therefore it needs to be reviewed and reinforced and be as apart of the curriculum.
Advantages of life Skills
Developing Life skills help individuals to translate knowledge, attitude and values into healthy behavior.
It also helps in building self confidence and to make them more independent and to take decisions effectively.
It also helps them in self management and to take proper career decisions.
It also helps in improving their interpersonal skills to establish healthy relationships in life.
Conclusion
Thus teaching life skills to students is really essential as it helps in bringing and molding capable adults who eventually become effective leaders bringing laurels to the nation.

content taken from changingminds.org

The Power of Your Words

by: William Frank Diedrich

Most of us underestimate the power of our words. We sometimes miss how our words set a tone. A few words can make someone’s day, or shatter it. Words can inspire someone to buy, or to go away without buying. Our words can move someone to do their best work, or to work against us. Your spoken words serve either to build up or to tear down. They serve to empower and inspire, or to disempower and hurt. Words are either life affirming or destructive. For this reason we should choose our words carefully.
“The word is the most powerful tool you have as a human...like a sword it has two edges, your word can create the most beautiful dream, or your word can destroy everything around you.” (The Four Agreements, Don Miquel Ruiz)
When you are talking to someone ask yourself this question: “Who am I being and what is the impact of my words on the people around me?” The power of your words lies in the intention behind them. Is it your intention to create a resolution or to be right? Do you intend to help the organization accomplish its mission or to satisfy the need to take someone down? We communicate best when we are clear about who we are and what we intend. This kind of clarity prevents us from saying words that are harmful to ourselves and others. It may prevent us from engaging in harmful gossip and complaining.
Gossip is usually destructive. It is often a careless use of our words. We just aren’t thinking about how we are affecting others. Sometimes gossip is mean spirited and intended to cause hurt. Whether gossip is careless or intentional, it causes pain. We may be hoping for a little humor or self justification, but the results of gossip are anger, suspicion, embarrassment, and fear. These creations of gossip negatively affect morale, service, and productivity. You cannot both care about someone and gossip about them. If you think back to the last time you either heard or offered gossip, it probably didn’t make you feel good. Gossip disempowers us.
Similar to gossip is chronic complaining. Complaining about people and situations makes us feel and look powerless. Managers who complain in front of their employees lose credibility as leaders. Chronic complaining leads us into a dead end street where there is nothing to be done. We become victims who are powerless to change anything. While venting frustrations to a trusted friend can be helpful in releasing negative feelings, complaining to everyone tends to reinforce negative feelings. Like gossip, chronic complaining disempowers us.
Our power to do harm is exceeded only by our power to do good. A simple, sincere apology (given without expectation of return) can heal a relationship. An uplifting word at the right moment can change a life, launch a career, or convince someone to go beyond perceived limitations. By consciously looking for evidence of greatness in others, and by using our words to tell them, we help others to build confidence. When we sincerely speak well of others we uplift ourselves.
There is great power in making the commitment to keeping our words as positive and life affirming as we are able. As an affirming presence our influence grows. We feel better about ourselves. Constant negative speech imprisons us and prevents us from finding joy and success. Developing the habit of speaking well of self and others frees us to enjoy life more. We become a blessing to ourselves and to others.
Our spoken words originate from our thoughts. The best way to increase the positive power of our spoken words is to clean up our thinking. We must become willing to think well of ourselves. Constant self criticism needs to become unacceptable. We free ourselves to think and speak well of others by thinking well of ourselves.
Consider practicing the following:
Affirm life in your thoughts and your words. (To affirm life is to build up, to nurture, to support, and to bless)
Refuse to gossip. Commit to saying only words that are uplifting or helpful to others.
Refuse to listen to gossip. Compassionately tell others it is beneath them to gossip.
Refuse to indulge in complaining about another person.
Refuse to dwell on self critical thoughts. Learn from mistakes and move on.
Intentionally look for positive qualities to think about yourself. Make a list often.
Intentionally look for positive qualities in others. Tell them.
Don’t take the words of others personally. Their words are more about them than about you. Let go of your grudges and your hurts and wish others well. This practice will make you happier.
Do not allow negative emotion to control you. Accept it. Be willing to let it go. Stop feeding it with negative words. Choose words that will refocus you on who you are and what you really want.
Gossip and complaining are distractions and a misuse of your energy. Decide what you really want and apply your energy to it. As you become more life affirming in your thoughts and words you will experience more joy and success, and your sense of well-being will affect others. More people will trust you and want to help you. Your life will change. Affirm life with your thoughts and words and you will find that your organization, your family, your community, and you will benefit greatly.

William Frank Diedrich is a keynote speaker, workshop leader, coach, and the author of three books including Beyond Blaming: Unleashing Power and Passion in People and Organizations. Bill has just released his new leadership Cd-- The Leader's Edge: Three Keys to Exceptional Leadership. This inspirational and insightful presentation is perfect for listening to in your vehicle or at your desk. It is available in Cd and mp3 formats for $ 12 USD at http://www.noblaming.com.
content taken from changingminds.org

The Johari Window

The Johari Window sounds somewhat esoteric until you learn that it was devised by two men called Joseph and Harry. Despite this quaint naming, it is, in fact a very useful way of understanding something of how our self may be divided into four parts that we and others may or may not see.
The Basic Johari Window
Below is a diagram of the standard Johari Window, showing the four different selves and how the awareness or otherwise of these aspects of our self by others and ourselves leads to these four categories.


The Public Self
The Public Self is the part of ourselves that we are happy to share with others and discuss openly. Thus you and I both see and can talk openly about this 'me' and gain a common view of who I am in this element.
The Private Self
There are often parts of our selves that are too private to share with others. We hide these away and refuse to discuss them with other people or even expose them in any way.
Private elements may be embarrassing or shameful in some way. They may also be fearful or seek to avoid being discussed for reasons of vulnerability.
Between the public and private selves, there are partly private, partly public aspects of our selves that we are prepared to share only with trusted others.
The Blind Self
We often assume that the public and private selves are all that we are. However, the views that others have of us may be different from those we have of ourselves. For example a person who considers themself as intelligent may be viewed as an arrogant and socially ignorant by others.
Our blind self may remain blind because others will not discuss this part of us for a range of reasons. Perhaps they realize that we would be unable to accept what they see. Perhaps they have tried to discuss this and we have been so blind that we assume their views are invalid. They may also withhold this information as it gives them power over us.
The Undiscovered Self
Finally, the fourth self is one which neither us or nor other people see. This undiscovered self may include both good and bad things that may remain forever undiscovered or may one day be discovered, entering the private, blind or maybe even public selves.
Between the Blind and Undiscovered Selves, are partly hidden selves that only some people see. Psychologists and those who are more empathic, for example, may well see more than the average person.
Four personas
Associated with the Johari Window, we can define four different personas, based on the largest 'self'.
The Open Persona
Someone with an open persona is both very self-aware (with a small blind self) and is quite happy to expose their self to others (a small private self).The Open person is usually the most 'together' and relaxed of the personas. They are so comfortable with themselves they are not ashamed or troubled with the notion of other people seeing themselves are they really are.
With a small Blind Self, they make less social errors and cause less embarrassment. They are also in a more powerful position in negotiations, where they have less weaknesses to be exploited.
Becoming and Open Persona usually takes people much time and effort, unless they were blessed with a wonderful childhood and grew up well-adjusted from the beginning. It can require courage to accept others honest views and also to share your deeper self and plumb the depths of the undiscovered self.
The weaker side of the Open Persona is where they understand and share themselves, but do not understand others. They may thus dump embarrassing information from their Private Selves onto others who are not ready to accept it.
The Naive Persona
The Naive person has a large Blind Self that others can see. They thus may make significant social gaffes and not even realize what they have done or how others see them. They hide little about themselves and are typically considered as harmless by others, who either treat them in kind and perhaps patronizing ways (that go unnoticed) or take unkind advantage of their naivety.

The Naive Persona may also be something of a bull in a china shop, for example using aggression without realizing the damage that it does, and can thus be disliked or feared. They may also wear their heart on their sleeves and lack the emotional intelligence to see how others see them.
The Secret Persona
When a person has a large Private Self, they may appear distant and secretive to others. They talk little about themselves and may spend a significant amount of time ensconced in their own private world. In conversations they say little and, as a result, may not pay a great deal of attention to others


Having a smaller Blind Self (often because they give little away), the Secret Persona may well be aware of their introverted tendencies, but are seldom troubled about this. Where they are troubled, their introversion is often as a result of personal traumas that have led them to retreat from the world.
The Mysterious Persona
Sometimes people are a mystery to themselves as well as to other people. They act in strange ways and do not notice it. They may be very solitary, yet not introverted

As the Mysterious Persona knows relatively little about themselves, they may be of low intelligence, not being able to relate either to themselves or to others. They may also just prefer to live in the moment, taking each day as it comes and not seeking self-awareness.
Some forms of esoteric self-developments seek to rid oneself of concerns about the self in order to achieve a higher state of being. They may deliberately enter states of non-thinking and revel in such intuitive paradoxes as knowing through not knowing.









Content taken from changingminds.org

Group behavior and psychoanalysis

Group behavior, when viewed through the psychoanalytic lens gives a particular perspective.
Self vs. group
Anxiety is often a cohesive force and holds groups together and people join as a defense against anxiety. Yet groups can also be the source of anxiety.
Being in a group leads to blurring between the self and others that, whilst giving the comfort of neonatal unity also causes anxieties. As the attachment to the self to the group increases, the sense of self decreases, which leads to anxieties about integrity and hence the true and false self.
In this state, the group members regress to early stages of defense against anxiety, as in the paranoid-schizoid position described by Melanie Klein, including part-object relating, idealization, persecution, splitting and projective identification.
The person may relate the group with the mother's body who thus take on significance of inner objects. Individual members collude in creating and realizing projections. Thus there becomes a group mind.
Roles
Roles in groups are functions that individuals adopt on behalf of the whole group. They can be viewed as subject positions into which individuals are interpellated by the leader or the group.
Roles can be positive and fulfilling. They may also be experienced as prisons and alienated positions that are far from the comfort zone of the person involved. A particularly negative team role is of scapegoat where the person involved carries the guilt of the entire team. The typical scapegoat is least able to successfully project negative feelings onto others and hence accepts projections without resistance in an enforced introjection. As a part of this process they may also be depersonalized by the rest of the group to enable them to act against normal values.
Typical positive team roles have been identified in Belbin's Team Roles.
Leaders
Freud viewed the bond within groups their leader as a form of 'libido' or love that works through introjective identification with a leader. The leader thus forms the common anchor and source of thinking and acting which the group members follow and through which they identify with one another.
Wilfred Bion saw a common mode of groups as dependency, in which leaders-seeking behavior appears. In his fight/flight state, the leader, with whom group members have projective identification, becomes particularly important. Army groups often act in this manner, where leadership is based on the paranoia of the group. Good, self-preserving parts of the self are projected into the leader and bad, aggressive impulses are projected into a shared external-object enemy who is seen as the persecutor. The group thus idealizes itself and denies its own guilt (including when it attacks a possibly innocent outsider).
Managers sit at the boundary of groups, projecting and introjecting for the group and otherwise connecting the group with the outer world. The role is difficult as they need to both connect with the group whilst maintaining a separation that preserves their authority. Managers and leaders both represent the 'me' of the group whilst also sustaining a 'not me' of being not just an ordinary team member, even more so than other roles.
Transmitting feelings
Groups will often pass blame (and other bad feelings) to one another. A blames B who blames C, and so on. This is done by a series of projective identifications in which the blame is experienced as a feeling-state. In this way a game of 'pass the parcel' ensues until one person is unable to pass it on (or back). This person then becomes the scapegoat.
Other emotions, both negative and positive, may also passed around the group in this way. The feeling-state can either be released as it is passed around (as the 'pass the parcel' game) or may remain with each person as it spreads (a 'virus' effect). Bad feelings are more likely to be released after passing to another by projective identification and good feelings to be retained as they are chosen by introjective identification.
Group life includes significant splitting as parts of each ego are split off and passed around. It can be considered that one's emotions are owned by the group rather than oneself and individuals can become depersonalized. In this way the group identity grows as the individual identity wanes.
The group may project their anxieties onto the leader in forms that range from anger to fear. The manager may project these bad objects elsewhere, including onto 'bad' group members and 'safely' onto others outside the group.

Content taken from changingminds.org

Benefits of humor

Humor has many benefits for communication and persuasion. Here are just a few...
Better communication
Studies by Fabio Sala at the Hay Group have shown that humor (used skillfully):
Reduces hostility
Deflects criticism
Relieves tension
Improves morale
Helps communicate difficult messages
Executives who were ranked as outstanding used humor over twice as often those ranked average (17.8 times/hr vs. 7.5 times/hr). They used mostly positive or neutral humor, but also sometimes used negative humor (for example as a put-down). They also received greater bonuses.
Although humor may not be a necessary and sufficient factor to gain all these benefits, it is at least a marker, perhaps, of emotional intelligence.
Research by Clouse and Spurgeon has also shown that a good joke or playful laughter can boost creativity, initiate conversation and generally build a more trusting atmosphere.
Other research by Bettinghaus and Cody (1994) and Foot (1997) showed that humor:
Builds rapport and liking of the humorist
Makes the target person want to listen more
Relaxes the person, making them more receptive to the message
Makes the person feel good and hence not think so carefully about the proposition
Makes the information more memorable
Distracts the person from thinking about counter-arguments
Getting concessions
Playful joking also increases the likelihood of financial concessions during a negotiation. Relaxing the other person and building trust makes them see you more as a friend and hence deserving of a better deal.

Content taken from changingminds.org

Negotiation tactics

In negotiation, there are many tactics that you may meet or use. They can be fair, foul or something in between, depending on the competitive or collaborative style of the people involved and the seriousness of the outcomes.
Auction: Set sellers or buyers against one another.
Bad publicity: Indicate bad publicity of not agreeing.
Better offer: indicate a better offer from the competition.
Better than that: Just say 'You'll have to do better than that...'
Biased choice: Offering choices that already include your biases.
Big fish: Show you're the big fish and they could get eaten.
Bluff: Assert things that are not true.
Breaking it off: Walking away from the negotiation.
Brooklyn optician: price or negotiate each item.
Call girl: Ask to be paid up front.
Cards on the table: State your case, clearly and completely.
Change the negotiator: New person can reset the rules.
Changing standards: Change the benchmarks of good and bad.
Check the facts: Bring up new information you have found.
Control the agenda: And hence what is discussed.
Credentials: Show how clever you are.
Deadlines: Push them up against the wall of time.
Delays: Buying time and building tension.
Divide and conquer: Get them arguing with one another.
Doomsday: paint an overly black picture.
Double agent: Get one of their people on your side.
Dry well: Show you've nothing left to exchange.
Empty pockets: say you can't afford it, don't have it, etc.
Empty promises: Make promises that you know you will not keep.
Escalating demand: the more you get the more you require.
Fair criteria: Set decisions criteria such that is is perceived as fair.
False deadline: Time limitation on their action.
Faking: Letting them believe something about you that is not true.
Fame: Appeal to their need for esteem from others.
Flattery: Make them look good and then ask for concession.
Forced choice: Subtly nudging them toward your choice.
Funny money: Financial games, percentages, increments, etc.
Fragmentation: Breaking big things into lots of little things.
Good guy/bad guy: Hurt and rescue by people.
Highball: Sellers--start high and you can always go down.
Hire an expert: Get an expert negotiator or subject expert on your team.
Incremental conversion: Persuade one person at a time. Then use them as allies.
Interim trade: Make an exchange during negotiation that will not get into the final contract.
Lawyer: use survey results, facts, logic, leading question.
Leaking: Let them find out 'secret' information.
Linking: Connect benefit and cost, strong and weak.
Lowball: Buyers--start low and you can always go up.
New issue: Introduce a new key issue during the negotiation.
New player: Another person who wants what you have appears on the scene.
Nibbling: constant adding of small requirements.
No authority: refuse to agree because you are not allowed to.
Non-negotiable: Things that cannot be negotiated.
Overwhelm: Cover them in requests or information.
Padding: Make unimportant things 'essential' then concede them.
Phasing: Offer to phase in/out the unpleasant bits.
Plant: A 'neutral' person who is really working for you.
Quivering quill: ask for concession just before signing.
Red herring: leave a false trail.
Russian Front: Two alternatives, one intimidating.
Reducing choice: Offering a limited set of options.
See you in court: Threatening to go to a higher or public forum.
Shotgun: Refusal to continue until a concession is gained.
Slicing: Break one deal down into multiple smaller deals.
Split the difference: Offer to agree on a half-way position.
Take it or leave it: give only one option.
Trial balloon: Suggest a final solution and see if they bite.
Undiscussable: Things that cannot even be discussed.
War: Threaten extreme action.
Widows and orphans: show the effect on the weak and innocent.
Wince: repeat price loudly, then silence.

Content taken from changingminds.org

Send free SMS....Just register for FREE