Suche senden
Hochladen
Feversocial系統操作說明
•
1 gefällt mir
•
705 views
Feversocial 發燒互動
Folgen
Feverosocial互動行銷系統-後台操作介紹, 包括活動模組及獎項設定, 行銷畫布網頁編輯器, 活動抽獎, 聯絡得獎人管理, 活動報表, Zines 品牌誌設定
Weniger lesen
Mehr lesen
Marketing
Melden
Teilen
Melden
Teilen
1 von 56
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Webcast Recording: https://www.youtube.com/watch?v=fCbVMWvncuw Increasingly, more organizations are migrating resources to being hosted in the cloud. With this comes a greater potential for misconfiguration if there isn’t a solid understanding of the attack surface. While there are many similarities between traditional on-premises pentesting and cloud-based pentesting, the latter is an animal of its own. This webcast will attempt to clear up some of the fogginess around cloud-based pentesting, specific to Microsoft Azure environments, including Microsoft 365. In order to adequately determine the attack surface, the appropriate coverage areas will be highlighted. Differences between Azure resources and Microsoft 365 can oftentimes be confusing but knowing these differences is key to helping you pivot and escalate privileges. Conditional access policies are great for defining different scenarios for how users can authenticate securely but can also be misconfigured. There are security protections for stopping certain password attacks but some of these can be bypassed. Ultimately, a methodology for testing Azure environments along with tools and techniques will be presented in this talk.
Getting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: Azure
Beau Bullock
Ansible fits naturally into any Kubernetes environment. Both are very active and widely used open source projects with vibrant communities that help make hard things easier. Here, we explore ways how...
Automating Kubernetes Environments with Ansible
Automating Kubernetes Environments with Ansible
Timothy Appnel
Bilgi Güvenliği Akademisi Ekibi Tarafından Hazırlanmış Dokümandır. Bu Sunum Siber Güvenlik Konferansı 2014 Etkinliği için Hazırlanmıştır.
Sızma Testlerinde Fiziksel Güvenlik Riskleri
Sızma Testlerinde Fiziksel Güvenlik Riskleri
BGA Cyber Security
Presented by Andy Robbins, Rohan Vazarkar, and Will Schroeder at DerbyCon 7.0: Legacy, in Louisville, Kentucky, 2017. See the video recording of the presentation here: https://www.youtube.com/watch?v=mfaFuXEiLF4
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Andy Robbins
The old API Pattern was designed in the 70's for centralized architectures and binds it's communication logic to it's business logic so that I/O cannot be shared with other services in an architecture without duplication. We will show a new API Pattern that fixes this issues by abstraction the communication layer away from business logic thus enabling sharing of I/O, better scale, less code, and faster processing as well as many other things.
Api pattern
Api pattern
Owen Rubel
This presentation was given at BSides Austin '15, and is an expanded version of the "I hunt sys admins" Shmoocon firetalk. It covers various ways to hunt for users in Windows domains, including using PowerView.
I hunt sys admins 2.0
I hunt sys admins 2.0
Will Schroeder
As more corporations adopt Google for providing cloud services they are also inheriting the security risks associated with centralized computing, email and data storage outside the perimeter. In order for pentesters and red teamers to remain effective in analyzing security risks, they must adapt techniques in a way that brings value to the customer. In this presentation we will begin by demonstrating adaptive techniques to crack the perimeter of Google Suite customers. Next, we will show how evasion can be accomplished by hiding in plain-sight due to failures in incident response plans. Finally, we will also show how a simple compromise could mean collateral damage for customers who are not carefully monitoring these cloud environments.
OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?
Beau Bullock
These slides were presented at GDG MeetUp in Bangalore which was held on 21st September 2013. Uploading the slides to help the people who wanted the slide Deck
Android Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
Empfohlen
Webcast Recording: https://www.youtube.com/watch?v=fCbVMWvncuw Increasingly, more organizations are migrating resources to being hosted in the cloud. With this comes a greater potential for misconfiguration if there isn’t a solid understanding of the attack surface. While there are many similarities between traditional on-premises pentesting and cloud-based pentesting, the latter is an animal of its own. This webcast will attempt to clear up some of the fogginess around cloud-based pentesting, specific to Microsoft Azure environments, including Microsoft 365. In order to adequately determine the attack surface, the appropriate coverage areas will be highlighted. Differences between Azure resources and Microsoft 365 can oftentimes be confusing but knowing these differences is key to helping you pivot and escalate privileges. Conditional access policies are great for defining different scenarios for how users can authenticate securely but can also be misconfigured. There are security protections for stopping certain password attacks but some of these can be bypassed. Ultimately, a methodology for testing Azure environments along with tools and techniques will be presented in this talk.
Getting Started in Pentesting the Cloud: Azure
Getting Started in Pentesting the Cloud: Azure
Beau Bullock
Ansible fits naturally into any Kubernetes environment. Both are very active and widely used open source projects with vibrant communities that help make hard things easier. Here, we explore ways how...
Automating Kubernetes Environments with Ansible
Automating Kubernetes Environments with Ansible
Timothy Appnel
Bilgi Güvenliği Akademisi Ekibi Tarafından Hazırlanmış Dokümandır. Bu Sunum Siber Güvenlik Konferansı 2014 Etkinliği için Hazırlanmıştır.
Sızma Testlerinde Fiziksel Güvenlik Riskleri
Sızma Testlerinde Fiziksel Güvenlik Riskleri
BGA Cyber Security
Presented by Andy Robbins, Rohan Vazarkar, and Will Schroeder at DerbyCon 7.0: Legacy, in Louisville, Kentucky, 2017. See the video recording of the presentation here: https://www.youtube.com/watch?v=mfaFuXEiLF4
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Andy Robbins
The old API Pattern was designed in the 70's for centralized architectures and binds it's communication logic to it's business logic so that I/O cannot be shared with other services in an architecture without duplication. We will show a new API Pattern that fixes this issues by abstraction the communication layer away from business logic thus enabling sharing of I/O, better scale, less code, and faster processing as well as many other things.
Api pattern
Api pattern
Owen Rubel
This presentation was given at BSides Austin '15, and is an expanded version of the "I hunt sys admins" Shmoocon firetalk. It covers various ways to hunt for users in Windows domains, including using PowerView.
I hunt sys admins 2.0
I hunt sys admins 2.0
Will Schroeder
As more corporations adopt Google for providing cloud services they are also inheriting the security risks associated with centralized computing, email and data storage outside the perimeter. In order for pentesters and red teamers to remain effective in analyzing security risks, they must adapt techniques in a way that brings value to the customer. In this presentation we will begin by demonstrating adaptive techniques to crack the perimeter of Google Suite customers. Next, we will show how evasion can be accomplished by hiding in plain-sight due to failures in incident response plans. Finally, we will also show how a simple compromise could mean collateral damage for customers who are not carefully monitoring these cloud environments.
OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?
Beau Bullock
These slides were presented at GDG MeetUp in Bangalore which was held on 21st September 2013. Uploading the slides to help the people who wanted the slide Deck
Android Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
An overview of deploying Redis on Kubernetes along with an extra section explaining how to expose our Redis cluster as a Key Value store that is reachable from the internet. Source code and deployment files are available here: https://github.com/IdanAtias/redis-on-k8s
Redis on Kubernetes
Redis on Kubernetes
Idan Atias
Gerekli olan EPS değerlerinin SIEM veya Log Yönetimi yazılımı tarafından sağlanıp sağlanamadığının testi.
Log yönetimi ve siem projelerindeki en önemli kriter EPS değerleri
Log yönetimi ve siem projelerindeki en önemli kriter EPS değerleri
Ertugrul Akbas
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
RootedCON
Have you ever wondered what the relative differences are between two of the more popular open source, in-memory data stores and caches? In this session, we will describe those differences and, more importantly, provide live demonstrations of the key capabilities that could have a major impact on your architectural Java application designs.
Redis vs Infinispan | DevNation Tech Talk
Redis vs Infinispan | DevNation Tech Talk
Red Hat Developers
The appeal of SaaS has many ISVs interested in the power and value of delivering their solutions in a SaaS model. However, moving a single-tenant application to a multi-tenant environment can be daunting. In this session, we'll look at the obstacles that many ISVs face as they consider the move to a SaaS delivery model. We'll explore a wide range of transformation patterns that cover everything from lift-and-shift of your monolith to an incremental cutover to multi-tenant aware microservices, data, and infrastructure. Along the way, we'll highlight the challenges and technical considerations that shape your solution and allow you to better align your transformed solution with SaaS best practices. This includes looking at all the new architectural elements you'll need to add to your environment to support SaaS (onboarding, identity, billing, metering, analytics, and so on).
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Amazon Web Services
Presenting how it is possible to build a great microservice architecture using the service mesh ISTIO
Microservices With Istio Service Mesh
Microservices With Istio Service Mesh
Natanael Fonseca
Slides from DerbyCon 2016 presentation -- Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em'
Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
Huzeyfe Önal “Siber Tehdit Gözetleme ve SIEM Olarak Açık Kaynak Sistemlerin Kullanımı”
Siber Tehdit Gözetleme ve SIEM Olarak Açık Kaynak Sistemlerin Kullanımı
Siber Tehdit Gözetleme ve SIEM Olarak Açık Kaynak Sistemlerin Kullanımı
BGA Cyber Security
I presented some practical aspects of adopting SRE for your organization & how Kubernetes can help in that journey, based on my experience in building the SRE practice at WSO2. The WSO2 SRE team runs the WSO2 Choreo & Asgardeo clouds.
SRE & Kubernetes
SRE & Kubernetes
Afkham Azeez
basics of metasploit.
Metasploit
Metasploit
Lalith Sai
bilgi güvenliği,iso 27001,korelasyon,log yönetimi,siem
Bilgi Güvenliği ve Log Yönetimi Sistemlerinin Analizi
Bilgi Güvenliği ve Log Yönetimi Sistemlerinin Analizi
Ertugrul Akbas
Holynix v1
Holynix v1
BGA Cyber Security
"ReCertifying Active Directory was presented at BlackHat EU 2021 by Will Schroeder and Lee Christensen.
ReCertifying Active Directory
ReCertifying Active Directory
Will Schroeder
Apache Kafka for 010php Meetup
Apache Kafka - Event Sourcing, Monitoring, Librdkafka, Scaling & Partitioning
Apache Kafka - Event Sourcing, Monitoring, Librdkafka, Scaling & Partitioning
Guido Schmutz
Ray Kao and Kevin Harris from Microsoft presenting ‘Kubernetes Security with Calico and Open Policy Agent’ at the spring 2019 Kubernetes and Cloud Native meetup in Toronto.
Kubernetes Security with Calico and Open Policy Agent
Kubernetes Security with Calico and Open Policy Agent
CloudOps2005
The session will be about Twitter's RPC Library, Finagle. We well see why Finagle is a powerful library for asynchronous programming and will have a working implementation of simple use case.
Twitter Finagle
Twitter Finagle
Knoldus Inc.
Presentation from our meetup group Fullstack Developers Israel held Thursday 23rd of November 2017
Modern Monitoring [ with Prometheus ]
Modern Monitoring [ with Prometheus ]
Haggai Philip Zagury
How Epic Games is using ScyllaDB for distribution of large game assets used by Unreal Engine across the world —enabling game developers to more quickly build great games.
Using ScyllaDB for Distribution of Game Assets in Unreal Engine
Using ScyllaDB for Distribution of Game Assets in Unreal Engine
ScyllaDB
As cloud computing becomes of strategic importance in the enterprise, part of the solution is no longer on-premise but in the cloud, adding a layer of complexity. Edwin Chan demystifies performance testing of cloud systems and applications by addressing the following key questions: Is performance testing of cloud systems fundamentally different from testing on-premises applications? What are the best practices for performance testing of both cloud and on-premises systems? Performance testing of cloud systems is essentially the same as that of its on-premises counterpart with the exception of the key consideration of network latency. After clearing common misconceptions, Edwin shares the hot topic best practices—adopting an agile/lean methodology, conducting early performance testing, and automating the injection of test data. Discuss the challenges the testing team faces in these days of disruptive and fast-paced technology changes. Take back and apply some of the best practices that fit your organization’s need.
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based Systems
TechWell
The talk I gave at Black Hat USA 2016 on Anti Malware Scan Interface. The talk looks at what good AMSI brings to Windows 10 and various methods of avoiding/bypassing it.
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Nikhil Mittal
行動時代必用的網路行銷工具: -RWD網頁編輯器, 快速製作吸引的行銷主題頁, landing page, event site -20+行銷活動模組 (如票選比賽, 心理測驗, 幸運輪盤, 有獎徵答, IG hashtag, 刮刮卡, 發票登錄抽獎, 電子序號發送等), -比wordpress好用, 專為行銷人打造的內容管理系統 CMS, 讓你輕鬆做內容行銷, 經營社群互動, 成長顧客名單
發燒互動 2019 數位行銷工具方案
發燒互動 2019 數位行銷工具方案
Feversocial 發燒互動
行動時代的來臨, 讓很多企業來不及升級自己的官網, 網頁無法適應手機上的瀏覽. 而網友在越來越零碎的時間上網, 需要快速小口好吸收的內容及資訊.企業需要有效率的工具協助執行新型態的內容行銷. Feversocial推出 "行銷畫布" RWD網頁編輯器, 讓行銷人可以在行動時代快速製作各種主題活動頁, 不需要工程人員幫忙, 自己就可以輕鬆做出很吸睛的頁面. 可搭配Feversocial的20+互動模組, 讓行銷更活潑! RWD的版型及html文字編寫, 符合google網頁規範, 讓你的內容增加SEO效果! 最新的Zine品牌情報網誌功能, 可進一步把行銷頁標註類別標籤, 結集組織成新型態的網誌, 線上主題誌, 或幫官網添加一個活動頻道.
內容行銷: 如何在行動時代快速製作有效內容
內容行銷: 如何在行動時代快速製作有效內容
Feversocial 發燒互動
Weitere ähnliche Inhalte
Was ist angesagt?
An overview of deploying Redis on Kubernetes along with an extra section explaining how to expose our Redis cluster as a Key Value store that is reachable from the internet. Source code and deployment files are available here: https://github.com/IdanAtias/redis-on-k8s
Redis on Kubernetes
Redis on Kubernetes
Idan Atias
Gerekli olan EPS değerlerinin SIEM veya Log Yönetimi yazılımı tarafından sağlanıp sağlanamadığının testi.
Log yönetimi ve siem projelerindeki en önemli kriter EPS değerleri
Log yönetimi ve siem projelerindeki en önemli kriter EPS değerleri
Ertugrul Akbas
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
RootedCON
Have you ever wondered what the relative differences are between two of the more popular open source, in-memory data stores and caches? In this session, we will describe those differences and, more importantly, provide live demonstrations of the key capabilities that could have a major impact on your architectural Java application designs.
Redis vs Infinispan | DevNation Tech Talk
Redis vs Infinispan | DevNation Tech Talk
Red Hat Developers
The appeal of SaaS has many ISVs interested in the power and value of delivering their solutions in a SaaS model. However, moving a single-tenant application to a multi-tenant environment can be daunting. In this session, we'll look at the obstacles that many ISVs face as they consider the move to a SaaS delivery model. We'll explore a wide range of transformation patterns that cover everything from lift-and-shift of your monolith to an incremental cutover to multi-tenant aware microservices, data, and infrastructure. Along the way, we'll highlight the challenges and technical considerations that shape your solution and allow you to better align your transformed solution with SaaS best practices. This includes looking at all the new architectural elements you'll need to add to your environment to support SaaS (onboarding, identity, billing, metering, analytics, and so on).
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Amazon Web Services
Presenting how it is possible to build a great microservice architecture using the service mesh ISTIO
Microservices With Istio Service Mesh
Microservices With Istio Service Mesh
Natanael Fonseca
Slides from DerbyCon 2016 presentation -- Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em'
Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
Huzeyfe Önal “Siber Tehdit Gözetleme ve SIEM Olarak Açık Kaynak Sistemlerin Kullanımı”
Siber Tehdit Gözetleme ve SIEM Olarak Açık Kaynak Sistemlerin Kullanımı
Siber Tehdit Gözetleme ve SIEM Olarak Açık Kaynak Sistemlerin Kullanımı
BGA Cyber Security
I presented some practical aspects of adopting SRE for your organization & how Kubernetes can help in that journey, based on my experience in building the SRE practice at WSO2. The WSO2 SRE team runs the WSO2 Choreo & Asgardeo clouds.
SRE & Kubernetes
SRE & Kubernetes
Afkham Azeez
basics of metasploit.
Metasploit
Metasploit
Lalith Sai
bilgi güvenliği,iso 27001,korelasyon,log yönetimi,siem
Bilgi Güvenliği ve Log Yönetimi Sistemlerinin Analizi
Bilgi Güvenliği ve Log Yönetimi Sistemlerinin Analizi
Ertugrul Akbas
Holynix v1
Holynix v1
BGA Cyber Security
"ReCertifying Active Directory was presented at BlackHat EU 2021 by Will Schroeder and Lee Christensen.
ReCertifying Active Directory
ReCertifying Active Directory
Will Schroeder
Apache Kafka for 010php Meetup
Apache Kafka - Event Sourcing, Monitoring, Librdkafka, Scaling & Partitioning
Apache Kafka - Event Sourcing, Monitoring, Librdkafka, Scaling & Partitioning
Guido Schmutz
Ray Kao and Kevin Harris from Microsoft presenting ‘Kubernetes Security with Calico and Open Policy Agent’ at the spring 2019 Kubernetes and Cloud Native meetup in Toronto.
Kubernetes Security with Calico and Open Policy Agent
Kubernetes Security with Calico and Open Policy Agent
CloudOps2005
The session will be about Twitter's RPC Library, Finagle. We well see why Finagle is a powerful library for asynchronous programming and will have a working implementation of simple use case.
Twitter Finagle
Twitter Finagle
Knoldus Inc.
Presentation from our meetup group Fullstack Developers Israel held Thursday 23rd of November 2017
Modern Monitoring [ with Prometheus ]
Modern Monitoring [ with Prometheus ]
Haggai Philip Zagury
How Epic Games is using ScyllaDB for distribution of large game assets used by Unreal Engine across the world —enabling game developers to more quickly build great games.
Using ScyllaDB for Distribution of Game Assets in Unreal Engine
Using ScyllaDB for Distribution of Game Assets in Unreal Engine
ScyllaDB
As cloud computing becomes of strategic importance in the enterprise, part of the solution is no longer on-premise but in the cloud, adding a layer of complexity. Edwin Chan demystifies performance testing of cloud systems and applications by addressing the following key questions: Is performance testing of cloud systems fundamentally different from testing on-premises applications? What are the best practices for performance testing of both cloud and on-premises systems? Performance testing of cloud systems is essentially the same as that of its on-premises counterpart with the exception of the key consideration of network latency. After clearing common misconceptions, Edwin shares the hot topic best practices—adopting an agile/lean methodology, conducting early performance testing, and automating the injection of test data. Discuss the challenges the testing team faces in these days of disruptive and fast-paced technology changes. Take back and apply some of the best practices that fit your organization’s need.
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based Systems
TechWell
The talk I gave at Black Hat USA 2016 on Anti Malware Scan Interface. The talk looks at what good AMSI brings to Windows 10 and various methods of avoiding/bypassing it.
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Nikhil Mittal
Was ist angesagt?
(20)
Redis on Kubernetes
Redis on Kubernetes
Log yönetimi ve siem projelerindeki en önemli kriter EPS değerleri
Log yönetimi ve siem projelerindeki en önemli kriter EPS değerleri
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
Redis vs Infinispan | DevNation Tech Talk
Redis vs Infinispan | DevNation Tech Talk
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Microservices With Istio Service Mesh
Microservices With Istio Service Mesh
Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016
Siber Tehdit Gözetleme ve SIEM Olarak Açık Kaynak Sistemlerin Kullanımı
Siber Tehdit Gözetleme ve SIEM Olarak Açık Kaynak Sistemlerin Kullanımı
SRE & Kubernetes
SRE & Kubernetes
Metasploit
Metasploit
Bilgi Güvenliği ve Log Yönetimi Sistemlerinin Analizi
Bilgi Güvenliği ve Log Yönetimi Sistemlerinin Analizi
Holynix v1
Holynix v1
ReCertifying Active Directory
ReCertifying Active Directory
Apache Kafka - Event Sourcing, Monitoring, Librdkafka, Scaling & Partitioning
Apache Kafka - Event Sourcing, Monitoring, Librdkafka, Scaling & Partitioning
Kubernetes Security with Calico and Open Policy Agent
Kubernetes Security with Calico and Open Policy Agent
Twitter Finagle
Twitter Finagle
Modern Monitoring [ with Prometheus ]
Modern Monitoring [ with Prometheus ]
Using ScyllaDB for Distribution of Game Assets in Unreal Engine
Using ScyllaDB for Distribution of Game Assets in Unreal Engine
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based Systems
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Mehr von Feversocial 發燒互動
行動時代必用的網路行銷工具: -RWD網頁編輯器, 快速製作吸引的行銷主題頁, landing page, event site -20+行銷活動模組 (如票選比賽, 心理測驗, 幸運輪盤, 有獎徵答, IG hashtag, 刮刮卡, 發票登錄抽獎, 電子序號發送等), -比wordpress好用, 專為行銷人打造的內容管理系統 CMS, 讓你輕鬆做內容行銷, 經營社群互動, 成長顧客名單
發燒互動 2019 數位行銷工具方案
發燒互動 2019 數位行銷工具方案
Feversocial 發燒互動
行動時代的來臨, 讓很多企業來不及升級自己的官網, 網頁無法適應手機上的瀏覽. 而網友在越來越零碎的時間上網, 需要快速小口好吸收的內容及資訊.企業需要有效率的工具協助執行新型態的內容行銷. Feversocial推出 "行銷畫布" RWD網頁編輯器, 讓行銷人可以在行動時代快速製作各種主題活動頁, 不需要工程人員幫忙, 自己就可以輕鬆做出很吸睛的頁面. 可搭配Feversocial的20+互動模組, 讓行銷更活潑! RWD的版型及html文字編寫, 符合google網頁規範, 讓你的內容增加SEO效果! 最新的Zine品牌情報網誌功能, 可進一步把行銷頁標註類別標籤, 結集組織成新型態的網誌, 線上主題誌, 或幫官網添加一個活動頻道.
內容行銷: 如何在行動時代快速製作有效內容
內容行銷: 如何在行動時代快速製作有效內容
Feversocial 發燒互動
全方位行銷活動工具 解決各種行銷頁的需求,零工程開發! 網頁製作:行銷畫布編輯器 互動設計:多種行銷活動模組 網誌管理:行銷網誌內容管理平台 FeverSocial 你的行銷技術夥伴: blog.feversocial.com/tw
發燒互動 Feversocial 2018行銷工具方案介紹
發燒互動 Feversocial 2018行銷工具方案介紹
Feversocial 發燒互動
互動行銷 x 內容行銷 X 跨平台 X 社群擴散
發燒網 2016 社群行銷方案
發燒網 2016 社群行銷方案
Feversocial 發燒互動
發燒網持續協助品牌客戶及中小企業有效的社群行銷解決方案 近20種互動式病毒行銷模組- 1)收集潛在顧客資料 2)進一步了解顧客喜好及意見 3)讓粉絲創造個人化內容(User Generated Content UGC),協助宣傳擴散 4)藉由活動內容累積SEO效益 -協助企業累積自己的粉絲通訊資料庫 (social CRM),做為二次行銷的名單基礎 -協助企業拓展社群行銷的通路 1) 官網活動外掛插件 (website plug-in widget) 2) 手機活動解決方案 3) o2o虛實整合行銷 (行動電子優惠券導購, QR code從平面媒體或實體通路連結網路活動) 4) Line行銷
2015 發燒網社群行銷活動優惠方案
2015 發燒網社群行銷活動優惠方案
Feversocial 發燒互動
活動模式包括: 留言、投票、揪團、有獎徵答、翻牌遊戲、圖片上傳、圖片拼貼、體驗分享、打卡
發燒網活動機制簡介
發燒網活動機制簡介
Feversocial 發燒互動
如何設定發燒網的優惠券活動模式及連結到Facebook Offer
發燒網任務型優惠券+Facebook Offer
發燒網任務型優惠券+Facebook Offer
Feversocial 發燒互動
發燒網 Fever38.com [打卡活動] 簡介
發燒網 Fever38.com [打卡活動] 簡介
Feversocial 發燒互動
Mehr von Feversocial 發燒互動
(8)
發燒互動 2019 數位行銷工具方案
發燒互動 2019 數位行銷工具方案
內容行銷: 如何在行動時代快速製作有效內容
內容行銷: 如何在行動時代快速製作有效內容
發燒互動 Feversocial 2018行銷工具方案介紹
發燒互動 Feversocial 2018行銷工具方案介紹
發燒網 2016 社群行銷方案
發燒網 2016 社群行銷方案
2015 發燒網社群行銷活動優惠方案
2015 發燒網社群行銷活動優惠方案
發燒網活動機制簡介
發燒網活動機制簡介
發燒網任務型優惠券+Facebook Offer
發燒網任務型優惠券+Facebook Offer
發燒網 Fever38.com [打卡活動] 簡介
發燒網 Fever38.com [打卡活動] 簡介
Feversocial系統操作說明
1.
公司簡介 行銷系統操作說明
2.
Feversocial管理後台 2 https://feversocial.com/admin/
3.
新管理員註冊流程-授權 授權管理粉絲頁
4.
新管理員註冊流程-綁定粉絲頁 簡單填寫個人資料 選取要辦活動的粉絲頁
5.
後台首頁 5
6.
設定企業官網及社群帳號資料 6 官網及社群帳號URL會 默認顯示在網頁最底下
7.
新增管理員 ◉ FB粉絲頁管理員可以登入取得「Admin」身分, 並有 7 身分
下載參加者資料 粉絲頁管理員 Admin 默認可以 Email邀請 Editor 默認不可 (Feversocial可協助改權限)
8.
安裝GA及Facebook追蹤碼 8 追蹤碼可用於檢視網頁瀏覽數據、廣告成效及再行銷(remarketing) GA及FB
Pixel 以外的追蹤碼可用GTM管理
9.
進入活動設定或主題頁製作 9 網頁是否要包含互動模組? A.要 B.純內容頁面
10.
活動 編 輯-設
定 活 動 模 組
11.
設定活動:5步驟輕鬆設定 設 活動辦法 檻 參加資格 獎 活動獎項 挑 互動模組 11 樣 頁面設定 先設定活動流程及參加規則參數 再進入「行銷畫布」編輯器完成網頁排版
12.
Step 1: 挑選活動模組 尋找 意見 領袖 遊戲 比賽 網友 創作 活動模組說明請看:
tw.feversocial.com/campaign-manager-101 12 互動模組豐富度:輕鬆達成各種行銷目的並收集資料
13.
Step 2a-活動必填資料 13 如活動沒有幫網友產生個人文字的時 候,
FB分享po文標題會用這個標題
14.
Step 2b-其他活動資料 14 如活動沒有幫網友產生個人圖的時候, FB分享圖會用這張,
如留言活動 FB最佳尺寸為 2:1
15.
Step 3a-參加資格 ◉ 可限制參加者年齡及生日月份;系統檢查參加者的FB註冊生日 ◉
可要求參加者填寫報名資料才可符合得獎資格 15
16.
Step 3b-報名服務-自訂報名欄位 ◉ 基本欄位跟自訂欄位可自由搭配使用 ◉
活動也可不開啟報名表格 ◉ 欄位資料可CSV匯出 基本 欄位 自訂 欄位 16
17.
Step 4-設定給獎方式及獎品 ◉ 給獎方式:抽獎、參加就送、刮刮樂或不給獎* ◉
特殊給獎:集氣抽、天天抽、多重給獎 ◉ 獎品種類:電子優惠券/購物金序號、需寄送贈品 實體贈品 電子優惠券 優惠序號 刮刮卡 *投票,問答,心理測驗活動也可不給獎
18.
Step 4-設定給獎方式及獎品 ◉ 選擇給獎方式:抽獎、參加就送、刮刮樂或不給獎* ◉
設定獎品種類:電子優惠券/購物金序號、需寄送贈品 *投票,問答,心理測驗活動也可不給獎
19.
Step 4-設定集氣獎 ◉ 先設定所有抽獎獎品;
排第一的獎品為基本獎,依集氣難度排序剩下的獎品 ◉ 設定每個集氣獎項的參加人數門檻
20.
Step 4-上傳電子序號 不重複電子序號, 用於EC商店購物金 或實體通路優惠券兌換
21.
Step5: 設定流程背景 21 ◉ 此背景出現在參加活 動的動態頁面及活動 插件 ◉
可設定參加按鈕顏色 ◉ 背景可選擇顏色或圖, 也可保持透明 ◉ 可選擇白色或黑色遮 罩增加氣氛
22.
「行銷畫布」網頁編輯器
23.
進入「行銷畫布」網頁編輯器 ◉ 從編輯活動的介面 ◉
從建立或編輯主題頁的介面 23
24.
創作新主張:堆疊多個內容版塊,輕鬆排版 圖文、影片、輪播展示、各式插件,自由新增排版不費力 24 行銷畫布大圖解:https://page.feversocial.com/page/87/ 按「+」新增內容版塊 按齒輪設定版塊元件
25.
建立新的內容版塊: 選擇版塊元件 行銷畫布的頁面設計是由內容元件版塊疊成的,目前提供
7 種內容元件: 25 行銷畫布大圖解:https://tw.feversocial.com/feversocialtw/87
26.
版塊元件設定 ◉ 點齒輪按鈕叫出元件相關的設定,如背景, 遮罩色調,
布局寬窄等 26
27.
常用元件: 活動模組元件 27 Feversocial活動模組的相關元件會自動嵌入網頁
可設定布局寬窄及背景 可隱藏不需要的元件
28.
常用元件:“T”文字元件 28 可直接編輯文字,可設定1-3欄佈局,也可插入圖片 可直接編輯原始html碼
手機瀏覽時, RWD排版會從左到右、呈現一行一個文字版塊
29.
同步製作PC及手機版網頁,隨時可預覽 29
30.
活動管理 ( 含 得
獎 設 定 +資 料 下 載 )
31.
抽獎開獎說明 ◉ 發燒網設計完整參加者檢核及抽獎管理流程: 1. 資格審核 2.
抽獎、抽獎結果檢查、設定得獎、重抽 3. 公布得獎到活動頁 4. 發送得獎通知到網友FB註冊 email 5. 管理得獎人回填資料 31 下載報名表格資料
32.
1 活動進行中可隨時管理參加者資格 32
33.
2 抽獎、資格確定後設定得獎 選擇欲抽獎項 將不符合得獎資格者,取消核選 設定「有勾選」者得獎* *可給相關人員皆確認無誤後,再設定得獎 33
34.
3 正式公布得獎 34 網友領獎畫面
35.
4 製作email範本 批量通知得獎人 ◉
公布得獎人後可透過系統發送得獎email通知 (寄送到FB註冊email) 35 如果獎品是電子優惠券 可直接手機掃描核銷
36.
5 管理得獎人回填獎項寄送資料 ◉ 得獎人可回到活動頁填寫寄送獎品資料,
可修改資料 ◉ 系統自動建檔並提供名單下載至excel, 資料60天後自動隱藏 36
37.
下載報名表格資料 ◉ 系統提供名單下載至excel, 資料60天後自動隱藏 ◉
也可使用填表資料通知得獎人 37
38.
活動成效報表
39.
活動成效報表: 串接GA讓你全程掌握流量及參加轉換 參加轉換率、活動分享率及 停留時間讓你進一步了解活 動的吸引力及分享價值
40.
活動成效報表: 串接FB分析參加者面貌,找出KOL 影響力分析讓你挖掘誰 是你具有社群擴散力的 粉絲 參加者分析讓你檢 視目標族群的分佈 及影響力
41.
網站插件設定
42.
各式插件案例 ▲box ▲參加流程外掛 43 ▲倒數插件
43.
管理後台首頁-設定插件 44
44.
參加流程插件可設定寬度及邊框 • 寬度設定為PC 寬度 • 手機顯示會自動 調整 45
45.
Box模式可選擇點擊表現 • 插件視覺圖可更換 • 按鈕文字可自訂 •
寬度設定為PC寬度 • 手機顯示會自動調整 46
46.
倒數計時插件可製造參加急迫感 47 • 按鈕文字可自訂 • 限有結束日期的給獎活動
47.
把插件的JS碼嵌入網頁html 複製JS 碼 從主網站上稿後台貼入網頁 48如果同一個頁面要放置多個插件,要使用進階JS碼
48.
官 網 活
動 頻 道/品 牌誌 設 定
49.
品牌行銷誌服務 Zines 50 專為企業打造的RWD行銷網誌平台
以行銷畫布編輯器做為上稿系統,搭載 頁面分類管理以及內容分析數據報表功 能,讓企業可以更有效經營內容行銷 可納入Feversocial活動模組,讓網誌 更互動活潑 網誌 管理 網頁 製作 互動 設計 更多介紹: https://www.zines.cc/zines
50.
品牌誌管理後台 ◉ 結集用編輯器製作的主題頁及活動成一個活動頻道或網誌 ◉ 可將主題頁及活動做分類管理 ◉
可在頁面放置相關類別的文章推薦/輪播單元 51
51.
品牌誌初始設定 ◉ 網誌默認網址為 zines.cc/[品牌名稱];如有做網域介接,
可自訂子網域URL ◉ 社群資訊及追蹤碼設定讀取Feversocial的帳號設定 52
52.
品牌誌首頁設定 ◉ 可指定任何一個主題頁為網誌的首頁 ◉ 指定為首頁的網頁會轉址到網誌的首頁URL 53
53.
品牌誌全站選單設定 ◉ 可設定頁首的logo及單元選單 ◉ 每個網頁皆可選擇是否隱藏選單 54
54.
網頁類別管理 ◉ 每個網頁可設定多個分類 55
55.
設定分類頁面元件 在行銷畫布網頁編輯器裡選擇「分類頁面」版塊元件, 可設定類別標籤
系統依分類自動拉取符合的網頁,可做為推薦/輪播區塊
56.
Thank you for
your attention 有任何問題歡迎聯絡我們: cs@feversocial.com (02) 2738-8810
Jetzt herunterladen