Masuk
Tampilkan postingan dengan label web. Tampilkan semua postingan
Tampilkan postingan dengan label web. Tampilkan semua postingan

Minggu, 10 Juni 2012

Tips buat blog Yang Telah di Sandbox Google Panda

Sebagian dari sobat blogger mungkin belom tau apa itu Sandbox Google Panda?, Sandbox Google Panda adalah sebuah jurus kungfu Google panda yang sangat mematikan untuk sebuah situs atau kata lainnya sebuah peringatan keras yang di berikan google kepada sebuah situs.
Setelah update Google Panda di rilis oleh Google.inc kehawatiran Webmaster dunia begitu terlihat khususnya pada level situs-situs yang memiliki konten situs yang Low. pembahasan kali ini pada Bloggermaczsobat bloggr saya akan mencoba membahas bagaimana sih Tips yang baik untuk mengembalikan Situs Web yang terkena Sandbox panda.

Berikut Beberapa Tips Untuk Situs terkenal Sandbox panda

Sebelumnya saya pribadi pernah juga terkena sandbox panda ini hingga visitor dari situs saya turun hingga 50% dari visitor biasanya dan itu akan terus berkurang bila tak dilakukan Maintenance pada situs yang terkena tanparan panda.
Nah Apa yang saya lakukan untuk melakukan maintenance situs yang terkena pinalti panda ?
1. Konten Kualitas Renda Dan Konten Kualitas Tinggi
Saya pribadi mengakui adanya cela pada saat mengupdate situs yang memposting artikel yang kualitasnya di bawah rata-rata. Konten seperti ini biasa di hasilkan dari konten spin dan konten kopas. yah itu salah satu bagian dari seorang bloggermatre yang mencari raupan dollar dari hasil yang mudah dengan memanfaatkan Konten orang lain.
Setelah saya berhasil memisahkan mana konten yang betul-betul berkualitas tinggi dan mana konten yang berkualitas rendah, maka saya mendelate semua konten yang berkualitas rendah untuk meningkatkan penilaian dari quality google panda pada situs saya.
2. Broken Link / 404 Yang di Benci Panda
Setiap situs walaupun itu sebuah situs besar tidak luput dari adanya Broken link. semakin banyak broken link pada situs, semakin besar pula pengurangan popularitas dari situs itu dimata panda (Saya yakin seyakin yakinnya kalau ini termasuk situs AGC).
Untuk menghindari broken link pada situs anda silahkan lakukan pengecekan pada Google Webmaster tools anda secara berkala untuk menghapus broken link yang terindex oleh mesin serp.
3. Bangun Link Yang Betul betul Berkualitas
Ketika anda sudah terkena Sandbox Google Panda dan sudah melakukan sesuai yang saya rekomendasikan pada point 1 dan point 2 silahkan berikan situs anda link yang bertul-betul berkualitas dan pasang link dengan skedul yang terstuktur
Nah saya sudah memberikan bagaimana Tips yang musti anda lakukan bila situs anda terkena Sandbox Google panda. Tips yang saya berikan diatas adalah semua berdasarkan pengalaman pribadi saya pada saat terkena Sandbox Panda. semoga itu bisa memberikan manfaat untuk anda dalam Maintenance Sandbox Pada Pada Situs
READ MORE - Tips buat blog Yang Telah di Sandbox Google Panda

Sabtu, 05 Mei 2012

10 things why Slow Internet Speed

We all suffer at some point and it is very frustrating trying to find why the connection suddenly went to a snail's pace. This article looks at 10 for the most common reasons for slow internet speeds.

1. Some P2P software program that runs in the background or other computers that use all the bandwidth. Ensure that all P2P programs shut down at any computer at home and then re-test your connection.

2. Operating system or other programs on your computer may perform pembaruan.Ini is a common cause slowdowns on your internet connection. Check the windows taskbar icon and check the updates for other programs in the background updating

3. BT can do work on your telephone exchange as they perform routine maintenance on their systems. It could also be that the fault has developed in your telephone exchange.There are a number of web sites that allow you to check the status of your telephone one of which can be found at the end of this article

4. An error on the side of your internet service provider. You can usually tell whether this is the case by their service status on their website. If this happens you may have to wait until the problem is resolved or if not resolved within 24 hours to give a call.

5. Malware or spyware can often cause a slowdown of your internet connection because they can use the connections or restricting it. Perform a full malware scan with something like byte malware and virus scan will usually clear this

6. An incorrectly configured router can often be found to be the cause of slow internet connection. This can sometimes be resolved simply by changing the router off for 5 minutes and then brought him back.

7. Is someone at home streaming movies or play games online via Xbox or some other device? This is another common cause with the availability of streaming movies online.Make sure no other devices using the connection and then test your connection again

8. Someone leeching (use) your wireless network connection. Although not common now can still happen to an unprotected wireless network

9. Very low wireless signal if you use a wireless device
10. A problem with the internal wiring of your home can cause problems in internet speed.

READ MORE - 10 things why Slow Internet Speed

Secure is your computer

This is yet again emphasized the need to return to this very important subject related to IT and computer systems. and no one I know who do not have some form of security to him or his property. No matter whether they live in the 6-digit home or in rented accommodation. The action could range from a single key to a highly sophisticated alarm and surveillance systems, but the point is they all have some form of security.

The same should be true of our computer systems. No matter if your system is connected with national security or stand alone in your house, if it contains sensitive data for you, you should take steps to protect it.

In this article I will go through several steps that you can put into action to ensure that the candidate made life difficult for thieves.

Physical Step

When it comes to IT security world, it is easy to overlook the obvious. When I was at school one of the 'catch you out' questions like these:

"If a red house is made of red brick and yellow house made of yellow bricks, what is a green house made of?"

Logical answer is the only green bricks but the correct answer is glass. The question is posed in such a way as to lead you to think a certain way. When it comes to IT, for some reason we think of ways to manage complex security when some simple practical steps may be all thats needed.

Lock It Away

If you have a notebook make sure that you lock it away when not in use or away from your desk overnight. Although this may be convenient for the desktop is still an option. I know at least one major bank that puts all of its desktop pc into a strong room in the evening. It may be boring, but very effective.

Bolt It Down

If your computer is the server and then turn it off and store it may not be an option. Then consider a run down. You can purchase a safety cage that bolts to the floor and would take too long for a thief right to cut and steal.

Many of the appropriate server that comes with lockable front panel, which prevents the computer from being opened, and / or the drive is removed. Why not take advantage of this simple deterrent?

Monitor Sensitive Systems

If you are a business, then relatively little money is easy to set up surveillance. All you need is a security camera (low-cost starting from 200 pounds) is connected to the computer base. This system not only record events, but also can send images to a computer outside the office or even send alerts to your mobile phone. You can log into the camera from a remote site using the Internet, this is very useful if the alarm system goes off and you want to check out your place soon.

Other Options

Password Protect

You will be amazed at how many systems and sensitive documents do not have the security password. There are at least four important things about using a password.

Use strong passwords

A strong password has the following characteristics:

A mixture of lowercase /

Including the number

Includes characters such as @ &%

At least 8 characters.

If your password does not contain the above, then your system may have security equivalent of a rusty bolt with a few screws loose!

Do not use one password for everything

Change passwords on a regular basis

Some servers can be set to force a password change on a regular basis every month or whatever time scale you choose. This system can also force the password can not be reused in many cycles.

Never use a password system is sensitive to the unknown

It is the policy of the sound advice you have any questions. Break it at your peril. You have been warned. To do so is like leaving a full set of buttons labeled in a public place. There are several software products available in the market that keeps a history of logging all keys pressed on the keyboard. Some even detect a mouse click option. If you must use the password (perhaps in a life or death situation) on the unknown system to change your password as soon as you can from a secure system is known.

Write down your password!

Yes, I know many of you will read that twice and wanted to know if I've lost plot.The advice from any bank or institution never write your password down anywhere. I actually agree. You should never write your password in a form everyone can identify. But with so many passwords we need to remember, it is amazing that people use the same password over and over again? What I did, was write down my password is encrypted in a way that I can understand but no one else will know what the numbers mean. Most, if not all credit cards work with 4-digit pin number. What you can do is write it in the wrong order and add 1 or 2 more numbers in the same place each time or always add the same amount over the original number. Also, I never write my password or PIN number along with other sources, for example, I did not write the name of the bank with a number beside it. I designed a system to provide bank account name and password. If someone finds my list they will never know the meaning of information and are more likely than not throw it away.

Practice

Firewall

A unique problem associated with the IT theft is that the thief did not have to enter your property to gain access to sensitive systems or data. Thanks to the Internet can be a thief on the other side of the world, sits drinking coffee while he's stealing from you.

All businesses must have a firewall stop, full well! A good router comes with a built in firewall of varying quality. From behind the fire-walled router, will be the thief got the answer when he / she is trying to 'ping' your IP address to find out if there are computers at the other end. Do not worry about the technical terms, just Firewall makes your computer invisible to the outside world.

Prohibit / prevent the use of file transfer and chat programs

If you are a business router or a third-party software can restrict access to the file transfer program that is commonly used to download music or chat programs. The program can act as a gateway through your firewall security.

Security Software

If you are a home user or a business you should consider using one of the many third-party software package known as Internet Security. I recommend the one that marks a secure website for the search.

Protecting Mobile Devices

Many companies have the personnel who use mobile devices that contain up to date data is usually like email, milk and event reminders. Most of the devices synchronization with the main server in the office. The tool is easily susceptible to theft. What many users may not know is that they can be remotely removed from the sensitive data no matter where the design is in the world.

Backup

To protect your property it is common to insure against losses from fire, theft and accidental damage. There is no discussion about the security would be complete without mentioning the backup, the equivalent of accidental damage. Here, I just wanted to mention one method of backup that I asked about more and more these days - the backup site.

Many third-party groups are now offering offsite backup. The options available for home and business users. Of course there are some good points in favor of this option, but there are limitations that I would like to draw your attention to:

Should not be considered as an answer to the

It is rare that one solution fits all needs. For example, what happens if your broadband connection goes down?

The cost of money

Of course, as the services offered there are costs involved. Vendor service fees based on the amount of data stored offsite. Costs range widely. As a believer in 'you get what you pay for' You need to investigate each offer carefully.

Data transfer rates and the number of

You have to calculate how much data you need to go back. Remember that time offsite backup will depend on how fast your broadband connection (if you do not have a broadband option is a non starter). Most systems work by moving the first backup all the files - which can take days - then just do incremental backups thereafter.

If a service contract with your operator to limit the amount of data you can transfer you have to make sure you do not have problems of excess costs.

Generally, you can not beat doing a full backup and store the tapes offsite own. I see this as a good choice for small files but it is very important as a tool in the arsenal.

If you would like help or advice on any of the issues raised in this article please visit my website at http://www.bdp.co.uk

For further information or assistance from Steve R Bryan http://www.bryansdataprogramming.com please visit the website at where you can find information about products, services and download a free monthly newsletter Bryan Programming the data are packed full of the latest news, information and advice about computing world
READ MORE - Secure is your computer

Jumat, 04 Mei 2012

SEJARAH MY SQL


MySQL adalah sumber yang paling populer di dunia perangkat lunak database yang terbuka, dengan lebih dari 100 juta salinan perangkat lunak download atau didistribusikan sepanjang sejarah itu. Dengan kecepatan superior, kehandalan, dan kemudahan penggunaan, MySQL telah menjadi pilihan terbaik untuk Web, Web 2.0, SaaS, ISV, perusahaan Telecom dan berpikiran maju Manajer TI perusahaan karena menghilangkan masalah utama yang terkait dengan downtime, pemeliharaan dan administrasi untuk modern, aplikasi online.

                Banyak organisasi terbesar dan tercepat di dunia berkembang menggunakan MySQL untuk menghemat waktu dan uang powering situs bervolume tinggi Web mereka, sistem bisnis penting, dan paket perangkat lunak - termasuk pemimpin industri seperti Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube , Wikipedia, dan Booking.com.

                Korban kapal MySQL adalah MySQL Enterprise, satu set perangkat lunak produksi-diuji, alat monitor proaktif, dan premi layanan dukungan yang tersedia dalam berlangganan tahunan terjangkau.

                 MySQL adalah bagian penting dari LAMP (Linux, Apache, MySQL, PHP / Perl / Python), perusahaan perangkat lunak sumber terbuka yang cepat tumbuh stack. Semakin banyak perusahaan menggunakan LAMP sebagai alternatif untuk perangkat lunak berpemilik tumpukan mahal karena biaya rendah dan bebas dari platform kunci-dalam.

                 MySQL awalnya didirikan dan dikembangkan di Swedia oleh dua orang Swedia dan Finn: David Axmark, Allan Larsson, dan Michael "Monty" Widenius, yang telah bekerja bersama sejak tahun 1980-an. informasi sejarah lebih lanjut tentang MySQL tersedia di Wikipedia
Kami Lanjutan Nilai MySQL

Kami ingin database MySQL adalah:

    * Yang terbaik dan database yang paling banyak digunakan di dunia untuk aplikasi online
    
* Tersedia dan terjangkau untuk semua
    * Mudah digunakan
    * Terus ditingkatkan sambil tetap cepat, aman dan dapat diandalkan
    * Fun untuk menggunakan dan meningkatkan
    * Bebas dari bug

Kami ingin orang-orang yang bekerja pada MySQL untuk:
    * Berlangganan filosofi Open Source
    * Bertujuan untuk menjadi warga negara yang baik
    * Lebih suka mitra yang berbagi nilai-nilai dan pola pikir
    * Jawaban email dan memberikan bantuan kepada pengguna, pelanggan, mitra dan rekan kerja
    
* Jadilah sebuah organisasi virtual, jaringan dengan orang lain

READ MORE - SEJARAH MY SQL